OVMSA-2023-0001

OVMSA-2023-0001 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2023-01-04

Description


[4.1.12-124.70.2]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378}
- netfilter: nf_conntrack_irc: Fix forged IP logic (David Leadbeater) [Orabug: 34872056] {CVE-2022-2663}
- r8152: Rate limit overflow messages (Andrew Gaul) [Orabug: 34719940] {CVE-2022-3594}
- HID: roccat: Fix use-after-free in roccat_read() (Hyunwoo Kim) [Orabug: 34670789] {CVE-2022-41850}

[4.1.12-124.70.1]
- usb: mon: make mmapped memory read only (Tadeusz Struk) [Orabug: 34820828] {CVE-2022-43750}
- sch_sfb: Also store skb len before calling child enqueue (Toke Hoiland-Jorgensen) [Orabug: 34731314] {CVE-2022-3586}
- sch_sfb: Don't assume the skb is still around after enqueueing to child (Toke Hoiland-Jorgensen) [Orabug: 34731314] {CVE-2022-3586}
- sch_sfb: keep backlog updated with qlen (WANG Cong) [Orabug: 34731314]


Related CVEs


CVE-2022-4378
CVE-2022-2663
CVE-2022-41850
CVE-2022-3586
CVE-2022-3594
CVE-2022-43750

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3 (x86_64) kernel-uek-4.1.12-124.70.2.el6uek.src.rpmccd176c4dd0efe3c0c99e9363bf6051d-
kernel-uek-4.1.12-124.70.2.el6uek.x86_64.rpmd9137a8d3b488768e0053f23ca811fa2-
kernel-uek-firmware-4.1.12-124.70.2.el6uek.noarch.rpm02d9fa8f39b76262263b55587beccde8-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete