Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1042

Опубликовано: 02 июн. 2015
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2015-1042: kernel security and bug fix update (IMPORTANT)

kernel [2.6.18-406]

  • [fs] pipe: fix pipe corruption and iovec overrun on partial copy (Mateusz Guzik) [1203787] {CVE-2015-1805}

[2.6.18-405]

  • [net] tcp: zero retrans_stamp if all retrans were acked (Marcelo Leitner) [1205521]
  • [net] tcp: fix retrans_stamp advancing in error cases (Marcelo Leitner) [1205521]
  • [net] tcp: Fix inconsistency source (Marcelo Leitner) [1205521]
  • [ipc] sem: fix the potential use-after-free in freeary() (Oleg Nesterov) [1124574]
  • [scsi] lpfc: Fix crash in device reset handler (Rob Evers) [1070964]
  • [mm] fix broken max_reclaims_in_progress memory reclaim throttle (Lachlan McIlroy) [1164105]
  • [x86_64] fpu: save_i387() must clr TS_USEDFPU along with stts() (Oleg Nesterov) [1193505]
  • [block] virtio: Call revalidate_disk() upon online disk resize (Stefan Hajnoczi) [1200855]
  • [block] virtio: fix config handler race (Stefan Hajnoczi) [1200855]
  • [block] virtio: allow re-reading config space at runtime (Stefan Hajnoczi) [1200855]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-406.el5

kernel-debug

2.6.18-406.el5

kernel-debug-devel

2.6.18-406.el5

kernel-devel

2.6.18-406.el5

kernel-doc

2.6.18-406.el5

kernel-headers

2.6.18-406.el5

kernel-xen

2.6.18-406.el5

kernel-xen-devel

2.6.18-406.el5

ocfs2-2.6.18-406.el5

1.4.10-1.el5

ocfs2-2.6.18-406.el5debug

1.4.10-1.el5

ocfs2-2.6.18-406.el5xen

1.4.10-1.el5

oracleasm-2.6.18-406.el5

2.0.5-1.el5

oracleasm-2.6.18-406.el5debug

2.0.5-1.el5

oracleasm-2.6.18-406.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-406.el5

kernel-debug

2.6.18-406.el5

kernel-debug-devel

2.6.18-406.el5

kernel-devel

2.6.18-406.el5

kernel-doc

2.6.18-406.el5

kernel-headers

2.6.18-406.el5

kernel-xen

2.6.18-406.el5

kernel-xen-devel

2.6.18-406.el5

ocfs2-2.6.18-406.el5

1.4.10-1.el5

ocfs2-2.6.18-406.el5debug

1.4.10-1.el5

ocfs2-2.6.18-406.el5xen

1.4.10-1.el5

oracleasm-2.6.18-406.el5

2.0.5-1.el5

oracleasm-2.6.18-406.el5debug

2.0.5-1.el5

oracleasm-2.6.18-406.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-406.el5

kernel-PAE

2.6.18-406.el5

kernel-PAE-devel

2.6.18-406.el5

kernel-debug

2.6.18-406.el5

kernel-debug-devel

2.6.18-406.el5

kernel-devel

2.6.18-406.el5

kernel-doc

2.6.18-406.el5

kernel-headers

2.6.18-406.el5

kernel-xen

2.6.18-406.el5

kernel-xen-devel

2.6.18-406.el5

ocfs2-2.6.18-406.el5

1.4.10-1.el5

ocfs2-2.6.18-406.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-406.el5debug

1.4.10-1.el5

ocfs2-2.6.18-406.el5xen

1.4.10-1.el5

oracleasm-2.6.18-406.el5

2.0.5-1.el5

oracleasm-2.6.18-406.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-406.el5debug

2.0.5-1.el5

oracleasm-2.6.18-406.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
почти 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

redhat
около 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

nvd
почти 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."

debian
почти 10 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in t ...

github
около 3 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."