Описание
ELSA-2016-0494: kernel security, bug fix, and enhancement update (MODERATE)
[2.6.32-573.22.1]
- [mm] always decrement anon_vma degree when the vma list is empty (Jerome Marchand) [1318364 1309898]
[2.6.32-573.21.1]
- [fs] pipe: fix offset and len mismatch on pipe_iov_copy_to_user failure (Seth Jennings) [1310148 1302223] {CVE-2016-0774}
- [fs] gfs2: Add missing else in trans_add_meta/data (Robert S Peterson) [1304332 1267995]
- [fs] fs-cache: Synchronise object death state change vs operation submission (David Howells) [1308471 1096893]
- [fs] fs-cache: Reduce cookie ref count if submit fails (David Howells) [1308471 1096893]
- [mm] memcg: oom_notify use-after-free fix (Rafael Aquini) [1302763 1294400]
- [x86] fix corruption of XMM registers when interrupt handlers use FPU (Mikulas Patocka) [1298994 1259023]
- [net] tcp: honour SO_BINDTODEVICE for TW_RST case too (Florian Westphal) [1303044 1292300]
- [net] add inet_sk_transparent() helper (Florian Westphal) [1303044 1292300]
- [net] ipv6: tcp_ipv6 policy route issue (Florian Westphal) [1303044 1292300]
- [net] ipv6: reuse rt6_need_strict (Florian Westphal) [1303044 1292300]
- [net] tcp: resets are misrouted (Florian Westphal) [1303044 1292300]
- [net] tcp: tcp_v4_send_reset: binding oif to iif in no sock case (Florian Westphal) [1303044 1292300]
- [crypto] api: Only abort operations on fatal signal (Herbert Xu) [1296014 1272314]
- [crypto] testmgr: don't use interruptible wait in tests (Herbert Xu) [1296014 1272314]
- [kernel] sched: add wait_for_completion_killable_timeout (Herbert Xu) [1296014 1272314]
- [net] sctp: add routing output fallback (Xin Long) [1307073 1229124]
- [net] sctp: fix dst leak (Xin Long) [1307073 1229124]
- [net] sctp: fix src address selection if using secondary addresses (Xin Long) [1307073 1229124]
- [net] sctp: reduce indent level on sctp_v4_get_dst (Xin Long) [1307073 1229124]
- [scsi] hpsa: Update driver revision to RH5 (Joseph Szczypek) [1306192 1244959]
- [scsi] hpsa: fix issues with multilun devices (Joseph Szczypek) [1306192 1244959]
[2.6.32-573.20.1]
- [sched] kernel: sched: Fix nohz load accounting -- again (Rafael Aquini) [1300349 1167755]
- [sched] kernel: sched: Move sched_avg_update to update_cpu_load (Rafael Aquini) [1300349 1167755]
- [sched] kernel: sched: Cure more NO_HZ load average woes (Rafael Aquini) [1300349 1167755]
- [sched] kernel: sched: Cure load average vs NO_HZ woes (Rafael Aquini) [1300349 1167755]
[2.6.32-573.19.1]
- [scsi] lpfc: in sli3 use configured sg_seg_cnt for sg_tablesize (Rob Evers) [1297838 1227036]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-573.22.1.el6
kernel-abi-whitelists
2.6.32-573.22.1.el6
kernel-debug
2.6.32-573.22.1.el6
kernel-debug-devel
2.6.32-573.22.1.el6
kernel-devel
2.6.32-573.22.1.el6
kernel-doc
2.6.32-573.22.1.el6
kernel-firmware
2.6.32-573.22.1.el6
kernel-headers
2.6.32-573.22.1.el6
perf
2.6.32-573.22.1.el6
python-perf
2.6.32-573.22.1.el6
Oracle Linux i686
kernel
2.6.32-573.22.1.el6
kernel-abi-whitelists
2.6.32-573.22.1.el6
kernel-debug
2.6.32-573.22.1.el6
kernel-debug-devel
2.6.32-573.22.1.el6
kernel-devel
2.6.32-573.22.1.el6
kernel-doc
2.6.32-573.22.1.el6
kernel-firmware
2.6.32-573.22.1.el6
kernel-headers
2.6.32-573.22.1.el6
perf
2.6.32-573.22.1.el6
python-perf
2.6.32-573.22.1.el6
Связанные CVE
Связанные уязвимости
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a ...
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.