OVMSA-2023-0017

OVMSA-2023-0017 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2023-08-03

Description


[4.1.12-124.76.2]
- firewire: fix potential uaf in outbound_phy_packet_callback() (Chengfeng Ye) [Orabug: 35493606] {CVE-2023-3159}
- ath9k: fix use-after-free in ath9k_hif_usb_rx_cb (Pavel Skripkin) [Orabug: 35448003] {CVE-2022-1679}
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern (Mike Snitzer) [Orabug: 35354880] {CVE-2023-2269}
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (Duoming Zhou) [Orabug: 35181652] {CVE-2023-1118}
- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os (Zheng Wang) [Orabug: 35180779] {CVE-2022-3424}

[4.1.12-124.76.1]
- ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum (Tudor Ambarus) [Orabug: 35457204] {CVE-2023-34256}
- igmp: Add ip_mc_list lock in ip_check_mc_rcu (Liu Jian) [Orabug: 35448048] {CVE-2022-20141}

[4.1.12-124.75.3]
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (Gwangun Jung) [Orabug: 35354791] {CVE-2023-2248}

[4.1.12-124.75.2]
- prlimit: do_prlimit needs to have a speculation check (Greg Kroah-Hartman) [Orabug: 35354303] {CVE-2023-0458}
- kernel/sys.c: fix potential Spectre v1 issue (Gustavo A. R. Silva) [Orabug: 35354303]
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (Zheng Wang) [Orabug: 35250898] {CVE-2023-1670}
- net: sched: cbq: dont intepret cls results when asked to drop (Jamal Hadi Salim) [Orabug: 34983586] {CVE-2023-23454}

[4.1.12-124.75.1]
- media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() (Baisong Zhong) [Orabug: 35312830] {CVE-2023-28328}
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (Mike Christie) [Orabug: 35312683] {CVE-2023-2162}
- nvme: restrict management ioctls to admin (Keith Busch) [Orabug: 34619368] {CVE-2022-3169}

[4.1.12-124.74.2]
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (Greg Kroah-Hartman) [Orabug: 35250098] {CVE-2023-1513}
- staging: rtl8712: fix use after free bugs (Dan Carpenter) [Orabug: 35212876] {CVE-2022-4095}
- staging: rtl8712: rtl8712_cmd.c: fixed comparison to null (Juliana Rodrigues) [Orabug: 35212876] {CVE-2022-4095}
- wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid (Szymon Heidrich) [Orabug: 35037715] {CVE-2023-23559}

[4.1.12-124.74.1]
- seq_buf: Fix overflow in seq_buf_putmem_hex() (Yun Zhou) [Orabug: 35217595] {CVE-2023-28772}
- net: mpls: fix stale pointer if allocation fails during device rename (Jakub Kicinski) [Orabug: 35181964] {CVE-2023-26545}


Related CVEs


CVE-2023-34256
CVE-2023-2269
CVE-2023-1118
CVE-2022-1679
CVE-2023-3159
CVE-2022-20141
CVE-2022-3424

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3 (x86_64) kernel-uek-4.1.12-124.76.2.el6uek.src.rpm883195b1c9000d402230e7433089bb7c-
kernel-uek-4.1.12-124.76.2.el6uek.x86_64.rpmfacac4195f5588681c4d72bc5b9e0481-
kernel-uek-firmware-4.1.12-124.76.2.el6uek.noarch.rpmee1152d59e1d091d73bb7ce9d23c723b-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete