Описание
ELSA-2014-1843: kernel security and bug fix update (IMPORTANT)
[2.6.32-504.1.3]
- Revert: [net] revert 'bridge: Set vlan_features to allow offloads on vlans' (Vlad Yasevich) [1144442 1121991]
[2.6.32-504.1.2]
- [x86] kvm: fix PIT timer race condition (mguzik) [1149592 1149593] {CVE-2014-3611}
- [x86] kvm: vmx: handle invept and invvpid vm exits gracefull (mguzik) [1144826 1144837 1144827 1144838] {CVE-2014-3646 CVE-2014-3645}
[2.6.32-504.1.1]
- [fs] call d_op->d_hash on last component of umount path (Abhijith Das) [1145193 1129712]
- [usb] serial: memory corruption flaw (Jacob Tanenbaum) [1141401 1141402] {CVE-2014-3185}
- [char] ipmi: Clear drvdata when interface is removed (Tony Camuso) [1149578 1135910]
- [char] ipmi: init shadow_ipmi_smi_handlers early in ipmi_si_intf (Tony Camuso) [1149580 1139464]
- [net] ipsec: update MAX_AH_AUTH_LEN to support sha512 (Herbert Xu) [1149083 1140103]
- [net] revert 'bridge: Set vlan_features to allow offloads on vlans' (Vlad Yasevich) [1144442 1121991]
- [netdrv] virtio-net: fix big buffer receiving (Jason Wang) [1148693 1144073]
- [netdrv] tg3: prevent ifup/ifdown during PCI error recovery (Ivan Vecera) [1142570 1117009]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-504.1.3.el6
kernel-abi-whitelists
2.6.32-504.1.3.el6
kernel-debug
2.6.32-504.1.3.el6
kernel-debug-devel
2.6.32-504.1.3.el6
kernel-devel
2.6.32-504.1.3.el6
kernel-doc
2.6.32-504.1.3.el6
kernel-firmware
2.6.32-504.1.3.el6
kernel-headers
2.6.32-504.1.3.el6
perf
2.6.32-504.1.3.el6
python-perf
2.6.32-504.1.3.el6
Oracle Linux i686
kernel
2.6.32-504.1.3.el6
kernel-abi-whitelists
2.6.32-504.1.3.el6
kernel-debug
2.6.32-504.1.3.el6
kernel-debug-devel
2.6.32-504.1.3.el6
kernel-devel
2.6.32-504.1.3.el6
kernel-doc
2.6.32-504.1.3.el6
kernel-firmware
2.6.32-504.1.3.el6
kernel-headers
2.6.32-504.1.3.el6
perf
2.6.32-504.1.3.el6
python-perf
2.6.32-504.1.3.el6
Связанные CVE
Связанные уязвимости
ELSA-2014-3084: Unbreakable Enterprise kernel Security update (IMPORTANT)
ELSA-2014-1724: kernel security and bug fix update (IMPORTANT)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.