File _patchinfo of Package patchinfo.2877
<patchinfo> <issue id="873374" tracker="bnc">VUL-0: CVE-2014-2851: kernel: net: ping: refcount issue in ping_init_sock() function</issue> <issue id="880892" tracker="bnc">VUL-0: CVE-2014-3153: kernel: Exploitable futex vulnerability</issue> <issue id="870173" tracker="bnc">VUL-0: CVE-2014-0055: kernel: vhost-net: insufficient handling of error conditions in get_rx_bufs()</issue> <issue id="870576" tracker="bnc">VUL-1: CVE-2014-0077: kernel: vhost-net: insufficiency in handling of big packets in handle_rx()</issue> <issue id="878274" tracker="bnc">memory cgroup controller: memory.force_empty will get deprecated</issue> <issue id="869563" tracker="bnc">VUL-1: CVE-2013-7339: kernel: rds: NULL ptr dereference issue in rds_ib_laddr_check</issue> <issue id="876102" tracker="bnc">VUL-0: CVE-2014-3122: Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking</issue> <issue id="871561" tracker="bnc">VUL-0: CVE-2014-2678: kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check()</issue> <issue id="CVE-2014-3122" tracker="cve" /> <issue id="CVE-2014-2678" tracker="cve" /> <issue id="CVE-2014-0077" tracker="cve" /> <issue id="CVE-2014-0055" tracker="cve" /> <issue id="CVE-2014-3153" tracker="cve" /> <issue id="CVE-2014-2851" tracker="cve" /> <issue id="CVE-2013-7339" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>msmeissn</packager> <description> The Linux kernel was updated to fix security issues and bugs: Security issues fixed: CVE-2014-3153: The futex_requeue function in kernel/futex.c in the Linux kernel did not ensure that calls have two different futex addresses, which allowed local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable buffers are disabled, did not properly validate packet lengths, which allowed guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package did not properly handle vhost_get_vq_desc errors, which allowed guest OS users to cause a denial of service (host OS crash) via unspecified vectors. CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel did not properly consider which pages must be locked, which allowed local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. Bugs fixed: - memcg: deprecate memory.force_empty knob (bnc#878274). </description> <summary>kernel: security and bugfix release</summary> <reboot_needed/> </patchinfo>