ELSA-2013-1173

ELSA-2013-1173 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2013-08-27

Description


[2.6.32-358.18.1]
- [x86] perf/x86: Fix offcore_rsp valid mask for SNB/IVB (Nikola Pajkovsky) [971314 971315] {CVE-2013-2146}
- [net] br: fix schedule while atomic issue in br_features_recompute() (Jiri Pirko) [990464 980876]
- [scsi] isci: Fix a race condition in the SSP task management path (David Milburn) [990470 978609]
- [bluetooth] L2CAP - Fix info leak via getsockname() (Jacob Tanenbaum) [922417 922418] {CVE-2012-6544}
- [bluetooth] HCI - Fix info leak in getsockopt() (Jacob Tanenbaum) [922417 922418] {CVE-2012-6544}
- [net] tuntap: initialize vlan_features (Vlad Yasevich) [984524 951458]
- [net] af_key: initialize satype in key_notify_policy_flush() (Thomas Graf) [981225 981227] {CVE-2013-2237}
- [usb] uhci: fix for suspend of virtual HP controller (Gopal) [982697 960026]
- [usb] uhci: Remove PCI dependencies from uhci-hub (Gopal) [982697 960026]
- [netdrv] bnx2x: Change MDIO clock settings (Michal Schmidt) [982116 901747]
- [scsi] st: Take additional queue ref in st_probe (Tomas Henzl) [979293 927988]
- [kernel] audit: wait_for_auditd() should use TASK_UNINTERRUPTIBLE (Oleg Nesterov) [982472 962976]
- [kernel] audit: avoid negative sleep durations (Oleg Nesterov) [982472 962976]
- [fs] ext4/jbd2: dont wait (forever) for stale tid caused by wraparound (Eric Sandeen) [963557 955807]
- [fs] jbd: dont wait (forever) for stale tid caused by wraparound (Eric Sandeen) [963557 955807]
- [fs] ext4: fix waiting and sending of a barrier in ext4_sync_file() (Eric Sandeen) [963557 955807]
- [fs] jbd2: Add function jbd2_trans_will_send_data_barrier() (Eric Sandeen) [963557 955807]
- [fs] jbd2: fix sending of data flush on journal commit (Eric Sandeen) [963557 955807]
- [fs] ext4: fix fdatasync() for files with only i_size changes (Eric Sandeen) [963557 955807]
- [fs] ext4: Initialize fsync transaction ids in ext4_new_inode() (Eric Sandeen) [963557 955807]
- [fs] ext4: Rewrite __jbd2_log_start_commit logic to match upstream (Eric Sandeen) [963557 955807]
- [net] bridge: Set vlan_features to allow offloads on vlans (Vlad Yasevich) [984524 951458]
- [virt] virtio-net: initialize vlan_features (Vlad Yasevich) [984524 951458]
- [mm] swap: avoid read_swap_cache_async() race to deadlock while waiting on discard I/O completion (Rafael Aquini) [977668 827548]
- [dma] ioat: Fix excessive CPU utilization (John Feeney) [982758 883575]
- [fs] vfs: revert most of dcache remove d_mounted (Ian Kent) [974597 907512]
- [fs] xfs: don't free EFIs before the EFDs are committed (Carlos Maiolino) [975578 947582]
- [fs] xfs: pass shutdown method into xfs_trans_ail_delete_bulk (Carlos Maiolino) [975576 805407]
- [net] ipv6: bind() use stronger condition for bind_conflict (Flavio Leitner) [989923 917872]
- [net] tcp: bind() use stronger condition for bind_conflict (Flavio Leitner) [977680 894683]
- [x86] remove BUG_ON(TS_USEDFPU) in __sanitize_i387_state() (Oleg Nesterov) [956054 920445]
- [fs] coredump: ensure the fpu state is flushed for proper multi-threaded core dump (Oleg Nesterov) [956054 920445]

[2.6.32-358.17.1]
- [net] ipv4: fix invalid free in ip_cmsg_send() callers (Petr Matousek) [980144 979788] {CVE-2013-2224}
- [net] sctp: Use correct sideffect command in duplicate cookie handling (Daniel Borkmann) [976571 963843] {CVE-2013-2206}
- [virt] kvm: limit difference between kvmclock updates (Marcelo Tosatti) [979912 952174]

