ELSA-2022-10072

ELSA-2022-10072 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-12-12

Description


[4.14.35-2047.520.3.1]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34883027] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34883027] {CVE-2022-4378}
- hugetlbfs: don't delete error page from pagecache (James Houghton) [Orabug: 34883072]
- mm: shmem: don't truncate page if memory failure happens (Yang Shi) [Orabug: 34883072]
- mm: hwpoison: refactor refcount check handling (Yang Shi) [Orabug: 34883072]

[4.14.35-2047.520.3]
- scsi: qla2xxx: Fix use after free in eh_abort path (Quinn Tran) [Orabug: 34841119]

[4.14.35-2047.520.2]
- rds: Remove the cp_rdsinfo_pending flag (Hakon Bugge) [Orabug: 34658891]
- RDMA/mlx5: Change debug log level for remote access error syndromes (Arumugam Kolappan) [Orabug: 34798453]

[4.14.35-2047.520.1]
- rds: ib: Fix cleanup of rds_ib_cache_gc_worker (Hakon Bugge) [Orabug: 34806078]
- scsi: stex: Properly zero out the passthrough command structure (Linus Torvalds) [Orabug: 34670756] {CVE-2022-40768}
- do_wait: make PIDTYPE_PID case O(1) instead of O(n) (Jim Newsome) [Orabug: 34420117]

[4.14.35-2047.520.0]
- uapi: Fix [rs]cq_vector data types in rds[6]_info_rdma_connection (Mark Haywood) [Orabug: 34732042]
- uapi: Fix congested flag type in rds[6]_info_socket (Mark Haywood) [Orabug: 34732042]
- scsi: target: core: Silence the message about unknown VPD pages (Konstantin Shelekhin) [Orabug: 34728690]
- mISDN: fix use-after-free bugs in l1oip timer handlers (Duoming Zhou) [Orabug: 34719782] {CVE-2022-3565}
- uek-rpm: add aarch64 to list of vdso arches (Tom Saeger) [Orabug: 34716203]
- xfs: trim IO to found COW extent limit (Eric Sandeen) [Orabug: 34705398]
- xfs: don't use delalloc extents for COW on files with extsize hints (Christoph Hellwig) [Orabug: 34705398]


Related CVEs


CVE-2022-40768
CVE-2022-4378
CVE-2022-3565

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-2047.520.3.1.el7uek.src.rpmf0b5f8a7e65fc8afb51fbea365a05916-
kernel-uek-4.14.35-2047.520.3.1.el7uek.aarch64.rpm6b03585a2e74201db884e1708f00c815-
kernel-uek-debug-4.14.35-2047.520.3.1.el7uek.aarch64.rpm1fae760fc929838de1e99584c05a5054-
kernel-uek-debug-devel-4.14.35-2047.520.3.1.el7uek.aarch64.rpmdca16fbe0d61cd21372b1f34eccfd2e5-
kernel-uek-devel-4.14.35-2047.520.3.1.el7uek.aarch64.rpma920c24a03d79747764628c02a0c4777-
kernel-uek-headers-4.14.35-2047.520.3.1.el7uek.aarch64.rpmdf97eb674f1b87b7e7537a68eb9efacb-
kernel-uek-tools-4.14.35-2047.520.3.1.el7uek.aarch64.rpm5cfc464a626f29796e27b7d169373d1c-
kernel-uek-tools-libs-4.14.35-2047.520.3.1.el7uek.aarch64.rpm5bc784cc3a584d93e83df6cbd1626173-
kernel-uek-tools-libs-devel-4.14.35-2047.520.3.1.el7uek.aarch64.rpm9e218accb4c2d1ec3dfa64ef553dd693-
perf-4.14.35-2047.520.3.1.el7uek.aarch64.rpm94c929c6a878c55e667871933f9a483c-
python-perf-4.14.35-2047.520.3.1.el7uek.aarch64.rpm36a34f9103589d72a4b5d59ed4b5480f-
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-2047.520.3.1.el7uek.src.rpmf0b5f8a7e65fc8afb51fbea365a05916-
kernel-uek-4.14.35-2047.520.3.1.el7uek.x86_64.rpm5e839bf1139c7fa69b2cf16c1bebf266-
kernel-uek-debug-4.14.35-2047.520.3.1.el7uek.x86_64.rpmd08c992f35b4b99bca2c04a1367c19df-
kernel-uek-debug-devel-4.14.35-2047.520.3.1.el7uek.x86_64.rpm8f4cf9f817d30cea5f7d97b494d3a746-
kernel-uek-devel-4.14.35-2047.520.3.1.el7uek.x86_64.rpmc065cb0983ab0972a28148ff8ebe825a-
kernel-uek-doc-4.14.35-2047.520.3.1.el7uek.noarch.rpm56f4f3ece2d811fc4d54ecbeca55dcee-
kernel-uek-tools-4.14.35-2047.520.3.1.el7uek.x86_64.rpma1576364455f06fc5da101398cce94d3-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete