Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-9211

Опубликовано: 10 мар. 2022
Источник: oracle-oval
Платформа: Oracle Linux 7
Платформа: Oracle Linux 8

Описание

ELSA-2022-9211: Unbreakable Enterprise kernel security update (IMPORTANT)

[5.4.17-2136.304.4.5]

  • lib/iov_iter: initialize 'flags' in new pipe_buffer (Max Kellermann) [Orabug: 33942329] {CVE-2022-0847}
  • bpf: Disallow unprivileged bpf by default (Pawan Gupta) [Orabug: 33942374]

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

kernel-uek

5.4.17-2136.304.4.5.el7uek

kernel-uek-debug

5.4.17-2136.304.4.5.el7uek

kernel-uek-debug-devel

5.4.17-2136.304.4.5.el7uek

kernel-uek-devel

5.4.17-2136.304.4.5.el7uek

kernel-uek-doc

5.4.17-2136.304.4.5.el7uek

kernel-uek-tools

5.4.17-2136.304.4.5.el7uek

kernel-uek-tools-libs

5.4.17-2136.304.4.5.el7uek

perf

5.4.17-2136.304.4.5.el7uek

python-perf

5.4.17-2136.304.4.5.el7uek

Oracle Linux x86_64

kernel-uek

5.4.17-2136.304.4.5.el7uek

kernel-uek-debug

5.4.17-2136.304.4.5.el7uek

kernel-uek-debug-devel

5.4.17-2136.304.4.5.el7uek

kernel-uek-devel

5.4.17-2136.304.4.5.el7uek

kernel-uek-doc

5.4.17-2136.304.4.5.el7uek

kernel-uek-tools

5.4.17-2136.304.4.5.el7uek

Oracle Linux 8

Oracle Linux aarch64

kernel-uek

5.4.17-2136.304.4.5.el8uek

kernel-uek-debug

5.4.17-2136.304.4.5.el8uek

kernel-uek-debug-devel

5.4.17-2136.304.4.5.el8uek

kernel-uek-devel

5.4.17-2136.304.4.5.el8uek

kernel-uek-doc

5.4.17-2136.304.4.5.el8uek

Oracle Linux x86_64

kernel-uek

5.4.17-2136.304.4.5.el8uek

kernel-uek-debug

5.4.17-2136.304.4.5.el8uek

kernel-uek-debug-devel

5.4.17-2136.304.4.5.el8uek

kernel-uek-devel

5.4.17-2136.304.4.5.el8uek

kernel-uek-doc

5.4.17-2136.304.4.5.el8uek

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVSS3: 7.8
redhat
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVSS3: 7.8
nvd
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVSS3: 7.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer ...