Описание
ELSA-2014-3019: Unbreakable Enterprise kernel security update (IMPORTANT)
[2.6.39-400.214.5]
- net: ipv4: current group_info should be put after using. (Wang, Xiaoming) [Orabug: 18603524] {CVE-2014-2851}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.214.5.el5uek
kernel-uek-debug
2.6.39-400.214.5.el5uek
kernel-uek-debug-devel
2.6.39-400.214.5.el5uek
kernel-uek-devel
2.6.39-400.214.5.el5uek
kernel-uek-doc
2.6.39-400.214.5.el5uek
kernel-uek-firmware
2.6.39-400.214.5.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.214.5.el5uek
kernel-uek-debug
2.6.39-400.214.5.el5uek
kernel-uek-debug-devel
2.6.39-400.214.5.el5uek
kernel-uek-devel
2.6.39-400.214.5.el5uek
kernel-uek-doc
2.6.39-400.214.5.el5uek
kernel-uek-firmware
2.6.39-400.214.5.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.214.5.el6uek
kernel-uek-debug
2.6.39-400.214.5.el6uek
kernel-uek-debug-devel
2.6.39-400.214.5.el6uek
kernel-uek-devel
2.6.39-400.214.5.el6uek
kernel-uek-doc
2.6.39-400.214.5.el6uek
kernel-uek-firmware
2.6.39-400.214.5.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.214.5.el6uek
kernel-uek-debug
2.6.39-400.214.5.el6uek
kernel-uek-debug-devel
2.6.39-400.214.5.el6uek
kernel-uek-devel
2.6.39-400.214.5.el6uek
kernel-uek-doc
2.6.39-400.214.5.el6uek
kernel-uek-firmware
2.6.39-400.214.5.el6uek
Связанные CVE
Связанные уязвимости
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in ...
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.