ELSA-2014-3082

ELSA-2014-3082 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2014-10-17

Description


[2.6.39-400.215.11]
- ALSA: control: Don't access controls outside of protected regions (Lars-Peter Clausen) [Orabug: 19817786] {CVE-2014-4653} {CVE-2014-4654} {CVE-2014-4655}
- ALSA: control: Fix replacing user controls (Lars-Peter Clausen) [Orabug: 19817748] {CVE-2014-4653} {CVE-2014-4654} {CVE-2014-4655}
- kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601) (Michael S. Tsirkin) [Orabug: 19817647] {CVE-2014-3601}
- mm: try_to_unmap_cluster() should lock_page() before mlocking (Vlastimil Babka) [Orabug: 19817323] {CVE-2014-3122}
- vm: convert fb_mmap to vm_iomap_memory() helper (Linus Torvalds) [Orabug: 19816563] {CVE-2013-2596}
- vm: add vm_iomap_memory() helper function (Linus Torvalds) [Orabug: 19816563] {CVE-2013-2596}
- net: sctp: inherit auth_capable on INIT collisions (Daniel Borkmann) [Orabug: 19816068] {CVE-2014-5077}


Related CVEs


CVE-2014-4653
CVE-2014-4654
CVE-2014-4655
CVE-2014-5077
CVE-2014-3601
CVE-2014-3122
CVE-2013-2596

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) kernel-uek-2.6.39-400.215.11.el5uek.src.rpm979c367c7eb540d373fd032e1a493211ELSA-2020-5936
kernel-uek-2.6.39-400.215.11.el5uek.i686.rpmd3e92bd0e41cc174b438bd277c464757ELSA-2020-5936
kernel-uek-debug-2.6.39-400.215.11.el5uek.i686.rpm28c50b4d39ef70e160c63dfbca464b38ELSA-2020-5936
kernel-uek-debug-devel-2.6.39-400.215.11.el5uek.i686.rpm54c5134f403baf30290b2609a327d9c4ELSA-2020-5936
kernel-uek-devel-2.6.39-400.215.11.el5uek.i686.rpm94c9d03211d427219c8d83b547eb95f3ELSA-2020-5936
kernel-uek-doc-2.6.39-400.215.11.el5uek.noarch.rpm1a86b9b4a3ec435da24841fba63d5792ELSA-2020-5936
kernel-uek-firmware-2.6.39-400.215.11.el5uek.noarch.rpm8592fda6597103a17112caa9f4a2a46cELSA-2020-5936
Oracle Linux 5 (x86_64) kernel-uek-2.6.39-400.215.11.el5uek.src.rpm979c367c7eb540d373fd032e1a493211ELSA-2020-5936
kernel-uek-2.6.39-400.215.11.el5uek.x86_64.rpm62e33a9c5fd900fe68cf231c8662d0a6ELSA-2020-5936
kernel-uek-debug-2.6.39-400.215.11.el5uek.x86_64.rpm6fb790e888cb548a88cc6c5bab495144ELSA-2020-5936
kernel-uek-debug-devel-2.6.39-400.215.11.el5uek.x86_64.rpmafb699504059c11158d958b3402518cfELSA-2020-5936
kernel-uek-devel-2.6.39-400.215.11.el5uek.x86_64.rpm0245d6b0b61dd9ba40a9720f905483bcELSA-2020-5936
kernel-uek-doc-2.6.39-400.215.11.el5uek.noarch.rpm1a86b9b4a3ec435da24841fba63d5792ELSA-2020-5936
kernel-uek-firmware-2.6.39-400.215.11.el5uek.noarch.rpm8592fda6597103a17112caa9f4a2a46cELSA-2020-5936
Oracle Linux 6 (i386) kernel-uek-2.6.39-400.215.11.el6uek.src.rpm8fad475819db7797dd8f1ae43218ca1cELSA-2021-9215
kernel-uek-2.6.39-400.215.11.el6uek.i686.rpm12ef975f00114d5f4998ac53572fb4deELSA-2021-9215
kernel-uek-debug-2.6.39-400.215.11.el6uek.i686.rpm53755148ff3d1e9873cfe4a133b146e0ELSA-2021-9215
kernel-uek-debug-devel-2.6.39-400.215.11.el6uek.i686.rpm2e0918589367e6e68d604f41f1d77582ELSA-2021-9215
kernel-uek-devel-2.6.39-400.215.11.el6uek.i686.rpm29fdbf95a19eab3878b7db154581facdELSA-2021-9215
kernel-uek-doc-2.6.39-400.215.11.el6uek.noarch.rpme074d77142c005de42a9ecfd97f948a8ELSA-2021-9215
kernel-uek-firmware-2.6.39-400.215.11.el6uek.noarch.rpm2fad789d821ca3d3b531e4e406f63948ELSA-2021-9215
Oracle Linux 6 (x86_64) kernel-uek-2.6.39-400.215.11.el6uek.src.rpm8fad475819db7797dd8f1ae43218ca1cELSA-2021-9215
kernel-uek-2.6.39-400.215.11.el6uek.x86_64.rpmd4771823693b723ae04926ec26e3c838ELSA-2021-9215
kernel-uek-debug-2.6.39-400.215.11.el6uek.x86_64.rpm06a83d3bb721e5c1caf5a691062430dbELSA-2021-9215
kernel-uek-debug-devel-2.6.39-400.215.11.el6uek.x86_64.rpmaf37125dbc329683690ea658f84007a2ELSA-2021-9215
kernel-uek-devel-2.6.39-400.215.11.el6uek.x86_64.rpmf235cd53a7f7bc48ff945a4184cf758eELSA-2021-9215
kernel-uek-doc-2.6.39-400.215.11.el6uek.noarch.rpme074d77142c005de42a9ecfd97f948a8ELSA-2021-9215
kernel-uek-firmware-2.6.39-400.215.11.el6uek.noarch.rpm2fad789d821ca3d3b531e4e406f63948ELSA-2021-9215



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete