Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-3084

Опубликовано: 30 окт. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2014-3084: Unbreakable Enterprise kernel Security update (IMPORTANT)

kernel-uek [3.8.13-44.1.4.el7uek]

  • USB: whiteheat: Added bounds checking for bulk command response (James Forshaw) [Orabug: 19849334] {CVE-2014-3185}
  • HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849317] {CVE-2014-3181}
  • kvm: vmx: handle invvpid vm exit gracefully (Petr Matousek) [Orabug: 19906300] {CVE-2014-3646}
  • nEPT: Nested INVEPT (Nadav Har'El) [Orabug: 19906267] {CVE-2014-3645}
  • KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: 19905686] {CVE-2014-3611}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-44.1.4.el6uek

0.4.3-4.el6

kernel-uek

3.8.13-44.1.4.el6uek

kernel-uek-debug

3.8.13-44.1.4.el6uek

kernel-uek-debug-devel

3.8.13-44.1.4.el6uek

kernel-uek-devel

3.8.13-44.1.4.el6uek

kernel-uek-doc

3.8.13-44.1.4.el6uek

kernel-uek-firmware

3.8.13-44.1.4.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-44.1.4.el7uek

0.4.3-4.el7

kernel-uek

3.8.13-44.1.4.el7uek

kernel-uek-debug

3.8.13-44.1.4.el7uek

kernel-uek-debug-devel

3.8.13-44.1.4.el7uek

kernel-uek-devel

3.8.13-44.1.4.el7uek

kernel-uek-doc

3.8.13-44.1.4.el7uek

kernel-uek-firmware

3.8.13-44.1.4.el7uek

Связанные уязвимости

oracle-oval
больше 10 лет назад

ELSA-2014-1843: kernel security and bug fix update (IMPORTANT)

oracle-oval
больше 10 лет назад

ELSA-2014-1724: kernel security and bug fix update (IMPORTANT)

oracle-oval
больше 10 лет назад

ELSA-2014-3085: Unbreakable Enterprise kernel Security update (IMPORTANT)

oracle-oval
больше 10 лет назад

ELSA-2014-3086: Unbreakable Enterprise kernel security update (IMPORTANT)

ubuntu
больше 10 лет назад

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.