Описание
ELSA-2022-10071: Unbreakable Enterprise kernel security update (IMPORTANT)
[4.1.12-124.69.5.1]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34883048] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34883048] {CVE-2022-4378}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
4.1.12-124.69.5.1.el6uek
kernel-uek-debug
4.1.12-124.69.5.1.el6uek
kernel-uek-debug-devel
4.1.12-124.69.5.1.el6uek
kernel-uek-devel
4.1.12-124.69.5.1.el6uek
kernel-uek-doc
4.1.12-124.69.5.1.el6uek
kernel-uek-firmware
4.1.12-124.69.5.1.el6uek
Oracle Linux 7
Oracle Linux x86_64
kernel-uek
4.1.12-124.69.5.1.el7uek
kernel-uek-debug
4.1.12-124.69.5.1.el7uek
kernel-uek-debug-devel
4.1.12-124.69.5.1.el7uek
kernel-uek-devel
4.1.12-124.69.5.1.el7uek
kernel-uek-doc
4.1.12-124.69.5.1.el7uek
kernel-uek-firmware
4.1.12-124.69.5.1.el7uek
Связанные CVE
Связанные уязвимости
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...