Описание
ELSA-2015-3005: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [2.6.32-400.36.14uek]
- net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet (Daniel Borkmann) [Orabug: 20425334] {CVE-2014-7841}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-400.36.14.el5uek
kernel-uek-debug
2.6.32-400.36.14.el5uek
kernel-uek-debug-devel
2.6.32-400.36.14.el5uek
kernel-uek-devel
2.6.32-400.36.14.el5uek
kernel-uek-doc
2.6.32-400.36.14.el5uek
kernel-uek-firmware
2.6.32-400.36.14.el5uek
mlnx_en-2.6.32-400.36.14.el5uek
1.5.7-2
mlnx_en-2.6.32-400.36.14.el5uekdebug
1.5.7-2
ofa-2.6.32-400.36.14.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.36.14.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-400.36.14.el5uek
kernel-uek-debug
2.6.32-400.36.14.el5uek
kernel-uek-debug-devel
2.6.32-400.36.14.el5uek
kernel-uek-devel
2.6.32-400.36.14.el5uek
kernel-uek-doc
2.6.32-400.36.14.el5uek
kernel-uek-firmware
2.6.32-400.36.14.el5uek
mlnx_en-2.6.32-400.36.14.el5uek
1.5.7-2
mlnx_en-2.6.32-400.36.14.el5uekdebug
1.5.7-2
ofa-2.6.32-400.36.14.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.36.14.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-400.36.14.el6uek
kernel-uek-debug
2.6.32-400.36.14.el6uek
kernel-uek-debug-devel
2.6.32-400.36.14.el6uek
kernel-uek-devel
2.6.32-400.36.14.el6uek
kernel-uek-doc
2.6.32-400.36.14.el6uek
kernel-uek-firmware
2.6.32-400.36.14.el6uek
mlnx_en-2.6.32-400.36.14.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.36.14.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.36.14.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.36.14.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-400.36.14.el6uek
kernel-uek-debug
2.6.32-400.36.14.el6uek
kernel-uek-debug-devel
2.6.32-400.36.14.el6uek
kernel-uek-devel
2.6.32-400.36.14.el6uek
kernel-uek-doc
2.6.32-400.36.14.el6uek
kernel-uek-firmware
2.6.32-400.36.14.el6uek
mlnx_en-2.6.32-400.36.14.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.36.14.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.36.14.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.36.14.el6uekdebug
1.5.1-4.0.58
Связанные CVE
Связанные уязвимости
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCT ...
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.