Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1143

Опубликовано: 04 сент. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2014-1143: kernel security and bug fix update (MODERATE)

kernel [2.6.18-371.12.1]

  • [audit] auditsc: audit_krule mask accesses need bounds checking (Denys Vlasenko) [1102702 1102703] {CVE-2014-3917}
  • [mm] writeback: Fix hang when low on memory due to NFS traffic (Larry Woodman) [1125246 1080194]
  • [net] tg3: Fix Read DMA workaround for 5719 A0 (Ivan Vecera) [1121017 924590]
  • [fs] jbd: don't wake kjournald unnecessarily (Denys Vlasenko) [1116027 1081785]
  • [fs] jbd: don't wait (forever) for stale tid caused by wraparound (Denys Vlasenko) [1116027 1081785]
  • [fs] ext4: fix waiting and sending of barrier in ext4_sync_file() (Denys Vlasenko) [1116027 1081785]
  • [fs] jbd2: Add function jbd2_trans_will_send_data_barrier() (Denys Vlasenko) [1116027 1081785]
  • [fs] jbd2: fix sending of data flush on journal commit (Denys Vlasenko) [1116027 1081785]
  • [fs] ext4, jbd2: Add barriers for file systems with ext journals (Denys Vlasenko) [1116027 1081785]
  • [fs] jbd: fix fsync() tid wraparound bug (Denys Vlasenko) [1116027 1081785]
  • [fs] ext4: fix fdatasync() for files with only i_size changes (Eric Sandeen) [1117665 1102768]

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kernel

2.6.18-371.12.1.el5

kernel-debug

2.6.18-371.12.1.el5

kernel-debug-devel

2.6.18-371.12.1.el5

kernel-devel

2.6.18-371.12.1.el5

kernel-doc

2.6.18-371.12.1.el5

kernel-headers

2.6.18-371.12.1.el5

kernel-xen

2.6.18-371.12.1.el5

kernel-xen-devel

2.6.18-371.12.1.el5

ocfs2-2.6.18-371.12.1.el5

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-371.12.1.el5

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5xen

2.0.5-1.el5

Oracle Linux x86_64

kernel

2.6.18-371.12.1.el5

kernel-debug

2.6.18-371.12.1.el5

kernel-debug-devel

2.6.18-371.12.1.el5

kernel-devel

2.6.18-371.12.1.el5

kernel-doc

2.6.18-371.12.1.el5

kernel-headers

2.6.18-371.12.1.el5

kernel-xen

2.6.18-371.12.1.el5

kernel-xen-devel

2.6.18-371.12.1.el5

ocfs2-2.6.18-371.12.1.el5

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-371.12.1.el5

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5xen

2.0.5-1.el5

Oracle Linux i386

kernel

2.6.18-371.12.1.el5

kernel-PAE

2.6.18-371.12.1.el5

kernel-PAE-devel

2.6.18-371.12.1.el5

kernel-debug

2.6.18-371.12.1.el5

kernel-debug-devel

2.6.18-371.12.1.el5

kernel-devel

2.6.18-371.12.1.el5

kernel-doc

2.6.18-371.12.1.el5

kernel-headers

2.6.18-371.12.1.el5

kernel-xen

2.6.18-371.12.1.el5

kernel-xen-devel

2.6.18-371.12.1.el5

ocfs2-2.6.18-371.12.1.el5

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5PAE

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5debug

1.4.10-1.el5

ocfs2-2.6.18-371.12.1.el5xen

1.4.10-1.el5

oracleasm-2.6.18-371.12.1.el5

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5PAE

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5debug

2.0.5-1.el5

oracleasm-2.6.18-371.12.1.el5xen

2.0.5-1.el5

Связанные CVE

Связанные уязвимости

ubuntu
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

redhat
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

nvd
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

debian
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDIT ...

github
около 3 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.