ELSA-2014-0981

ELSA-2014-0981 - kernel security, bug fix, and enhancement update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-07-29

Description


[2.6.32-431.23.3]
- [netdrv] pppol2tp: fail when socket option level is not SOL_PPPOL2TP [1119461 1119462] {CVE-2014-4943}

[2.6.32-431.23.2]
- [kernel] utrace: force IRET path after utrace_finish_vfork() (Oleg Nesterov) [1115932 1115933] {CVE-2014-4699}

[2.6.32-431.23.1]
- [net] ip_tunnel: fix ip_tunnel_find to return NULL in case the tunnel is not there (Jiri Pirko) [1107931 1104503]
- [netdrv] bnx2x: Fix kernel crash and data miscompare after EEH recovery (Michal Schmidt) [1109269 1029600]
- [netdrv] bnx2x: Adapter not recovery from EEH error injection (Michal Schmidt) [1109269 1029600]
- [scsi] qla2xxx: Don't check for firmware hung during the reset context for ISP82XX (Chad Dupuis) [1110658 1054299]
- [scsi] qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (Chad Dupuis) [1110658 1054299]
- [scsi] qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (Chad Dupuis) [1110658 1054299]
- [scsi] qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (Chad Dupuis) [1110658 1054299]
- [scsi] qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (Chad Dupuis) [1110658 1054299]
- [scsi] qla2xxx: Set host can_queue value based on available resources (Chad Dupuis) [1110658 1054299]
- [net] filter: prevent nla extensions to peek beyond the end of the message (Jiri Benc) [1096778 1096779] {CVE-2014-3144 CVE-2014-3145}
- [net] bridge: add empty br_mdb_init() and br_mdb_uninit() definitions (Vlad Yasevich) [1106472 1097915]
- [net] bridge: Correctly unregister MDB rtnetlink handlers (Vlad Yasevich) [1106472 1097915]
- [net] rds: prevent dereference of a NULL device in rds_iw_laddr_check (Radomir Vrbovsky) [1083276 1083277] {CVE-2014-2678}
- [s390] crypto: fix aes, des ctr mode concurrency finding (Hendrik Brueckner) [1110168 1096328]
- [s390] crypto: fix des and des3_ede ctr concurrency issue (Hendrik Brueckner) [1109885 1065404]
- [s390] crypto: fix des and des3_ede cbc concurrency issue (Hendrik Brueckner) [1109883 1065398]
- [kernel] futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi() (Mateusz Guzik) [1097759 1097760] {CVE-2012-6647}
- [libata] ahci: accommodate tag ordered controller (David Milburn) [1099725 1083748]
- [net] mac80211: crash dues to AP powersave TX vs. wakeup race (Jacob Tanenbaum) [1083531 1083532] {CVE-2014-2706}
- [netdrv] ath9k: tid->sched race in ath_tx_aggr_sleep() (Jacob Tanenbaum) [1083249 1083250] {CVE-2014-2672}
- [kernel] hrtimer: Prevent all reprogramming if hang detected (Prarit Bhargava) [1096059 1075805]
- [net] ipv4: current group_info should be put after using (Jiri Benc) [1087412 1087414] {CVE-2014-2851}
- [kernel] tracing: Reset ring buffer when changing trace_clocks (Marcelo Tosatti) [1093984 1018138]
- [net] rds: dereference of a NULL device (Jacob Tanenbaum) [1079218 1079219] {CVE-2013-7339}
- [s390] crypto: fix concurrency issue in aes-ctr mode (Hendrik Brueckner) [1110169 1063478]
