Описание
ELSA-2022-9409: Unbreakable Enterprise kernel security update (IMPORTANT)
[5.4.17-2136.307.3.2]
- perf: Fix sys_perf_event_open() race against self (Peter Zijlstra) [Orabug: 34172709] {CVE-2022-1729}
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
5.4.17-2136.307.3.2.el7uek
kernel-uek-debug
5.4.17-2136.307.3.2.el7uek
kernel-uek-debug-devel
5.4.17-2136.307.3.2.el7uek
kernel-uek-devel
5.4.17-2136.307.3.2.el7uek
kernel-uek-doc
5.4.17-2136.307.3.2.el7uek
kernel-uek-tools
5.4.17-2136.307.3.2.el7uek
kernel-uek-tools-libs
5.4.17-2136.307.3.2.el7uek
perf
5.4.17-2136.307.3.2.el7uek
python-perf
5.4.17-2136.307.3.2.el7uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.307.3.2.el7uek
kernel-uek-debug
5.4.17-2136.307.3.2.el7uek
kernel-uek-debug-devel
5.4.17-2136.307.3.2.el7uek
kernel-uek-devel
5.4.17-2136.307.3.2.el7uek
kernel-uek-doc
5.4.17-2136.307.3.2.el7uek
kernel-uek-tools
5.4.17-2136.307.3.2.el7uek
Oracle Linux 8
Oracle Linux aarch64
kernel-uek
5.4.17-2136.307.3.2.el8uek
kernel-uek-debug
5.4.17-2136.307.3.2.el8uek
kernel-uek-debug-devel
5.4.17-2136.307.3.2.el8uek
kernel-uek-devel
5.4.17-2136.307.3.2.el8uek
kernel-uek-doc
5.4.17-2136.307.3.2.el8uek
Oracle Linux x86_64
kernel-uek
5.4.17-2136.307.3.2.el8uek
kernel-uek-debug
5.4.17-2136.307.3.2.el8uek
kernel-uek-debug-devel
5.4.17-2136.307.3.2.el8uek
kernel-uek-devel
5.4.17-2136.307.3.2.el8uek
kernel-uek-doc
5.4.17-2136.307.3.2.el8uek
Связанные CVE
Связанные уязвимости
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
A race condition was found the Linux kernel in perf_event_open() which ...