Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-3019

Опубликовано: 16 апр. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2014-3019: Unbreakable Enterprise kernel security update (IMPORTANT)

[2.6.39-400.214.5]

  • net: ipv4: current group_info should be put after using. (Wang, Xiaoming) [Orabug: 18603524] {CVE-2014-2851}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.39-400.214.5.el5uek

kernel-uek-debug

2.6.39-400.214.5.el5uek

kernel-uek-debug-devel

2.6.39-400.214.5.el5uek

kernel-uek-devel

2.6.39-400.214.5.el5uek

kernel-uek-doc

2.6.39-400.214.5.el5uek

kernel-uek-firmware

2.6.39-400.214.5.el5uek

Oracle Linux i386

kernel-uek

2.6.39-400.214.5.el5uek

kernel-uek-debug

2.6.39-400.214.5.el5uek

kernel-uek-debug-devel

2.6.39-400.214.5.el5uek

kernel-uek-devel

2.6.39-400.214.5.el5uek

kernel-uek-doc

2.6.39-400.214.5.el5uek

kernel-uek-firmware

2.6.39-400.214.5.el5uek

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.39-400.214.5.el6uek

kernel-uek-debug

2.6.39-400.214.5.el6uek

kernel-uek-debug-devel

2.6.39-400.214.5.el6uek

kernel-uek-devel

2.6.39-400.214.5.el6uek

kernel-uek-doc

2.6.39-400.214.5.el6uek

kernel-uek-firmware

2.6.39-400.214.5.el6uek

Oracle Linux i686

kernel-uek

2.6.39-400.214.5.el6uek

kernel-uek-debug

2.6.39-400.214.5.el6uek

kernel-uek-debug-devel

2.6.39-400.214.5.el6uek

kernel-uek-devel

2.6.39-400.214.5.el6uek

kernel-uek-doc

2.6.39-400.214.5.el6uek

kernel-uek-firmware

2.6.39-400.214.5.el6uek

Связанные CVE

Связанные уязвимости

ubuntu
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

redhat
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

nvd
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

debian
около 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in ...

github
около 3 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.