Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-3013

Опубликовано: 13 мар. 2015
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2015-3013: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [3.8.13-55.1.8]

  • kvm: fix excessive pages un-pinning in kvm_iommu_map error path. (Quentin Casasnovas) [Orabug: 20687313] {CVE-2014-3601} {CVE-2014-8369} {CVE-2014-3601}

[3.8.13-55.1.7]

  • ttusb-dec: buffer overflow in ioctl (Dan Carpenter) [Orabug: 20673376] {CVE-2014-8884}
  • mm: Fix NULL pointer dereference in madvise(MADV_WILLNEED) support (Kirill A. Shutemov) [Orabug: 20673281] {CVE-2014-8173}
  • netfilter: conntrack: disable generic tracking for known protocols (Florian Westphal) [Orabug: 20673239] {CVE-2014-8160}
  • tracing/syscalls: Ignore numbers outside NR_syscalls' range (Rabin Vincent) [Orabug: 20673163] {CVE-2014-7826}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-55.1.8.el6uek

0.4.3-4.el6

kernel-uek

3.8.13-55.1.8.el6uek

kernel-uek-debug

3.8.13-55.1.8.el6uek

kernel-uek-debug-devel

3.8.13-55.1.8.el6uek

kernel-uek-devel

3.8.13-55.1.8.el6uek

kernel-uek-doc

3.8.13-55.1.8.el6uek

kernel-uek-firmware

3.8.13-55.1.8.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-55.1.8.el7uek

0.4.3-4.el7

kernel-uek

3.8.13-55.1.8.el7uek

kernel-uek-debug

3.8.13-55.1.8.el7uek

kernel-uek-debug-devel

3.8.13-55.1.8.el7uek

kernel-uek-devel

3.8.13-55.1.8.el7uek

kernel-uek-doc

3.8.13-55.1.8.el7uek

kernel-uek-firmware

3.8.13-55.1.8.el7uek

Связанные уязвимости

oracle-oval
больше 10 лет назад

ELSA-2015-3015: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
больше 10 лет назад

ELSA-2015-3014: Unbreakable Enterprise kernel security update (IMPORTANT)

oracle-oval
больше 10 лет назад

ELSA-2015-0290: kernel security, bug fix, and enhancement update (IMPORTANT)

oracle-oval
больше 10 лет назад

ELSA-2015-0674: kernel security and bug fix update (IMPORTANT)

ubuntu
больше 10 лет назад

net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.