ELSA-2015-0087

ELSA-2015-0087 - kernel security and bug fix update

Type:SECURITY
Severity:IMPORTANT
Release Date:2015-01-28

Description


[2.6.32-504.8.1]
- [crypto] crc32c: Kill pointless CRYPTO_CRC32C_X86_64 option (Jarod Wilson) [1175509 1036212]
- [crypto] testmgr: add larger crc32c test vector to test FPU path in crc32c_intel (Jarod Wilson) [1175509 1036212]
- [crypto] tcrypt: Added speed test in tcrypt for crc32c (Jarod Wilson) [1175509 1036212]
- [crypto] crc32c: Optimize CRC32C calculation with PCLMULQDQ instruction (Jarod Wilson) [1175509 1036212]
- [crypto] crc32c: Rename crc32c-intel.c to crc32c-intel_glue.c (Jarod Wilson) [1175509 1036212]

[2.6.32-504.7.1]
- [kernel] ipc/sem: Fully initialize sem_array before making it visible (Rik van Riel) [1172029 1165277]
- [kernel] ipc/sem: synchronize semop and semctl with IPC_RMID (Rik van Riel) [1172029 1165277]
- [kernel] ipc/sem: update sem_otime for all operations (Larry Woodman) [1172025 1168588]
- [fs] fuse: prevent null nd panic on dentry revalidate (Brian Foster) [1172022 1162782]
- [net] netfilter: ipset: timeout values corrupted on set resize (Marcelo Leitner) [1172764 1152754]
- [net] netfilter: fix xt_TCPOPTSTRIP in forwarding path (Marcelo Leitner) [1172027 1135650]
- [usb] ehci: Fix panic on hotplug race condition (Don Zickus) [1172024 1107010]
- [usb] usb_wwan: replace release and disconnect with a port_remove hook (Stanislaw Gruszka) [1172030 1148615]
- [x86] traps: stop using IST for #SS (Petr Matousek) [1172810 1172811] {CVE-2014-9322}

[2.6.32-504.6.1]
- [fs] ext4: don't count external journal blocks as overhead (Eric Sandeen) [1168504 1163811]
- [net] sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet (Daniel Borkmann) [1163090 1153980] {CVE-2014-7841}
- [netdrv] e100: fix typo in MDI/MDI-X eeprom check in e100_phy_init (John Greene) [1165985 1156417]
- [powerpc] Add smp_mb()s to arch_spin_unlock_wait() (Gustavo Duarte) [1165986 1136224]
- [powerpc] Add smp_mb() to arch_spin_is_locked() (Gustavo Duarte) [1165986 1136224]
- [kernel] cpuset: PF_SPREAD_PAGE and PF_SPREAD_SLAB should be atomic flags (Aaron Tomlin) [1165002 1045310]
- [documentation] cpuset: Update the cpuset flag file (Aaron Tomlin) [1165002 1045310]
- [alsa] control: Make sure that id->index does not overflow (Jacob Tanenbaum) [1149140 1117312] {CVE-2014-4656}
- [alsa] control: Handle numid overflow (Jacob Tanenbaum) [1149140 1117312] {CVE-2014-4656}
- [s390] mm: fix SIGBUS handling (Hendrik Brueckner) [1169433 1145070]
- [fs] gfs2: fix bad inode i_goal values during block allocation (Abhijith Das) [1165001 1130684]
- [md] dm-thin: fix pool_io_hints to avoid looking at max_hw_sectors (Mike Snitzer) [1161420 1161421 1142773 1145230]

[2.6.32-504.5.1]
- [fs] nfsd: don't halt scanning the DRC LRU list when there's an RC_INPROG entry (J. Bruce Fields) [1168129 1150675]

[2.6.32-504.4.1]
- [fs] nfs: Make sure pre_change_attr is initialized correctly (Scott Mayhew) [1163214 1160042]
- [usb] ehci: Fix a regression in the ISO scheduler (Gustavo Duarte) [1162072 1145805]


Related CVEs


CVE-2014-4656
CVE-2014-7841

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) kernel-2.6.32-504.8.1.el6.src.rpm49b457aa6a02c03c47e170df2e9fb078ELSA-2021-9212
kernel-2.6.32-504.8.1.el6.i686.rpmda91728b0d26e25adefb13347917b63bELSA-2021-9212
kernel-abi-whitelists-2.6.32-504.8.1.el6.noarch.rpm6045b001d9447358eead76fb51dfdd49ELSA-2021-9212
kernel-debug-2.6.32-504.8.1.el6.i686.rpmca1223569e0de3f8190fb97095add1f6ELSA-2021-9212
kernel-debug-devel-2.6.32-504.8.1.el6.i686.rpmad2a09997facd568b18d35511ca90d90ELSA-2021-9212
kernel-devel-2.6.32-504.8.1.el6.i686.rpmbd4681079f6f9f7a8ad28229ff687d9eELSA-2021-9212
kernel-doc-2.6.32-504.8.1.el6.noarch.rpm72f0660977fdcffe8dcf42c5406298e5ELSA-2021-9212
kernel-firmware-2.6.32-504.8.1.el6.noarch.rpmff8039b7a0f582afeb9ad90abf0633d8ELSA-2021-9212
kernel-headers-2.6.32-504.8.1.el6.i686.rpma477226b3f01cf2df5cbde02a2a43c94ELSA-2021-9212
perf-2.6.32-504.8.1.el6.i686.rpm735553e1bbf969fe684482c408b9c3ffELSA-2021-9212
python-perf-2.6.32-504.8.1.el6.i686.rpm6e3f8273de7c792cef8f4b606ac8d745ELSA-2021-9212
Oracle Linux 6 (x86_64) kernel-2.6.32-504.8.1.el6.src.rpm49b457aa6a02c03c47e170df2e9fb078ELSA-2021-9212
kernel-2.6.32-504.8.1.el6.x86_64.rpmf4bf177158ac3be0bc48df585f38746dELSA-2021-9212
kernel-abi-whitelists-2.6.32-504.8.1.el6.noarch.rpm6045b001d9447358eead76fb51dfdd49ELSA-2021-9212
kernel-debug-2.6.32-504.8.1.el6.x86_64.rpmcffb2d07b94b42deeed768457a5d8bd0ELSA-2021-9212
kernel-debug-devel-2.6.32-504.8.1.el6.x86_64.rpm30596677631cc3ad032f4f0084ec65e4ELSA-2021-9212
kernel-devel-2.6.32-504.8.1.el6.x86_64.rpm234d1e61c489352a621bc10bf283d504ELSA-2021-9212
kernel-doc-2.6.32-504.8.1.el6.noarch.rpm72f0660977fdcffe8dcf42c5406298e5ELSA-2021-9212
kernel-firmware-2.6.32-504.8.1.el6.noarch.rpmff8039b7a0f582afeb9ad90abf0633d8ELSA-2021-9212
kernel-headers-2.6.32-504.8.1.el6.x86_64.rpmf88b5f24b1f6e562db58b6a09af76696ELSA-2021-9212
perf-2.6.32-504.8.1.el6.x86_64.rpm749e91b5f7eb2ee368963da0c8895392ELSA-2021-9212
python-perf-2.6.32-504.8.1.el6.x86_64.rpmb4048031a7131bf8c24436d5244b5efdELSA-2021-9212



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete