Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-20190

Опубликовано: 20 мар. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8
Платформа: Oracle Linux 7

Описание

ELSA-2025-20190: Unbreakable Enterprise kernel security update (IMPORTANT)

[5.4.17-2136.341.3.3]

  • ima: Fix use-after-free on a dentry's dname.name (Stefan Berger) [Orabug: 37727037] {CVE-2024-39494}

[5.4.17-2136.341.3.2]

  • ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (Dennis Lam) [Orabug: 37707634] {CVE-2024-57892}
  • ocfs2: correct return value of ocfs2_local_free_info() (Joseph Qi) [Orabug: 37707634]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

kernel-uek

5.4.17-2136.341.3.3.el8uek

kernel-uek-debug

5.4.17-2136.341.3.3.el8uek

kernel-uek-debug-devel

5.4.17-2136.341.3.3.el8uek

kernel-uek-devel

5.4.17-2136.341.3.3.el8uek

kernel-uek-doc

5.4.17-2136.341.3.3.el8uek

Oracle Linux x86_64

kernel-uek

5.4.17-2136.341.3.3.el8uek

kernel-uek-container

5.4.17-2136.341.3.3.el8uek

kernel-uek-container-debug

5.4.17-2136.341.3.3.el8uek

kernel-uek-debug

5.4.17-2136.341.3.3.el8uek

kernel-uek-debug-devel

5.4.17-2136.341.3.3.el8uek

kernel-uek-devel

5.4.17-2136.341.3.3.el8uek

kernel-uek-doc

5.4.17-2136.341.3.3.el8uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

5.4.17-2136.341.3.3.el7uek

kernel-uek-container

5.4.17-2136.341.3.3.el7uek

kernel-uek-container-debug

5.4.17-2136.341.3.3.el7uek

kernel-uek-debug

5.4.17-2136.341.3.3.el7uek

kernel-uek-debug-devel

5.4.17-2136.341.3.3.el7uek

kernel-uek-devel

5.4.17-2136.341.3.3.el7uek

kernel-uek-doc

5.4.17-2136.341.3.3.el7uek

kernel-uek-tools

5.4.17-2136.341.3.3.el7uek

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the dangling pointer. During the remounting process, the pointer dqi_priv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOT_SUSPENDED flag instead of setting the DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2_get_next_id is called and only checks the quota usage flags and not the quota suspended flags. To fix this, I set dqi_priv to null when it is freed after remounting with read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id. [akpm@linux-foundation.org: coding-style cleanups]

CVSS3: 7.8
redhat
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the dangling pointer. During the remounting process, the pointer dqi_priv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOT_SUSPENDED flag instead of setting the DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2_get_next_id is called and only checks the quota usage flags and not the quota suspended flags. To fix this, I set dqi_priv to null when it is freed after remounting with read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id. [akpm@linux-foundation.org: coding-style cleanups]

CVSS3: 7.8
nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the dangling pointer. During the remounting process, the pointer dqi_priv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOT_SUSPENDED flag instead of setting the DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2_get_next_id is called and only checks the quota usage flags and not the quota suspended flags. To fix this, I set dqi_priv to null when it is freed after remounting with read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id. [akpm@linux-foundation.org: coding-style cleanups]

CVSS3: 7.8
msrc
3 месяца назад

Описание отсутствует

CVSS3: 7.8
debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: o ...