Описание
ELSA-2017-1372: kernel security and bug fix update (MODERATE)
[2.6.32-696.3.1.OL6]
- Update genkey [bug 25599697]
[2.6.32-696.3.1]
- [netdrv] be2net: Fix endian issue in logical link config command (Ivan Vecera) [1442979 1436527]
- [scsi] lpfc: update for r 11.0.0.6 (Maurizio Lombardi) [1439636 1429881]
- [scsi] lpfc: The lpfc driver does not issue RFF_ID and RFT_ID in the correct sequence (Maurizio Lombardi) [1439636 1429881]
- [x86] vmalloc_sync: avoid syncing vmalloc area on crashing cpu (Pingfan Liu) [1443499 1146727]
- [kernel] audit: plug cred memory leak in audit_filter_rules (Richard Guy Briggs) [1443234 1434560]
- [net] tcp: avoid infinite loop in tcp_splice_read() (Davide Caratti) [1430577 1430578] {CVE-2017-6214}
[2.6.32-696.2.1]
- [sched] fair: Rework throttle_count sync (Jiri Olsa) [1436241 1250762]
- [sched] fair: Reorder cgroup creation code (Jiri Olsa) [1436241 1250762]
- [sched] fair: Initialize throttle_count for new task-groups lazily (Jiri Olsa) [1436241 1250762]
- [sched] fair: Do not announce throttled next buddy in dequeue_task_fair() (Jiri Olsa) [1436241 1250762]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-696.3.1.el6
kernel-abi-whitelists
2.6.32-696.3.1.el6
kernel-debug
2.6.32-696.3.1.el6
kernel-debug-devel
2.6.32-696.3.1.el6
kernel-devel
2.6.32-696.3.1.el6
kernel-doc
2.6.32-696.3.1.el6
kernel-firmware
2.6.32-696.3.1.el6
kernel-headers
2.6.32-696.3.1.el6
perf
2.6.32-696.3.1.el6
python-perf
2.6.32-696.3.1.el6
Oracle Linux i686
kernel
2.6.32-696.3.1.el6
kernel-abi-whitelists
2.6.32-696.3.1.el6
kernel-debug
2.6.32-696.3.1.el6
kernel-debug-devel
2.6.32-696.3.1.el6
kernel-devel
2.6.32-696.3.1.el6
kernel-doc
2.6.32-696.3.1.el6
kernel-firmware
2.6.32-696.3.1.el6
kernel-headers
2.6.32-696.3.1.el6
perf
2.6.32-696.3.1.el6
python-perf
2.6.32-696.3.1.el6
Связанные CVE
Связанные уязвимости
The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel bef ...
The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.