Описание
ELSA-2015-3067: Unbreakable Enterprise kernel security update (MODERATE)
[2.6.39-400.250.10]
- md: use kzalloc() when bitmap is disabled (Benjamin Randazzo) [Orabug: 21563042] {CVE-2015-5697}
- netfilter: nf_conntrack: reserve two bytes for nf_ct_ext->len (Andrey Vagin) [Orabug: 21562780] {CVE-2014-9715}
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kernel-uek
2.6.39-400.250.10.el5uek
kernel-uek-debug
2.6.39-400.250.10.el5uek
kernel-uek-debug-devel
2.6.39-400.250.10.el5uek
kernel-uek-devel
2.6.39-400.250.10.el5uek
kernel-uek-doc
2.6.39-400.250.10.el5uek
kernel-uek-firmware
2.6.39-400.250.10.el5uek
Oracle Linux i386
kernel-uek
2.6.39-400.250.10.el5uek
kernel-uek-debug
2.6.39-400.250.10.el5uek
kernel-uek-debug-devel
2.6.39-400.250.10.el5uek
kernel-uek-devel
2.6.39-400.250.10.el5uek
kernel-uek-doc
2.6.39-400.250.10.el5uek
kernel-uek-firmware
2.6.39-400.250.10.el5uek
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
2.6.39-400.250.10.el6uek
kernel-uek-debug
2.6.39-400.250.10.el6uek
kernel-uek-debug-devel
2.6.39-400.250.10.el6uek
kernel-uek-devel
2.6.39-400.250.10.el6uek
kernel-uek-doc
2.6.39-400.250.10.el6uek
kernel-uek-firmware
2.6.39-400.250.10.el6uek
Oracle Linux i686
kernel-uek
2.6.39-400.250.10.el6uek
kernel-uek-debug
2.6.39-400.250.10.el6uek
kernel-uek-debug-devel
2.6.39-400.250.10.el6uek
kernel-uek-devel
2.6.39-400.250.10.el6uek
kernel-uek-doc
2.6.39-400.250.10.el6uek
kernel-uek-firmware
2.6.39-400.250.10.el6uek
Связанные CVE
Связанные уязвимости
ELSA-2015-3068: Unbreakable Enterprise kernel security update (MODERATE)
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem ...