ELSA-2015-0864

ELSA-2015-0864 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2015-04-21

Description


[2.6.32-504.16.2]
- [infiniband] core: Prevent integer overflow in ib_umem_get address arithmetic (Doug Ledford) [1181173 1179327] {CVE-2014-8159}

[2.6.32-504.16.1]
- [fs] gfs2: Move gfs2_file_splice_write outside of #ifdef (Robert S Peterson) [1198329 1193559]
- [security] keys: close race between key lookup and freeing (Radomir Vrbovsky) [1179849 1179850] {CVE-2014-9529}
- [net] sctp: fix slab corruption from use after free on INIT collisions (Daniel Borkmann) [1196587 1135425] {CVE-2015-1421}
- [fs] gfs2: Allocate reservation during splice_write (Robert S Peterson) [1198329 1193559]
- [fs] nfs: Be less aggressive about returning delegations for open files (Steve Dickson) [1196314 1145334]
- [fs] nfs: Avoid PUTROOTFH when managing leases (Benjamin Coddington) [1196313 1143013]
- [crypto] testmgr: mark rfc4106(gcm(aes)) as fips_allowed (Jarod Wilson) [1194983 1185395]
- [crypto] Extending the RFC4106 AES-GCM test vectors (Jarod Wilson) [1194983 1185395]
- [char] raw: Return short read or 0 at end of a raw device, not EIO (Jeff Moyer) [1195747 1142314]
- [scsi] hpsa: Use local workqueues instead of system workqueues - part1 (Tomas Henzl) [1193639 1134115]
- [x86] kvm: vmx: invalid host cr4 handling across vm entries (Jacob Tanenbaum) [1153326 1153327] {CVE-2014-3690}
- [fs] isofs: Fix unchecked printing of ER records (Radomir Vrbovsky) [1180481 1180492] {CVE-2014-9584}
- [fs] bio: fix argument of __bio_add_page() for max_sectors > 0xffff (Fam Zheng) [1198428 1166763]
- [media] ttusb-dec: buffer overflow in ioctl (Alexander Gordeev) [1170971 1167115] {CVE-2014-8884}
- [kernel] trace: insufficient syscall number validation in perf and ftrace subsystems (Jacob Tanenbaum) [1161567 1161568] {CVE-2014-7826 CVE-2014-7825}
- [fs] nfs: Fix a delegation callback race (Dave Wysochanski) [1187639 1149831]
- [fs] nfs: Don't use the delegation->inode in nfs_mark_return_delegation() (Dave Wysochanski) [1187639 1149831]
- [infiniband] ipoib: don't queue a work struct up twice (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: make sure we reap all our ah on shutdown (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: cleanup a couple debug messages (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: flush the ipoib_workqueue on unregister (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: fix ipoib_mcast_restart_task (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: fix race between mcast_dev_flush and mcast_join (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: remove unneeded locks (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: don't restart our thread on ENETRESET (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: Handle -ENETRESET properly in our callback (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: make delayed tasks not hold up everything (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: Add a helper to restart the multicast task (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: fix IPOIB_MCAST_RUN flag usage (Doug Ledford) [1187664 1187666 1184072 1159925]
- [infiniband] ipoib: Remove unnecessary port query (Doug Ledford) [1187664 1187666 1184072 1159925]
- [x86] kvm: Avoid pagefault in kvm_lapic_sync_to_vapic (Paolo Bonzini) [1192055 1116398]
- [s390] kernel: fix cpu target address of directed yield (Hendrik Brueckner) [1188339 1180061]
- [mm] memcg: do not allow task about to OOM kill to bypass the limit (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [mm] memcg: do not declare OOM from __GFP_NOFAIL allocations (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [fs] buffer: move allocation failure loop into the allocator (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [mm] memcg: handle non-error OOM situations more gracefully (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [mm] memcg: do not trap chargers with full callstack on OOM (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [mm] memcg: rework and document OOM waiting and wakeup (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [mm] memcg: enable memcg OOM killer only for user faults (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [x86] mm: finish user fault error path with fatal signal (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [mm] pass userspace fault flag to generic fault handler (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [s390] mm: do not invoke OOM killer on kernel fault OOM (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [powerpc] mm: remove obsolete init OOM protection (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [powerpc] mm: invoke oom-killer from remaining unconverted page fault handlers (Johannes Weiner) [1198110 1088334] {CVE-2014-8171}
- [security] selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID (Denys Vlasenko) [1104567 1104568] {CVE-2014-3215}
- [security] Add PR__NO_NEW_PRIVS to prevent execve from granting privs (Denys Vlasenko) [1104567 1104568] {CVE-2014-3215}

[2.6.32-504.15.1]
- [netdrv] ixgbe: remove CIAA/D register reads from bad VF check (John Greene) [1196312 1156061]
- [pci] Make FLR and AF FLR reset warning messages different (Myron Stowe) [1192365 1184540]
- [pci] Fix unaligned access in AF transaction pending test (Myron Stowe) [1192365 1184540]
- [pci] Merge multi-line quoted strings (Myron Stowe) [1192365 1184540]
- [pci] Wrong register used to check pending traffic (Myron Stowe) [1192365 1184540]
- [pci] Add pci_wait_for_pending() -- refactor pci_wait_for_pending_transaction() (Myron Stowe) [1192365 1184540]
- [pci] Use pci_wait_for_pending_transaction() instead of for loop (Myron Stowe) [1192365 1184540]
- [pci] Add pci_wait_for_pending_transaction() (Myron Stowe) [1192365 1184540]
- [pci] Wait for pending transactions to complete before 82599 FLR (Myron Stowe) [1192365 1184540]
- [scsi] storvsc: fix a bug in storvsc limits (Vitaly Kuznetsov) [1196532 1174168]

[2.6.32-504.14.1]
- [s390] crypto: kernel oops at insmod of the z90crypt device driver (Hendrik Brueckner) [1191916 1172137]
- [sound] alsa: usb-audio: Fix crash at re-preparing the PCM stream (Jerry Snitselaar) [1192105 1167059]
- [usb] ehci: bugfix: urb->hcpriv should not be NULL (Jerry Snitselaar) [1192105 1167059]
- [mm] mmap: uncached vma support with writenotify (Jerry Snitselaar) [1192105 1167059]
- [kernel] futex: Mention key referencing differences between shared and private futexes (Larry Woodman) [1192107 1167405]
- [kernel] futex: Ensure get_futex_key_refs() always implies a barrier (Larry Woodman) [1192107 1167405]

[2.6.32-504.13.1]
- [netdrv] enic: fix rx skb checksum (Stefan Assmann) [1189068 1115505]
- [scsi] Revert 'fix our current target reap infrastructure' (David Milburn) [1188941 1168072]
- [scsi] Revert 'dual scan thread bug fix' (David Milburn) [1188941 1168072]
- [net] tcp: do not copy headers in tcp_collapse() (Alexander Duyck) [1188838 1156289]
- [net] tcp: use tcp_flags in tcp_data_queue() (Alexander Duyck) [1188838 1156289]
- [net] tcp: use TCP_SKB_CB(skb)->tcp_flags in input path (Alexander Duyck) [1188838 1156289]
- [net] tcp: remove unused tcp_fin() parameters (Alexander Duyck) [1188838 1156289]
- [net] tcp: rename tcp_skb_cb flags (Alexander Duyck) [1188838 1156289]
- [net] tcp: unify tcp flag macros (Alexander Duyck) [1188838 1156289]
- [net] tcp: unalias tcp_skb_cb flags and ip_dsfield (Alexander Duyck) [1188838 1156289]


Related CVEs


CVE-2014-8171
CVE-2014-9529
CVE-2014-7825
CVE-2014-7826
CVE-2014-3690
CVE-2014-8884
CVE-2015-1421
CVE-2014-3215
CVE-2014-9584

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-504.16.2.el6.src.rpmff4f407f7cba476df821219e58ffea002457a3ea3fd59a47a4bb89bd5e24955aELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-504.16.2.el6.src.rpmff4f407f7cba476df821219e58ffea002457a3ea3fd59a47a4bb89bd5e24955aELSA-2024-1831ol6_u6_i386_patch
kernel-2.6.32-504.16.2.el6.i686.rpma85eb137412766ecc9a9527c3df33de565e28fcfee408f75486f172f4cb71476ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-504.16.2.el6.i686.rpma85eb137412766ecc9a9527c3df33de565e28fcfee408f75486f172f4cb71476ELSA-2024-1831ol6_u6_i386_patch
kernel-abi-whitelists-2.6.32-504.16.2.el6.noarch.rpmdedbaf614cbb7e7433a756583d2aa74dbc160ce35e3c2e73777d6063e0f728ccELSA-2024-1831ol6_i386_latest_archive
kernel-abi-whitelists-2.6.32-504.16.2.el6.noarch.rpmdedbaf614cbb7e7433a756583d2aa74dbc160ce35e3c2e73777d6063e0f728ccELSA-2024-1831ol6_u6_i386_patch
kernel-debug-2.6.32-504.16.2.el6.i686.rpm2587297705854825c093cc313dc7d3b8efdfc984e081835a9dc3011e97b94e0fELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-504.16.2.el6.i686.rpm2587297705854825c093cc313dc7d3b8efdfc984e081835a9dc3011e97b94e0fELSA-2024-1831ol6_u6_i386_patch
kernel-debug-devel-2.6.32-504.16.2.el6.i686.rpm1a5e709fe82dfff899aac0cdfa89e875cbb3c18b50c843a4103960b6fd73583aELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-504.16.2.el6.i686.rpm1a5e709fe82dfff899aac0cdfa89e875cbb3c18b50c843a4103960b6fd73583aELSA-2024-1831ol6_u6_i386_patch
kernel-devel-2.6.32-504.16.2.el6.i686.rpmee39e558b9b35eefbe4590af655033ad0950de9418f74f2f11c0ce8a3c033731ELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-504.16.2.el6.i686.rpmee39e558b9b35eefbe4590af655033ad0950de9418f74f2f11c0ce8a3c033731ELSA-2024-1831ol6_u6_i386_patch
kernel-doc-2.6.32-504.16.2.el6.noarch.rpm1f17cdb8b0ff59fcec7aacf850d96c5be53cd8cd975c88aeb2e472a6418ec102ELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-504.16.2.el6.noarch.rpm1f17cdb8b0ff59fcec7aacf850d96c5be53cd8cd975c88aeb2e472a6418ec102ELSA-2024-1831ol6_u6_i386_patch
kernel-firmware-2.6.32-504.16.2.el6.noarch.rpmae5a04e2703c5e95c79b37037f5a68b1e5cb5e14518ce16f0649c430761ebbc5ELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-504.16.2.el6.noarch.rpmae5a04e2703c5e95c79b37037f5a68b1e5cb5e14518ce16f0649c430761ebbc5ELSA-2024-1831ol6_u6_i386_patch
kernel-headers-2.6.32-504.16.2.el6.i686.rpmd3f2097de0de3383029f0d360e838c6a90768fcacdfffbdacf435405b9f423a3ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-504.16.2.el6.i686.rpmd3f2097de0de3383029f0d360e838c6a90768fcacdfffbdacf435405b9f423a3ELSA-2024-1831ol6_u6_i386_patch
perf-2.6.32-504.16.2.el6.i686.rpm6ed9195626f6c71232e598094d61495eb79adbecff2b321d522368d9aca77533ELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-504.16.2.el6.i686.rpm6ed9195626f6c71232e598094d61495eb79adbecff2b321d522368d9aca77533ELSA-2024-1831ol6_u6_i386_patch
python-perf-2.6.32-504.16.2.el6.i686.rpmd923d9f47cf17b82bd9926dd05b72e08c9b336b455705bd52008df3417cc7f20ELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-504.16.2.el6.i686.rpmd923d9f47cf17b82bd9926dd05b72e08c9b336b455705bd52008df3417cc7f20ELSA-2024-1831ol6_u6_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-504.16.2.el6.src.rpmff4f407f7cba476df821219e58ffea002457a3ea3fd59a47a4bb89bd5e24955aELSA-2024-1831ol6_u6_x86_64_patch
