ELSA-2014-0328

ELSA-2014-0328 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-03-25

Description


[2.6.32-431.11.2]
- [net] sctp: fix sctp_sf_do_5_1D_ce to verify if peer is AUTH capable (Daniel Borkmann) [1070715 1067451] {CVE-2014-0101}
- [vhost] validate vhost_get_vq_desc return value (Michael S. Tsirkin) [1062579 1058677] {CVE-2014-0055}

[2.6.32-431.11.1]
- [net] netpoll: take rcu_read_lock_bh() in netpoll_send_skb_on_dev() (Florian Westphal) [1063271 1049052]
- [fs] cifs: sanity check length of data to send before sending (Sachin Prabhu) [1065668 1062590] {CVE-2014-0069}
- [fs] cifs: ensure that uncached writes handle unmapped areas correctly (Sachin Prabhu) [1065668 1062590] {CVE-2014-0069}
- [infiniband] ipoib: Report operstate consistently when brought up without a link (Michal Schmidt) [1064464 995300]
- [security] selinux: fix broken peer recv check (Paul Moore) [1059991 1043051]
- [fs] GFS2: Fix slab memory leak in gfs2_bufdata (Robert S Peterson) [1064913 1024024]
- [fs] GFS2: Fix use-after-free race when calling gfs2_remove_from_ail (Robert S Peterson) [1064913 1024024]
- [fs] nfs: always make sure page is up-to-date before extending a write to cover the entire page (Scott Mayhew) [1066942 1054493]
- [fs] xfs: ensure we capture IO errors correctly (Lachlan McIlroy) [1058418 1021325]
- [mm] get rid of unnecessary pageblock scanning in setup_zone_migrate_reserve (Motohiro Kosaki) [1062113 1043353]
- [security] selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute() (Paul Moore) [1055364 1024631]
- [security] selinux: look for IPsec labels on both inbound and outbound packets (Paul Moore) [1055364 1024631]
- [security] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_postroute() (Paul Moore) [1055364 1024631]
- [security] selinux: handle TCP SYN-ACK packets correctly in selinux_ip_output() (Paul Moore) [1055364 1024631]
- [edac] e752x_edac: Fix pci_dev usage count (Aristeu Rozanski) [1058420 1029530]
- [s390] mm: handle asce-type exceptions as normal page fault (Hendrik Brueckner) [1057164 1034268]
- [s390] mm: correct tlb flush on page table upgrade (Hendrik Brueckner) [1057165 1034269]
- [net] fix memory information leaks in recv protocol handlers (Florian Westphal) [1039868 1039869]
- [usb] cdc-wdm: fix buffer overflow (Alexander Gordeev) [922000 922001] {CVE-2013-1860}
- [usb] cdc-wdm: Fix race between autosuspend and reading from the device (Alexander Gordeev) [922000 922001] {CVE-2013-1860}

[2.6.32-431.10.1]
- [fs] xfs: xfs_remove deadlocks due to inverted AGF vs AGI lock ordering (Brian Foster) [1067775 1059334]
- [x86] apic: Map the local apic when parsing the MP table (Prarit Bhargava) [1063507 1061873]

[2.6.32-431.9.1]
- [netdrv] bonding: add NETIF_F_NO_CSUM vlan_features (Ivan Vecera) [1063199 1059777]

[2.6.32-431.8.1]
- [netdrv] enic: remove enic->vlan_group check (Stefan Assmann) [1064115 1057704]

[2.6.32-431.7.1]
- [char] n_tty: Fix unsafe update of available buffer space (Jiri Benc) [1060491 980188]
- [char] n_tty: Fix stuck throttled driver (Jiri Benc) [1060491 980188]
- [char] tty: Add safe tty throttle/unthrottle functions (Jiri Benc) [1060491 980188]
- [char] tty: note race we need to fix (Jiri Benc) [1060491 980188]

[2.6.32-431.6.1]
- [mm] memcg: fix oom schedule_timeout() (Ulrich Obergfell) [1054072 1034237]
- [mm] memcg: change memcg_oom_mutex to spinlock (Ulrich Obergfell) [1054072 1034237]
- [mm] memcg: fix hierarchical oom locking (Ulrich Obergfell) [1054072 1034237]
- [mm] memcg: make oom_lock 0 and 1 based rather than counter (Ulrich Obergfell) [1054072 1034237]