- [net] ipv4: processing ancillary IP_TOS or IP_TTL (Francesco Fusco) [1094403 990694]
- [net] ipv4: IP_TOS and IP_TTL can be specified as ancillary data (Francesco Fusco) [1094403 990694]
- [s390] crypto: Fix aes-xts parameter corruption (Hendrik Brueckner) [1110170 1043540]
- [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [1103068 1007459]
- [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [1103068 1007459]
- [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [1103068 1007459]
- [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [1103068 1007459]
- [fs] ext4: replace cut'n'pasted llseek code with generic_file_llseek_size (Eric Sandeen) [1103068 1007459]
- [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [1103068 1007459]
- [net] bridge: disable snooping if there is no querier (Vlad Yasevich) [1090749 1090670]
- [net] Revert 'bridge: only expire the mdb entry when query is received' (Vlad Yasevich) [1090749 1090670]
- [net] Revert 'bridge: fix some kernel warning in multicast timer' (Vlad Yasevich) [1090749 1090670]
- [net] Revert 'bridge: do not call setup_timer() multiple times' (Vlad Yasevich) [1090749 1090670]
- [net] Revert 'bridge: update mdb expiration timer upon reports' (Vlad Yasevich) [1090749 1090670]
- [kernel] futex: Make lookup_pi_state more robust (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}
- [kernel] futex: Always cleanup owner tid in unlock_pi (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}
- [kernel] futex: Validate atomic acquisition in futex_lock_pi_atomic() (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}
- [kernel] futex: prevent requeue pi on same futex (Jerome Marchand) [1104516 1104517] {CVE-2014-3153}
- [fs] autofs4: fix device ioctl mount lookup (Ian Kent) [1069630 999708]
- [fs] vfs: introduce kern_path_mountpoint() (Ian Kent) [1069630 999708]
- [fs] vfs: rename user_path_umountat() to user_path_mountpoint_at() (Ian Kent) [1069630 999708]
- [fs] vfs: massage umount_lookup_last() a bit to reduce nesting (Ian Kent) [1069630 999708]
- [fs] vfs: allow umount to handle mountpoints without revalidating them (Ian Kent) [1069630 999708]
- Revert: [fs] vfs: allow umount to handle mountpoints without revalidating them (Ian Kent) [1069630 999708]
- Revert: [fs] vfs: massage umount_lookup_last() a bit to reduce nesting (Ian Kent) [1069630 999708]
- Revert: [fs] vfs: rename user_path_umountat() to user_path_mountpoint_at() (Ian Kent) [1069630 999708]
- Revert: [fs] vfs: introduce kern_path_mountpoint() (Ian Kent) [1069630 999708]
- Revert: [fs] autofs4: fix device ioctl mount lookup (Ian Kent) [1069630 999708]
- [block] floppy: don't write kernel-only members to FDRAWCMD ioctl output (Denys Vlasenko) [1094308 1094310] {CVE-2014-1738 CVE-2014-1737}
- [block] floppy: ignore kernel-only members in FDRAWCMD ioctl input (Denys Vlasenko) [1094308 1094310] {CVE-2014-1738 CVE-2014-1737}
- [fs] vfs: fix autofs/afs/etc magic mountpoint breakage (Frantisek Hrbata) [1094370 1079347] {CVE-2014-0203}

