Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2022-09-06 |
[4.1.12-124.66.3]
- fuse: fix pipe buffer lifetime for direct_io (Miklos Szeredi) [Orabug: 33981149] {CVE-2022-1011}
- vt: drop old FONT ioctls (Jiri Slaby) [Orabug: 34408794] {CVE-2021-33656}
- video: of_display_timing.h: include errno.h (Hsin-Yi Wang) [Orabug: 34408910] {CVE-2021-33655}
- fbcon: Disallow setting font bigger than screen size (Helge Deller) [Orabug: 34408910] {CVE-2021-33655}
- scsi: target: Fix WRITE_SAME No Data Buffer crash (Mike Christie) [Orabug: 34419974] {CVE-2022-21546}
- scsi/eh: fix hang adding ehandler wakeups after decrementing host_busy (Gulam Mohamed) [Orabug: 33349684] [Orabug: 34492498]
[4.1.12-124.66.2]
- mm: enforce min addr even if capable() in expand_downwards() (Jann Horn) [Orabug: 29501997] {CVE-2019-9213}
- ACPICA: Reference Counts: increase max to 0x4000 for large servers (Erik Schmauss)
- ipv4: tcp: send zero IPID in SYNACK messages (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- ipv4: Cache net in ip_build_and_send_pkt and ip_queue_xmit (Eric W. Biederman) [Orabug: 33917058] {CVE-2020-36516}
- ipv4: igmp: guard against silly MTU values (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- inet: constify ip_dont_fragment() arguments (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- ip: constify ip_build_and_send_pkt() socket argument (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (Eric Biggers) [Orabug: 34433461] {CVE-2020-36557}
- vt: vt_ioctl: fix race in VT_RESIZEX (Eric Dumazet) [Orabug: 34433476] {CVE-2020-36558}
- VT_RESIZEX: get rid of field-by-field copyin (Al Viro) [Orabug: 34433476]
- net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34460939] [Orabug: 34484730] {CVE-2022-2588}
[4.1.12-124.66.1]
- net: fix uninit-value in __hw_addr_add_ex() (Eric Dumazet) [Orabug: 34395887]
- mac80211: silence an uninitialized variable warning (Dan Carpenter) [Orabug: 34396283]
CVE-2019-9213 |
CVE-2020-36516 |
CVE-2022-2588 |
CVE-2021-33655 |
CVE-2022-21546 |
CVE-2021-33656 |
CVE-2020-36557 |
CVE-2020-36558 |
CVE-2022-1011 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.66.3.el6uek.src.rpm | 1217cdaef66182cc2b6c9c6fa22321f4 | - |
kernel-uek-4.1.12-124.66.3.el6uek.x86_64.rpm | b95974f933102cecf5791d529eb35ea9 | - | |
kernel-uek-debug-4.1.12-124.66.3.el6uek.x86_64.rpm | ac14941ce5176ddd5497c35c78b8f048 | - | |
kernel-uek-debug-devel-4.1.12-124.66.3.el6uek.x86_64.rpm | c3a8bab6dcedf3908f1caf474d5da802 | - | |
kernel-uek-devel-4.1.12-124.66.3.el6uek.x86_64.rpm | 2be61b27d2d80f726f002a34cc05725d | - | |
kernel-uek-doc-4.1.12-124.66.3.el6uek.noarch.rpm | e72660568a88dc39b1f635700da5ee49 | - | |
kernel-uek-firmware-4.1.12-124.66.3.el6uek.noarch.rpm | ceceba22aaaca64b88e8ee6aeec93c40 | - | |
Oracle Linux 7 (x86_64) | kernel-uek-4.1.12-124.66.3.el7uek.src.rpm | 78f67a1307be7c717a97daca4da7c8d6 | - |
kernel-uek-4.1.12-124.66.3.el7uek.x86_64.rpm | 152f8045589401f3e8bdb61242fe1be4 | - | |
kernel-uek-debug-4.1.12-124.66.3.el7uek.x86_64.rpm | d77f55509926c2f7c3593a09fc49469e | - | |
kernel-uek-debug-devel-4.1.12-124.66.3.el7uek.x86_64.rpm | a4db61caa2bdf30151df8e653e8f0d13 | - | |
kernel-uek-devel-4.1.12-124.66.3.el7uek.x86_64.rpm | a0dcb1be1304ab7a6574ae1bc5ec4a8e | - | |
kernel-uek-doc-4.1.12-124.66.3.el7uek.noarch.rpm | 6c4619e03b9e6bd69422dba2fbd6e05e | - | |
kernel-uek-firmware-4.1.12-124.66.3.el7uek.noarch.rpm | cd7514821ef24cba8deac52f5e0be0a8 | - |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team