Описание
ELSA-2017-0323: kernel security update (IMPORTANT)
kernel [2.6.18-419]
- [net] dccp: Use AF-independent rebuild_header routine (Hannes Frederic Sowa) [1424751]
- [net] dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Hannes Frederic Sowa) [1424633] {CVE-2017-6074}
- [redhat] kernel.spec.template: disable autoloading for dccp proto (Hannes Frederic Sowa) [1425177]
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
kernel
2.6.18-419.el5
kernel-debug
2.6.18-419.el5
kernel-debug-devel
2.6.18-419.el5
kernel-devel
2.6.18-419.el5
kernel-doc
2.6.18-419.el5
kernel-headers
2.6.18-419.el5
kernel-xen
2.6.18-419.el5
kernel-xen-devel
2.6.18-419.el5
ocfs2-2.6.18-419.el5
1.4.11-1.el5
ocfs2-2.6.18-419.el5debug
1.4.11-1.el5
ocfs2-2.6.18-419.el5xen
1.4.11-1.el5
oracleasm-2.6.18-419.el5
2.0.5-2.el5
oracleasm-2.6.18-419.el5debug
2.0.5-2.el5
oracleasm-2.6.18-419.el5xen
2.0.5-2.el5
Oracle Linux x86_64
kernel
2.6.18-419.el5
kernel-debug
2.6.18-419.el5
kernel-debug-devel
2.6.18-419.el5
kernel-devel
2.6.18-419.el5
kernel-doc
2.6.18-419.el5
kernel-headers
2.6.18-419.el5
kernel-xen
2.6.18-419.el5
kernel-xen-devel
2.6.18-419.el5
ocfs2-2.6.18-419.el5
1.4.11-1.el5
ocfs2-2.6.18-419.el5debug
1.4.11-1.el5
ocfs2-2.6.18-419.el5xen
1.4.11-1.el5
oracleasm-2.6.18-419.el5
2.0.5-2.el5
oracleasm-2.6.18-419.el5debug
2.0.5-2.el5
oracleasm-2.6.18-419.el5xen
2.0.5-2.el5
Oracle Linux i386
kernel
2.6.18-419.el5
kernel-PAE
2.6.18-419.el5
kernel-PAE-devel
2.6.18-419.el5
kernel-debug
2.6.18-419.el5
kernel-debug-devel
2.6.18-419.el5
kernel-devel
2.6.18-419.el5
kernel-doc
2.6.18-419.el5
kernel-headers
2.6.18-419.el5
kernel-xen
2.6.18-419.el5
kernel-xen-devel
2.6.18-419.el5
ocfs2-2.6.18-419.el5
1.4.11-1.el5
ocfs2-2.6.18-419.el5PAE
1.4.11-1.el5
ocfs2-2.6.18-419.el5debug
1.4.11-1.el5
ocfs2-2.6.18-419.el5xen
1.4.11-1.el5
oracleasm-2.6.18-419.el5
2.0.5-2.el5
oracleasm-2.6.18-419.el5PAE
2.0.5-2.el5
oracleasm-2.6.18-419.el5debug
2.0.5-2.el5
oracleasm-2.6.18-419.el5xen
2.0.5-2.el5
Связанные CVE
Связанные уязвимости
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
It was found that the Linux kernel's Datagram Congestion Control Proto ...