ELSA-2022-9761

ELSA-2022-9761 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-09-06

Description


[4.1.12-124.66.3]
- fuse: fix pipe buffer lifetime for direct_io (Miklos Szeredi) [Orabug: 33981149] {CVE-2022-1011}
- vt: drop old FONT ioctls (Jiri Slaby) [Orabug: 34408794] {CVE-2021-33656}
- video: of_display_timing.h: include errno.h (Hsin-Yi Wang) [Orabug: 34408910] {CVE-2021-33655}
- fbcon: Disallow setting font bigger than screen size (Helge Deller) [Orabug: 34408910] {CVE-2021-33655}
- scsi: target: Fix WRITE_SAME No Data Buffer crash (Mike Christie) [Orabug: 34419974] {CVE-2022-21546}
- scsi/eh: fix hang adding ehandler wakeups after decrementing host_busy (Gulam Mohamed) [Orabug: 33349684] [Orabug: 34492498]

[4.1.12-124.66.2]
- mm: enforce min addr even if capable() in expand_downwards() (Jann Horn) [Orabug: 29501997] {CVE-2019-9213}
- ACPICA: Reference Counts: increase max to 0x4000 for large servers (Erik Schmauss)
- ipv4: tcp: send zero IPID in SYNACK messages (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- ipv4: Cache net in ip_build_and_send_pkt and ip_queue_xmit (Eric W. Biederman) [Orabug: 33917058] {CVE-2020-36516}
- ipv4: igmp: guard against silly MTU values (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- inet: constify ip_dont_fragment() arguments (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- ip: constify ip_build_and_send_pkt() socket argument (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (Eric Biggers) [Orabug: 34433461] {CVE-2020-36557}
- vt: vt_ioctl: fix race in VT_RESIZEX (Eric Dumazet) [Orabug: 34433476] {CVE-2020-36558}
- VT_RESIZEX: get rid of field-by-field copyin (Al Viro) [Orabug: 34433476]
- net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34460939] [Orabug: 34484730] {CVE-2022-2588}

[4.1.12-124.66.1]
- net: fix uninit-value in __hw_addr_add_ex() (Eric Dumazet) [Orabug: 34395887]
- mac80211: silence an uninitialized variable warning (Dan Carpenter) [Orabug: 34396283]


Related CVEs


CVE-2019-9213
CVE-2020-36516
CVE-2022-2588
CVE-2021-33655
CVE-2022-21546
CVE-2021-33656
CVE-2020-36557
CVE-2020-36558
CVE-2022-1011

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (x86_64) kernel-uek-4.1.12-124.66.3.el6uek.src.rpm1217cdaef66182cc2b6c9c6fa22321f4-
kernel-uek-4.1.12-124.66.3.el6uek.x86_64.rpmb95974f933102cecf5791d529eb35ea9-
kernel-uek-debug-4.1.12-124.66.3.el6uek.x86_64.rpmac14941ce5176ddd5497c35c78b8f048-
kernel-uek-debug-devel-4.1.12-124.66.3.el6uek.x86_64.rpmc3a8bab6dcedf3908f1caf474d5da802-
kernel-uek-devel-4.1.12-124.66.3.el6uek.x86_64.rpm2be61b27d2d80f726f002a34cc05725d-
kernel-uek-doc-4.1.12-124.66.3.el6uek.noarch.rpme72660568a88dc39b1f635700da5ee49-
kernel-uek-firmware-4.1.12-124.66.3.el6uek.noarch.rpmceceba22aaaca64b88e8ee6aeec93c40-
Oracle Linux 7 (x86_64) kernel-uek-4.1.12-124.66.3.el7uek.src.rpm78f67a1307be7c717a97daca4da7c8d6-
kernel-uek-4.1.12-124.66.3.el7uek.x86_64.rpm152f8045589401f3e8bdb61242fe1be4-
kernel-uek-debug-4.1.12-124.66.3.el7uek.x86_64.rpmd77f55509926c2f7c3593a09fc49469e-
kernel-uek-debug-devel-4.1.12-124.66.3.el7uek.x86_64.rpma4db61caa2bdf30151df8e653e8f0d13-
kernel-uek-devel-4.1.12-124.66.3.el7uek.x86_64.rpma0dcb1be1304ab7a6574ae1bc5ec4a8e-
kernel-uek-doc-4.1.12-124.66.3.el7uek.noarch.rpm6c4619e03b9e6bd69422dba2fbd6e05e-
kernel-uek-firmware-4.1.12-124.66.3.el7uek.noarch.rpmcd7514821ef24cba8deac52f5e0be0a8-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete