Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1455

Опубликовано: 30 сент. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1455: kernel security and bug fix update (MODERATE)

[2.6.18-164.2.1.0.1.el5]

  • [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
  • Add entropy support to igb ( John Sobecki) [orabug 7607479]
  • [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
  • [NET] Add xen pv/bonding netconsole support (Tina yang) [orabug 6993043] [bz 7258]
  • [MM] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
  • fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
  • [nfsd] fix failure of file creation from hpux client (Wen gang Wang) [orabug 7579314]

[2.6.18-164.2.1.el5]

  • [x86_64] kvm: bound last_kvm to prevent backwards time (Glauber Costa ) [524527 524076]
  • [x86] kvm: fix vsyscall going backwards (Glauber Costa ) [524527 524076]
  • [misc] fix RNG to not use first generated random block (Neil Horman ) [523289 522860]
  • [x86] kvm: mark kvmclock_init as cpuinit (Glauber Costa ) [524151 523450]
  • [x86_64] kvm: allow kvmclock to be overwritten (Glauber Costa ) [524150 523447]
  • [x86] kvmclock: fix bogus wallclock value (Glauber Costa ) [524152 519771]
  • [scsi] scsi_dh_rdace: add more sun hardware (mchristi@redhat.com ) [523237 518496]
  • [misc] cprng: fix cont test to be fips compliant (Neil Horman ) [523290 523259]
  • [net] bridge: fix LRO crash with tun (Andy Gospodarek ) [522636 483646]
  • Revert: [x86_64] fix gettimeoday TSC overflow issue - 1 (Don Zickus ) [489847 467942]
  • Revert: [net] atalk/irda: memory leak to user in getname (Danny Feng ) [519309 519310] {CVE-2009-3001 CVE-2009-3002}

[2.6.18-164.1.1.el5]

  • [net] sky2: revert some phy power refactoring changes (Neil Horman ) [517976 509891]
  • [net] atalk/irda: memory leak to user in getname (Danny Feng ) [519309 519310] {CVE-2009-3001 CVE-2009-3002}
  • [x86_64] fix gettimeoday TSC overflow issue - 1 (Prarit Bhargava ) [489847 467942]
  • [md] prevent crash when accessing suspend_* sysfs attr (Danny Feng ) [518135 518136] {CVE-2009-2849}
  • [nfs] nlm_lookup_host: don't return invalidated nlm_host (Sachin S. Prabhu ) [517967 507549]
  • [net] bonding: tlb/alb: set active slave when enslaving (Jiri Pirko ) [517971 499884]
  • [nfs] r/w I/O perf degraded by FLUSH_STABLE page flush (Peter Staubach ) [521244 498433]
  • [SELinux] allow preemption b/w transition perm checks (Eric Paris ) [520919 516216]
  • [scsi] scsi_transport_fc: fc_user_scan correction (David Milburn ) [521239 515176]
  • [net] tg3: refrain from touching MPS (John Feeney ) [521241 516123]
  • [net] qlge: fix hangs and read performance (Marcus Barrow ) [519783 517893]
  • [scsi] qla2xxx: allow use of MSI when MSI-X disabled (Marcus Barrow ) [519782 517922]
  • [net] mlx4_en fix for vlan traffic (Doug Ledford ) [520906 514141]
  • [net] mlx4_core: fails to load on large systems (Doug Ledford ) [520908 514147]
  • [x86] disable kvmclock by default (Glauber Costa ) [520685 476075]
  • [x86] disable kvmclock when shuting the machine down (Glauber Costa ) [520685 476075]
  • [x86] re-register clock area in prepare_boot_cpu (Glauber Costa ) [520685 476075]
  • [x86] kvmclock smp support (Glauber Costa ) [520685 476075]
  • [x86] use kvm wallclock (Glauber Costa ) [520685 476075]
  • [x86_64] kvm clocksource's implementation (Glauber Costa ) [520685 476075]
  • [x86] kvm: import kvmclock.c (Glauber Costa ) [520685 476075]
  • [x86] kvm: import pvclock.c and headers (Glauber Costa ) [520685 476075]
  • [x86] export additional cpu flags in /proc/cpuinfo (Prarit Bhargava ) [520686 517928]
  • [x86] detect APIC clock calibration problems (Prarit Bhargava ) [521238 503957]
  • [x86] pnpacpi: fix serial ports on IBM Point-of-Sale HW (Kevin Monroe ) [520905 506799]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-164.2.1.0.1.el5

kernel-debug

2.6.18-164.2.1.0.1.el5

kernel-debug-devel

2.6.18-164.2.1.0.1.el5

kernel-devel

2.6.18-164.2.1.0.1.el5

kernel-doc

2.6.18-164.2.1.0.1.el5

kernel-headers

2.6.18-164.2.1.0.1.el5

kernel-xen

2.6.18-164.2.1.0.1.el5

kernel-xen-devel

2.6.18-164.2.1.0.1.el5

ocfs2-2.6.18-164.2.1.0.1.el5

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5debug

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5xen

1.4.4-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-164.2.1.0.1.el5

kernel-debug

2.6.18-164.2.1.0.1.el5

kernel-debug-devel

2.6.18-164.2.1.0.1.el5

kernel-devel

2.6.18-164.2.1.0.1.el5

kernel-doc

2.6.18-164.2.1.0.1.el5

kernel-headers

2.6.18-164.2.1.0.1.el5

kernel-xen

2.6.18-164.2.1.0.1.el5

kernel-xen-devel

2.6.18-164.2.1.0.1.el5

ocfs2-2.6.18-164.2.1.0.1.el5

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5debug

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5xen

1.4.4-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-164.2.1.0.1.el5

kernel-PAE

2.6.18-164.2.1.0.1.el5

kernel-PAE-devel

2.6.18-164.2.1.0.1.el5

kernel-debug

2.6.18-164.2.1.0.1.el5

kernel-debug-devel

2.6.18-164.2.1.0.1.el5

kernel-devel

2.6.18-164.2.1.0.1.el5

kernel-doc

2.6.18-164.2.1.0.1.el5

kernel-headers

2.6.18-164.2.1.0.1.el5

kernel-xen

2.6.18-164.2.1.0.1.el5

kernel-xen-devel

2.6.18-164.2.1.0.1.el5

ocfs2-2.6.18-164.2.1.0.1.el5

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5PAE

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5debug

1.4.4-1.el5

ocfs2-2.6.18-164.2.1.0.1.el5xen

1.4.4-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-164.2.1.0.1.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
почти 16 лет назад

The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to "suspend_* sysfs attributes" and the (1) suspend_lo_store or (2) suspend_hi_store functions. NOTE: this is only a vulnerability when sysfs is writable by an attacker.

redhat
почти 16 лет назад

The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to "suspend_* sysfs attributes" and the (1) suspend_lo_store or (2) suspend_hi_store functions. NOTE: this is only a vulnerability when sysfs is writable by an attacker.

nvd
почти 16 лет назад

The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to "suspend_* sysfs attributes" and the (1) suspend_lo_store or (2) suspend_hi_store functions. NOTE: this is only a vulnerability when sysfs is writable by an attacker.

debian
почти 16 лет назад

The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 mi ...

github
около 3 лет назад

The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to "suspend_* sysfs attributes" and the (1) suspend_lo_store or (2) suspend_hi_store functions. NOTE: this is only a vulnerability when sysfs is writable by an attacker.

Уязвимость ELSA-2009-1455