Описание
ELSA-2022-9024: Unbreakable Enterprise kernel security update (IMPORTANT)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
kernel-uek
5.4.17-2136.302.7.3.el8uek
kernel-uek-debug
5.4.17-2136.302.7.3.el8uek
kernel-uek-debug-devel
5.4.17-2136.302.7.3.el8uek
kernel-uek-devel
5.4.17-2136.302.7.3.el8uek
kernel-uek-doc
5.4.17-2136.302.7.3.el8uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.302.7.3.el8uek
kernel-uek-debug
5.4.17-2136.302.7.3.el8uek
kernel-uek-debug-devel
5.4.17-2136.302.7.3.el8uek
kernel-uek-devel
5.4.17-2136.302.7.3.el8uek
kernel-uek-doc
5.4.17-2136.302.7.3.el8uek
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
5.4.17-2136.302.7.3.el7uek
kernel-uek-debug
5.4.17-2136.302.7.3.el7uek
kernel-uek-debug-devel
5.4.17-2136.302.7.3.el7uek
kernel-uek-devel
5.4.17-2136.302.7.3.el7uek
kernel-uek-doc
5.4.17-2136.302.7.3.el7uek
kernel-uek-tools
5.4.17-2136.302.7.3.el7uek
kernel-uek-tools-libs
5.4.17-2136.302.7.3.el7uek
perf
5.4.17-2136.302.7.3.el7uek
python-perf
5.4.17-2136.302.7.3.el7uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.302.7.3.el7uek
kernel-uek-debug
5.4.17-2136.302.7.3.el7uek
kernel-uek-debug-devel
5.4.17-2136.302.7.3.el7uek
kernel-uek-devel
5.4.17-2136.302.7.3.el7uek
kernel-uek-doc
5.4.17-2136.302.7.3.el7uek
kernel-uek-tools
5.4.17-2136.302.7.3.el7uek
Связанные CVE
Связанные уязвимости
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
A heap-based buffer overflow flaw was found in the way the legacy_pars ...