[2.6.32-431.22.1]
- [fs] cifs: Check if prefixpath starts with '\' in cifs_parse_mount_options (Sachin Prabhu) [1107503 1104268]
- [virt] kvm: enable PCI multiple-segments for pass-through device (Michael S. Tsirkin) [1103972 1103471]
- [fs] GFS2: Lock i_mutex and use a local gfs2_holder for fallocate (Robert S Peterson) [1102313 1061910]

[2.6.32-431.21.1]
- [kvm] mmu: fix incorrect check of guest cr4 bits (Bandan Das) [1103821 1007164]
- [drm] nouveau: fix nasty bug which can clobber SOR0's clock setup (Ben Skeggs) [1100574 1095796]
- [net] tcp: tsq: restore minimal amount of queueing (Jiri Pirko) [1103825 1044053]


Related CVEs


CVE-2014-3145
CVE-2012-6647
CVE-2014-2672
CVE-2014-2678
CVE-2014-2851
CVE-2014-2706
CVE-2013-7339
CVE-2014-3144

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-431.23.3.el6.src.rpm66a3f6926023143ed5295ce5b4f701d8394bc810ab5240286303ee69aa00a282ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-431.23.3.el6.src.rpm66a3f6926023143ed5295ce5b4f701d8394bc810ab5240286303ee69aa00a282ELSA-2024-1831ol6_u5_i386_patch
kernel-2.6.32-431.23.3.el6.i686.rpm414174c0c20951bcfeaef35800001c20938b1259275850fba1f59b291ccb162aELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-431.23.3.el6.i686.rpm414174c0c20951bcfeaef35800001c20938b1259275850fba1f59b291ccb162aELSA-2024-1831ol6_u5_i386_patch
kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpmb45495ac00315f40c38a4dafdea9561ce05d954d976b86b7a0b095fd814ed844ELSA-2024-1831ol6_i386_latest_archive
kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpmb45495ac00315f40c38a4dafdea9561ce05d954d976b86b7a0b095fd814ed844ELSA-2024-1831ol6_u5_i386_patch
kernel-debug-2.6.32-431.23.3.el6.i686.rpma92a38db93b4763fd184017fa8c50c085740fbba63442c106e824e6fbded29e4ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-431.23.3.el6.i686.rpma92a38db93b4763fd184017fa8c50c085740fbba63442c106e824e6fbded29e4ELSA-2024-1831ol6_u5_i386_patch
kernel-debug-devel-2.6.32-431.23.3.el6.i686.rpmf1a65f4b160b6a789896717e2244b45081ae1089243e036a920f3cea91c9ca40ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-431.23.3.el6.i686.rpmf1a65f4b160b6a789896717e2244b45081ae1089243e036a920f3cea91c9ca40ELSA-2024-1831ol6_u5_i386_patch
kernel-devel-2.6.32-431.23.3.el6.i686.rpmd5ef20835dedc5c0beed89425ec32bc26adfea5b7b2ae3118a2f4365441d6472ELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-431.23.3.el6.i686.rpmd5ef20835dedc5c0beed89425ec32bc26adfea5b7b2ae3118a2f4365441d6472ELSA-2024-1831ol6_u5_i386_patch
kernel-doc-2.6.32-431.23.3.el6.noarch.rpm14e9d1651de503c7267367b6da74aecd5a456e5f196404ddfa576bec33c9fe4bELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-431.23.3.el6.noarch.rpm14e9d1651de503c7267367b6da74aecd5a456e5f196404ddfa576bec33c9fe4bELSA-2024-1831ol6_u5_i386_patch
kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm8c1f3b2db0ab6660edf73af22163674eca617694166a6ac8a038451f69ad5800ELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm8c1f3b2db0ab6660edf73af22163674eca617694166a6ac8a038451f69ad5800ELSA-2024-1831ol6_u5_i386_patch
kernel-headers-2.6.32-431.23.3.el6.i686.rpm60e984f17fc01835bf732a4e28727c74ac40825abaa83dceb1e4c9dc32bf9a63ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-431.23.3.el6.i686.rpm60e984f17fc01835bf732a4e28727c74ac40825abaa83dceb1e4c9dc32bf9a63ELSA-2024-1831ol6_u5_i386_patch
perf-2.6.32-431.23.3.el6.i686.rpm8b9642d8e68be19516cad7b04fab86c07ae57647b8217709a216e86a0522a1e8ELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-431.23.3.el6.i686.rpm8b9642d8e68be19516cad7b04fab86c07ae57647b8217709a216e86a0522a1e8ELSA-2024-1831ol6_u5_i386_patch
