Описание
ELSA-2023-1822: kernel security update (IMPORTANT)
[2.6.32-754.35.1.0.10.el6.OL6]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) {CVE-2022-4378} [Orabug: 35304147]
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) {CVE-2022-4378} [Orabug: 35304147]
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel
2.6.32-754.35.1.0.10.el6
kernel-abi-whitelists
2.6.32-754.35.1.0.10.el6
kernel-debug
2.6.32-754.35.1.0.10.el6
kernel-debug-devel
2.6.32-754.35.1.0.10.el6
kernel-devel
2.6.32-754.35.1.0.10.el6
kernel-doc
2.6.32-754.35.1.0.10.el6
kernel-firmware
2.6.32-754.35.1.0.10.el6
kernel-headers
2.6.32-754.35.1.0.10.el6
perf
2.6.32-754.35.1.0.10.el6
python-perf
2.6.32-754.35.1.0.10.el6
Oracle Linux i686
kernel
2.6.32-754.35.1.0.10.el6
kernel-abi-whitelists
2.6.32-754.35.1.0.10.el6
kernel-debug
2.6.32-754.35.1.0.10.el6
kernel-debug-devel
2.6.32-754.35.1.0.10.el6
kernel-devel
2.6.32-754.35.1.0.10.el6
kernel-doc
2.6.32-754.35.1.0.10.el6
kernel-firmware
2.6.32-754.35.1.0.10.el6
kernel-headers
2.6.32-754.35.1.0.10.el6
perf
2.6.32-754.35.1.0.10.el6
python-perf
2.6.32-754.35.1.0.10.el6
Связанные CVE
Связанные уязвимости
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...