[2.6.32-358.16.1]
- [net] ipv6: ip6_sk_dst_check() must not assume ipv6 dst (Jiri Pirko) [981558 981559]
- [x86] Revert: Allow greater than 1TB of RAM on AMD x86_64 sytems (Larry Woodman) [982703 970735]
- [x86] Revert: Prevent panic in init_memory_mapping() when booting more than 1TB on AMD systems (Larry Woodman) [982703 970735]
- [mm] reinstate the first-fit scheme for arch_get_unmapped_area_topdown() (Rafael Aquini) [982571 980273]

[2.6.32-358.15.1]
- [mm] block: optionally snapshot page contents to provide stable pages during write (Rafael Aquini) [981177 951937]
- [mm] only enforce stable page writes if the backing device requires it (Rafael Aquini) [981177 951937]
- [mm] bdi: allow block devices to say that they require stable page writes (Rafael Aquini) [981177 951937]
- [mm] fix writeback_in_progress() (Rafael Aquini) [981177 951937]
- [kernel] sched: Do not account bogus utime (Stanislaw Gruszka) [959930 912662]
- [kernel] sched: Avoid cputime scaling overflow (Stanislaw Gruszka) [959930 912662]
- [char] n_tty: Remove BUG_ON from n_tty_read() (Stanislaw Gruszka) [982496 848085]


