Summary: | <sys-kernel/openvz-sources-2.6.32.88.4 : multiple vulnerabilities (CVE-2014-2523) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | andreis.vinogradovs, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/58060/ | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=505658 | ||
Whiteboard: | B1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() 042stab088.4. That said I've bumped 042stab090.3 to deal with CVE-2014-3153. Peter, please start stabilization process ( on x86 and amd64) + 17 Jun 2014; Peter Volkov <pva@gentoo.org> + -openvz-sources-2.6.32.85.20.ebuild, -openvz-sources-2.6.32.88.4.ebuild, + -openvz-sources-2.6.32.90.2.ebuild, openvz-sources-2.6.32.90.3.ebuild: + x86/amd64 stable, security bug #508010 and bug #513084 wrt Andreis + Vinogradovs ( slepnoga ) and Agostino Sarubbo. Drop old. Thanks, guys Kernel package, closing as noglsa CVE-2014-2523 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2523): net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. |