kernel-2.6.32-504.16.2.el6.src.rpmff4f407f7cba476df821219e58ffea002457a3ea3fd59a47a4bb89bd5e24955aELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-504.16.2.el6.x86_64.rpm7284bf9f1b49e652a5c9ebadbb6347c68d7e9c0ab916d770dab4111b058297f6ELSA-2024-1831ol6_u6_x86_64_patch
kernel-2.6.32-504.16.2.el6.x86_64.rpm7284bf9f1b49e652a5c9ebadbb6347c68d7e9c0ab916d770dab4111b058297f6ELSA-2024-1831ol6_x86_64_latest_archive
kernel-abi-whitelists-2.6.32-504.16.2.el6.noarch.rpmdedbaf614cbb7e7433a756583d2aa74dbc160ce35e3c2e73777d6063e0f728ccELSA-2024-1831ol6_u6_x86_64_patch
kernel-abi-whitelists-2.6.32-504.16.2.el6.noarch.rpmdedbaf614cbb7e7433a756583d2aa74dbc160ce35e3c2e73777d6063e0f728ccELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-504.16.2.el6.x86_64.rpm8c07af89a3f19a7772d84a01a571b6b183e2dd721b2be5cb04fd7913d5cf5831ELSA-2024-1831ol6_u6_x86_64_patch
kernel-debug-2.6.32-504.16.2.el6.x86_64.rpm8c07af89a3f19a7772d84a01a571b6b183e2dd721b2be5cb04fd7913d5cf5831ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-504.16.2.el6.x86_64.rpmb69773c7d01e91892b112d0ab60b21124e8e15ab1a10439dfa684810408dd2f5ELSA-2024-1831ol6_u6_x86_64_patch
kernel-debug-devel-2.6.32-504.16.2.el6.x86_64.rpmb69773c7d01e91892b112d0ab60b21124e8e15ab1a10439dfa684810408dd2f5ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-504.16.2.el6.x86_64.rpm4b4ca4bd87f9da81581ea3fe1dbd19345b38fa48d4fbc35364c7f328a0310f12ELSA-2024-1831ol6_u6_x86_64_patch
kernel-devel-2.6.32-504.16.2.el6.x86_64.rpm4b4ca4bd87f9da81581ea3fe1dbd19345b38fa48d4fbc35364c7f328a0310f12ELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-504.16.2.el6.noarch.rpm1f17cdb8b0ff59fcec7aacf850d96c5be53cd8cd975c88aeb2e472a6418ec102ELSA-2024-1831ol6_u6_x86_64_patch
kernel-doc-2.6.32-504.16.2.el6.noarch.rpm1f17cdb8b0ff59fcec7aacf850d96c5be53cd8cd975c88aeb2e472a6418ec102ELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-504.16.2.el6.noarch.rpmae5a04e2703c5e95c79b37037f5a68b1e5cb5e14518ce16f0649c430761ebbc5ELSA-2024-1831ol6_u6_x86_64_patch
kernel-firmware-2.6.32-504.16.2.el6.noarch.rpmae5a04e2703c5e95c79b37037f5a68b1e5cb5e14518ce16f0649c430761ebbc5ELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-504.16.2.el6.x86_64.rpm2b9c4d1756dae142f5c83cf226211db9d5a4e3fd35841d89d0ef17f9cd745a6eELSA-2024-1831ol6_u6_x86_64_patch
kernel-headers-2.6.32-504.16.2.el6.x86_64.rpm2b9c4d1756dae142f5c83cf226211db9d5a4e3fd35841d89d0ef17f9cd745a6eELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-504.16.2.el6.x86_64.rpm29ec42d10f057b7c00323bfb7a0c0501a1f9578a58d05e48f2c169e57a2d96c8ELSA-2024-1831ol6_u6_x86_64_patch
perf-2.6.32-504.16.2.el6.x86_64.rpm29ec42d10f057b7c00323bfb7a0c0501a1f9578a58d05e48f2c169e57a2d96c8ELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-504.16.2.el6.x86_64.rpm709fbe3b136196146dce32dd88b8887148dd9b74f4683091e889ba1adf107a12ELSA-2024-1831ol6_u6_x86_64_patch
python-perf-2.6.32-504.16.2.el6.x86_64.rpm709fbe3b136196146dce32dd88b8887148dd9b74f4683091e889ba1adf107a12ELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete