Описание
ELSA-2015-1042: kernel security and bug fix update (IMPORTANT)
kernel [2.6.18-406]
- [fs] pipe: fix pipe corruption and iovec overrun on partial copy (Mateusz Guzik) [1203787] {CVE-2015-1805}
[2.6.18-405]
- [net] tcp: zero retrans_stamp if all retrans were acked (Marcelo Leitner) [1205521]
- [net] tcp: fix retrans_stamp advancing in error cases (Marcelo Leitner) [1205521]
- [net] tcp: Fix inconsistency source (Marcelo Leitner) [1205521]
- [ipc] sem: fix the potential use-after-free in freeary() (Oleg Nesterov) [1124574]
- [scsi] lpfc: Fix crash in device reset handler (Rob Evers) [1070964]
- [mm] fix broken max_reclaims_in_progress memory reclaim throttle (Lachlan McIlroy) [1164105]
- [x86_64] fpu: save_i387() must clr TS_USEDFPU along with stts() (Oleg Nesterov) [1193505]
- [block] virtio: Call revalidate_disk() upon online disk resize (Stefan Hajnoczi) [1200855]
- [block] virtio: fix config handler race (Stefan Hajnoczi) [1200855]
- [block] virtio: allow re-reading config space at runtime (Stefan Hajnoczi) [1200855]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-406.el5
kernel-debug
2.6.18-406.el5
kernel-debug-devel
2.6.18-406.el5
kernel-devel
2.6.18-406.el5
kernel-doc
2.6.18-406.el5
kernel-headers
2.6.18-406.el5
kernel-xen
2.6.18-406.el5
kernel-xen-devel
2.6.18-406.el5
ocfs2-2.6.18-406.el5
1.4.10-1.el5
ocfs2-2.6.18-406.el5debug
1.4.10-1.el5
ocfs2-2.6.18-406.el5xen
1.4.10-1.el5
oracleasm-2.6.18-406.el5
2.0.5-1.el5
oracleasm-2.6.18-406.el5debug
2.0.5-1.el5
oracleasm-2.6.18-406.el5xen
2.0.5-1.el5
Oracle Linux x86_64
kernel
2.6.18-406.el5
kernel-debug
2.6.18-406.el5
kernel-debug-devel
2.6.18-406.el5
kernel-devel
2.6.18-406.el5
kernel-doc
2.6.18-406.el5
kernel-headers
2.6.18-406.el5
kernel-xen
2.6.18-406.el5
kernel-xen-devel
2.6.18-406.el5
ocfs2-2.6.18-406.el5
1.4.10-1.el5
ocfs2-2.6.18-406.el5debug
1.4.10-1.el5
ocfs2-2.6.18-406.el5xen
1.4.10-1.el5
oracleasm-2.6.18-406.el5
2.0.5-1.el5
oracleasm-2.6.18-406.el5debug
2.0.5-1.el5
oracleasm-2.6.18-406.el5xen
2.0.5-1.el5
Oracle Linux i386
kernel
2.6.18-406.el5
kernel-PAE
2.6.18-406.el5
kernel-PAE-devel
2.6.18-406.el5
kernel-debug
2.6.18-406.el5
kernel-debug-devel
2.6.18-406.el5
kernel-devel
2.6.18-406.el5
kernel-doc
2.6.18-406.el5
kernel-headers
2.6.18-406.el5
kernel-xen
2.6.18-406.el5
kernel-xen-devel
2.6.18-406.el5
ocfs2-2.6.18-406.el5
1.4.10-1.el5
ocfs2-2.6.18-406.el5PAE
1.4.10-1.el5
ocfs2-2.6.18-406.el5debug
1.4.10-1.el5
ocfs2-2.6.18-406.el5xen
1.4.10-1.el5
oracleasm-2.6.18-406.el5
2.0.5-1.el5
oracleasm-2.6.18-406.el5PAE
2.0.5-1.el5
oracleasm-2.6.18-406.el5debug
2.0.5-1.el5
oracleasm-2.6.18-406.el5xen
2.0.5-1.el5
Связанные CVE
Связанные уязвимости
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in t ...
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."