Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-0494

Опубликовано: 22 мар. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2016-0494: kernel security, bug fix, and enhancement update (MODERATE)

[2.6.32-573.22.1]

  • [mm] always decrement anon_vma degree when the vma list is empty (Jerome Marchand) [1318364 1309898]

[2.6.32-573.21.1]

  • [fs] pipe: fix offset and len mismatch on pipe_iov_copy_to_user failure (Seth Jennings) [1310148 1302223] {CVE-2016-0774}
  • [fs] gfs2: Add missing else in trans_add_meta/data (Robert S Peterson) [1304332 1267995]
  • [fs] fs-cache: Synchronise object death state change vs operation submission (David Howells) [1308471 1096893]
  • [fs] fs-cache: Reduce cookie ref count if submit fails (David Howells) [1308471 1096893]
  • [mm] memcg: oom_notify use-after-free fix (Rafael Aquini) [1302763 1294400]
  • [x86] fix corruption of XMM registers when interrupt handlers use FPU (Mikulas Patocka) [1298994 1259023]
  • [net] tcp: honour SO_BINDTODEVICE for TW_RST case too (Florian Westphal) [1303044 1292300]
  • [net] add inet_sk_transparent() helper (Florian Westphal) [1303044 1292300]
  • [net] ipv6: tcp_ipv6 policy route issue (Florian Westphal) [1303044 1292300]
  • [net] ipv6: reuse rt6_need_strict (Florian Westphal) [1303044 1292300]
  • [net] tcp: resets are misrouted (Florian Westphal) [1303044 1292300]
  • [net] tcp: tcp_v4_send_reset: binding oif to iif in no sock case (Florian Westphal) [1303044 1292300]
  • [crypto] api: Only abort operations on fatal signal (Herbert Xu) [1296014 1272314]
  • [crypto] testmgr: don't use interruptible wait in tests (Herbert Xu) [1296014 1272314]
  • [kernel] sched: add wait_for_completion_killable_timeout (Herbert Xu) [1296014 1272314]
  • [net] sctp: add routing output fallback (Xin Long) [1307073 1229124]
  • [net] sctp: fix dst leak (Xin Long) [1307073 1229124]
  • [net] sctp: fix src address selection if using secondary addresses (Xin Long) [1307073 1229124]
  • [net] sctp: reduce indent level on sctp_v4_get_dst (Xin Long) [1307073 1229124]
  • [scsi] hpsa: Update driver revision to RH5 (Joseph Szczypek) [1306192 1244959]
  • [scsi] hpsa: fix issues with multilun devices (Joseph Szczypek) [1306192 1244959]

[2.6.32-573.20.1]

  • [sched] kernel: sched: Fix nohz load accounting -- again (Rafael Aquini) [1300349 1167755]
  • [sched] kernel: sched: Move sched_avg_update to update_cpu_load (Rafael Aquini) [1300349 1167755]
  • [sched] kernel: sched: Cure more NO_HZ load average woes (Rafael Aquini) [1300349 1167755]
  • [sched] kernel: sched: Cure load average vs NO_HZ woes (Rafael Aquini) [1300349 1167755]

[2.6.32-573.19.1]

  • [scsi] lpfc: in sli3 use configured sg_seg_cnt for sg_tablesize (Rob Evers) [1297838 1227036]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel

2.6.32-573.22.1.el6

kernel-abi-whitelists

2.6.32-573.22.1.el6

kernel-debug

2.6.32-573.22.1.el6

kernel-debug-devel

2.6.32-573.22.1.el6

kernel-devel

2.6.32-573.22.1.el6

kernel-doc

2.6.32-573.22.1.el6

kernel-firmware

2.6.32-573.22.1.el6

kernel-headers

2.6.32-573.22.1.el6

perf

2.6.32-573.22.1.el6

python-perf

2.6.32-573.22.1.el6

Oracle Linux i686

kernel

2.6.32-573.22.1.el6

kernel-abi-whitelists

2.6.32-573.22.1.el6

kernel-debug

2.6.32-573.22.1.el6

kernel-debug-devel

2.6.32-573.22.1.el6

kernel-devel

2.6.32-573.22.1.el6

kernel-doc

2.6.32-573.22.1.el6

kernel-firmware

2.6.32-573.22.1.el6

kernel-headers

2.6.32-573.22.1.el6

perf

2.6.32-573.22.1.el6

python-perf

2.6.32-573.22.1.el6

Связанные CVE

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

redhat
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

CVSS3: 6.8
nvd
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

CVSS3: 6.8
debian
больше 9 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a ...

CVSS3: 6.8
github
больше 3 лет назад

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.