NULL Pointer Dereference Affecting kernel-uek-core package, versions <0:5.15.0-0.30.19.el8uek
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-KERNELUEKCORE-2939590
- published 2 Jul 2022
- disclosed 31 Aug 2022
Introduced: 2 Jul 2022
CVE-2022-1263 Open this link in a new tabHow to fix?
Upgrade Oracle:8 kernel-uek-core to version 0:5.15.0-0.30.19.el8uek or higher.
This issue was patched in ELSA-2022-9533.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-uek-core package and not the kernel-uek-core package as distributed by Oracle.
See How to fix? for Oracle:8 relevant fixed versions and status.
A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
References
- https://linux.oracle.com/cve/CVE-2022-1263.html
- https://linux.oracle.com/errata/ELSA-2022-9533.html
- https://www.openwall.com/lists/oss-security/2022/04/07/1
- https://github.com/torvalds/linux/commit/5593473a1e6c743764b08e3b6071cb43b5cfa6c4
- https://access.redhat.com/security/cve/CVE-2022-1263
- https://bugzilla.redhat.com/show_bug.cgi?id=2072698