Описание
ELSA-2013-0744: kernel security and bug fix update (IMPORTANT)
[2.6.32-358.6.1]
- [virt] kvm: accept unaligned MSR_KVM_SYSTEM_TIME writes (Petr Matousek) [917020 917021] {CVE-2013-1796}
- [char] tty: hold lock across tty buffer finding and buffer filling (Prarit Bhargava) [928686 901780]
- [net] tcp: fix for zero packets_in_flight was too broad (Thomas Graf) [927309 920794]
- [net] tcp: frto should not set snd_cwnd to 0 (Thomas Graf) [927309 920794]
- [net] tcp: fix an infinite loop in tcp_slow_start() (Thomas Graf) [927309 920794]
- [net] tcp: fix ABC in tcp_slow_start() (Thomas Graf) [927309 920794]
- [netdrv] ehea: avoid accessing a NULL vgrp (Steve Best) [921535 911359]
- [net] sunrpc: Get rid of the redundant xprt->shutdown bit field (J. Bruce Fields) [915579 893584]
- [virt] kvm: do not #GP on unaligned MSR_KVM_SYSTEM_TIME write (Gleb Natapov) [917020 917021] {CVE-2013-1796}
- [drm] i915: bounds check execbuffer relocation count (Nikola Pajkovsky) [920523 920525] {CVE-2013-0913}
- [x86] irq: add quirk for broken interrupt remapping on 55XX chipsets (Neil Horman) [911267 887006]
- [kvm] Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (Gleb Natapov) [917024 917025] {CVE-2013-1797}
- [kvm] Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (Gleb Natapov) [917020 917021] {CVE-2013-1796}
- [kvm] Fix bounds checking in ioapic indirect register reads (Gleb Natapov) [917030 917032] {CVE-2013-1798}
- [kvm] x86: release kvmclock page on reset (Gleb Natapov) [917024 917025] {CVE-2013-1797}
- [security] keys: Fix race with concurrent install_user_keyrings() (David Howells) [916681 913258] {CVE-2013-1792}
- [virt] hv_balloon: Make adjustments to the pressure report (Jason Wang) [909156 902232]
[2.6.32-358.5.1]
- [fs] xfs: use maximum schedule timeout when ail is empty (Brian Foster) [921958 883905]
- [net] xfrm_user: fix info leak in copy_to_user_tmpl() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_policy() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_state() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] xfrm_user: fix info leak in copy_to_user_auth() (Thomas Graf) [922428 922429] {CVE-2012-6537}
- [net] atm: fix info leak in getsockopt(SO_ATMPVC) (Thomas Graf) [922386 922387] {CVE-2012-6546}
- [net] atm: fix info leak via getsockname() (Thomas Graf) [922386 922387] {CVE-2012-6546}
- [fs] nls: improve UTF8 -> UTF16 string conversion routine (Nikola Pajkovsky) [916118 916119] {CVE-2013-1773}
- [fs] fat: Fix stat->f_namelen (Nikola Pajkovsky) [916118 916119] {CVE-2013-1773}
- [netdrv] tun: fix ioctl() based info leaks (Thomas Graf) [922350 922351] {CVE-2012-6547}
- [virt] x86: Add a check to catch Xen emulation of Hyper-V (Andrew Jones) [923204 918239]
- [fs] cifs: fix expand_dfs_referral (Sachin Prabhu) [923098 902492]
- [fs] cifs: factor smb_vol allocation out of cifs_setup_volume_info (Sachin Prabhu) [923098 902492]
- [fs] cifs: have cifs_cleanup_volume_info not take a double pointer (Sachin Prabhu) [923098 902492]
- [fs] nfs: Dont allow NFS silly-renamed files to be deleted, no signal (Dave Wysochanski) [920266 905095]
[2.6.32-358.4.1]
- [fs] NLM: Ensure that we resend all pending blocking locks after a reclaim (Steve Dickson) [921150 913704]
- [fs] xfs: remove log force from xfs_buf_cond_lock() (Brian Foster) [921961 896224]
- [fs] xfs: recheck buffer pinned status after push trylock failure (Brian Foster) [921961 896224]
- [fs] nfs: Ensure that we check lock exclusive/shared type against open modes (Dave Wysochanski) [920268 916324]
- [powerpc] pseries: Fix partition migration hang in stop_topology_update (Steve Best) [921963 910597]
- [infiniband] qib: correction for faulty sparse warning correction (Jay Fenlason) [922154 901701]
- [usb] io_ti: Fix NULL dereference in chase_port() (Nikola Pajkovsky) [916198 916200] {CVE-2013-1774}
- [net] bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Nikola Pajkovsky) [914690 914691] {CVE-2013-0349}
- [char] tty: set_termios/set_termiox should not return -EINTR (Oleg Nesterov) [921145 904907]
- [netdrv] ehea: fix VLAN support (Steve Best) [921535 911359]
- [net] xfrm_user: return error pointer instead of NULL (Thomas Graf) [919388 919389] {CVE-2013-1826}
- [net] dccp: check ccid before NULL poiter dereference (Weiping Pan) [919187 919188] {CVE-2013-1827}
- [mm] tmpfs: fix use-after-free of mempolicy object (Nikola Pajkovsky) [915714 915715] {CVE-2013-1767}
- [fs] fuse: set page_descs length in fuse_buffered_write() (Brian Foster) [916957 915135]
- [fs] vfs: fix pointer dereference validation in d_validate (Carlos Maiolino) [915583 876600]
- [fs] cifs: after upcalling for krb5 creds, invalidate key rather than revoking it (Niels de Vos) [912452 885899]
- [fs] cifs: tmp_key_invalidate() should not set key->expiry to 0 (Niels de Vos) [912452 885899]
- [block] disable discard request merge temporarily (Mike Snitzer) [911475 907844]
[2.6.32-358.3.1]
- [net] netfilter: improve out-of-sync situation in TCP tracking (Flavio Leitner) [917690 629857]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-358.6.1.el6
kernel-debug
2.6.32-358.6.1.el6
kernel-debug-devel
2.6.32-358.6.1.el6
kernel-devel
2.6.32-358.6.1.el6
kernel-doc
2.6.32-358.6.1.el6
kernel-firmware
2.6.32-358.6.1.el6
kernel-headers
2.6.32-358.6.1.el6
perf
2.6.32-358.6.1.el6
python-perf
2.6.32-358.6.1.el6
Oracle Linux i686
kernel
2.6.32-358.6.1.el6
kernel-debug
2.6.32-358.6.1.el6
kernel-debug-devel
2.6.32-358.6.1.el6
kernel-devel
2.6.32-358.6.1.el6
kernel-doc
2.6.32-358.6.1.el6
kernel-firmware
2.6.32-358.6.1.el6
kernel-headers
2.6.32-358.6.1.el6
perf
2.6.32-358.6.1.el6
python-perf
2.6.32-358.6.1.el6
Ссылки на источники
Связанные уязвимости
ELSA-2013-2520: Unbreakable Enterprise kernel security update (IMPORTANT)
The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
The ATM implementation in the Linux kernel before 3.6 does not initial ...