Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-5706

Опубликовано: 04 июн. 2020
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2020-5706: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [3.8.13-118.46.1]

  • ipv6: only static routes qualify for equal cost multipathing (Hannes Frederic Sowa) [Orabug: 30977687] {CVE-2013-4125}
  • USB: adutux: fix use-after-free on disconnect (Johan Hovold) [Orabug: 31240296] {CVE-2019-19523}
  • USB: core: Fix races in character device registration and deregistraion (Alan Stern) [Orabug: 31317668] {CVE-2019-19537}
  • USB: iowarrior: fix use-after-free on disconnect (Johan Hovold) [Orabug: 31351063] {CVE-2019-19528}
  • usb: iowarrior: fix deadlock on disconnect (Oliver Neukum) [Orabug: 31351063] {CVE-2019-19528}
  • mremap: properly flush TLB before releasing the page (Linus Torvalds) [Orabug: 31352012] {CVE-2018-18281}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-3.8.13-118.46.1.el6uek

0.4.5-3.el6

kernel-uek

3.8.13-118.46.1.el6uek

kernel-uek-debug

3.8.13-118.46.1.el6uek

kernel-uek-debug-devel

3.8.13-118.46.1.el6uek

kernel-uek-devel

3.8.13-118.46.1.el6uek

kernel-uek-doc

3.8.13-118.46.1.el6uek

kernel-uek-firmware

3.8.13-118.46.1.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-3.8.13-118.46.1.el7uek

0.4.5-3.el7

kernel-uek

3.8.13-118.46.1.el7uek

kernel-uek-debug

3.8.13-118.46.1.el7uek

kernel-uek-debug-devel

3.8.13-118.46.1.el7uek

kernel-uek-devel

3.8.13-118.46.1.el7uek

kernel-uek-doc

3.8.13-118.46.1.el7uek

kernel-uek-firmware

3.8.13-118.46.1.el7uek

Связанные уязвимости

ubuntu
почти 12 лет назад

The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.

redhat
почти 12 лет назад

The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.

nvd
почти 12 лет назад

The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.

debian
почти 12 лет назад

The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack ...

github
около 3 лет назад

The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.