Описание
ELSA-2022-9260: Unbreakable Enterprise kernel security update (IMPORTANT)
[4.1.12-124.61.2]
- exec, elf: ignore invalid note data (Anthony Yznaga) [Orabug: 34023956]
[4.1.12-124.61.1]
- drm/i915: Flush TLBs before releasing backing store (Tvrtko Ursulin) [Orabug: 33835812] {CVE-2022-0330}
- drm/i915: Reduce locking in execlist command submission (Chris Wilson) [Orabug: 33835812] {CVE-2022-0330}
- ipv4: make exception cache less predictible (Eric Dumazet) [Orabug: 33894531] {CVE-2021-20322}
- route: also update fnhe_genid when updating a route cache (Xin Long) [Orabug: 33894531] {CVE-2021-20322}
- ipv4: avoid using shared IP generator for connected sockets (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- sctp: add vtag check in sctp_sf_violation (Xin Long) [Orabug: 33924717] {CVE-2021-3772}
- sctp: use init_tag from inithdr for ABORT chunk (Xin Long) [Orabug: 33924717] {CVE-2021-3772}
- sr9700: sanity check for packet length (Oliver Neukum) [Orabug: 33962995] {CVE-2022-26966}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
4.1.12-124.61.2.el6uek
kernel-uek-debug
4.1.12-124.61.2.el6uek
kernel-uek-debug-devel
4.1.12-124.61.2.el6uek
kernel-uek-devel
4.1.12-124.61.2.el6uek
kernel-uek-doc
4.1.12-124.61.2.el6uek
kernel-uek-firmware
4.1.12-124.61.2.el6uek
Oracle Linux 7
Oracle Linux x86_64
kernel-uek
4.1.12-124.61.2.el7uek
kernel-uek-debug
4.1.12-124.61.2.el7uek
kernel-uek-debug-devel
4.1.12-124.61.2.el7uek
kernel-uek-devel
4.1.12-124.61.2.el7uek
kernel-uek-doc
4.1.12-124.61.2.el7uek
kernel-uek-firmware
4.1.12-124.61.2.el7uek
Ссылки на источники
Связанные уязвимости
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
A flaw in the processing of received ICMP errors (ICMP fragment needed ...