kernel security and bug fix update

2008-07-24T00:00:00
ID ELSA-2008-0607
Type oraclelinux
Reporter Oracle
Modified 2008-07-24T00:00:00

Description

[2.6.9-67.0.22.0.1.EL] - fix skb alignment that was causing sendto() to fail with EFAULT (Olaf Kirch) [orabug 6845794] - fix entropy flag in bnx2 driver to generate entropy pool (John Sobecki) [orabug 5931647] - fix enomem due to larger mtu size page alloc (Zach Brown) [orabug 5486128] - fix per_cpu() api bug_on with rds (Zach Brown) [orabug 5760648] - remove patch sysrq-b that queues upto keventd thread [orabug 6125546] - allow more than 4GB hugepage for single user (Herbert van den Bergh) [orabug 6002738] - netrx/netpoll race avoidance (Tina Yang) [orabug 6143381] - fix pv guest oops on live migration (Chuck Anderson) [orabugz 4118]

[2.6.9-67.0.22] -[revert] sys_times: Fix system unresponsiveness during many concurrent invocation of sys_times (Vitaly Mayatskikh) [449101 435280]

[2.6.9-67.0.21] -rpc: do not block on skb allocation (Jeff Layton) [450185 439436] -Fix deadlock possibility in arch_get_unmapped_area_topdown() (Vitaly Mayatskikh) [450760 450094] -[usb] ohci-hcd: Fix kernel failed to boot and dropped to xmon on ppc64 (Vitaly Mayatskikh) [450865 443052] -sctp: make sure length argument passed does not overflow (Neil Horman) [452479 452480] {CVE-2008-2826} -sit: Fix exploitable remote memory leak (Jiri Pirko) [446035 446036] {CVE-2008-2136}