Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-10065

Опубликовано: 06 дек. 2022
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2022-10065: Unbreakable Enterprise kernel security update (IMPORTANT)

[4.1.12-124.69.5]

  • x86/smpboot: check cpu_initialized_mask first after returning from schedule() (Dongli Zhang) [Orabug: 34798594]

[4.1.12-124.69.4]

  • btrfs: Remove BUG_ON() as it is causing kernel to panic (Rhythm Mahajan) [Orabug: 34840579]

[4.1.12-124.69.3]

  • btrfs: fix missing return for a non-void function. (Harshit Mogalapalli) [Orabug: 34827292]

[4.1.12-124.69.2]

  • btrfs: Don't submit any btree write bio if the fs has errors (Qu Wenruo) [Orabug: 31265340] {CVE-2019-19377}
  • scsi: stex: Properly zero out the passthrough command structure (Linus Torvalds) [Orabug: 34670757] {CVE-2022-40768}
  • net/packet: fix slab-out-of-bounds access in packet_recvmsg() (Eric Dumazet) [Orabug: 34791643] {CVE-2022-20368}
  • packet: in recvmsg msg_name return at least sizeof sockaddr_ll (Willem de Bruijn) [Orabug: 34791643]
  • fs/attr.c: handling case when inode does not attach with dentry structure (Alok Tiwari) [Orabug: 34733462] [Orabug: 34798221] [Orabug: 34816013]

[4.1.12-124.69.1]

  • drm/ttm/nouveau: don't call tt destroy callback on alloc failure. (Dave Airlie) [Orabug: 33014078] {CVE-2021-20292}
  • netfilter: nf_conntrack_irc: Tighten matching on DCC message (David Leadbeater) [Orabug: 34555474] {CVE-2022-2663}
  • openvswitch: fix OOB access in reserve_sfa_size() (Paolo Valerio) [Orabug: 34607642] {CVE-2022-2639}
  • openvswitch: fix flow actions reallocation (Andrea Righi) [Orabug: 34607642]
  • openvswitch: fix the incorrect flow action alloc size (zhangliping) [Orabug: 34607642]
  • cgroup: Prevent kill_css() from being called more than once (Waiman Long) [Orabug: 34679307]
  • mISDN: fix use-after-free bugs in l1oip timer handlers (Duoming Zhou) [Orabug: 34719783] {CVE-2022-3565}
  • vsock: Fix memory leak in vsock_connect() (Peilin Ye) [Orabug: 34731194] {CVE-2022-3629}
  • vsock: split dwork to avoid reinitializations (Cong Wang) [Orabug: 34731194]

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

kernel-uek

4.1.12-124.69.5.el6uek

kernel-uek-debug

4.1.12-124.69.5.el6uek

kernel-uek-debug-devel

4.1.12-124.69.5.el6uek

kernel-uek-devel

4.1.12-124.69.5.el6uek

kernel-uek-doc

4.1.12-124.69.5.el6uek

kernel-uek-firmware

4.1.12-124.69.5.el6uek

Oracle Linux 7

Oracle Linux x86_64

kernel-uek

4.1.12-124.69.5.el7uek

kernel-uek-debug

4.1.12-124.69.5.el7uek

kernel-uek-debug-devel

4.1.12-124.69.5.el7uek

kernel-uek-devel

4.1.12-124.69.5.el7uek

kernel-uek-doc

4.1.12-124.69.5.el7uek

kernel-uek-firmware

4.1.12-124.69.5.el7uek

Связанные уязвимости

suse-cvrf
больше 2 лет назад

Security update for the Linux Kernel

suse-cvrf
больше 2 лет назад

Security update for the Linux Kernel

CVSS3: 2.6
ubuntu
больше 2 лет назад

A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.

CVSS3: 3.3
redhat
почти 3 года назад

A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.

CVSS3: 2.6
nvd
больше 2 лет назад

A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.

Уязвимость ELSA-2022-10065