Описание
ELSA-2015-0164: kernel security and bug fix update (MODERATE)
kernel [2.6.18-402]
- [block] virtio: Reset device after blk_cleanup_queue() (Stefan Hajnoczi) [1006536]
- [block] virtio: Call del_gendisk() before disable guest kick (Stefan Hajnoczi) [1006536]
- [block] virtio: Drop unused request tracking list (Stefan Hajnoczi) [1006536]
- [fs] cifs: setfacl removes part of ACL when setting POSIX ACLs (Sachin Prabhu) [1105625]
- [fs] splice: perform generic write checks (Eric Sandeen) [1155908] {CVE-2014-7822}
- [fs] ext4: verify block bitmap (Lukas Czerner) [1034403]
- [fs] ext4: fix type declaration of ext4_validate_block_bitmap (Lukas Czerner) [1034403]
- [fs] ext4: error out if verifying the block bitmap fails (Lukas Czerner) [1034403]
- [x86] traps: stop using IST for #SS (Petr Matousek) [1172809] {CVE-2014-9322}
[2.6.18-401]
- [net] rds: fix possible double free on sock tear down (Herton R. Krzesinski) [1116880]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-402.el5
kernel-debug
2.6.18-402.el5
kernel-debug-devel
2.6.18-402.el5
kernel-devel
2.6.18-402.el5
kernel-doc
2.6.18-402.el5
kernel-headers
2.6.18-402.el5
kernel-xen
2.6.18-402.el5
kernel-xen-devel
2.6.18-402.el5
ocfs2-2.6.18-402.el5
1.4.10-1.el5
ocfs2-2.6.18-402.el5debug
1.4.10-1.el5
ocfs2-2.6.18-402.el5xen
1.4.10-1.el5
oracleasm-2.6.18-402.el5
2.0.5-1.el5
oracleasm-2.6.18-402.el5debug
2.0.5-1.el5
oracleasm-2.6.18-402.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-402.el5
kernel-debug
2.6.18-402.el5
kernel-debug-devel
2.6.18-402.el5
kernel-devel
2.6.18-402.el5
kernel-doc
2.6.18-402.el5
kernel-headers
2.6.18-402.el5
kernel-xen
2.6.18-402.el5
kernel-xen-devel
2.6.18-402.el5
ocfs2-2.6.18-402.el5
1.4.10-1.el5
ocfs2-2.6.18-402.el5debug
1.4.10-1.el5
ocfs2-2.6.18-402.el5xen
1.4.10-1.el5
oracleasm-2.6.18-402.el5
2.0.5-1.el5
oracleasm-2.6.18-402.el5debug
2.0.5-1.el5
oracleasm-2.6.18-402.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-402.el5
kernel-PAE
2.6.18-402.el5
kernel-PAE-devel
2.6.18-402.el5
kernel-debug
2.6.18-402.el5
kernel-debug-devel
2.6.18-402.el5
kernel-devel
2.6.18-402.el5
kernel-doc
2.6.18-402.el5
kernel-headers
2.6.18-402.el5
kernel-xen
2.6.18-402.el5
kernel-xen-devel
2.6.18-402.el5
ocfs2-2.6.18-402.el5
1.4.10-1.el5
ocfs2-2.6.18-402.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-402.el5debug
1.4.10-1.el5
ocfs2-2.6.18-402.el5xen
1.4.10-1.el5
oracleasm-2.6.18-402.el5
2.0.5-1.el5
oracleasm-2.6.18-402.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-402.el5debug
2.0.5-1.el5
oracleasm-2.6.18-402.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
The implementation of certain splice_write file operations in the Linu ...
The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.