ELSA-2014-3046

ELSA-2014-3046 - unbreakable enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-07-18

Description


kernel-uek
[3.8.13-35.1.3.el6uek]
- l2tp: fix an unprivileged user to kernel privilege escalation (Sasha Levin) [Orabug: 19229497] {CVE-2014-4943} {CVE-2014-4943}
- ptrace,x86: force IRET path after a ptrace_stop() (Tejun Heo) [Orabug: 19230689] {CVE-2014-4699}
- net: flow_dissector: fail on evil iph->ihl (Jason Wang) [Orabug: 19231234] {CVE-2013-4348}


Related CVEs


CVE-2014-4699
CVE-2013-4348
CVE-2014-4943

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) dtrace-modules-3.8.13-35.1.3.el6uek-0.4.3-4.el6.src.rpm5ec096217358cda66ba96b0f548d1351c07162703f4d187d081d04d462e6c85d-ol6_x86_64_UEKR3_latest
kernel-uek-3.8.13-35.1.3.el6uek.src.rpm7b64162e80218ba4f4bd5a92184f48977e44ea1dd9d7c3c8d49d83252f852280ELSA-2025-20007ol6_x86_64_UEKR3_latest
dtrace-modules-3.8.13-35.1.3.el6uek-0.4.3-4.el6.x86_64.rpm0ef4909a219d332c8c27ff36a64c30430bfd0d2fdda7de522e1a576de0ca9719-ol6_x86_64_UEKR3_latest
kernel-uek-3.8.13-35.1.3.el6uek.x86_64.rpmb545ca71a5c9db4379f736a1430ea390b98c835fcfe780ad3fa10aa3dce86d4bELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-debug-3.8.13-35.1.3.el6uek.x86_64.rpmaa42671aa28ea3eb70eac0122b9b38187555e772863e1cb17cc6c8a12e67ce6cELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-debug-devel-3.8.13-35.1.3.el6uek.x86_64.rpm6002700f44c49219112783c2c0c40df9de8cbd8b81c730f00ba0bfc46215074bELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-devel-3.8.13-35.1.3.el6uek.x86_64.rpm176c04053ef5c26f70faabb5051acb9ab200e507566d5f805a28582925ef3a45ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-doc-3.8.13-35.1.3.el6uek.noarch.rpmd770f3a92fe19fbd52fb463aa462c6f79ad5aed5481b9ea1731ba0a02458a700ELSA-2025-20007ol6_x86_64_UEKR3_latest
kernel-uek-firmware-3.8.13-35.1.3.el6uek.noarch.rpme3e07aa606d7309a9a2b916a41f9562ea0be86ab5af0ca7d339eff28cf469c2dELSA-2025-20007ol6_x86_64_UEKR3_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete