Описание
ELSA-2022-9211: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.4.17-2136.304.4.5]
- lib/iov_iter: initialize 'flags' in new pipe_buffer (Max Kellermann) [Orabug: 33942329] {CVE-2022-0847}
- bpf: Disallow unprivileged bpf by default (Pawan Gupta) [Orabug: 33942374]
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
5.4.17-2136.304.4.5.el7uek
kernel-uek-debug
5.4.17-2136.304.4.5.el7uek
kernel-uek-debug-devel
5.4.17-2136.304.4.5.el7uek
kernel-uek-devel
5.4.17-2136.304.4.5.el7uek
kernel-uek-doc
5.4.17-2136.304.4.5.el7uek
kernel-uek-tools
5.4.17-2136.304.4.5.el7uek
kernel-uek-tools-libs
5.4.17-2136.304.4.5.el7uek
perf
5.4.17-2136.304.4.5.el7uek
python-perf
5.4.17-2136.304.4.5.el7uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.304.4.5.el7uek
kernel-uek-debug
5.4.17-2136.304.4.5.el7uek
kernel-uek-debug-devel
5.4.17-2136.304.4.5.el7uek
kernel-uek-devel
5.4.17-2136.304.4.5.el7uek
kernel-uek-doc
5.4.17-2136.304.4.5.el7uek
kernel-uek-tools
5.4.17-2136.304.4.5.el7uek
Oracle Linux 8
Oracle Linux aarch64
kernel-uek
5.4.17-2136.304.4.5.el8uek
kernel-uek-debug
5.4.17-2136.304.4.5.el8uek
kernel-uek-debug-devel
5.4.17-2136.304.4.5.el8uek
kernel-uek-devel
5.4.17-2136.304.4.5.el8uek
kernel-uek-doc
5.4.17-2136.304.4.5.el8uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.304.4.5.el8uek
kernel-uek-debug
5.4.17-2136.304.4.5.el8uek
kernel-uek-debug-devel
5.4.17-2136.304.4.5.el8uek
kernel-uek-devel
5.4.17-2136.304.4.5.el8uek
kernel-uek-doc
5.4.17-2136.304.4.5.el8uek
Связанные CVE
Связанные уязвимости
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
A flaw was found in the way the "flags" member of the new pipe buffer ...