ELSA-2022-9348

ELSA-2022-9348 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-05-03

Description


[4.1.12-124.62.3]
- fget: check that the fd still exists after getting a ref to it (Linus Torvalds) [Orabug: 33679806] {CVE-2021-0920}
- fs: add fget_many() and fput_many() (Jens Axboe) [Orabug: 33679806]
- af_unix: fix garbage collect vs MSG_PEEK (Miklos Szeredi) [Orabug: 33679806] {CVE-2021-0920}
- net: split out functions related to registering inflight socket files (Jens Axboe) [Orabug: 33679806]

[4.1.12-124.62.2]
- netfilter: nf_tables: initialize registers in nft_do_chain() (Pablo Neira Ayuso) [Orabug: 34012926] {CVE-2022-1016}
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (Nikola Livic) [Orabug: 34020970] {CVE-2021-4157}

[4.1.12-124.62.1]
- Bluetooth: use correct lock to prevent UAF of hdev object (Lin Ma) [Orabug: 33014054] {CVE-2021-3573}
- hugetlbfs: flush TLBs correctly after huge_pmd_unshare (Nadav Amit) [Orabug: 33617221] {CVE-2021-4002}
- udf: Restore i_lenAlloc when inode expansion fails (Jan Kara) [Orabug: 33870269] {CVE-2022-0617}
- udf: Fix NULL ptr deref when converting from inline format (Jan Kara) [Orabug: 33870269] {CVE-2022-0617}
- phonet: refcount leak in pep_sock_accep (Hangyu Hua) [Orabug: 33962762] {CVE-2021-45095}
- btrfs: unlock newly allocated extent buffer after error (Qu Wenruo) [Orabug: 33997139] {CVE-2021-4149}
- quota: correct error number in free_dqentry() (Zhang Yi) [Orabug: 33997256] {CVE-2021-45868}
- quota: check block number when reading the block in quota file (Zhang Yi) [Orabug: 33997256] {CVE-2021-45868}
- af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (Eric Dumazet) [Orabug: 34006847] {CVE-2021-4203}


Related CVEs


CVE-2021-3573
CVE-2022-1016
CVE-2022-0617
CVE-2021-4002
CVE-2021-4149
CVE-2021-4157
CVE-2021-4203
CVE-2021-45095
CVE-2021-45868
CVE-2021-0920

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.62.3.el6uek.src.rpm768136643bf065b1a2457361134910b2-
kernel-uek-4.1.12-124.62.3.el6uek.x86_64.rpm0a582425c43dbb13c0b229bfa29cd907-
kernel-uek-debug-4.1.12-124.62.3.el6uek.x86_64.rpm54aa92032fea4b66fcf3d78ffbcc6de0-
kernel-uek-debug-devel-4.1.12-124.62.3.el6uek.x86_64.rpm0fbe4b54cf2e97f79fd61b13de4348eb-
kernel-uek-devel-4.1.12-124.62.3.el6uek.x86_64.rpm8d82705389482d028ae6f1ae490eb17e-
kernel-uek-doc-4.1.12-124.62.3.el6uek.noarch.rpm79f2152ec706cefc303464c9e8033e63-
kernel-uek-firmware-4.1.12-124.62.3.el6uek.noarch.rpm7e52a51d5c89ee80eb5c4da1b6a5c1a8-
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.62.3.el7uek.src.rpma07f2068db95fc5979584412bde3ec3e-
kernel-uek-4.1.12-124.62.3.el7uek.x86_64.rpm152858166b6a3e7b0afc3d81072fe85f-
kernel-uek-debug-4.1.12-124.62.3.el7uek.x86_64.rpm8feb22a5c2dc5619060786074f724ea9-
kernel-uek-debug-devel-4.1.12-124.62.3.el7uek.x86_64.rpm49fc9882f9176b1e29c4de6424e91c54-
kernel-uek-devel-4.1.12-124.62.3.el7uek.x86_64.rpm6cab09864cd4d956b4bfba6b34987068-
kernel-uek-doc-4.1.12-124.62.3.el7uek.noarch.rpm90bbb1aa35ecf9bc7d5202a0d610829e-
kernel-uek-firmware-4.1.12-124.62.3.el7uek.noarch.rpm06ea13244072c63a452a43c909d4c683-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete