ELSA-2013-0744

ELSA-2013-0744 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2013-04-23

Description


[2.6.32-358.6.1]
- [virt] kvm: accept unaligned MSR_KVM_SYSTEM_TIME writes (Petr Matousek) [917020 917021] {CVE-2013-1796}
- [char] tty: hold lock across tty buffer finding and buffer filling (Prarit Bhargava) [928686 901780]
- [net] tcp: fix for zero packets_in_flight was too broad (Thomas Graf) [927309 920794]
- [net] tcp: frto should not set snd_cwnd to 0 (Thomas Graf) [927309 920794]
- [net] tcp: fix an infinite loop in tcp_slow_start() (Thomas Graf) [927309 920794]
- [net] tcp: fix ABC in tcp_slow_start() (Thomas Graf) [927309 920794]
- [netdrv] ehea: avoid accessing a NULL vgrp (Steve Best) [921535 911359]
- [net] sunrpc: Get rid of the redundant xprt->shutdown bit field (J. Bruce Fields) [915579 893584]
- [virt] kvm: do not #GP on unaligned MSR_KVM_SYSTEM_TIME write (Gleb Natapov) [917020 917021] {CVE-2013-1796}
- [drm] i915: bounds check execbuffer relocation count (Nikola Pajkovsky) [920523 920525] {CVE-2013-0913}
- [x86] irq: add quirk for broken interrupt remapping on 55XX chipsets (Neil Horman) [911267 887006]
- [kvm] Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (Gleb Natapov) [917024 917025] {CVE-2013-1797}
- [kvm] Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (Gleb Natapov) [917020 917021] {CVE-2013-1796}
- [kvm] Fix bounds checking in ioapic indirect register reads (Gleb Natapov) [917030 917032] {CVE-2013-1798}
- [kvm] x86: release kvmclock page on reset (Gleb Natapov) [917024 917025] {CVE-2013-1797}
- [security] keys: Fix race with concurrent install_user_keyrings() (David Howells) [916681 913258] {CVE-2013-1792}
- [virt] hv_balloon: Make adjustments to the pressure report (Jason Wang) [909156 902232]

[2.6.32-358.5.1]
- [fs] xfs: use maximum schedule timeout when ail is empty (Brian Foster) [921958 883905]
- [net] xfrm_user: fix info leak in copy_to_user_tmpl() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_policy() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_state() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_auth() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] atm: fix info leak in getsockopt(SO_ATMPVC) (Thomas Graf) [922386 922387] {CVE-2012-6546}
- [net] atm: fix info leak via getsockname() (Thomas Graf) [922386 922387] {CVE-2012-6546}
- [fs] nls: improve UTF8 -> UTF16 string conversion routine (Nikola Pajkovsky) [916118 916119] {CVE-2013-1773}
- [fs] fat: Fix stat->f_namelen (Nikola Pajkovsky) [916118 916119] {CVE-2013-1773}
- [netdrv] tun: fix ioctl() based info leaks (Thomas Graf) [922350 922351] {CVE-2012-6547}
- [virt] x86: Add a check to catch Xen emulation of Hyper-V (Andrew Jones) [923204 918239]
- [fs] cifs: fix expand_dfs_referral (Sachin Prabhu) [923098 902492]
- [fs] cifs: factor smb_vol allocation out of cifs_setup_volume_info (Sachin Prabhu) [923098 902492]
- [fs] cifs: have cifs_cleanup_volume_info not take a double pointer (Sachin Prabhu) [923098 902492]
- [fs] nfs: Dont allow NFS silly-renamed files to be deleted, no signal (Dave Wysochanski) [920266 905095]

