Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-3018

Опубликовано: 16 апр. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-3018: Unbreakable Enterprise kernel security update (IMPORTANT)

[3.8.13-26.2.3.el6uek]

  • net: ipv4: current group_info should be put after using. (Wang, Xiaoming) [Orabug: 18603523] {CVE-2014-2851}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-26.2.3.el6uek

0.4.2-3.el6

kernel-uek

3.8.13-26.2.3.el6uek

kernel-uek-debug

3.8.13-26.2.3.el6uek

kernel-uek-debug-devel

3.8.13-26.2.3.el6uek

kernel-uek-devel

3.8.13-26.2.3.el6uek

kernel-uek-doc

3.8.13-26.2.3.el6uek

kernel-uek-firmware

3.8.13-26.2.3.el6uek

kernel-uek-headers

3.8.13-26.2.3.el6uek

Связанные CVE

Связанные уязвимости

ubuntu
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

redhat
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

nvd
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

debian
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in ...

github
около 3 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.