Описание
ELSA-2016-3626: Unbreakable Enterprise kernel security update (IMPORTANT)
kernel-uek [4.1.12-61.1.14]
- net: add recursion limit to GRO (Sabrina Dubroca) [Orabug: 24829133] {CVE-2016-7039}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dtrace-modules-4.1.12-61.1.14.el6uek
0.5.3-2.el6
kernel-uek
4.1.12-61.1.14.el6uek
kernel-uek-debug
4.1.12-61.1.14.el6uek
kernel-uek-debug-devel
4.1.12-61.1.14.el6uek
kernel-uek-devel
4.1.12-61.1.14.el6uek
kernel-uek-doc
4.1.12-61.1.14.el6uek
kernel-uek-firmware
4.1.12-61.1.14.el6uek
Oracle Linux 7
Oracle Linux x86_64
dtrace-modules-4.1.12-61.1.14.el7uek
0.5.3-2.el7
kernel-uek
4.1.12-61.1.14.el7uek
kernel-uek-debug
4.1.12-61.1.14.el7uek
kernel-uek-debug-devel
4.1.12-61.1.14.el7uek
kernel-uek-devel
4.1.12-61.1.14.el7uek
kernel-uek-doc
4.1.12-61.1.14.el7uek
kernel-uek-firmware
4.1.12-61.1.14.el7uek
Связанные CVE
Связанные уязвимости
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
The IP stack in the Linux kernel through 4.8.2 allows remote attackers ...
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.