Описание
ELSA-2014-0926: kernel security and bug fix update (MODERATE)
kernel [2.6.18-371.11.1]
- [fs] dcache: fix cleanup on warning in d_splice_alias (Denys Vlasenko) [1109720 1080606]
- [net] neigh: Make neigh_add_timer symmetrical to neigh_del_timer (Marcelo Ricardo Leitner) [1111195 1109888]
- [net] neigh: set NUD_INCOMPLETE when probing router reachability (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ipv6: router reachability probing (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ipv6: probe routes asynchronous in rt6_probe (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ndisc: Update neigh->updated with write lock (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ipv6: remove the unnecessary statement in find_match() (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ipv6: fix route selection if CONFIG_IPV6_ROUTER_PREF unset (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ipv6: Fix def route failover when CONFIG_IPV6_ROUTER_PREF=n (Marcelo Ricardo Leitner) [1106354 1090806]
- [net] ipv6: Prefer reachable nexthop only if the caller requests (Marcelo Ricardo Leitner) [1106354 1090806]
- [fs] ext4/jbd2: don't wait forever stale tid caused by wraparound (Eric Sandeen) [1097528 980268]
- [fs] ext4: Initialize fsync transaction ids in ext4_new_inode() (Eric Sandeen) [1097528 980268]
- [fs] jbd2: don't wake kjournald unnecessarily (Eric Sandeen) [1097528 980268]
- [fs] jbd2: fix fsync() tid wraparound bug (Eric Sandeen) [1097528 980268]
- [infiniband] rds: do not deref NULL dev in rds_iw_laddr_check() (Jacob Tanenbaum) [1093311 1093312] {CVE-2014-2678}
- [fs] nfs4: Add recovery for individual stateids - partial backport. (Dave Wysochanski) [1113468 867570]
- [fs] nfs4: Don't start state recovery in nfs4_close_done - clean backport. (Dave Wysochanski) [1113468 867570]
- [xen] page-alloc: scrub anonymous domain heap pages upon freeing (Vitaly Kuznetsov) [1103648 1103649] {CVE-2014-4021}
[2.6.18-371.10.1]
- [net] ipv6: fix overlap check for fragments (Francesco Fusco) [1107932 995277]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-371.11.1.el5
kernel-debug
2.6.18-371.11.1.el5
kernel-debug-devel
2.6.18-371.11.1.el5
kernel-devel
2.6.18-371.11.1.el5
kernel-doc
2.6.18-371.11.1.el5
kernel-headers
2.6.18-371.11.1.el5
kernel-xen
2.6.18-371.11.1.el5
kernel-xen-devel
2.6.18-371.11.1.el5
ocfs2-2.6.18-371.11.1.el5
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.11.1.el5
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-371.11.1.el5
kernel-debug
2.6.18-371.11.1.el5
kernel-debug-devel
2.6.18-371.11.1.el5
kernel-devel
2.6.18-371.11.1.el5
kernel-doc
2.6.18-371.11.1.el5
kernel-headers
2.6.18-371.11.1.el5
kernel-xen
2.6.18-371.11.1.el5
kernel-xen-devel
2.6.18-371.11.1.el5
ocfs2-2.6.18-371.11.1.el5
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.11.1.el5
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-371.11.1.el5
kernel-PAE
2.6.18-371.11.1.el5
kernel-PAE-devel
2.6.18-371.11.1.el5
kernel-debug
2.6.18-371.11.1.el5
kernel-debug-devel
2.6.18-371.11.1.el5
kernel-devel
2.6.18-371.11.1.el5
kernel-doc
2.6.18-371.11.1.el5
kernel-headers
2.6.18-371.11.1.el5
kernel-xen
2.6.18-371.11.1.el5
kernel-xen-devel
2.6.18-371.11.1.el5
ocfs2-2.6.18-371.11.1.el5
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.11.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.11.1.el5
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.11.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
ELSA-2014-0926-1: kernel security and bug fix update (MODERATE)
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered ...