Download/kernel/rhel6/042stab120.11/changes

From OpenVZ Virtuozzo Containers Wiki
Jump to: navigation, search

Changes

Since 042stab120.6:

  • Stack overflow via ecryptfs and /proc/$pid/environ. (CVE-2016-1583)

It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.

  • Use after free in tcp_xmit_retransmit_queue. (CVE-2016-6828)

A use after free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.

  • block: fix use-after-free in seq file. (CVE-2016-7910)

Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.

  • block: fix use-after-free in sys_ioprio_get(). (CVE-2016-7911)

Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.

  • Creation of a network bridge can break IPv6 setup on host. (PSBM-50920) Kernels from 042stab117.x are affected.
  • Fixed host crash in ixgbe driver (10Gb NIC Intel) due to iptables TCP REJECT rule. (OVZ-6811) Kernels from 042stab117.x are affected
  • CPT restore of containers with Unix sockets can crash the host. (OVZ-6823) All 042stab* kernels are affected.
  • Removed WARN_ON in d_delete/unhash_offsprings generated false alert messages. (OVZ-6827) 042stab112+ kernels are affected
  • Other internal improvements.

See also