Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-3022

Опубликовано: 08 мая 2014
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2014-3022: Unbreakable Enterprise kernel security update (IMPORTANT)

[2.6.39-400.214.6]

  • aacraid: missing capable() check in compat ioctl (Dan Carpenter) [Orabug: 18721962] {CVE-2013-6383}
  • vhost: fix total length when packets are too short (Michael S. Tsirkin) [Orabug: 18721977] {CVE-2014-0077}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.214.6.el5uek

kernel-uek-debug

2.6.39-400.214.6.el5uek

kernel-uek-debug-devel

2.6.39-400.214.6.el5uek

kernel-uek-devel

2.6.39-400.214.6.el5uek

kernel-uek-doc

2.6.39-400.214.6.el5uek

kernel-uek-firmware

2.6.39-400.214.6.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.214.6.el5uek

kernel-uek-debug

2.6.39-400.214.6.el5uek

kernel-uek-debug-devel

2.6.39-400.214.6.el5uek

kernel-uek-devel

2.6.39-400.214.6.el5uek

kernel-uek-doc

2.6.39-400.214.6.el5uek

kernel-uek-firmware

2.6.39-400.214.6.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.214.6.el6uek

kernel-uek-debug

2.6.39-400.214.6.el6uek

kernel-uek-debug-devel

2.6.39-400.214.6.el6uek

kernel-uek-devel

2.6.39-400.214.6.el6uek

kernel-uek-doc

2.6.39-400.214.6.el6uek

kernel-uek-firmware

2.6.39-400.214.6.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.214.6.el6uek

kernel-uek-debug

2.6.39-400.214.6.el6uek

kernel-uek-debug-devel

2.6.39-400.214.6.el6uek

kernel-uek-devel

2.6.39-400.214.6.el6uek

kernel-uek-doc

2.6.39-400.214.6.el6uek

kernel-uek-firmware

2.6.39-400.214.6.el6uek

Связанные CVE

Связанные уязвимости

oracle-oval
около 11 лет назад

ELSA-2014-3021: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
около 11 лет назад

ELSA-2014-0475: kernel security and bug fix update (IMPORTANT)

ubuntu
около 11 лет назад

drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.

redhat
около 11 лет назад

drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.

nvd
около 11 лет назад

drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.