[ELSA-2014-3105] Unbreakable Enterprise kernel security update
Severity
Important
Affected Packages
22
CVEs
5
kernel-uek
[2.6.32-400.36.12]
- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849320] {CVE-2014-3184}
- ALSA: control: Protect user controls against concurrent access (Lars-Peter Clausen) [Orabug: 20192545] {CVE-2014-4652}
- udf: Avoid infinite loop when processing indirect ICBs (Jan Kara) [Orabug: 20192451] {CVE-2014-6410}
- ALSA: control: Make sure that id->index does not overflow (Lars-Peter Clausen) [Orabug: 20192420] {CVE-2014-4656}
- ALSA: control: Handle numid overflow (Lars-Peter Clausen) [Orabug: 20192379] {CVE-2014-4656}
- net: sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [Orabug: 20192060] {CVE-2014-3688}
- ID
- ELSA-2014-3105
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2014-3105.html
- Published
-
2014-12-11T00:00:00
(9 years ago) - Modified
-
2014-12-11T00:00:00
(9 years ago) - Rights
- Copyright 2014 Oracle, Inc.
- Other Advisories
-
- DSA-3060-1
- ELSA-2014-1971
- ELSA-2014-1997
- ELSA-2014-3096
- ELSA-2014-3103
- ELSA-2014-3104
- ELSA-2015-0087
- ELSA-2015-1272
- FEDORA-2014-11008
- FEDORA-2014-11031
- FEDORA-2014-11097
- FEDORA-2014-13020
- FEDORA-2014-13045
- FEDORA-2014-13558
- FEDORA-2014-13773
- FEDORA-2014-14068
- FEDORA-2014-14126
- FEDORA-2014-15200
- FEDORA-2014-16632
- FEDORA-2014-17244
- FEDORA-2014-17283
- FEDORA-2015-0515
- FEDORA-2015-1672
- FEDORA-2015-3594
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-8518
- RHSA-2014:1971
- RHSA-2014:1997
- RHSA-2015:0087
- RHSA-2015:1272
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2018:2062-1
- SUSE-SU-2018:2177-1
- USN-2332-1
- USN-2333-1
- USN-2334-1
- USN-2335-1
- USN-2336-1
- USN-2337-1
- USN-2374-1
- USN-2375-1
- USN-2376-1
- USN-2377-1
- USN-2378-1
- USN-2379-1
- USN-2417-1
- USN-2418-1
- USN-2441-1
- USN-2442-1
- USN-2445-1
- USN-2446-1
- USN-2447-1
- USN-2448-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2014-3105 | http://linux.oracle.com/errata/ELSA-2014-3105.html | |
CVE | CVE-2014-3184 | http://linux.oracle.com/cve/CVE-2014-3184 | |
CVE | CVE-2014-3688 | http://linux.oracle.com/cve/CVE-2014-3688 | |
CVE | CVE-2014-4652 | http://linux.oracle.com/cve/CVE-2014-4652 | |
CVE | CVE-2014-4656 | http://linux.oracle.com/cve/CVE-2014-4656 | |
CVE | CVE-2014-6410 | http://linux.oracle.com/cve/CVE-2014-6410 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.12.el6uekdebug | oraclelinux | ofa-2.6.32-400.36.12.el6uekdebug | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.12.el6uek | oraclelinux | ofa-2.6.32-400.36.12.el6uek | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.12.el5uekdebug | oraclelinux | ofa-2.6.32-400.36.12.el5uekdebug | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/ofa-2.6.32-400.36.12.el5uek | oraclelinux | ofa-2.6.32-400.36.12.el5uek | < 1.5.1-4.0.58 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.12.el6uekdebug | oraclelinux | mlnx_en-2.6.32-400.36.12.el6uekdebug | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.12.el6uek | oraclelinux | mlnx_en-2.6.32-400.36.12.el6uek | < 1.5.7-0.1 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.12.el5uekdebug | oraclelinux | mlnx_en-2.6.32-400.36.12.el5uekdebug | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/mlnx_en-2.6.32-400.36.12.el5uek | oraclelinux | mlnx_en-2.6.32-400.36.12.el5uek | < 1.5.7-2 | |||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-5 | oraclelinux | kernel-uek | < 2.6.32-400.36.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-6 | oraclelinux | kernel-uek-headers | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-headers?distro=oraclelinux-5 | oraclelinux | kernel-uek-headers | < 2.6.32-400.36.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-5 | oraclelinux | kernel-uek-firmware | < 2.6.32-400.36.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-5 | oraclelinux | kernel-uek-doc | < 2.6.32-400.36.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-devel | < 2.6.32-400.36.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug | < 2.6.32-400.36.12.el5uek | oraclelinux-5 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-400.36.12.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-5 | oraclelinux | kernel-uek-debug-devel | < 2.6.32-400.36.12.el5uek | oraclelinux-5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |