Oval Definition:oval:org.mitre.oval:def:27024
Revision Date:2014-12-15Version:10
Title:ELSA-2014-1392 -- kernel security, bug fix, and enhancement update (important)
Description:* A NULL pointer dereference flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled simultaneous connections between the same hosts. A remote attacker could use this flaw to crash the system. (CVE-2014-5077, Important) * An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. (CVE-2013-2596, Important) * A flaw was found in the way the ipc_rcu_putref() function in the Linux kernel's IPC implementation handled reference counter decrementing. A local, unprivileged user could use this flaw to trigger an Out of Memory (OOM) condition and, potentially, crash the system. (CVE-2013-4483, Moderate) * It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process. (CVE-2014-0181, Moderate) * It was found that the try_to_unmap_cluster() function in the Linux kernel's Memory Managment subsystem did not properly handle page locking in certain cases, which could potentially trigger the BUG_ON() macro in the mlock_vma_page() function. A local, unprivileged user could use this flaw to crash the system. (CVE-2014-3122, Moderate) * A flaw was found in the way the Linux kernel's kvm_iommu_map_pages() function handled IOMMU mapping failures. A privileged user in a guest with an assigned host device could use this flaw to crash the host. (CVE-2014-3601, Moderate) * Multiple use-after-free flaws were found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use either of these flaws to crash the system. (CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, Moderate) * A flaw was found in the way the Linux kernel's VFS subsystem handled reference counting when performing unmount operations on symbolic links. A local, unprivileged user could use this flaw to exhaust all available memory on the system or, potentially, trigger a use-after-free error, resulting in a system crash or privilege escalation. (CVE-2014-5045, Moderate) * An integer overflow flaw was found in the way the lzo1x_decompress_safe() function of the Linux kernel's LZO implementation processed Literal Runs. A local attacker could, in extremely rare cases, use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4608, Low)
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2013-2596
CVE-2013-4483
CVE-2014-0181
CVE-2014-3122
CVE-2014-3601
CVE-2014-4608
CVE-2014-4653
CVE-2014-4654
CVE-2014-4655
CVE-2014-5045
CVE-2014-5077
ELSA-2014-1392
Platform(s):Oracle Linux 6
Product(s):kernel
Definition Synopsis
  • Oracle Linux 6.x
  • AND Packages match section
  • kernel is earlier than 0:2.6.32-504.el6
  • OR kernel-abi-whitelists is earlier than 0:2.6.32-504.el6
  • OR kernel-debug is earlier than 0:2.6.32-504.el6
  • OR kernel-debug-devel is earlier than 0:2.6.32-504.el6
  • OR kernel-devel is earlier than 0:2.6.32-504.el6
  • OR kernel-doc is earlier than 0:2.6.32-504.el6
  • OR kernel-firmware is earlier than 0:2.6.32-504.el6
  • OR kernel-headers is earlier than 0:2.6.32-504.el6
  • OR perf is earlier than 0:2.6.32-504.el6
  • OR python-perf is earlier than 0:2.6.32-504.el6
  • BACK