Описание
ELSA-2014-3039: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [2.6.32-400.36.2uek]
- futex: Make lookup_pi_state more robust (Thomas Gleixner) [Orabug: 18918736] {CVE-2014-3153}
- futex: Always cleanup owner tid in unlock_pi (Thomas Gleixner) [Orabug: 18918736] {CVE-2014-3153}
- futex: Validate atomic acquisition in futex_lock_pi_atomic() (Thomas Gleixner) [Orabug: 18918736] {CVE-2014-3153}
- futex: Forbid uaddr1 == uaddr2 in futex_requeue(..., requeue_pi=1) (Thomas Gleixner) [Orabug: 18918736] {CVE-2014-3153} {CVE-2014-3153}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-400.36.2.el5uek
kernel-uek-debug
2.6.32-400.36.2.el5uek
kernel-uek-debug-devel
2.6.32-400.36.2.el5uek
kernel-uek-devel
2.6.32-400.36.2.el5uek
kernel-uek-doc
2.6.32-400.36.2.el5uek
kernel-uek-firmware
2.6.32-400.36.2.el5uek
kernel-uek-headers
2.6.32-400.36.2.el5uek
mlnx_en-2.6.32-400.36.2.el5uek
1.5.7-2
mlnx_en-2.6.32-400.36.2.el5uekdebug
1.5.7-2
ofa-2.6.32-400.36.2.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.36.2.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-400.36.2.el5uek
kernel-uek-debug
2.6.32-400.36.2.el5uek
kernel-uek-debug-devel
2.6.32-400.36.2.el5uek
kernel-uek-devel
2.6.32-400.36.2.el5uek
kernel-uek-doc
2.6.32-400.36.2.el5uek
kernel-uek-firmware
2.6.32-400.36.2.el5uek
kernel-uek-headers
2.6.32-400.36.2.el5uek
mlnx_en-2.6.32-400.36.2.el5uek
1.5.7-2
mlnx_en-2.6.32-400.36.2.el5uekdebug
1.5.7-2
ofa-2.6.32-400.36.2.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.36.2.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-400.36.2.el6uek
kernel-uek-debug
2.6.32-400.36.2.el6uek
kernel-uek-debug-devel
2.6.32-400.36.2.el6uek
kernel-uek-devel
2.6.32-400.36.2.el6uek
kernel-uek-doc
2.6.32-400.36.2.el6uek
kernel-uek-firmware
2.6.32-400.36.2.el6uek
kernel-uek-headers
2.6.32-400.36.2.el6uek
mlnx_en-2.6.32-400.36.2.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.36.2.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.36.2.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.36.2.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-400.36.2.el6uek
kernel-uek-debug
2.6.32-400.36.2.el6uek
kernel-uek-debug-devel
2.6.32-400.36.2.el6uek
kernel-uek-devel
2.6.32-400.36.2.el6uek
kernel-uek-doc
2.6.32-400.36.2.el6uek
kernel-uek-firmware
2.6.32-400.36.2.el6uek
kernel-uek-headers
2.6.32-400.36.2.el6uek
mlnx_en-2.6.32-400.36.2.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.36.2.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.36.2.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.36.2.el6uekdebug
1.5.1-4.0.58
Связанные CVE
Связанные уязвимости
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
The futex_requeue function in kernel/futex.c in the Linux kernel throu ...
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.