Описание
ELSA-2010-0704: kernel security update (IMPORTANT)
[2.6.18-194.11.4.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043] [bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang) [orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) [orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to()
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh) [orabug 9245919]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
[2.6.18-194.11.4.el5]
- [misc] make compat_alloc_user_space() incorporate the access_ok() (Don Howard) [634463 634464] {CVE-2010-3081}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-194.11.4.0.1.el5
kernel-debug
2.6.18-194.11.4.0.1.el5
kernel-debug-devel
2.6.18-194.11.4.0.1.el5
kernel-devel
2.6.18-194.11.4.0.1.el5
kernel-doc
2.6.18-194.11.4.0.1.el5
kernel-headers
2.6.18-194.11.4.0.1.el5
kernel-xen
2.6.18-194.11.4.0.1.el5
kernel-xen-devel
2.6.18-194.11.4.0.1.el5
ocfs2-2.6.18-194.11.4.0.1.el5
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5debug
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5xen
1.4.7-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-194.11.4.0.1.el5
kernel-debug
2.6.18-194.11.4.0.1.el5
kernel-debug-devel
2.6.18-194.11.4.0.1.el5
kernel-devel
2.6.18-194.11.4.0.1.el5
kernel-doc
2.6.18-194.11.4.0.1.el5
kernel-headers
2.6.18-194.11.4.0.1.el5
kernel-xen
2.6.18-194.11.4.0.1.el5
kernel-xen-devel
2.6.18-194.11.4.0.1.el5
ocfs2-2.6.18-194.11.4.0.1.el5
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5debug
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5xen
1.4.7-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-194.11.4.0.1.el5
kernel-PAE
2.6.18-194.11.4.0.1.el5
kernel-PAE-devel
2.6.18-194.11.4.0.1.el5
kernel-debug
2.6.18-194.11.4.0.1.el5
kernel-debug-devel
2.6.18-194.11.4.0.1.el5
kernel-devel
2.6.18-194.11.4.0.1.el5
kernel-doc
2.6.18-194.11.4.0.1.el5
kernel-headers
2.6.18-194.11.4.0.1.el5
kernel-xen
2.6.18-194.11.4.0.1.el5
kernel-xen-devel
2.6.18-194.11.4.0.1.el5
ocfs2-2.6.18-194.11.4.0.1.el5
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5PAE
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5debug
1.4.7-1.el5
ocfs2-2.6.18-194.11.4.0.1.el5xen
1.4.7-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-194.11.4.0.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
The compat_alloc_user_space functions in include/asm/compat.h files in ...
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.