ELSA-2014-0328

ELSA-2014-0328 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2014-03-25

Description


[2.6.32-431.11.2]
- [net] sctp: fix sctp_sf_do_5_1D_ce to verify if peer is AUTH capable (Daniel Borkmann) [1070715 1067451] {CVE-2014-0101}
- [vhost] validate vhost_get_vq_desc return value (Michael S. Tsirkin) [1062579 1058677] {CVE-2014-0055}

[2.6.32-431.11.1]
- [net] netpoll: take rcu_read_lock_bh() in netpoll_send_skb_on_dev() (Florian Westphal) [1063271 1049052]
- [fs] cifs: sanity check length of data to send before sending (Sachin Prabhu) [1065668 1062590] {CVE-2014-0069}
- [fs] cifs: ensure that uncached writes handle unmapped areas correctly (Sachin Prabhu) [1065668 1062590] {CVE-2014-0069}
- [infiniband] ipoib: Report operstate consistently when brought up without a link (Michal Schmidt) [1064464 995300]
- [security] selinux: fix broken peer recv check (Paul Moore) [1059991 1043051]
- [fs] GFS2: Fix slab memory leak in gfs2_bufdata (Robert S Peterson) [1064913 1024024]
- [fs] GFS2: Fix use-after-free race when calling gfs2_remove_from_ail (Robert S Peterson) [1064913 1024024]
- [fs] nfs: always make sure page is up-to-date before extending a write to cover the entire page (Scott Mayhew) [1066942 1054493]
- [fs] xfs: ensure we capture IO errors correctly (Lachlan McIlroy) [1058418 1021325]
- [mm] get rid of unnecessary pageblock scanning in setup_zone_migrate_reserve (Motohiro Kosaki) [1062113 1043353]
- [security] selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute() (Paul Moore) [1055364 1024631]
- [security] selinux: look for IPsec labels on both inbound and outbound packets (Paul Moore) [1055364 1024631]
- [security] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_postroute() (Paul Moore) [1055364 1024631]
- [security] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_output() (Paul Moore) [1055364 1024631]
- [edac] e752x_edac: Fix pci_dev usage count (Aristeu Rozanski) [1058420 1029530]
- [s390] mm: handle asce-type exceptions as normal page fault (Hendrik Brueckner) [1057164 1034268]
- [s390] mm: correct tlb flush on page table upgrade (Hendrik Brueckner) [1057165 1034269]
- [net] fix memory information leaks in recv protocol handlers (Florian Westphal) [1039868 1039869]
- [usb] cdc-wdm: fix buffer overflow (Alexander Gordeev) [922000 922001] {CVE-2013-1860}
- [usb] cdc-wdm: Fix race between autosuspend and reading from the device (Alexander Gordeev) [922000 922001] {CVE-2013-1860}

[2.6.32-431.10.1]
- [fs] xfs: xfs_remove deadlocks due to inverted AGF vs AGI lock ordering (Brian Foster) [1067775 1059334]
- [x86] apic: Map the local apic when parsing the MP table (Prarit Bhargava) [1063507 1061873]

[2.6.32-431.9.1]
- [netdrv] bonding: add NETIF_F_NO_CSUM vlan_features (Ivan Vecera) [1063199 1059777]

[2.6.32-431.8.1]
- [netdrv] enic: remove enic->vlan_group check (Stefan Assmann) [1064115 1057704]

[2.6.32-431.7.1]
- [char] n_tty: Fix unsafe update of available buffer space (Jiri Benc) [1060491 980188]
- [char] n_tty: Fix stuck throttled driver (Jiri Benc) [1060491 980188]
- [char] tty: Add safe tty throttle/unthrottle functions (Jiri Benc) [1060491 980188]
- [char] tty: note race we need to fix (Jiri Benc) [1060491 980188]

[2.6.32-431.6.1]
- [mm] memcg: fix oom schedule_timeout() (Ulrich Obergfell) [1054072 1034237]
- [mm] memcg: change memcg_oom_mutex to spinlock (Ulrich Obergfell) [1054072 1034237]
- [mm] memcg: fix hierarchical oom locking (Ulrich Obergfell) [1054072 1034237]
- [mm] memcg: make oom_lock 0 and 1 based rather than counter (Ulrich Obergfell) [1054072 1034237]


Related CVEs


CVE-2013-1860
CVE-2014-0055
CVE-2014-0069
CVE-2014-0101

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-431.11.2.el6.src.rpm17a5ddc16adcf27e63c5873283b91d22ELSA-2021-9212
kernel-2.6.32-431.11.2.el6.i686.rpmd2d95dce1dcdb0c7f1a3e19017676fadELSA-2021-9212
kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm241959300bc1cbd61f947327f6261a7cELSA-2021-9212
kernel-debug-2.6.32-431.11.2.el6.i686.rpmca9e299fb79eb252382bf4f88cc930ebELSA-2021-9212
kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm33829a99561f4cd84dea7582b056e5c3ELSA-2021-9212
kernel-devel-2.6.32-431.11.2.el6.i686.rpm62860c5ac4127bf180e6c86f314ceab3ELSA-2021-9212
kernel-doc-2.6.32-431.11.2.el6.noarch.rpm9182d19f3db99787a0ac4a2c0f06808bELSA-2021-9212
kernel-firmware-2.6.32-431.11.2.el6.noarch.rpmbadd1408eb828674144bad545fa67e27ELSA-2021-9212
kernel-headers-2.6.32-431.11.2.el6.i686.rpm33ff7be87df778ab37cddee5041154afELSA-2021-9212
perf-2.6.32-431.11.2.el6.i686.rpm8917d56d2809ee8bfef9bb4ec6bc743bELSA-2021-9212
python-perf-2.6.32-431.11.2.el6.i686.rpmd11d36304a4df0ba9872f2184aa41098ELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-431.11.2.el6.src.rpm17a5ddc16adcf27e63c5873283b91d22ELSA-2021-9212
kernel-2.6.32-431.11.2.el6.x86_64.rpm68221de10dba76461cd31c9e66fe6487ELSA-2021-9212
kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm241959300bc1cbd61f947327f6261a7cELSA-2021-9212
kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm851eea5585723839d923d7bcc9a20359ELSA-2021-9212
kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm70837113571c707ba0d0f2940856f62aELSA-2021-9212
kernel-devel-2.6.32-431.11.2.el6.x86_64.rpmc5825333ef27946c6960a41afc4508f1ELSA-2021-9212
kernel-doc-2.6.32-431.11.2.el6.noarch.rpm9182d19f3db99787a0ac4a2c0f06808bELSA-2021-9212
kernel-firmware-2.6.32-431.11.2.el6.noarch.rpmbadd1408eb828674144bad545fa67e27ELSA-2021-9212
kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm0f406818a799dc4389211ebb7f233c92ELSA-2021-9212
perf-2.6.32-431.11.2.el6.x86_64.rpm34ff8179a4357d252bce641c74b2c1a8ELSA-2021-9212
python-perf-2.6.32-431.11.2.el6.x86_64.rpmcd70ad854cf922e53835c3cbb10aa792ELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete