Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-9348

Опубликовано: 03 мая 2022
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2022-9348: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-124.62.3]

  • fget: check that the fd still exists after getting a ref to it (Linus Torvalds) [Orabug: 33679806] {CVE-2021-0920}
  • fs: add fget_many() and fput_many() (Jens Axboe) [Orabug: 33679806]
  • af_unix: fix garbage collect vs MSG_PEEK (Miklos Szeredi) [Orabug: 33679806] {CVE-2021-0920}
  • net: split out functions related to registering inflight socket files (Jens Axboe) [Orabug: 33679806]

[4.1.12-124.62.2]

  • netfilter: nf_tables: initialize registers in nft_do_chain() (Pablo Neira Ayuso) [Orabug: 34012926] {CVE-2022-1016}
  • pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (Nikola Livic) [Orabug: 34020970] {CVE-2021-4157}

[4.1.12-124.62.1]

  • Bluetooth: use correct lock to prevent UAF of hdev object (Lin Ma) [Orabug: 33014054] {CVE-2021-3573}
  • hugetlbfs: flush TLBs correctly after huge_pmd_unshare (Nadav Amit) [Orabug: 33617221] {CVE-2021-4002}
  • udf: Restore i_lenAlloc when inode expansion fails (Jan Kara) [Orabug: 33870269] {CVE-2022-0617}
  • udf: Fix NULL ptr deref when converting from inline format (Jan Kara) [Orabug: 33870269] {CVE-2022-0617}
  • phonet: refcount leak in pep_sock_accep (Hangyu Hua) [Orabug: 33962762] {CVE-2021-45095}
  • btrfs: unlock newly allocated extent buffer after error (Qu Wenruo) [Orabug: 33997139] {CVE-2021-4149}
  • quota: correct error number in free_dqentry() (Zhang Yi) [Orabug: 33997256] {CVE-2021-45868}
  • quota: check block number when reading the block in quota file (Zhang Yi) [Orabug: 33997256] {CVE-2021-45868}
  • af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (Eric Dumazet) [Orabug: 34006847] {CVE-2021-4203}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-124.62.3.el6uek

kernel-uek-debug

4.1.12-124.62.3.el6uek

kernel-uek-debug-devel

4.1.12-124.62.3.el6uek

kernel-uek-devel

4.1.12-124.62.3.el6uek

kernel-uek-doc

4.1.12-124.62.3.el6uek

kernel-uek-firmware

4.1.12-124.62.3.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-124.62.3.el7uek

kernel-uek-debug

4.1.12-124.62.3.el7uek

kernel-uek-debug-devel

4.1.12-124.62.3.el7uek

kernel-uek-devel

4.1.12-124.62.3.el7uek

kernel-uek-doc

4.1.12-124.62.3.el7uek

kernel-uek-firmware

4.1.12-124.62.3.el7uek

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 4 года назад

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.

CVSS3: 6.7
redhat
около 4 лет назад

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.

CVSS3: 6.4
nvd
почти 4 года назад

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.

CVSS3: 6.4
debian
почти 4 года назад

A use-after-free in function hci_sock_bound_ioctl() of the Linux kerne ...

CVSS3: 6.4
github
около 3 лет назад

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.