ELSA-2014-3049

ELSA-2014-3049 - unbreakable enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-07-23

Description


kernel-uek
[3.8.13-35.3.2.el7uek]
- l2tp: fix an unprivileged user to kernel privilege escalation (Sasha Levin) [Orabug: 19229497] {CVE-2014-4943} {CVE-2014-4943}
- ptrace,x86: force IRET path after a ptrace_stop() (Tejun Heo) [Orabug: 19230689] {CVE-2014-4699}
- net: flow_dissector: fail on evil iph->ihl (Jason Wang) [Orabug: 19231234] {CVE-2013-4348}


Related CVEs


CVE-2013-4348
CVE-2014-4699
CVE-2014-4943

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) dtrace-modules-3.8.13-35.3.2.el7uek-0.4.3-4.el7.src.rpm944adb062a4e6f15be55a459a0a023383ca0d52e9a25c34df6c925f6bf1165f4-ol7_x86_64_UEKR3
kernel-uek-3.8.13-35.3.2.el7uek.src.rpm78c8e6a386e12080cd46d1ad910c9786f62d0ed8c65270cfb9e85e294310053fELSA-2025-20190ol7_x86_64_UEKR3
dtrace-modules-3.8.13-35.3.2.el7uek-0.4.3-4.el7.x86_64.rpm9980564932a267c726182a198c59ba6fcd6a5f51bb347d82eee950a4c0885f64-ol7_x86_64_UEKR3
kernel-uek-3.8.13-35.3.2.el7uek.x86_64.rpm698af5e9f1f63dc3576c080e308742869afffd597446385265b69c7b7c0f6925ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-debug-3.8.13-35.3.2.el7uek.x86_64.rpmfaec5b95dc76f45b251fdbc73a5720c46a3abb4c3743681f4580ea12c40e6404ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-debug-devel-3.8.13-35.3.2.el7uek.x86_64.rpme4b1638d96fa8b2ee117997e6aee99e3d7da36504592a30bc5cd2553dd2ad79aELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-devel-3.8.13-35.3.2.el7uek.x86_64.rpm444565cd76a686035025d8fd48361e263e1ba4fd6fd1e3b15f1f93eb7ddb74d6ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-doc-3.8.13-35.3.2.el7uek.noarch.rpma67b24846389dad5d4df06b70071c3460574a46b4aab38b7c9b8a9c128897de7ELSA-2025-20190ol7_x86_64_UEKR3
kernel-uek-firmware-3.8.13-35.3.2.el7uek.noarch.rpm0e2b3be57e47aff00aed9bf40aa58bc862ca52467c6a767c81016763c91d266eELSA-2025-20007ol7_x86_64_UEKR3



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete