Описание
ELSA-2014-3074: unbreakable enterprise kernel security bug fix update (IMPORTANT)
[2.6.39-400.215.10]
- auditsc: audit_krule mask accesses need bounds checking (Andy Lutomirski) [Orabug: 19590597] {CVE-2014-3917}
[2.6.39-400.215.9]
- oracleasm: Add support for new error return codes from block/SCSI (Martin K. Petersen) [Orabug: 18438934]
[2.6.39-400.215.8]
- ib_ipoib: CSUM support in connected mode (Yuval Shaia) [Orabug: 18692878]
- net: Reduce high cpu usage in bonding driver by do_csum (Venkat Venkatsubra) [Orabug: 18141731]
- [random] Partially revert 6d7c7e49: random: make 'add_interrupt_randomness() (John Sobecki) [Orabug: 17740293]
- oracleasm: claim FMODE_EXCL access on disk during asm_open (Srinivas Eeda) [Orabug: 19453460]
- notify block layer when using temporary change to cache_type (Vaughan Cao) [Orabug: 19448451]
- sd: Fix parsing of 'temporary ' cache mode prefix (Ben Hutchings) [Orabug: 19448451]
- sd: fix array cache flushing bug causing performance problems (James Bottomley) [Orabug: 19448451]
- block: fix max discard sectors limit (James Bottomley) [Orabug: 18961244]
- xen-netback: fix deadlock in high memory pressure (Junxiao Bi) [Orabug: 18959416]
- sdp: fix keepalive functionality (shamir rabinovitch) [Orabug: 18728784]
- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (Steven Rostedt) [Orabug: 18552029]
- refcount: take rw_lock in ocfs2_reflink (Wengang Wang) [Orabug: 18406219]
- ipv6: check return value for dst_alloc (Madalin Bucur) [Orabug: 17865160]
- cciss: bug fix to prevent cciss from loading in kdump crash kernel (Mike Miller) [Orabug: 17740446]
- configfs: fix race between dentry put and lookup (Junxiao Bi) [Orabug: 17627075]
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.215.10.el5uek
kernel-uek-debug
2.6.39-400.215.10.el5uek
kernel-uek-debug-devel
2.6.39-400.215.10.el5uek
kernel-uek-devel
2.6.39-400.215.10.el5uek
kernel-uek-doc
2.6.39-400.215.10.el5uek
kernel-uek-firmware
2.6.39-400.215.10.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.215.10.el5uek
kernel-uek-debug
2.6.39-400.215.10.el5uek
kernel-uek-debug-devel
2.6.39-400.215.10.el5uek
kernel-uek-devel
2.6.39-400.215.10.el5uek
kernel-uek-doc
2.6.39-400.215.10.el5uek
kernel-uek-firmware
2.6.39-400.215.10.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.215.10.el6uek
kernel-uek-debug
2.6.39-400.215.10.el6uek
kernel-uek-debug-devel
2.6.39-400.215.10.el6uek
kernel-uek-devel
2.6.39-400.215.10.el6uek
kernel-uek-doc
2.6.39-400.215.10.el6uek
kernel-uek-firmware
2.6.39-400.215.10.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.215.10.el6uek
kernel-uek-debug
2.6.39-400.215.10.el6uek
kernel-uek-debug-devel
2.6.39-400.215.10.el6uek
kernel-uek-devel
2.6.39-400.215.10.el6uek
kernel-uek-doc
2.6.39-400.215.10.el6uek
kernel-uek-firmware
2.6.39-400.215.10.el6uek
Связанные CVE
Связанные уязвимости
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDIT ...
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.