Описание
ELSA-2022-10072: Unbreakable Enterprise kernel security update (IMPORTANT)
[4.14.35-2047.520.3.1]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34883027] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34883027] {CVE-2022-4378}
- hugetlbfs: don't delete error page from pagecache (James Houghton) [Orabug: 34883072]
- mm: shmem: don't truncate page if memory failure happens (Yang Shi) [Orabug: 34883072]
- mm: hwpoison: refactor refcount check handling (Yang Shi) [Orabug: 34883072]
[4.14.35-2047.520.3]
- scsi: qla2xxx: Fix use after free in eh_abort path (Quinn Tran) [Orabug: 34841119]
[4.14.35-2047.520.2]
- rds: Remove the cp_rdsinfo_pending flag (Hakon Bugge) [Orabug: 34658891]
- RDMA/mlx5: Change debug log level for remote access error syndromes (Arumugam Kolappan) [Orabug: 34798453]
[4.14.35-2047.520.1]
- rds: ib: Fix cleanup of rds_ib_cache_gc_worker (Hakon Bugge) [Orabug: 34806078]
- scsi: stex: Properly zero out the passthrough command structure (Linus Torvalds) [Orabug: 34670756] {CVE-2022-40768}
- do_wait: make PIDTYPE_PID case O(1) instead of O(n) (Jim Newsome) [Orabug: 34420117]
[4.14.35-2047.520.0]
- uapi: Fix [rs]cq_vector data types in rds[6]_info_rdma_connection (Mark Haywood) [Orabug: 34732042]
- uapi: Fix congested flag type in rds[6]_info_socket (Mark Haywood) [Orabug: 34732042]
- scsi: target: core: Silence the message about unknown VPD pages (Konstantin Shelekhin) [Orabug: 34728690]
- mISDN: fix use-after-free bugs in l1oip timer handlers (Duoming Zhou) [Orabug: 34719782] {CVE-2022-3565}
- uek-rpm: add aarch64 to list of vdso arches (Tom Saeger) [Orabug: 34716203]
- xfs: trim IO to found COW extent limit (Eric Sandeen) [Orabug: 34705398]
- xfs: don't use delalloc extents for COW on files with extsize hints (Christoph Hellwig) [Orabug: 34705398]
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
kernel-uek
4.14.35-2047.520.3.1.el7uek
kernel-uek-debug
4.14.35-2047.520.3.1.el7uek
kernel-uek-debug-devel
4.14.35-2047.520.3.1.el7uek
kernel-uek-devel
4.14.35-2047.520.3.1.el7uek
kernel-uek-headers
4.14.35-2047.520.3.1.el7uek
kernel-uek-tools
4.14.35-2047.520.3.1.el7uek
kernel-uek-tools-libs
4.14.35-2047.520.3.1.el7uek
kernel-uek-tools-libs-devel
4.14.35-2047.520.3.1.el7uek
perf
4.14.35-2047.520.3.1.el7uek
python-perf
4.14.35-2047.520.3.1.el7uek
Oracle Linux x86_64
kernel-uek
4.14.35-2047.520.3.1.el7uek
kernel-uek-debug
4.14.35-2047.520.3.1.el7uek
kernel-uek-debug-devel
4.14.35-2047.520.3.1.el7uek
kernel-uek-devel
4.14.35-2047.520.3.1.el7uek
kernel-uek-doc
4.14.35-2047.520.3.1.el7uek
kernel-uek-tools
4.14.35-2047.520.3.1.el7uek
Связанные CVE
Связанные уязвимости
ELSA-2022-10073: Unbreakable Enterprise kernel-container security update (IMPORTANT)
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.