- Home
- CVEs with nessus.description==Two+flaws+were+found+in+the+way+the+Linux+kernel%27s+networking+implementation+handled+UDP+packets+with+incorrect+checksum+values.+A+remote+attacker+could+potentially+use+these+flaws+to+trigger+an+infinite+loop+in+the+kernel%2C+resulting+in+a+denial+of+service+on+the+system%2C+or+cause+a+denial+of+service+in+applications+using+the+edge+triggered+epoll+functionality.+%28CVE-2015-5364%2C+CVE-2015-5366%2C+Important%29%0A%0AThis+update+also+fixes+the+following+bugs+%3A%0A%0A++-+When+removing+a+directory%2C+and+a+reference+was+held+to+++++that+directory+by+a+reference+to+a+negative+child+++++dentry%2C+the+directory+dentry+was+previously+not+killed.%0A++++In+addition%2C+once+the+negative+child+dentry+was+killed%2C+++++an+unlinked+and+unused+dentry+was+present+in+the+cache.%0A++++As+a+consequence%2C+deadlock+could+be+caused+by+forcing+++++the+dentry+eviction+while+the+file+system+in+question+++++was+frozen.+With+this+update%2C+all+unused+dentries+are+++++unhashed+and+evicted+just+after+a+successful+directory+++++removal%2C+which+avoids+the+deadlock%2C+and+the+system+no+++++longer+hangs+in+the+aforementioned+scenario.%0A%0A++-+Due+to+the+broken+s_umount+lock+ordering%2C+a+race+++++condition+occurred+when+an+unlinked+file+was+closed+and+++++the+sync+%28or+syncfs%29+utility+was+run+at+the+same+time.%0A++++As+a+consequence%2C+deadlock+occurred+on+a+frozen+file+++++system+between+sync+and+a+process+trying+to+unfreeze+the+++++file+system.+With+this+update%2C+sync+%28or+syncfs%29+is+++++skipped+on+a+frozen+file+system%2C+and+deadlock+no+longer+++++occurs+in+the+aforementioned+situation.%0A%0A++-+Previously%2C+in+the+scenario+when+a+file+was+opened+by+++++file+handle+%28fhandle%29+with+its+dentry+not+present+in+++++dcache+%28%27cold+dcache%27%29+and+then+making+use+of+the+++++unlink%28%29+and+close%28%29+functions%2C+the+inode+was+not+freed+++++upon+the+close%28%29+system+call.+As+a+consequence%2C+the+++++iput%28%29+final+was+delayed+indefinitely.+A+patch+has+been+++++provided+to+fix+this+bug%2C+and+the+inode+is+now+freed+as+++++expected.%0A%0A++-+Due+to+a+corrupted+Executable+and+Linkable+Format+%28ELF%29+++++header+in+the+%2Fproc%2Fvmcore+file%2C+the+kdump+utility+++++failed+to+provide+any+information.+The+underlying+source+++++code+has+been+patched%2C+and+kdump+now+provides+debuging+++++information+for+kernel+crashes+as+intended.%0A%0A++-+Previously%2C+running+the+multipath+request+queue+caused+++++regressions+in+cases+where+paths+failed+regularly+under+++++I%2FO+load.+This+regression+manifested+as+I%2FO+stalls+that+++++exceeded+300+seconds.+This+update+reverts+the+changes+++++aimed+to+reduce+running+the+multipath+request+queue+++++resulting+in+I%2FO+stalls+completing+in+a+timely+manner.%0A%0AThe+system+must+be+rebooted+for+this+update+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top