Related CVEs


CVE-2013-1860
CVE-2014-0055
CVE-2014-0069
CVE-2014-0101

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-431.11.2.el6.src.rpm703d34009fd9d329db6067db9f5894a77b6bfc81ef899421c427040b4d5ad54eELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-431.11.2.el6.src.rpm703d34009fd9d329db6067db9f5894a77b6bfc81ef899421c427040b4d5ad54eELSA-2024-1831ol6_u5_i386_patch
kernel-2.6.32-431.11.2.el6.i686.rpme0fc5d3dffe7594728e518847df870bbaf0300678b1abf644c38943e043cdd2cELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-431.11.2.el6.i686.rpme0fc5d3dffe7594728e518847df870bbaf0300678b1abf644c38943e043cdd2cELSA-2024-1831ol6_u5_i386_patch
kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpmbdd4fcb510975f2c1ff7758f4b1d3d7772d79877255e7c41feaf8d0523898bd6ELSA-2024-1831ol6_i386_latest_archive
kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpmbdd4fcb510975f2c1ff7758f4b1d3d7772d79877255e7c41feaf8d0523898bd6ELSA-2024-1831ol6_u5_i386_patch
kernel-debug-2.6.32-431.11.2.el6.i686.rpma5e901e916382f2dad43c8fb4b363e5d116d4f0d08242d39d613c6e635871707ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-431.11.2.el6.i686.rpma5e901e916382f2dad43c8fb4b363e5d116d4f0d08242d39d613c6e635871707ELSA-2024-1831ol6_u5_i386_patch
kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm6cdfefface9d6b5871cdb738ac18d3dd0c074a83f480c32e795d01657b480186ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm6cdfefface9d6b5871cdb738ac18d3dd0c074a83f480c32e795d01657b480186ELSA-2024-1831ol6_u5_i386_patch
kernel-devel-2.6.32-431.11.2.el6.i686.rpm8a560d871ed805ad3cfb34fbf3d6b4e86c8fbad272ba1590264e0427f81faadcELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-431.11.2.el6.i686.rpm8a560d871ed805ad3cfb34fbf3d6b4e86c8fbad272ba1590264e0427f81faadcELSA-2024-1831ol6_u5_i386_patch
kernel-doc-2.6.32-431.11.2.el6.noarch.rpm84841f0cbe8f70dd10c60d0cc53895bac19af74f47cce71047bdc9c139d34880ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-431.11.2.el6.noarch.rpm84841f0cbe8f70dd10c60d0cc53895bac19af74f47cce71047bdc9c139d34880ELSA-2024-1831ol6_u5_i386_patch
kernel-firmware-2.6.32-431.11.2.el6.noarch.rpmfcc87fd4b67c5ef484db64fbc3b12ad968f488842dc14848ee6e5bcffdaccecaELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-431.11.2.el6.noarch.rpmfcc87fd4b67c5ef484db64fbc3b12ad968f488842dc14848ee6e5bcffdaccecaELSA-2024-1831ol6_u5_i386_patch
kernel-headers-2.6.32-431.11.2.el6.i686.rpmb82b074d13762a767f404c51e0cc3dc4be8498cb765b7bd0676f7297b105904fELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-431.11.2.el6.i686.rpmb82b074d13762a767f404c51e0cc3dc4be8498cb765b7bd0676f7297b105904fELSA-2024-1831ol6_u5_i386_patch
perf-2.6.32-431.11.2.el6.i686.rpme4bc7c41469a624ff822ac98cf1691ca9e2ebf3f8530552171bc0daabcf23bbcELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-431.11.2.el6.i686.rpme4bc7c41469a624ff822ac98cf1691ca9e2ebf3f8530552171bc0daabcf23bbcELSA-2024-1831ol6_u5_i386_patch
python-perf-2.6.32-431.11.2.el6.i686.rpm8d6284ea9e6c11907424a8a282e05e72f4ff3cc785838dfa49367faf30501e70ELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-431.11.2.el6.i686.rpm8d6284ea9e6c11907424a8a282e05e72f4ff3cc785838dfa49367faf30501e70ELSA-2024-1831ol6_u5_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-431.11.2.el6.src.rpm703d34009fd9d329db6067db9f5894a77b6bfc81ef899421c427040b4d5ad54eELSA-2024-1831ol6_u5_x86_64_patch
