Описание
ELSA-2010-0792: kernel security update (IMPORTANT)
[2.6.18-194.17.4.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043] [bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang) [orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) [orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to()
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh) [orabug 9245919]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
- [ib] fix memory corruption (Andy Grover) [orabug 9972346]
[2.6.18-194.17.4.el5]
- [net] rds: fix local privilege escalation (Eugene Teo) [642897 642898] {CVE-2010-3904}
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-194.17.4.0.1.el5
kernel-debug
2.6.18-194.17.4.0.1.el5
kernel-debug-devel
2.6.18-194.17.4.0.1.el5
kernel-devel
2.6.18-194.17.4.0.1.el5
kernel-doc
2.6.18-194.17.4.0.1.el5
kernel-headers
2.6.18-194.17.4.0.1.el5
kernel-xen
2.6.18-194.17.4.0.1.el5
kernel-xen-devel
2.6.18-194.17.4.0.1.el5
ocfs2-2.6.18-194.17.4.0.1.el5
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5debug
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5xen
1.4.7-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-194.17.4.0.1.el5
kernel-debug
2.6.18-194.17.4.0.1.el5
kernel-debug-devel
2.6.18-194.17.4.0.1.el5
kernel-devel
2.6.18-194.17.4.0.1.el5
kernel-doc
2.6.18-194.17.4.0.1.el5
kernel-headers
2.6.18-194.17.4.0.1.el5
kernel-xen
2.6.18-194.17.4.0.1.el5
kernel-xen-devel
2.6.18-194.17.4.0.1.el5
ocfs2-2.6.18-194.17.4.0.1.el5
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5debug
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5xen
1.4.7-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-194.17.4.0.1.el5
kernel-PAE
2.6.18-194.17.4.0.1.el5
kernel-PAE-devel
2.6.18-194.17.4.0.1.el5
kernel-debug
2.6.18-194.17.4.0.1.el5
kernel-debug-devel
2.6.18-194.17.4.0.1.el5
kernel-devel
2.6.18-194.17.4.0.1.el5
kernel-doc
2.6.18-194.17.4.0.1.el5
kernel-headers
2.6.18-194.17.4.0.1.el5
kernel-xen
2.6.18-194.17.4.0.1.el5
kernel-xen-devel
2.6.18-194.17.4.0.1.el5
ocfs2-2.6.18-194.17.4.0.1.el5
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5PAE
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5debug
1.4.7-1.el5
ocfs2-2.6.18-194.17.4.0.1.el5xen
1.4.7-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-194.17.4.0.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
The rds_page_copy_user function in net/rds/page.c in the Reliable Data ...
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.