Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0398

Опубликовано: 06 мая 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0398: kernel security and bug fix update (IMPORTANT)

[2.6.18-194.3.1.0.1.el5]

  • [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
  • Add entropy support to igb (John Sobecki) [orabug 7607479]
  • [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
  • [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043] [bz 7258]
  • [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
  • fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
  • [nfsd] fix failure of file creation from hpux client (Wen gang Wang) [orabug 7579314]
  • [nfs] -revert return code check to avoid EIO (Chuck Lever, Guru Anbalagane) [Orabug 9448515]
  • [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
  • [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) [orabug 9504524]
  • [mm] Set hugepages dirty bit so vm.drop_caches does not corrupt (John Sobecki) [orabug 9461825]
  • [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to()

[2.6.18-194.3.1.el5]

  • [net] bnx2: fix lost MSI-X problem on 5709 NICs (John Feeney) [587799 511368]

[2.6.18-194.2.1.el5]

  • [cpu] fix boot crash in 32-bit install on AMD cpus (Bhavna Sarathy) [580846 575799]

[2.6.18-194.1.1.el5]

  • [xen] arpl on MMIO area crashes the guest (Paolo Bonzini) [572979 572982] {CVE-2010-0730}
  • [mm] fix boot on s390x after bootmem overlap patch (Amerigo Wang) [580838 550974]
  • [net] bnx2: avoid restarting cnic in some contexts (Andy Gospodarek) [581148 554706]
  • [iscsi] fix slow failover times (Mike Christie) [580840 570681]
  • [misc] kernel: fix elf load DoS on x86_64 (Danny Feng) [560552 560553] {CVE-2010-0307}
  • [netlink] connector: delete buggy notification code (Jiri Olsa) [561684 561685] {CVE-2010-0410}
  • [sound] hda_intel: avoid divide by zero in azx devices (Jaroslav Kysela) [567171 567172] {CVE-2010-1085}
  • [dvb] fix endless loop when decoding ULE at dvb-core (Mauro Carvalho Chehab) [569241 569242] {CVE-2010-1086}
  • [scsi] fnic: fix tx queue handling (Mike Christie) [580829 576709]
  • [fusion] mptsas: fix event_data alignment (Tomas Henzl) [580832 570000]
  • [edac] fix internal error message in amd64_edac driver (Bhavna Sarathy) [580836 569938]
  • [x86_64] fix floating point state corruption after signal (Oleg Nesterov) [580841 560891]
  • [mm] don't let reserved memory overlap bootmem_map (Amerigo Wang) [580838 550974]
  • [s390] kernel: correct TLB flush of page table entries (Hendrik Brueckner) [580839 545527]
  • [xen] iommu: clear IO-APIC pins on boot and shutdown (Paolo Bonzini) [580199 548201]
  • [xen] vtd: fix ioapic pin array (Don Dugger) [581150 563546]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-194.3.1.0.1.el5

kernel-debug

2.6.18-194.3.1.0.1.el5

kernel-debug-devel

2.6.18-194.3.1.0.1.el5

kernel-devel

2.6.18-194.3.1.0.1.el5

kernel-doc

2.6.18-194.3.1.0.1.el5

kernel-headers

2.6.18-194.3.1.0.1.el5

kernel-xen

2.6.18-194.3.1.0.1.el5

kernel-xen-devel

2.6.18-194.3.1.0.1.el5

ocfs2-2.6.18-194.3.1.0.1.el5

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5debug

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5xen

1.4.7-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-194.3.1.0.1.el5

kernel-debug

2.6.18-194.3.1.0.1.el5

kernel-debug-devel

2.6.18-194.3.1.0.1.el5

kernel-devel

2.6.18-194.3.1.0.1.el5

kernel-doc

2.6.18-194.3.1.0.1.el5

kernel-headers

2.6.18-194.3.1.0.1.el5

kernel-xen

2.6.18-194.3.1.0.1.el5

kernel-xen-devel

2.6.18-194.3.1.0.1.el5

ocfs2-2.6.18-194.3.1.0.1.el5

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5debug

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5xen

1.4.7-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-194.3.1.0.1.el5

kernel-PAE

2.6.18-194.3.1.0.1.el5

kernel-PAE-devel

2.6.18-194.3.1.0.1.el5

kernel-debug

2.6.18-194.3.1.0.1.el5

kernel-debug-devel

2.6.18-194.3.1.0.1.el5

kernel-devel

2.6.18-194.3.1.0.1.el5

kernel-doc

2.6.18-194.3.1.0.1.el5

kernel-headers

2.6.18-194.3.1.0.1.el5

kernel-xen

2.6.18-194.3.1.0.1.el5

kernel-xen-devel

2.6.18-194.3.1.0.1.el5

ocfs2-2.6.18-194.3.1.0.1.el5

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5PAE

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5debug

1.4.7-1.el5

ocfs2-2.6.18-194.3.1.0.1.el5xen

1.4.7-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-194.3.1.0.1.el5xen

2.0.5-1.el5

Связанные уязвимости

ubuntu
больше 15 лет назад

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.

redhat
больше 15 лет назад

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.

nvd
больше 15 лет назад

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.

debian
больше 15 лет назад

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel be ...

github
около 3 лет назад

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.

Уязвимость ELSA-2010-0398