Описание
ELSA-2015-3021: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [2.6.32-400.37.3]
- net: sctp: fix slab corruption from use after free on INIT collisions (Daniel Borkmann) [Orabug: 20780349] {CVE-2015-1421}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.32-400.37.3.el5uek
kernel-uek-debug
2.6.32-400.37.3.el5uek
kernel-uek-debug-devel
2.6.32-400.37.3.el5uek
kernel-uek-devel
2.6.32-400.37.3.el5uek
kernel-uek-doc
2.6.32-400.37.3.el5uek
kernel-uek-firmware
2.6.32-400.37.3.el5uek
mlnx_en-2.6.32-400.37.3.el5uek
1.5.7-2
mlnx_en-2.6.32-400.37.3.el5uekdebug
1.5.7-2
ofa-2.6.32-400.37.3.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.37.3.el5uekdebug
1.5.1-4.0.58
Oracle Linux i386
kernel-uek
2.6.32-400.37.3.el5uek
kernel-uek-debug
2.6.32-400.37.3.el5uek
kernel-uek-debug-devel
2.6.32-400.37.3.el5uek
kernel-uek-devel
2.6.32-400.37.3.el5uek
kernel-uek-doc
2.6.32-400.37.3.el5uek
kernel-uek-firmware
2.6.32-400.37.3.el5uek
mlnx_en-2.6.32-400.37.3.el5uek
1.5.7-2
mlnx_en-2.6.32-400.37.3.el5uekdebug
1.5.7-2
ofa-2.6.32-400.37.3.el5uek
1.5.1-4.0.58
ofa-2.6.32-400.37.3.el5uekdebug
1.5.1-4.0.58
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.32-400.37.3.el6uek
kernel-uek-debug
2.6.32-400.37.3.el6uek
kernel-uek-debug-devel
2.6.32-400.37.3.el6uek
kernel-uek-devel
2.6.32-400.37.3.el6uek
kernel-uek-doc
2.6.32-400.37.3.el6uek
kernel-uek-firmware
2.6.32-400.37.3.el6uek
mlnx_en-2.6.32-400.37.3.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.37.3.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.37.3.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.37.3.el6uekdebug
1.5.1-4.0.58
Oracle Linux i686
kernel-uek
2.6.32-400.37.3.el6uek
kernel-uek-debug
2.6.32-400.37.3.el6uek
kernel-uek-debug-devel
2.6.32-400.37.3.el6uek
kernel-uek-devel
2.6.32-400.37.3.el6uek
kernel-uek-doc
2.6.32-400.37.3.el6uek
kernel-uek-firmware
2.6.32-400.37.3.el6uek
mlnx_en-2.6.32-400.37.3.el6uek
1.5.7-0.1
mlnx_en-2.6.32-400.37.3.el6uekdebug
1.5.7-0.1
ofa-2.6.32-400.37.3.el6uek
1.5.1-4.0.58
ofa-2.6.32-400.37.3.el6uekdebug
1.5.1-4.0.58
Связанные CVE
Связанные уязвимости
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
Use-after-free vulnerability in the sctp_assoc_update function in net/ ...
Security update for kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2