Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-7549

Опубликовано: 01 дек. 2023
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2023-7549: kernel security and bug fix update (IMPORTANT)

[4.18.0-513.9.1_9.OL8]

  • media: dvb-core: Fix use-after-free due to race at dvb_register_device() (Mauro Carvalho Chehab) {CVE-2022-45884}
  • cifs: Fix UAF in cifs_demultiplex_thread() (Zhang Xiaoxu) {CVE-2023-1192}
  • nvmet-tcp: Fix a possible UAF in queue intialization setup (Sagi Grimberg) {CVE-2023-5178}
  • net: tun: fix bugs for oversize packet when napi frags enabled (Ziyang Xuan) {CVE-2023-3812}
  • bpf: Fix incorrect verifier pruning due to missing register precision taints (Daniel Borkmann) (Andrii Nakryiko) {CVE-2023-2163}
  • media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (Hyunwoo Kim) {CVE-2022-45919}
  • media: dvbdev: fix error logic at dvb_register_device() (Mauro Carvalho Chehab)
  • media: dvbdev: Fix memleak in dvb_register_device (Dinghao Liu)
  • media: dvb-core: Fix use-after-free due on race condition at dvb_net (Hyunwoo Kim} {CVE-2022-45886}

[4.18.0-513.5.1_9.OL8]

  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.3
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34750652]
  • Drop not needed patch

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bpftool

4.18.0-513.9.1.el8_9

kernel-cross-headers

4.18.0-513.9.1.el8_9

kernel-headers

4.18.0-513.9.1.el8_9

kernel-tools

4.18.0-513.9.1.el8_9

kernel-tools-libs

4.18.0-513.9.1.el8_9

kernel-tools-libs-devel

4.18.0-513.9.1.el8_9

perf

4.18.0-513.9.1.el8_9

python3-perf

4.18.0-513.9.1.el8_9

Oracle Linux x86_64

bpftool

4.18.0-513.9.1.el8_9

kernel

4.18.0-513.9.1.el8_9

kernel-abi-stablelists

4.18.0-513.9.1.el8_9

kernel-core

4.18.0-513.9.1.el8_9

kernel-cross-headers

4.18.0-513.9.1.el8_9

kernel-debug

4.18.0-513.9.1.el8_9

kernel-debug-core

4.18.0-513.9.1.el8_9

kernel-debug-devel

4.18.0-513.9.1.el8_9

kernel-debug-modules

4.18.0-513.9.1.el8_9

kernel-debug-modules-extra

4.18.0-513.9.1.el8_9

kernel-devel

4.18.0-513.9.1.el8_9

kernel-doc

4.18.0-513.9.1.el8_9

kernel-headers

4.18.0-513.9.1.el8_9

kernel-modules

4.18.0-513.9.1.el8_9

kernel-modules-extra

4.18.0-513.9.1.el8_9

kernel-tools

4.18.0-513.9.1.el8_9

kernel-tools-libs

4.18.0-513.9.1.el8_9

kernel-tools-libs-devel

4.18.0-513.9.1.el8_9

perf

4.18.0-513.9.1.el8_9

python3-perf

4.18.0-513.9.1.el8_9

Связанные уязвимости

rocky
больше 1 года назад

Important: kernel security and bug fix update

CVSS3: 10
ubuntu
почти 2 года назад

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

CVSS3: 8.2
redhat
около 2 лет назад

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

CVSS3: 10
nvd
почти 2 года назад

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

CVSS3: 10
debian
почти 2 года назад

Incorrect verifier pruningin BPF in Linux Kernel>=5.4leads to unsafe c ...

Уязвимость ELSA-2023-7549