Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-5249

Опубликовано: 30 июн. 2022
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2022-5249: kernel security and bug fix update (IMPORTANT)

[5.14.0-70.17.1.0.1_0.OL9]

  • lockdown: also lock down previous kgdb use (Daniel Thompson) [Orabug: 34290418] {CVE-2022-21499}

[5.14.0-70.17.1_0.OL9]

  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 < 15.3-1.0.4
  • Remove nmap references from kernel (Mridula Shastry) [Orabug: 34313944]

[5.14.0-70.17.1_0]

  • netfilter: nf_tables: disallow non-stateful expression in sets earlier (Phil Sutter) [2092994 2092995] {CVE-2022-1966}
  • thunderx nic: mark device as unmaintained (Inigo Huguet) [2092638 2060285]
  • pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (Steve Best) [2092255 2067770]
  • perf: Fix sys_perf_event_open() race against self (Michael Petlan) [2087963 2087964] {CVE-2022-1729}
  • spec: Fix separate tools build (Jiri Olsa) [2090852 2054579]
  • mm: lru_cache_disable: replace work queue synchronization with synchronize_rcu (Marcelo Tosatti) [2086963 2033500]

[5.14.0-70.16.1_0]

  • dm integrity: fix memory corruption when tag_size is less than digest size (Benjamin Marzinski) [2082187 2081778]

[5.14.0-70.15.1_0]

  • CI: Use zstream builder image (Veronika Kabatova)
  • tcp: drop the hash_32() part from the index calculation (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • tcp: increase source port perturb table to 2^16 (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • tcp: dynamically allocate the perturb table used by source ports (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • tcp: add small random increments to the source port (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • tcp: resalt the secret every 10 seconds (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • tcp: use different parts of the port_offset for index and offset (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • secure_seq: use the 64 bits of the siphash for port offset calculation (Guillaume Nault) [2087128 2064868] {CVE-2022-1012}
  • Revert 'netfilter: conntrack: tag conntracks picked up in local out hook' (Florian Westphal) [2085480 2061850]
  • Revert 'netfilter: nat: force port remap to prevent shadowing well-known ports' (Florian Westphal) [2085480 2061850]
  • redhat/koji/Makefile: Decouple koji Makefile from Makefile.common (Andrea Claudi)
  • redhat: fix make {distg-brew,distg-koji} (Andrea Claudi)
  • esp: limit skb_page_frag_refill use to a single page (Sabrina Dubroca) [2082950 2082951] {CVE-2022-27666}
  • esp: Fix possible buffer overflow in ESP transformation (Sabrina Dubroca) [2082950 2082951] {CVE-2022-27666}
  • sctp: use the correct skb for security_sctp_assoc_request (Ondrej Mosnacek) [2084044 2078856]
  • security: implement sctp_assoc_established hook in selinux (Ondrej Mosnacek) [2084044 2078856]
  • security: add sctp_assoc_established hook (Ondrej Mosnacek) [2084044 2078856]
  • security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce (Ondrej Mosnacek) [2084044 2078856]
  • security: pass asoc to sctp_assoc_request and sctp_sk_clone (Ondrej Mosnacek) [2084044 2078856]

[5.14.0-70.14.1_0]

  • PCI: hv: Propagate coherence from VMbus device to PCI device (Vitaly Kuznetsov) [2074830 2068432]
  • Drivers: hv: vmbus: Propagate VMbus coherence to each VMbus device (Vitaly Kuznetsov) [2074830 2068432]
  • redhat: rpminspect: disable 'patches' check for known empty patch files (Herton R. Krzesinski)
  • redhat/configs: make SHA512_arch algos and CRYPTO_USER built-ins (Vladis Dronov) [2072643 2070624]
  • CI: Drop baseline runs (Veronika Kabatova)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

bpftool

5.14.0-70.17.1.0.1.el9_0

kernel-cross-headers

5.14.0-70.17.1.0.1.el9_0

kernel-headers

5.14.0-70.17.1.0.1.el9_0

kernel-tools

5.14.0-70.17.1.0.1.el9_0

kernel-tools-libs

5.14.0-70.17.1.0.1.el9_0

kernel-tools-libs-devel

5.14.0-70.17.1.0.1.el9_0

perf

5.14.0-70.17.1.0.1.el9_0

python3-perf

5.14.0-70.17.1.0.1.el9_0

Oracle Linux x86_64

bpftool

5.14.0-70.17.1.0.1.el9_0

kernel

5.14.0-70.17.1.0.1.el9_0

kernel-abi-stablelists

5.14.0-70.17.1.0.1.el9_0

kernel-core

5.14.0-70.17.1.0.1.el9_0

kernel-cross-headers

5.14.0-70.17.1.0.1.el9_0

kernel-debug

5.14.0-70.17.1.0.1.el9_0

kernel-debug-core

5.14.0-70.17.1.0.1.el9_0

kernel-debug-devel

5.14.0-70.17.1.0.1.el9_0

kernel-debug-devel-matched

5.14.0-70.17.1.0.1.el9_0

kernel-debug-modules

5.14.0-70.17.1.0.1.el9_0

kernel-debug-modules-extra

5.14.0-70.17.1.0.1.el9_0

kernel-devel

5.14.0-70.17.1.0.1.el9_0

kernel-devel-matched

5.14.0-70.17.1.0.1.el9_0

kernel-doc

5.14.0-70.17.1.0.1.el9_0

kernel-headers

5.14.0-70.17.1.0.1.el9_0

kernel-modules

5.14.0-70.17.1.0.1.el9_0

kernel-modules-extra

5.14.0-70.17.1.0.1.el9_0

kernel-tools

5.14.0-70.17.1.0.1.el9_0

kernel-tools-libs

5.14.0-70.17.1.0.1.el9_0

kernel-tools-libs-devel

5.14.0-70.17.1.0.1.el9_0

perf

5.14.0-70.17.1.0.1.el9_0

python3-perf

5.14.0-70.17.1.0.1.el9_0

Связанные уязвимости

oracle-oval
почти 3 года назад

ELSA-2022-5232: kernel security and bug fix update (IMPORTANT)

redhat
около 3 лет назад

[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel's netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.

nvd
около 3 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

suse-cvrf
почти 3 года назад

Security update for the Linux Kernel

CVSS3: 7.8
github
около 3 лет назад

A use-after-free vulnerability was found in the Linux kernel's Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.