[2.6.32-358.4.1]
- [fs] NLM: Ensure that we resend all pending blocking locks after a reclaim (Steve Dickson) [921150 913704]
- [fs] xfs: remove log force from xfs_buf_cond_lock() (Brian Foster) [921961 896224]
- [fs] xfs: recheck buffer pinned status after push trylock failure (Brian Foster) [921961 896224]
- [fs] nfs: Ensure that we check lock exclusive/shared type against open modes (Dave Wysochanski) [920268 916324]
- [powerpc] pseries: Fix partition migration hang in stop_topology_update (Steve Best) [921963 910597]
- [infiniband] qib: correction for faulty sparse warning correction (Jay Fenlason) [922154 901701]
- [usb] io_ti: Fix NULL dereference in chase_port() (Nikola Pajkovsky) [916198 916200] {CVE-2013-1774}
- [net] bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Nikola Pajkovsky) [914690 914691] {CVE-2013-0349}
- [char] tty: set_termios/set_termiox should not return -EINTR (Oleg Nesterov) [921145 904907]
- [netdrv] ehea: fix VLAN support (Steve Best) [921535 911359]
- [net] xfrm_user: return error pointer instead of NULL (Thomas Graf) [919388 919389] {CVE-2013-1826}
- [net] dccp: check ccid before NULL poiter dereference (Weiping Pan) [919187 919188] {CVE-2013-1827}
- [mm] tmpfs: fix use-after-free of mempolicy object (Nikola Pajkovsky) [915714 915715] {CVE-2013-1767}
- [fs] fuse: set page_descs length in fuse_buffered_write() (Brian Foster) [916957 915135]
- [fs] vfs: fix pointer dereference validation in d_validate (Carlos Maiolino) [915583 876600]
- [fs] cifs: after upcalling for krb5 creds, invalidate key rather than revoking it (Niels de Vos) [912452 885899]
- [fs] cifs: tmp_key_invalidate() should not set key->expiry to 0 (Niels de Vos) [912452 885899]
- [block] disable discard request merge temporarily (Mike Snitzer) [911475 907844]

[2.6.32-358.3.1]
- [net] netfilter: improve out-of-sync situation in TCP tracking (Flavio Leitner) [917690 629857]


Related CVEs


CVE-2012-6546
CVE-2013-0349
CVE-2013-0913
CVE-2012-6547
CVE-2013-1796
CVE-2013-1798
CVE-2013-1773
CVE-2013-1792
CVE-2013-1797
CVE-2013-1827
CVE-2013-1774
CVE-2012-6537
CVE-2013-1767
CVE-2013-1826