python-perf-2.6.32-431.23.3.el6.i686.rpmf1765fad5aca7a9ec936863fe7217d1312e403ccfc9b63399374a5190abbf46dELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-431.23.3.el6.i686.rpmf1765fad5aca7a9ec936863fe7217d1312e403ccfc9b63399374a5190abbf46dELSA-2024-1831ol6_u5_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-431.23.3.el6.src.rpm66a3f6926023143ed5295ce5b4f701d8394bc810ab5240286303ee69aa00a282ELSA-2024-1831ol6_u5_x86_64_patch
kernel-2.6.32-431.23.3.el6.src.rpm66a3f6926023143ed5295ce5b4f701d8394bc810ab5240286303ee69aa00a282ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-431.23.3.el6.x86_64.rpm2f80897784b2420df40482db9485131c1d970f6daa36ed3719f99381454b3867ELSA-2024-1831ol6_u5_x86_64_patch
kernel-2.6.32-431.23.3.el6.x86_64.rpm2f80897784b2420df40482db9485131c1d970f6daa36ed3719f99381454b3867ELSA-2024-1831ol6_x86_64_latest_archive
kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpmb45495ac00315f40c38a4dafdea9561ce05d954d976b86b7a0b095fd814ed844ELSA-2024-1831ol6_u5_x86_64_patch
kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpmb45495ac00315f40c38a4dafdea9561ce05d954d976b86b7a0b095fd814ed844ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-431.23.3.el6.x86_64.rpma1cacfd9367d219bfa23f7823b8d51e296fa2b3b004b83c19a469d71525c7194ELSA-2024-1831ol6_u5_x86_64_patch
kernel-debug-2.6.32-431.23.3.el6.x86_64.rpma1cacfd9367d219bfa23f7823b8d51e296fa2b3b004b83c19a469d71525c7194ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-431.23.3.el6.x86_64.rpmc6a26c86c8f3ea7e54a1d28894cd14fa47f9d1b1157472f44f78ef4a80a8ea85ELSA-2024-1831ol6_u5_x86_64_patch
kernel-debug-devel-2.6.32-431.23.3.el6.x86_64.rpmc6a26c86c8f3ea7e54a1d28894cd14fa47f9d1b1157472f44f78ef4a80a8ea85ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-431.23.3.el6.x86_64.rpm3b5060cff0052c4583896cc588dabec9d03dde6dacedf6c4e78d62d291d5d81dELSA-2024-1831ol6_u5_x86_64_patch
kernel-devel-2.6.32-431.23.3.el6.x86_64.rpm3b5060cff0052c4583896cc588dabec9d03dde6dacedf6c4e78d62d291d5d81dELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-431.23.3.el6.noarch.rpm14e9d1651de503c7267367b6da74aecd5a456e5f196404ddfa576bec33c9fe4bELSA-2024-1831ol6_u5_x86_64_patch
kernel-doc-2.6.32-431.23.3.el6.noarch.rpm14e9d1651de503c7267367b6da74aecd5a456e5f196404ddfa576bec33c9fe4bELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm8c1f3b2db0ab6660edf73af22163674eca617694166a6ac8a038451f69ad5800ELSA-2024-1831ol6_u5_x86_64_patch
kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm8c1f3b2db0ab6660edf73af22163674eca617694166a6ac8a038451f69ad5800ELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-431.23.3.el6.x86_64.rpm86f36f4e872e198b23815882cf1605ed616567ba337295bd1e8694cc71c78614ELSA-2024-1831ol6_u5_x86_64_patch
kernel-headers-2.6.32-431.23.3.el6.x86_64.rpm86f36f4e872e198b23815882cf1605ed616567ba337295bd1e8694cc71c78614ELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-431.23.3.el6.x86_64.rpma21262fa76419e940eb11fcfb533aed9299896278c25989e48dcc38e9fc55902ELSA-2024-1831ol6_u5_x86_64_patch
perf-2.6.32-431.23.3.el6.x86_64.rpma21262fa76419e940eb11fcfb533aed9299896278c25989e48dcc38e9fc55902ELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-431.23.3.el6.x86_64.rpmafdde0d720d41d14dc89b5f0bcbdc642a4e78c4d28b1bbf794a083d2abdff0adELSA-2024-1831ol6_u5_x86_64_patch
python-perf-2.6.32-431.23.3.el6.x86_64.rpmafdde0d720d41d14dc89b5f0bcbdc642a4e78c4d28b1bbf794a083d2abdff0adELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete