Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-5259

Опубликовано: 18 сент. 2024
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2024-5259: kernel security update (IMPORTANT)

[3.10.0-1160.119.1.0.3.el7.OL7]

  • net: fix __dst_negative_advice() race (Eric Dumazet) [Orabug: 36947298]

[3.10.0-1160.119.1.0.2.el7.OL7]

  • md/raid5: fix oops during stripe resizing (Ritika Srivastava) [Orabug: 34048726]
  • blk-mq: Remove generation seqeunce (Ritika Srivastava) [Orabug: 33964689]
  • block: init flush rq ref count to 1 (Ritika Srivastava) [Orabug: 33964689]
  • block: fix null pointer dereference in blk_mq_rq_timed_out() (Ritika Srivastava) [Orabug: 33964689]
  • [xen/netfront] stop tx queues during live migration (Orabug: 33446314)
  • [xen/balloon] Support xend-based toolstack (Orabug: 28663970)
  • [x86/apic/x2apic] avoid allocate multiple irq vectors for a single interrupt on multiple cpu, otherwise irq vectors would be used up when there are only 2 cpu online per node. [Orabug: 28691156]
  • [bonding] avoid repeated display of same link status change. [Orabug: 28109857]
  • [ipc] ipc/sem.c: bugfix for semctl(,,GETZCNT) (Manfred Spraul) [Orabug: 22552377]
  • kexec: Increase KEXEC_AUTO_RESERVED_SIZE to 256M [Orabug: 31517048]

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

bpftool

3.10.0-1160.119.1.0.3.el7

kernel

3.10.0-1160.119.1.0.3.el7

kernel-abi-whitelists

3.10.0-1160.119.1.0.3.el7

kernel-debug

3.10.0-1160.119.1.0.3.el7

kernel-debug-devel

3.10.0-1160.119.1.0.3.el7

kernel-devel

3.10.0-1160.119.1.0.3.el7

kernel-doc

3.10.0-1160.119.1.0.3.el7

kernel-headers

3.10.0-1160.119.1.0.3.el7

kernel-tools

3.10.0-1160.119.1.0.3.el7

kernel-tools-libs

3.10.0-1160.119.1.0.3.el7

kernel-tools-libs-devel

3.10.0-1160.119.1.0.3.el7

perf

3.10.0-1160.119.1.0.3.el7

python-perf

3.10.0-1160.119.1.0.3.el7

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.

CVSS3: 7
redhat
больше 3 лет назад

A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.

CVSS3: 7.8
nvd
больше 3 лет назад

A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.

CVSS3: 7.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 3 лет назад

A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesy ...

Уязвимость ELSA-2024-5259