Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-7423

Опубликовано: 22 нояб. 2023
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2023-7423: kernel security update (IMPORTANT)

[3.10.0-1160.105.1.0.1.OL7]

  • debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}

[3.10.0-1160.105.1.OL7]

  • Update Oracle Linux certificates (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15-2.0.9
  • Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)

[3.10.0-1160.105.1]

  • net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
  • net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
  • net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}

[3.10.0-1160.104.1]

  • CI: Remove unused kpet_tree_family (Nikolai Kondrashov)
  • xen/x86: don't lose event interrupts (Vitaly Kuznetsov) [RHEL-1534]
  • Documentation/x86: Fix backwards on/off logic about YMM support (Waiman Long) [2229893] {CVE-2022-40982}
  • KVM: Add GDS_NO support to KVM (Waiman Long) [2229893] {CVE-2022-40982}
  • x86/speculation: Add Kconfig option for GDS (Waiman Long) [2229893] {CVE-2022-40982}
  • x86/speculation: Add force option to GDS mitigation (Waiman Long) [2229893] {CVE-2022-40982}
  • x86/speculation: Add Gather Data Sampling mitigation (Waiman Long) [2229893] {CVE-2022-40982}
  • Documentation/ABI: Mention retbleed vulnerability info file for sysfs (Waiman Long) [2229893]
  • docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (Waiman Long) [2229893]
  • x86/speculation: Add missing srbds=off to the mitigations= help text (Waiman Long) [2229893]
  • x86: Sync Intel family names & cpu_vuln_blacklist[] with upstream (Waiman Long) [2229893]

[3.10.0-1160.103.1]

  • net/sched: sch_qfq: account for stab overhead in qfq_enqueue (Davide Caratti) [2225555] {CVE-2023-3611}
  • net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (Davide Caratti) [2225555]
  • net/sched: cls_fw: Fix improper refcount update leads to use-after-free (Davide Caratti) [2225639] {CVE-2023-3776}
  • redhat: fix to be able to build with rpm 4.19.0 (Denys Vlasenko)

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

bpftool

3.10.0-1160.105.1.0.1.el7

kernel

3.10.0-1160.105.1.0.1.el7

kernel-abi-whitelists

3.10.0-1160.105.1.0.1.el7

kernel-debug

3.10.0-1160.105.1.0.1.el7

kernel-debug-devel

3.10.0-1160.105.1.0.1.el7

kernel-devel

3.10.0-1160.105.1.0.1.el7

kernel-doc

3.10.0-1160.105.1.0.1.el7

kernel-headers

3.10.0-1160.105.1.0.1.el7

kernel-tools

3.10.0-1160.105.1.0.1.el7

kernel-tools-libs

3.10.0-1160.105.1.0.1.el7

kernel-tools-libs-devel

3.10.0-1160.105.1.0.1.el7

perf

3.10.0-1160.105.1.0.1.el7

python-perf

3.10.0-1160.105.1.0.1.el7

Связанные уязвимости

oracle-oval
больше 1 года назад

ELSA-2023-12842: Unbreakable Enterprise kernel security update (IMPORTANT)

CVSS3: 7.8
ubuntu
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVSS3: 7
redhat
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVSS3: 7.8
nvd
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.

CVSS3: 7.8
msrc
почти 2 года назад

Описание отсутствует

Уязвимость ELSA-2023-7423