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-358.6.1.el6.src.rpm7d44e2ffb738ef14c3b107254f5c35e335b2bb54541095e6792a2cda8f6440f5ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-358.6.1.el6.src.rpm7d44e2ffb738ef14c3b107254f5c35e335b2bb54541095e6792a2cda8f6440f5ELSA-2024-1831ol6_u4_i386_patch
kernel-2.6.32-358.6.1.el6.i686.rpmba1fa19594040f0c7c72ed064551899bb3bde1fcd2b84409f2183ff5bc481f95ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-358.6.1.el6.i686.rpmba1fa19594040f0c7c72ed064551899bb3bde1fcd2b84409f2183ff5bc481f95ELSA-2024-1831ol6_u4_i386_patch
kernel-debug-2.6.32-358.6.1.el6.i686.rpm186422187c841c79e4808102ed5a49aeee745e5a88556a3893190f0972dad878ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-358.6.1.el6.i686.rpm186422187c841c79e4808102ed5a49aeee745e5a88556a3893190f0972dad878ELSA-2024-1831ol6_u4_i386_patch
kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpmc69354460dbc037422ae3b24a58043fab0443aa88d1a1a4e73ff9e575dac5865ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpmc69354460dbc037422ae3b24a58043fab0443aa88d1a1a4e73ff9e575dac5865ELSA-2024-1831ol6_u4_i386_patch
kernel-devel-2.6.32-358.6.1.el6.i686.rpma6f3dca3e74c1e8440a8fc493eed157427ec5577872d15e61f4a836172130a55ELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-358.6.1.el6.i686.rpma6f3dca3e74c1e8440a8fc493eed157427ec5577872d15e61f4a836172130a55ELSA-2024-1831ol6_u4_i386_patch
kernel-doc-2.6.32-358.6.1.el6.noarch.rpm9a97ef091440338f3b4083c6ebd8a1b676c6541428ddeac74523e73fef8321c2ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-358.6.1.el6.noarch.rpm9a97ef091440338f3b4083c6ebd8a1b676c6541428ddeac74523e73fef8321c2ELSA-2024-1831ol6_u4_i386_patch
kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm898004e5f0fc01b7f55e3628cd2c633cc2a7c4f0603deb0790d27ae6f3336685ELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm898004e5f0fc01b7f55e3628cd2c633cc2a7c4f0603deb0790d27ae6f3336685ELSA-2024-1831ol6_u4_i386_patch
kernel-headers-2.6.32-358.6.1.el6.i686.rpm3b1c9747128d85fa834ca7b9888b6a495c1056ef5b0241ebd1a510d9d60a4187ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-358.6.1.el6.i686.rpm3b1c9747128d85fa834ca7b9888b6a495c1056ef5b0241ebd1a510d9d60a4187ELSA-2024-1831ol6_u4_i386_patch
perf-2.6.32-358.6.1.el6.i686.rpm2b765bcb0257ca61fa4c185e6ca2931efe43654af2f862c62969f1872e62976aELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-358.6.1.el6.i686.rpm2b765bcb0257ca61fa4c185e6ca2931efe43654af2f862c62969f1872e62976aELSA-2024-1831ol6_u4_i386_patch
python-perf-2.6.32-358.6.1.el6.i686.rpm06959e430950cbc384e6bd53c85b5b6091190d137b17f742f9f38333bab270f5ELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-358.6.1.el6.i686.rpm06959e430950cbc384e6bd53c85b5b6091190d137b17f742f9f38333bab270f5ELSA-2024-1831ol6_u4_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-358.6.1.el6.src.rpm7d44e2ffb738ef14c3b107254f5c35e335b2bb54541095e6792a2cda8f6440f5ELSA-2024-1831ol6_u4_x86_64_patch
kernel-2.6.32-358.6.1.el6.src.rpm7d44e2ffb738ef14c3b107254f5c35e335b2bb54541095e6792a2cda8f6440f5ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-358.6.1.el6.x86_64.rpm1f6171b0fbc0658054e2b9a9e6be73a341e72488378f6c21a32ccc41fa9f71b5ELSA-2024-1831ol6_u4_x86_64_patch
kernel-2.6.32-358.6.1.el6.x86_64.rpm1f6171b0fbc0658054e2b9a9e6be73a341e72488378f6c21a32ccc41fa9f71b5ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm5faebd82c0f6ccbe555e6b85ea774538be705ce7c8f283ac0e77dbb1d8042e17ELSA-2024-1831ol6_u4_x86_64_patch
kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm5faebd82c0f6ccbe555e6b85ea774538be705ce7c8f283ac0e77dbb1d8042e17ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpmde99fcbd401a2caa539d499e6311c130cf3c3a91604fd4d9208eafdae8c15a3eELSA-2024-1831ol6_u4_x86_64_patch
kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpmde99fcbd401a2caa539d499e6311c130cf3c3a91604fd4d9208eafdae8c15a3eELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm96230fe1b911c29b749b9c584783a02b1aced9cfb0a945b37376b0bf3f634419ELSA-2024-1831ol6_u4_x86_64_patch
kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm96230fe1b911c29b749b9c584783a02b1aced9cfb0a945b37376b0bf3f634419ELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-358.6.1.el6.noarch.rpm9a97ef091440338f3b4083c6ebd8a1b676c6541428ddeac74523e73fef8321c2ELSA-2024-1831ol6_u4_x86_64_patch
kernel-doc-2.6.32-358.6.1.el6.noarch.rpm9a97ef091440338f3b4083c6ebd8a1b676c6541428ddeac74523e73fef8321c2ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm898004e5f0fc01b7f55e3628cd2c633cc2a7c4f0603deb0790d27ae6f3336685ELSA-2024-1831ol6_u4_x86_64_patch
kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm898004e5f0fc01b7f55e3628cd2c633cc2a7c4f0603deb0790d27ae6f3336685ELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-358.6.1.el6.x86_64.rpmc17f20219529d87ef592ecfb3dd4fa1c18a164e0e646f83bbe4f35b30a1fddf3ELSA-2024-1831ol6_u4_x86_64_patch
kernel-headers-2.6.32-358.6.1.el6.x86_64.rpmc17f20219529d87ef592ecfb3dd4fa1c18a164e0e646f83bbe4f35b30a1fddf3ELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-358.6.1.el6.x86_64.rpm8a0537ade4213d53991ad13a602e6afeac468312d6d45903cd97b351d8291339ELSA-2024-1831ol6_u4_x86_64_patch
perf-2.6.32-358.6.1.el6.x86_64.rpm8a0537ade4213d53991ad13a602e6afeac468312d6d45903cd97b351d8291339ELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-358.6.1.el6.x86_64.rpm0d792255a144b83388f88ae9ca2ef75dfaa9c061c8f072ae5ec00202daaac69fELSA-2024-1831ol6_u4_x86_64_patch
python-perf-2.6.32-358.6.1.el6.x86_64.rpm0d792255a144b83388f88ae9ca2ef75dfaa9c061c8f072ae5ec00202daaac69fELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete