[ELSA-2014-3049] unbreakable enterprise kernel security update

Severity Important
Affected Packages 7
CVEs 3

kernel-uek
[3.8.13-35.3.2.el7uek]
- l2tp: fix an unprivileged user to kernel privilege escalation (Sasha Levin) [Orabug: 19229497] {CVE-2014-4943} {CVE-2014-4943}
- ptrace,x86: force IRET path after a ptrace_stop() (Tejun Heo) [Orabug: 19230689] {CVE-2014-4699}
- net: flow_dissector: fail on evil iph->ihl (Jason Wang) [Orabug: 19231234] {CVE-2013-4348}

ID
ELSA-2014-3049
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2014-3049.html
Published
2014-07-23T00:00:00
(10 years ago)
Modified
2014-07-23T00:00:00
(10 years ago)
Rights
Copyright 2014 Oracle, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 oraclelinux kernel-uek < 3.8.13-35.3.2.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 oraclelinux kernel-uek-firmware < 3.8.13-35.3.2.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 oraclelinux kernel-uek-doc < 3.8.13-35.3.2.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 oraclelinux kernel-uek-devel < 3.8.13-35.3.2.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 oraclelinux kernel-uek-debug < 3.8.13-35.3.2.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 oraclelinux kernel-uek-debug-devel < 3.8.13-35.3.2.el7uek oraclelinux-7
Affected pkg:rpm/oraclelinux/dtrace-modules-3.8.13-35.3.2.el7uek?distro=oraclelinux-7 oraclelinux dtrace-modules-3.8.13-35.3.2.el7uek < 0.4.3-4.el7 oraclelinux-7
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...