[ELSA-2014-3054] unbreakable enterprise kernel security update
Severity
Important
Affected Packages
22
CVEs
4
kernel-uek
[2.6.32-400.36.6uek]
- filter: prevent nla extensions to peek beyond the end of the message (Mathias Krause) [Orabug: 19315783] {CVE-2014-3144} {CVE-2014-3145}
- futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi() (Darren Hart) [Orabug: 19315318] {CVE-2012-6647}
[2.6.32-400.36.5uek]
- n_tty: Fix n_tty_write crash when echoing in raw mode (Peter Hurley) [Orabug: 18756450] {CVE-2014-0196} {CVE-2014-0196}
- ID
- ELSA-2014-3054
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2014-3054.html
- Published
-
2014-07-30T00:00:00
(10 years ago) - Modified
-
2014-07-30T00:00:00
(10 years ago) - Rights
- Copyright 2014 Oracle, Inc.
- Other Advisories
-
- ALAS-2014-339
- ALAS-2014-392
- CISA-2023:0512
- DSA-2926-1
- DSA-2949-1
- ELSA-2014-0678
- ELSA-2014-0786
- ELSA-2014-0981
- ELSA-2014-3034
- ELSA-2014-3052
- ELSA-2014-3053
- FEDORA-2014-11008
- FEDORA-2014-11031
- FEDORA-2014-13020
- FEDORA-2014-13045
- FEDORA-2014-13558
- FEDORA-2014-13773
- FEDORA-2014-14068
- FEDORA-2014-15200
- FEDORA-2014-16632
- FEDORA-2014-17244
- FEDORA-2014-17283
- FEDORA-2014-6122
- FEDORA-2014-6354
- FEDORA-2014-6357
- FEDORA-2014-7033
- FEDORA-2014-7128
- FEDORA-2014-7320
- FEDORA-2014-7426
- FEDORA-2014-7430
- FEDORA-2014-7863
- FEDORA-2014-8171
- FEDORA-2014-8487
- FEDORA-2014-8519
- FEDORA-2014-9010
- FEDORA-2014-9142
- FEDORA-2014-9449
- FEDORA-2014-9466
- FEDORA-2014-9959
- FEDORA-2015-0515
- FEDORA-2015-1672
- FEDORA-2015-3594
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-8518
- FREEBSD:6294F75F-03F2-11E5-AAB1-D050996490D0
- RHSA-2013:0744
- RHSA-2014:0678
- RHSA-2014:0786
- RHSA-2014:0981
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-1579-1
- USN-1580-1
- USN-1651-1
- USN-1653-1
- USN-2196-1
- USN-2197-1
- USN-2198-1
- USN-2199-1
- USN-2200-1
- USN-2201-1
- USN-2202-1
- USN-2203-1
- USN-2204-1
- USN-2227-1
- USN-2251-1
- USN-2252-1
- USN-2259-1
- USN-2260-1
- USN-2261-1
- USN-2262-1
- USN-2263-1
- USN-2264-1
- USN-2286-1
- USN-2288-1
- USN-2290-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2014-3054 | http://linux.oracle.com/errata/ELSA-2014-3054.html | |
CVE | CVE-2014-0196 | http://linux.oracle.com/cve/CVE-2014-0196 | |
CVE | CVE-2014-3144 | http://linux.oracle.com/cve/CVE-2014-3144 | |
CVE | CVE-2014-3145 | http://linux.oracle.com/cve/CVE-2014-3145 | |
CVE | CVE-2012-6647 | http://linux.oracle.com/cve/CVE-2012-6647 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.6.el6uekdebug | oraclelinux | ofa-2.6.32-400.36.6.el6uekdebug | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.6.el6uek | oraclelinux | ofa-2.6.32-400.36.6.el6uek | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.6.el5uekdebug | oraclelinux | ofa-2.6.32-400.36.6.el5uekdebug | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.6.el5uek | oraclelinux | ofa-2.6.32-400.36.6.el5uek | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.6.el6uekdebug | oraclelinux | mlnx_en-2.6.32-400.36.6.el6uekdebug | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.6.el6uek | oraclelinux | mlnx_en-2.6.32-400.36.6.el6uek | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.6.el5uekdebug | oraclelinux | mlnx_en-2.6.32-400.36.6.el5uekdebug | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.6.el5uek | oraclelinux | mlnx_en-2.6.32-400.36.6.el5uek | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.32-400.36.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | oraclelinux | kernel-uek-headers | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-5 | oraclelinux | kernel-uek-headers | < 2.6.32-400.36.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.32-400.36.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.32-400.36.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.32-400.36.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.32-400.36.6.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-400.36.6.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-400.36.6.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |