Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-3005

Опубликовано: 29 янв. 2015
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2015-3005: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [2.6.32-400.36.14uek]

  • net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet (Daniel Borkmann) [Orabug: 20425334] {CVE-2014-7841}

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kernel-uek

2.6.32-400.36.14.el5uek

kernel-uek-debug

2.6.32-400.36.14.el5uek

kernel-uek-debug-devel

2.6.32-400.36.14.el5uek

kernel-uek-devel

2.6.32-400.36.14.el5uek

kernel-uek-doc

2.6.32-400.36.14.el5uek

kernel-uek-firmware

2.6.32-400.36.14.el5uek

mlnx_en-2.6.32-400.36.14.el5uek

1.5.7-2

mlnx_en-2.6.32-400.36.14.el5uekdebug

1.5.7-2

ofa-2.6.32-400.36.14.el5uek

1.5.1-4.0.58

ofa-2.6.32-400.36.14.el5uekdebug

1.5.1-4.0.58

Oracle Linux i386

kernel-uek

2.6.32-400.36.14.el5uek

kernel-uek-debug

2.6.32-400.36.14.el5uek

kernel-uek-debug-devel

2.6.32-400.36.14.el5uek

kernel-uek-devel

2.6.32-400.36.14.el5uek

kernel-uek-doc

2.6.32-400.36.14.el5uek

kernel-uek-firmware

2.6.32-400.36.14.el5uek

mlnx_en-2.6.32-400.36.14.el5uek

1.5.7-2

mlnx_en-2.6.32-400.36.14.el5uekdebug

1.5.7-2

ofa-2.6.32-400.36.14.el5uek

1.5.1-4.0.58

ofa-2.6.32-400.36.14.el5uekdebug

1.5.1-4.0.58

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

2.6.32-400.36.14.el6uek

kernel-uek-debug

2.6.32-400.36.14.el6uek

kernel-uek-debug-devel

2.6.32-400.36.14.el6uek

kernel-uek-devel

2.6.32-400.36.14.el6uek

kernel-uek-doc

2.6.32-400.36.14.el6uek

kernel-uek-firmware

2.6.32-400.36.14.el6uek

mlnx_en-2.6.32-400.36.14.el6uek

1.5.7-0.1

mlnx_en-2.6.32-400.36.14.el6uekdebug

1.5.7-0.1

ofa-2.6.32-400.36.14.el6uek

1.5.1-4.0.58

ofa-2.6.32-400.36.14.el6uekdebug

1.5.1-4.0.58

Oracle Linux i686

kernel-uek

2.6.32-400.36.14.el6uek

kernel-uek-debug

2.6.32-400.36.14.el6uek

kernel-uek-debug-devel

2.6.32-400.36.14.el6uek

kernel-uek-devel

2.6.32-400.36.14.el6uek

kernel-uek-doc

2.6.32-400.36.14.el6uek

kernel-uek-firmware

2.6.32-400.36.14.el6uek

mlnx_en-2.6.32-400.36.14.el6uek

1.5.7-0.1

mlnx_en-2.6.32-400.36.14.el6uekdebug

1.5.7-0.1

ofa-2.6.32-400.36.14.el6uek

1.5.1-4.0.58

ofa-2.6.32-400.36.14.el6uekdebug

1.5.1-4.0.58

Связанные CVE

Связанные уязвимости

ubuntu
больше 10 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

redhat
больше 10 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

nvd
больше 10 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

debian
больше 10 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCT ...

github
около 3 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.