kernel-2.6.32-431.11.2.el6.src.rpm703d34009fd9d329db6067db9f5894a77b6bfc81ef899421c427040b4d5ad54eELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-431.11.2.el6.x86_64.rpm30bdedc936140b587e90aa35ebd9161683368746949eefa92f6159e3e01b0f70ELSA-2024-1831ol6_u5_x86_64_patch
kernel-2.6.32-431.11.2.el6.x86_64.rpm30bdedc936140b587e90aa35ebd9161683368746949eefa92f6159e3e01b0f70ELSA-2024-1831ol6_x86_64_latest_archive
kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpmbdd4fcb510975f2c1ff7758f4b1d3d7772d79877255e7c41feaf8d0523898bd6ELSA-2024-1831ol6_u5_x86_64_patch
kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpmbdd4fcb510975f2c1ff7758f4b1d3d7772d79877255e7c41feaf8d0523898bd6ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm334ba2eade095287f2bd9942417bd95992359f9a273c84d04b961e7be19d4898ELSA-2024-1831ol6_u5_x86_64_patch
kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm334ba2eade095287f2bd9942417bd95992359f9a273c84d04b961e7be19d4898ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm984a7725b92ac47e21ca10a68e35aa9b3d42ea30d43e2d29b34fce202dcdeca9ELSA-2024-1831ol6_u5_x86_64_patch
kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm984a7725b92ac47e21ca10a68e35aa9b3d42ea30d43e2d29b34fce202dcdeca9ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm5182ecfcebbe2bbe76881e5b6171a640d2b4c792ef6fcdde6a82e7fd75922972ELSA-2024-1831ol6_u5_x86_64_patch
kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm5182ecfcebbe2bbe76881e5b6171a640d2b4c792ef6fcdde6a82e7fd75922972ELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-431.11.2.el6.noarch.rpm84841f0cbe8f70dd10c60d0cc53895bac19af74f47cce71047bdc9c139d34880ELSA-2024-1831ol6_u5_x86_64_patch
kernel-doc-2.6.32-431.11.2.el6.noarch.rpm84841f0cbe8f70dd10c60d0cc53895bac19af74f47cce71047bdc9c139d34880ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-431.11.2.el6.noarch.rpmfcc87fd4b67c5ef484db64fbc3b12ad968f488842dc14848ee6e5bcffdaccecaELSA-2024-1831ol6_u5_x86_64_patch
kernel-firmware-2.6.32-431.11.2.el6.noarch.rpmfcc87fd4b67c5ef484db64fbc3b12ad968f488842dc14848ee6e5bcffdaccecaELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-431.11.2.el6.x86_64.rpmd336eb64d816c41362d3bd47cc9c79eb2084e525c3003c2e25e965ba1c2bbabcELSA-2024-1831ol6_u5_x86_64_patch
kernel-headers-2.6.32-431.11.2.el6.x86_64.rpmd336eb64d816c41362d3bd47cc9c79eb2084e525c3003c2e25e965ba1c2bbabcELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-431.11.2.el6.x86_64.rpm41e21bce89bf412d877754d30e476c6acfaf38a7986bc6915deeceda3b9870b2ELSA-2024-1831ol6_u5_x86_64_patch
perf-2.6.32-431.11.2.el6.x86_64.rpm41e21bce89bf412d877754d30e476c6acfaf38a7986bc6915deeceda3b9870b2ELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-431.11.2.el6.x86_64.rpm9617d1c5936d1affeef3a3a5eeb1c3491c370e0286ed2b0bcfa0659822ca612dELSA-2024-1831ol6_u5_x86_64_patch
python-perf-2.6.32-431.11.2.el6.x86_64.rpm9617d1c5936d1affeef3a3a5eeb1c3491c370e0286ed2b0bcfa0659822ca612dELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete