Описание
ELSA-2014-1143: kernel security and bug fix update (MODERATE)
kernel [2.6.18-371.12.1]
- [audit] auditsc: audit_krule mask accesses need bounds checking (Denys Vlasenko) [1102702 1102703] {CVE-2014-3917}
- [mm] writeback: Fix hang when low on memory due to NFS traffic (Larry Woodman) [1125246 1080194]
- [net] tg3: Fix Read DMA workaround for 5719 A0 (Ivan Vecera) [1121017 924590]
- [fs] jbd: don't wake kjournald unnecessarily (Denys Vlasenko) [1116027 1081785]
- [fs] jbd: don't wait (forever) for stale tid caused by wraparound (Denys Vlasenko) [1116027 1081785]
- [fs] ext4: fix waiting and sending of barrier in ext4_sync_file() (Denys Vlasenko) [1116027 1081785]
- [fs] jbd2: Add function jbd2_trans_will_send_data_barrier() (Denys Vlasenko) [1116027 1081785]
- [fs] jbd2: fix sending of data flush on journal commit (Denys Vlasenko) [1116027 1081785]
- [fs] ext4, jbd2: Add barriers for file systems with ext journals (Denys Vlasenko) [1116027 1081785]
- [fs] jbd: fix fsync() tid wraparound bug (Denys Vlasenko) [1116027 1081785]
- [fs] ext4: fix fdatasync() for files with only i_size changes (Eric Sandeen) [1117665 1102768]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-371.12.1.el5
kernel-debug
2.6.18-371.12.1.el5
kernel-debug-devel
2.6.18-371.12.1.el5
kernel-devel
2.6.18-371.12.1.el5
kernel-doc
2.6.18-371.12.1.el5
kernel-headers
2.6.18-371.12.1.el5
kernel-xen
2.6.18-371.12.1.el5
kernel-xen-devel
2.6.18-371.12.1.el5
ocfs2-2.6.18-371.12.1.el5
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.12.1.el5
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-371.12.1.el5
kernel-debug
2.6.18-371.12.1.el5
kernel-debug-devel
2.6.18-371.12.1.el5
kernel-devel
2.6.18-371.12.1.el5
kernel-doc
2.6.18-371.12.1.el5
kernel-headers
2.6.18-371.12.1.el5
kernel-xen
2.6.18-371.12.1.el5
kernel-xen-devel
2.6.18-371.12.1.el5
ocfs2-2.6.18-371.12.1.el5
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.12.1.el5
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-371.12.1.el5
kernel-PAE
2.6.18-371.12.1.el5
kernel-PAE-devel
2.6.18-371.12.1.el5
kernel-debug
2.6.18-371.12.1.el5
kernel-debug-devel
2.6.18-371.12.1.el5
kernel-devel
2.6.18-371.12.1.el5
kernel-doc
2.6.18-371.12.1.el5
kernel-headers
2.6.18-371.12.1.el5
kernel-xen
2.6.18-371.12.1.el5
kernel-xen-devel
2.6.18-371.12.1.el5
ocfs2-2.6.18-371.12.1.el5
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5debug
1.4.10-1.el5
ocfs2-2.6.18-371.12.1.el5xen
1.4.10-1.el5
oracleasm-2.6.18-371.12.1.el5
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5debug
2.0.5-1.el5
oracleasm-2.6.18-371.12.1.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDIT ...
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.