ELSA-2024-12571

ELSA-2024-12571 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2024-08-05

Description


[4.1.12-124.88.3]
- crypto: pcrypt - Fix hungtask for PADATA_RESET (Lu Jialin) [Orabug: 36806710] {CVE-2023-52813}
- usbnet: sanity check for maxpacket (Oliver Neukum) [Orabug: 36806658] {CVE-2021-47495}
- phonet: fix rtm_phonet_notify() skb allocation (Eric Dumazet) [Orabug: 36683487] {CVE-2024-36946}
- wifi: nl80211: don't free NULL coalescing rule (Johannes Berg) [Orabug: 36683466] {CVE-2024-36941}
- bna: ensure the copied buf is NUL terminated (Bui Quang Minh) [Orabug: 36683433] {CVE-2024-36934}
- bna: use memdup_user to copy userspace buffers (Ivan Vecera) [Orabug: 36683433] {CVE-2024-36934}
- new helper: memdup_user_nul() (Al Viro) [Orabug: 36683433] {CVE-2024-36934}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (Ziyang Xuan) [Orabug: 36598047] {CVE-2024-27020}
- netfilter: nf_tables: __nft_expr_type_get() selects specific family type (Pablo Neira Ayuso) [Orabug: 36598047] {CVE-2024-27020}
- net/mlx5e: drop shorter ethernet frames (Manjunath Patil) [Orabug: 36879159] {CVE-2024-41090} {CVE-2024-41091}

[4.1.12-124.88.2]
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (Shigeru Yoshida) [Orabug: 36802310] {CVE-2023-52528}
- usbnet/smsc75xx: silence uninitialized variable warning (Dan Carpenter) {CVE-2023-52528}
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (Thadeu Lima de Souza Cascardo) [Orabug: 36685663] {CVE-2023-52880}
- netfilter: nf_tables: disallow anonymous set with timeout flag (Pablo Neira Ayuso) [Orabug: 36530112] {CVE-2024-26642}
- ubi: Check for too small LEB size in VTBL code (Richard Weinberger) [Orabug: 36356637] {CVE-2024-25739}

[4.1.12-124.88.1]
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (Trond Myklebust) [Orabug: 33958156] {CVE-2022-24448}
- NFSv4: Handle case where the lookup of a directory fails (Trond Myklebust) [Orabug: 33958156] {CVE-2022-24448}


Related CVEs


CVE-2024-36946
CVE-2024-41091
CVE-2023-52813
CVE-2024-36941
CVE-2024-36934
CVE-2024-41090
CVE-2023-52880
CVE-2024-27020
CVE-2022-24448
CVE-2023-52528
CVE-2024-25739
CVE-2021-47495
CVE-2024-26642

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.88.3.el7uek.src.rpm99a565066cc43ec475a594f3f4a83feb-ol7_x86_64_UEKR4
kernel-uek-4.1.12-124.88.3.el7uek.x86_64.rpme90e0c4cb2414d3511f20a40a359e8ab-ol7_x86_64_UEKR4
kernel-uek-debug-4.1.12-124.88.3.el7uek.x86_64.rpm5def418740a32ab199e7d362a50f5bf0-ol7_x86_64_UEKR4
kernel-uek-debug-devel-4.1.12-124.88.3.el7uek.x86_64.rpmb4ffdb2d120e8a81edb0a762fadffa05-ol7_x86_64_UEKR4
kernel-uek-devel-4.1.12-124.88.3.el7uek.x86_64.rpmfeac191dcf029e593f76b247d04fb5c6-ol7_x86_64_UEKR4
kernel-uek-doc-4.1.12-124.88.3.el7uek.noarch.rpm5fbb4b06c48f0ff2214ed5eef17b6b3d-ol7_x86_64_UEKR4
kernel-uek-firmware-4.1.12-124.88.3.el7uek.noarch.rpmd3b2ababc9fc98d482c91329f4f6d98e-ol7_x86_64_UEKR4


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete