Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-3074

Опубликовано: 10 сент. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2014-3074: unbreakable enterprise kernel security bug fix update (IMPORTANT)

[2.6.39-400.215.10]

  • auditsc: audit_krule mask accesses need bounds checking (Andy Lutomirski) [Orabug: 19590597] {CVE-2014-3917}

[2.6.39-400.215.9]

  • oracleasm: Add support for new error return codes from block/SCSI (Martin K. Petersen) [Orabug: 18438934]

[2.6.39-400.215.8]

  • ib_ipoib: CSUM support in connected mode (Yuval Shaia) [Orabug: 18692878]
  • net: Reduce high cpu usage in bonding driver by do_csum (Venkat Venkatsubra) [Orabug: 18141731]
  • [random] Partially revert 6d7c7e49: random: make 'add_interrupt_randomness() (John Sobecki) [Orabug: 17740293]
  • oracleasm: claim FMODE_EXCL access on disk during asm_open (Srinivas Eeda) [Orabug: 19453460]
  • notify block layer when using temporary change to cache_type (Vaughan Cao) [Orabug: 19448451]
  • sd: Fix parsing of 'temporary ' cache mode prefix (Ben Hutchings) [Orabug: 19448451]
  • sd: fix array cache flushing bug causing performance problems (James Bottomley) [Orabug: 19448451]
  • block: fix max discard sectors limit (James Bottomley) [Orabug: 18961244]
  • xen-netback: fix deadlock in high memory pressure (Junxiao Bi) [Orabug: 18959416]
  • sdp: fix keepalive functionality (shamir rabinovitch) [Orabug: 18728784]
  • SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (Steven Rostedt) [Orabug: 18552029]
  • refcount: take rw_lock in ocfs2_reflink (Wengang Wang) [Orabug: 18406219]
  • ipv6: check return value for dst_alloc (Madalin Bucur) [Orabug: 17865160]
  • cciss: bug fix to prevent cciss from loading in kdump crash kernel (Mike Miller) [Orabug: 17740446]
  • configfs: fix race between dentry put and lookup (Junxiao Bi) [Orabug: 17627075]

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.215.10.el5uek

kernel-uek-debug

2.6.39-400.215.10.el5uek

kernel-uek-debug-devel

2.6.39-400.215.10.el5uek

kernel-uek-devel

2.6.39-400.215.10.el5uek

kernel-uek-doc

2.6.39-400.215.10.el5uek

kernel-uek-firmware

2.6.39-400.215.10.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.215.10.el5uek

kernel-uek-debug

2.6.39-400.215.10.el5uek

kernel-uek-debug-devel

2.6.39-400.215.10.el5uek

kernel-uek-devel

2.6.39-400.215.10.el5uek

kernel-uek-doc

2.6.39-400.215.10.el5uek

kernel-uek-firmware

2.6.39-400.215.10.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.215.10.el6uek

kernel-uek-debug

2.6.39-400.215.10.el6uek

kernel-uek-debug-devel

2.6.39-400.215.10.el6uek

kernel-uek-devel

2.6.39-400.215.10.el6uek

kernel-uek-doc

2.6.39-400.215.10.el6uek

kernel-uek-firmware

2.6.39-400.215.10.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.215.10.el6uek

kernel-uek-debug

2.6.39-400.215.10.el6uek

kernel-uek-debug-devel

2.6.39-400.215.10.el6uek

kernel-uek-devel

2.6.39-400.215.10.el6uek

kernel-uek-doc

2.6.39-400.215.10.el6uek

kernel-uek-firmware

2.6.39-400.215.10.el6uek

Связанные CVE

Связанные уязвимости

ubuntu
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

redhat
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

nvd
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

debian
около 11 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDIT ...

github
около 3 лет назад

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.