ELSA-2022-10065

ELSA-2022-10065 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-12-06

Description


[4.1.12-124.69.5]
- x86/smpboot: check cpu_initialized_mask first after returning from schedule() (Dongli Zhang) [Orabug: 34798594]

[4.1.12-124.69.4]
- btrfs: Remove BUG_ON() as it is causing kernel to panic (Rhythm Mahajan) [Orabug: 34840579]

[4.1.12-124.69.3]
- btrfs: fix missing return for a non-void function. (Harshit Mogalapalli) [Orabug: 34827292]

[4.1.12-124.69.2]
- btrfs: Don't submit any btree write bio if the fs has errors (Qu Wenruo) [Orabug: 31265340] {CVE-2019-19377}
- scsi: stex: Properly zero out the passthrough command structure (Linus Torvalds) [Orabug: 34670757] {CVE-2022-40768}
- net/packet: fix slab-out-of-bounds access in packet_recvmsg() (Eric Dumazet) [Orabug: 34791643] {CVE-2022-20368}
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (Willem de Bruijn) [Orabug: 34791643]
- fs/attr.c: handling case when inode does not attach with dentry structure (Alok Tiwari) [Orabug: 34733462] [Orabug: 34798221] [Orabug: 34816013]

[4.1.12-124.69.1]
- drm/ttm/nouveau: don't call tt destroy callback on alloc failure. (Dave Airlie) [Orabug: 33014078] {CVE-2021-20292}
- netfilter: nf_conntrack_irc: Tighten matching on DCC message (David Leadbeater) [Orabug: 34555474] {CVE-2022-2663}
- openvswitch: fix OOB access in reserve_sfa_size() (Paolo Valerio) [Orabug: 34607642] {CVE-2022-2639}
- openvswitch: fix flow actions reallocation (Andrea Righi) [Orabug: 34607642]
- openvswitch: fix the incorrect flow action alloc size (zhangliping) [Orabug: 34607642]
- cgroup: Prevent kill_css() from being called more than once (Waiman Long) [Orabug: 34679307]
- mISDN: fix use-after-free bugs in l1oip timer handlers (Duoming Zhou) [Orabug: 34719783] {CVE-2022-3565}
- vsock: Fix memory leak in vsock_connect() (Peilin Ye) [Orabug: 34731194] {CVE-2022-3629}
- vsock: split dwork to avoid reinitializations (Cong Wang) [Orabug: 34731194]


Related CVEs


CVE-2022-3629
CVE-2022-2663
CVE-2022-3565
CVE-2022-40768
CVE-2019-19377
CVE-2022-2639
CVE-2021-20292
CVE-2022-20368

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.69.5.el6uek.src.rpmf2f6ac2595cdf470cd7226aa607d9a0c-
kernel-uek-4.1.12-124.69.5.el6uek.x86_64.rpm9d7d894c55aa2a738c58bf670db9e7fb-
kernel-uek-debug-4.1.12-124.69.5.el6uek.x86_64.rpm197843ff8d52403fec1413ac930dbc41-
kernel-uek-debug-devel-4.1.12-124.69.5.el6uek.x86_64.rpm26aae4add4e39af3e6713df439820ebe-
kernel-uek-devel-4.1.12-124.69.5.el6uek.x86_64.rpm3c83b667eb2700a43369136b044b1052-
kernel-uek-doc-4.1.12-124.69.5.el6uek.noarch.rpmfd0af2aa4977d2557bcdf48e1aec7e8b-
kernel-uek-firmware-4.1.12-124.69.5.el6uek.noarch.rpmc5fb206c37b5bdd2a43082bb1fabf20c-
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.69.5.el7uek.src.rpm87675d09eb4e5e1cbf93bf29c312a54e-
kernel-uek-4.1.12-124.69.5.el7uek.x86_64.rpm1de93ff2b0263f5741809fba13f9a2e6-
kernel-uek-debug-4.1.12-124.69.5.el7uek.x86_64.rpmd9ee1b1978740b12cf110b7f222d57b1-
kernel-uek-debug-devel-4.1.12-124.69.5.el7uek.x86_64.rpm0bcae23df1c5bfaed58b7e20d1a76c60-
kernel-uek-devel-4.1.12-124.69.5.el7uek.x86_64.rpm60c2db75c1e977bef32dcf674d4df514-
kernel-uek-doc-4.1.12-124.69.5.el7uek.noarch.rpm0006d75518366035538fe10668581bd1-
kernel-uek-firmware-4.1.12-124.69.5.el7uek.noarch.rpm2aa3c3164a2f5bb44587fd1984162ba3-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete