Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-12851

Опубликовано: 27 нояб. 2024
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2024-12851: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-124.92.3]

  • memcg_write_event_control(): fix a user-triggerable oops (Al Viro) [Orabug: 37070674] {CVE-2024-45021}
  • ocfs2: fix races between hole punching and AIO+DIO (Su Yue) [Orabug: 36835819] {CVE-2024-40943}

[4.1.12-124.92.2]

  • fbdev: savage: Handle err return when savagefb_check_var failed (Cai Xinchen) [Orabug: 36984058] {CVE-2024-39475}
  • bnx2x: Fix multiple UBSAN array-index-out-of-bounds (Ghadi Elie Rahme) [Orabug: 36897888] {CVE-2024-42148}
  • vmci: prevent speculation leaks by sanitizing event in event_deliver() (Hagar Gamal Halim Hemdan) [Orabug: 36835584] {CVE-2024-39499}
  • aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts (Chun-Yi Lee) [Orabug: 36544953] {CVE-2024-26898}

[4.1.12-124.92.1]

  • Input: MT - limit max slots (Tetsuo Handa) [Orabug: 37029139] {CVE-2024-45008}
  • drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (Ma Ke) [Orabug: 36897642] {CVE-2024-42101}
  • wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (Remi Pommarel) [Orabug: 36835737] {CVE-2024-40912}
  • USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (Alan Stern) [Orabug: 36835711] {CVE-2024-40904}
  • bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (Sam Sun) [Orabug: 36825250] {CVE-2024-39487}
  • jffs2: prevent xattr node from overflowing the eraseblock (Ilya Denisyev) [Orabug: 36753653] {CVE-2024-38599}
  • scsi: bfa: Ensure the copied buf is NUL terminated (Bui Quang Minh) [Orabug: 36753475] {CVE-2024-38560}
  • ALSA: usb-audio: Stop parsing channels bits when all channels are found. (Johan Carlsson) [Orabug: 36642150] {CVE-2024-27436}
  • USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (Alan Stern) [Orabug: 36598221] {CVE-2024-27059}
  • fat: fix uninitialized field in nostale filehandles (Jan Kara) [Orabug: 36597870] {CVE-2024-26973}
  • ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (Armin Wolf) [Orabug: 36544941] {CVE-2024-26894}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-124.92.3.el6uek

kernel-uek-debug

4.1.12-124.92.3.el6uek

kernel-uek-debug-devel

4.1.12-124.92.3.el6uek

kernel-uek-devel

4.1.12-124.92.3.el6uek

kernel-uek-doc

4.1.12-124.92.3.el6uek

kernel-uek-firmware

4.1.12-124.92.3.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-124.92.3.el7uek

kernel-uek-debug

4.1.12-124.92.3.el7uek

kernel-uek-debug-devel

4.1.12-124.92.3.el7uek

kernel-uek-devel

4.1.12-124.92.3.el7uek

kernel-uek-doc

4.1.12-124.92.3.el7uek

kernel-uek-firmware

4.1.12-124.92.3.el7uek

Связанные уязвимости

CVSS3: 6
ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak: unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex dump (first 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8836a742): [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340 [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0 [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0 [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50 [<ffffffff99805872>] really_probe+0xe2/0x480 [<ffffffff99805c98>] __driver_probe_device+0x78/0x160 [<ffffffff99805daf>] driver_probe_device+0x1f/0x90 [<ffffffff9980601e>] __driver_attach+0xce/0x1c0 [<ffffffff99803170>] bus_for_each_dev+0x70/0xc0 [<ffffffff998...

CVSS3: 6
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak: unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex dump (first 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8836a742): [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340 [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0 [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0 [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50 [<ffffffff99805872>] really_probe+0xe2/0x480 [<ffffffff99805c98>] __driver_probe_device+0x78/0x160 [<ffffffff99805daf>] driver_probe_device+0x1f/0x90 [<ffffffff9980601e>] __driver_attach+0xce/0x1c0 [<ffffffff99803170>] bus_for_each_dev+0x70/0xc0 [<ffffffff9...

CVSS3: 6
nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak: unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex dump (first 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8836a742): [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340 [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0 [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0 [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50 [<ffffffff99805872>] really_probe+0xe2/0x480 [<ffffffff99805c98>] __driver_probe_device+0x78/0x160 [<ffffffff99805daf>] driver_probe_device+0x1f/0x90 [<ffffffff9980601e>] __driver_attach+0xce/0x1c0 [<fffffff

CVSS3: 6
debian
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: A ...

CVSS3: 6
github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak: unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex dump (first 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8836a742): [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340 [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0 [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0 [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50 [<ffffffff99805872>] really_probe+0xe2/0x480 [<ffffffff99805c98>] __driver_probe_device+0x78/0x160 [<ffffffff99805daf>] driver_probe_device+0x1f/0x90 [<ffffffff9980601e>] __driver_attach+0xce/0x1c0 [<ffff...