Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0661

Опубликовано: 31 авг. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0661: kernel security update (IMPORTANT)

[2.6.18-194.11.3.0.1.el5]

  • [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
  • Add entropy support to igb (John Sobecki) [orabug 7607479]
  • [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
  • [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043] [bz 7258]
  • [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
  • fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
  • [nfsd] fix failure of file creation from hpux client (Wen gang Wang) [orabug 7579314]
  • [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
  • [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) [orabug 9504524]
  • [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to()
  • [mm] Enhance shrink_zone patch allow full swap utilization, and also be NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh) [orabug 9245919]
  • [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465]
  • [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220]
  • Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
  • fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033]
  • [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]

[2.6.18-194.11.3.el5]

  • [mm] accept an abutting stack segment (Jiri Pirko) [607857 607858] {CVE-2010-2240}

[2.6.18-194.11.2.el5]

  • [mm] pass correct mm when growing stack (Jiri Pirko) [607857 607858] {CVE-2010-2240}
  • [mm] fix up some user-visible effects of stack guard page (Jiri Pirko) [607857 607858] {CVE-2010-2240}
  • [mm] fix page table unmap for stack guard page properly (Jiri Pirko) [607857 607858] {CVE-2010-2240}
  • [mm] fix missing unmap for stack guard page failure case (Jiri Pirko) [607857 607858] {CVE-2010-2240}
  • [mm] keep a guard page below a grow-down stack segment (Jiri Pirko) [607857 607858] {CVE-2010-2240}

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-194.11.3.0.1.el5

kernel-debug

2.6.18-194.11.3.0.1.el5

kernel-debug-devel

2.6.18-194.11.3.0.1.el5

kernel-devel

2.6.18-194.11.3.0.1.el5

kernel-doc

2.6.18-194.11.3.0.1.el5

kernel-headers

2.6.18-194.11.3.0.1.el5

kernel-xen

2.6.18-194.11.3.0.1.el5

kernel-xen-devel

2.6.18-194.11.3.0.1.el5

ocfs2-2.6.18-194.11.3.0.1.el5

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5debug

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5xen

1.4.7-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-194.11.3.0.1.el5

kernel-debug

2.6.18-194.11.3.0.1.el5

kernel-debug-devel

2.6.18-194.11.3.0.1.el5

kernel-devel

2.6.18-194.11.3.0.1.el5

kernel-doc

2.6.18-194.11.3.0.1.el5

kernel-headers

2.6.18-194.11.3.0.1.el5

kernel-xen

2.6.18-194.11.3.0.1.el5

kernel-xen-devel

2.6.18-194.11.3.0.1.el5

ocfs2-2.6.18-194.11.3.0.1.el5

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5debug

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5xen

1.4.7-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-194.11.3.0.1.el5

kernel-PAE

2.6.18-194.11.3.0.1.el5

kernel-PAE-devel

2.6.18-194.11.3.0.1.el5

kernel-debug

2.6.18-194.11.3.0.1.el5

kernel-debug-devel

2.6.18-194.11.3.0.1.el5

kernel-devel

2.6.18-194.11.3.0.1.el5

kernel-doc

2.6.18-194.11.3.0.1.el5

kernel-headers

2.6.18-194.11.3.0.1.el5

kernel-xen

2.6.18-194.11.3.0.1.el5

kernel-xen-devel

2.6.18-194.11.3.0.1.el5

ocfs2-2.6.18-194.11.3.0.1.el5

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5PAE

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5debug

1.4.7-1.el5

ocfs2-2.6.18-194.11.3.0.1.el5xen

1.4.7-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-194.11.3.0.1.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
почти 15 лет назад

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

redhat
почти 15 лет назад

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

nvd
почти 15 лет назад

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

debian
почти 15 лет назад

The do_anonymous_page function in mm/memory.c in the Linux kernel befo ...

github
около 3 лет назад

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

Уязвимость ELSA-2010-0661