Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-0164

Опубликовано: 11 фев. 2015
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2015-0164: kernel security and bug fix update (MODERATE)

kernel [2.6.18-402]

  • [block] virtio: Reset device after blk_cleanup_queue() (Stefan Hajnoczi) [1006536]
  • [block] virtio: Call del_gendisk() before disable guest kick (Stefan Hajnoczi) [1006536]
  • [block] virtio: Drop unused request tracking list (Stefan Hajnoczi) [1006536]
  • [fs] cifs: setfacl removes part of ACL when setting POSIX ACLs (Sachin Prabhu) [1105625]
  • [fs] splice: perform generic write checks (Eric Sandeen) [1155908] {CVE-2014-7822}
  • [fs] ext4: verify block bitmap (Lukas Czerner) [1034403]
  • [fs] ext4: fix type declaration of ext4_validate_block_bitmap (Lukas Czerner) [1034403]
  • [fs] ext4: error out if verifying the block bitmap fails (Lukas Czerner) [1034403]
  • [x86] traps: stop using IST for #SS (Petr Matousek) [1172809] {CVE-2014-9322}

[2.6.18-401]

  • [net] rds: fix possible double free on sock tear down (Herton R. Krzesinski) [1116880]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-402.el5

kernel-debug

2.6.18-402.el5

kernel-debug-devel

2.6.18-402.el5

kernel-devel

2.6.18-402.el5

kernel-doc

2.6.18-402.el5

kernel-headers

2.6.18-402.el5

kernel-xen

2.6.18-402.el5

kernel-xen-devel

2.6.18-402.el5

ocfs2-2.6.18-402.el5

1.4.10-1.el5

ocfs2-2.6.18-402.el5debug

1.4.10-1.el5

ocfs2-2.6.18-402.el5xen

1.4.10-1.el5

oracleasm-2.6.18-402.el5

2.0.5-1.el5

oracleasm-2.6.18-402.el5debug

2.0.5-1.el5

oracleasm-2.6.18-402.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-402.el5

kernel-debug

2.6.18-402.el5

kernel-debug-devel

2.6.18-402.el5

kernel-devel

2.6.18-402.el5

kernel-doc

2.6.18-402.el5

kernel-headers

2.6.18-402.el5

kernel-xen

2.6.18-402.el5

kernel-xen-devel

2.6.18-402.el5

ocfs2-2.6.18-402.el5

1.4.10-1.el5

ocfs2-2.6.18-402.el5debug

1.4.10-1.el5

ocfs2-2.6.18-402.el5xen

1.4.10-1.el5

oracleasm-2.6.18-402.el5

2.0.5-1.el5

oracleasm-2.6.18-402.el5debug

2.0.5-1.el5

oracleasm-2.6.18-402.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-402.el5

kernel-PAE

2.6.18-402.el5

kernel-PAE-devel

2.6.18-402.el5

kernel-debug

2.6.18-402.el5

kernel-debug-devel

2.6.18-402.el5

kernel-devel

2.6.18-402.el5

kernel-doc

2.6.18-402.el5

kernel-headers

2.6.18-402.el5

kernel-xen

2.6.18-402.el5

kernel-xen-devel

2.6.18-402.el5

ocfs2-2.6.18-402.el5

1.4.10-1.el5

ocfs2-2.6.18-402.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-402.el5debug

1.4.10-1.el5

ocfs2-2.6.18-402.el5xen

1.4.10-1.el5

oracleasm-2.6.18-402.el5

2.0.5-1.el5

oracleasm-2.6.18-402.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-402.el5debug

2.0.5-1.el5

oracleasm-2.6.18-402.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 10 лет назад

The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.

redhat
больше 10 лет назад

The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.

nvd
больше 10 лет назад

The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.

debian
больше 10 лет назад

The implementation of certain splice_write file operations in the Linu ...

github
около 3 лет назад

The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.