Related CVEs


CVE-2013-2146
CVE-2013-2237
CVE-2013-2224
CVE-2013-2232
CVE-2012-6544
CVE-2013-2206

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-358.18.1.el6.src.rpm96d24e66d4075f285e69f14741dd3e3aa44076756de20610aec146277a8a2158ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-358.18.1.el6.src.rpm96d24e66d4075f285e69f14741dd3e3aa44076756de20610aec146277a8a2158ELSA-2024-1831ol6_u4_i386_patch
kernel-2.6.32-358.18.1.el6.i686.rpmbada85e90adfb0abb976157fa7719003a26d0f8f14797e1a734865464ec8387cELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-358.18.1.el6.i686.rpmbada85e90adfb0abb976157fa7719003a26d0f8f14797e1a734865464ec8387cELSA-2024-1831ol6_u4_i386_patch
kernel-debug-2.6.32-358.18.1.el6.i686.rpm9439f684206e69bda80c191bd422ab2d01e41de44c99ccd0210852d908a51773ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-358.18.1.el6.i686.rpm9439f684206e69bda80c191bd422ab2d01e41de44c99ccd0210852d908a51773ELSA-2024-1831ol6_u4_i386_patch
kernel-debug-devel-2.6.32-358.18.1.el6.i686.rpmd7ef6c2f92095552709505333e1664983bfb6642391766950d16ff7e26dd85a1ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-358.18.1.el6.i686.rpmd7ef6c2f92095552709505333e1664983bfb6642391766950d16ff7e26dd85a1ELSA-2024-1831ol6_u4_i386_patch
kernel-devel-2.6.32-358.18.1.el6.i686.rpm310ea9a53ad709bf76e7684aeab8ec43705b6f492e3801f4831e51254dcfa2e0ELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-358.18.1.el6.i686.rpm310ea9a53ad709bf76e7684aeab8ec43705b6f492e3801f4831e51254dcfa2e0ELSA-2024-1831ol6_u4_i386_patch
kernel-doc-2.6.32-358.18.1.el6.noarch.rpm568e2e6deb71010b5397089416ff8da27426f195aa245168a0c2454ac2865b72ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-358.18.1.el6.noarch.rpm568e2e6deb71010b5397089416ff8da27426f195aa245168a0c2454ac2865b72ELSA-2024-1831ol6_u4_i386_patch
kernel-firmware-2.6.32-358.18.1.el6.noarch.rpm64a128bb143dd4adc9855a18cd669ed8b2c2a0f7e5d33eb644b752d3e55e291dELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-358.18.1.el6.noarch.rpm64a128bb143dd4adc9855a18cd669ed8b2c2a0f7e5d33eb644b752d3e55e291dELSA-2024-1831ol6_u4_i386_patch
kernel-headers-2.6.32-358.18.1.el6.i686.rpm85d2ce4e33e4fab5d196f2201d2bba48f215bc5b59aae3677e6181f79950ce41ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-358.18.1.el6.i686.rpm85d2ce4e33e4fab5d196f2201d2bba48f215bc5b59aae3677e6181f79950ce41ELSA-2024-1831ol6_u4_i386_patch
perf-2.6.32-358.18.1.el6.i686.rpme5986082cb8bb14cddf335d9fcfd0be8a698752bd642c7ba3c00c4b819f6afabELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-358.18.1.el6.i686.rpme5986082cb8bb14cddf335d9fcfd0be8a698752bd642c7ba3c00c4b819f6afabELSA-2024-1831ol6_u4_i386_patch
python-perf-2.6.32-358.18.1.el6.i686.rpmcc6975ca08e2ff2ad65bc068a4d5e133ebb2b16dc119d85c11b7aec424372249ELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-358.18.1.el6.i686.rpmcc6975ca08e2ff2ad65bc068a4d5e133ebb2b16dc119d85c11b7aec424372249ELSA-2024-1831ol6_u4_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-358.18.1.el6.src.rpm96d24e66d4075f285e69f14741dd3e3aa44076756de20610aec146277a8a2158ELSA-2024-1831ol6_u4_x86_64_patch
kernel-2.6.32-358.18.1.el6.src.rpm96d24e66d4075f285e69f14741dd3e3aa44076756de20610aec146277a8a2158ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-358.18.1.el6.x86_64.rpm4be4584ab8db77d1fd5e364083fa1ab55d2cc9abf1763cf0bcf8d1ead12bc3b5ELSA-2024-1831ol6_u4_x86_64_patch
kernel-2.6.32-358.18.1.el6.x86_64.rpm4be4584ab8db77d1fd5e364083fa1ab55d2cc9abf1763cf0bcf8d1ead12bc3b5ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-358.18.1.el6.x86_64.rpmbc5fdc6342c7e98717f0c2382662f3ba9a0583940e709758e002e48932d5be43ELSA-2024-1831ol6_u4_x86_64_patch
kernel-debug-2.6.32-358.18.1.el6.x86_64.rpmbc5fdc6342c7e98717f0c2382662f3ba9a0583940e709758e002e48932d5be43ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-358.18.1.el6.x86_64.rpmf8e3119ab0b7317f3b4d72ac1264335e93e6657e5f0c7cf5699f8d453d04622dELSA-2024-1831ol6_u4_x86_64_patch
kernel-debug-devel-2.6.32-358.18.1.el6.x86_64.rpmf8e3119ab0b7317f3b4d72ac1264335e93e6657e5f0c7cf5699f8d453d04622dELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-358.18.1.el6.x86_64.rpma488527d94c0e94566a6537b0bc919b72bef867d7cb13c203e023364b42411cdELSA-2024-1831ol6_u4_x86_64_patch
kernel-devel-2.6.32-358.18.1.el6.x86_64.rpma488527d94c0e94566a6537b0bc919b72bef867d7cb13c203e023364b42411cdELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-358.18.1.el6.noarch.rpm568e2e6deb71010b5397089416ff8da27426f195aa245168a0c2454ac2865b72ELSA-2024-1831ol6_u4_x86_64_patch
kernel-doc-2.6.32-358.18.1.el6.noarch.rpm568e2e6deb71010b5397089416ff8da27426f195aa245168a0c2454ac2865b72ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-358.18.1.el6.noarch.rpm64a128bb143dd4adc9855a18cd669ed8b2c2a0f7e5d33eb644b752d3e55e291dELSA-2024-1831ol6_u4_x86_64_patch
kernel-firmware-2.6.32-358.18.1.el6.noarch.rpm64a128bb143dd4adc9855a18cd669ed8b2c2a0f7e5d33eb644b752d3e55e291dELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-358.18.1.el6.x86_64.rpmba0cf82547116ced451c6a643435cef96222a874cf8ca0a88cb43afb8601951eELSA-2024-1831ol6_u4_x86_64_patch
kernel-headers-2.6.32-358.18.1.el6.x86_64.rpmba0cf82547116ced451c6a643435cef96222a874cf8ca0a88cb43afb8601951eELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-358.18.1.el6.x86_64.rpma7ef545f3ba16fa5520e3325e48bbdf6a8bf6b8d7608b0e438c313a803f06d9cELSA-2024-1831ol6_u4_x86_64_patch
perf-2.6.32-358.18.1.el6.x86_64.rpma7ef545f3ba16fa5520e3325e48bbdf6a8bf6b8d7608b0e438c313a803f06d9cELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-358.18.1.el6.x86_64.rpm73b88c03df33b129ce839fa323614fc4b62e77930159e9c8d0f5fd20c06745b2ELSA-2024-1831ol6_u4_x86_64_patch
python-perf-2.6.32-358.18.1.el6.x86_64.rpm73b88c03df33b129ce839fa323614fc4b62e77930159e9c8d0f5fd20c06745b2ELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete