[ELSA-2022-0825] kernel security, bug fix, and enhancement update
[4.18.0-348.20.1_5.OL8]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-11.0.5
[4.18.0-348.20.1_5]
- lib/iov_iter: initialize 'flags' in new pipe_buffer (Jan Stancek) [2060874 2060875] {CVE-2022-0847}
[4.18.0-348.19.1_5]
- tipc: improve size validations for received domain records (Xin Long) [2048970 2048971] {CVE-2022-0435}
- smb3: do not error on fsync when readonly (Ronnie Sahlberg) [2055824 2037811]
- security: implement sctp_assoc_established hook in selinux (Ondrej Mosnacek) [2054112 2054117 2015525 2048251]
- security: add sctp_assoc_established hook (Ondrej Mosnacek) [2054112 2054117 2015525 2048251]
- security: call security_sctp_assoc_request in sctp_sf_do_5_1D_ce (Ondrej Mosnacek) [2054112 2054117 2015525 2048251]
- security: pass asoc to sctp_assoc_request and sctp_sk_clone (Bruno Meneguele) [2054112 2054117 2015525 2048251]
- net: sctp: Fix some typos (Ondrej Mosnacek) [2054112 2054117 2015525 2048251]
- RDMA/bnxt_re: Fix stats counters (Selvin Xavier) [2049684 2001893]
- net: check skb sec_path when re-initializing slow_gro in gro_list_prepare (Xin Long) [2047427 2030476]
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (David Arcari) [2036888 2003695]
[4.18.0-348.18.1_5]
- selftests: kvm: Check whether SIDA memop fails for normal guests (Thomas Huth) [2050806 2050807] {CVE-2022-0516}
- KVM: s390: Return error on SIDA memop on normal guest (Thomas Huth) [2050806 2050807] {CVE-2022-0516}
- iommu/amd: Remove iommu_init_ga() (Jerry Snitselaar) [2030854 1998265]
- iommu/amd: Relocate GAMSup check to early_enable_iommus (Jerry Snitselaar) [2030854 1998265]
[4.18.0-348.17.1_5]
- vfs: check dentry is still valid in get_link() (Ian Kent) [2052558 2014846]
- xfs: don't expose internal symlink metadata buffers to the vfs (Brian Foster) [2052558 2014846]
- CI: Use appropriate zstream builder (Veronika Kabatova)
- CI: Enable baseline realtime checks (Veronika Kabatova)
- CI: Rename pipelines to include release names (Veronika Kabatova)
- cgroup-v1: Require capabilities to set release_agent (Waiman Long) [2052166 2052167] {CVE-2022-0492}
- ice: Remove boolean vlan_promisc flag from function (Jonathan Toppins) [2051951 2030400]
- ceph: put the requests/sessions when it fails to alloc memory (Jeffrey Layton) [2053725 2017796]
- ceph: fix off by one bugs in unsafe_request_wait() (Jeffrey Layton) [2053725 2017796]
- ceph: flush the mdlog before waiting on unsafe reqs (Jeffrey Layton) [2053725 2017796]
- ceph: flush mdlog before umounting (Jeffrey Layton) [2053725 2017796]
- ceph: make iterate_sessions a global symbol (Jeffrey Layton) [2053725 2017796]
- ceph: make ceph_create_session_msg a global symbol (Jeffrey Layton) [2053725 2017796]
- xfs: check sb_meta_uuid for dabuf buffer recovery (Bill O'Donnell) [2049292 2020764]
- drm/i915: Flush TLBs before releasing backing store (Patrick Talbert) [2044328 2044329] {CVE-2022-0330}
- hugetlb: fix hugetlb cgroup refcounting during vma split (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: fix imbalanced css_get and css_put pair for shared mappings (Waiman Long) [2039015 2032811]
- mm/hugetlb: change hugetlb_reserve_pages() to type bool (Waiman Long) [2039015 2032811]
- hugetlb: fix an error code in hugetlb_reserve_pages() (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: fix offline of hugetlb cgroup with reservations (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: fix reservation accounting (Waiman Long) [2039015 2032811]
- mm/hugetlb: narrow the hugetlb_lock protection area during preparing huge page (Waiman Long) [2039015 2032811]
- mm/hugetlb: a page from buddy is not on any list (Waiman Long) [2039015 2032811]
- mm/hugetlb: not necessary to coalesce regions recursively (Waiman Long) [2039015 2032811]
- selftests/vm/write_to_hugetlbfs.c: fix unused variable warning (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: add hugetlb_cgroup reservation tests (Waiman Long) [2039015 2032811]
- hugetlb: support file_region coalescing again (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: support noreserve mappings (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: add accounting for shared mappings (Waiman Long) [2039015 2032811]
- hugetlb: disable region_add file_region coalescing (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: add reservation accounting for private mappings (Waiman Long) [2039015 2032811]
- mm/hugetlb_cgroup: fix hugetlb_cgroup migration (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: add interface for charge/uncharge hugetlb reservations (Waiman Long) [2039015 2032811]
- hugetlb_cgroup: add hugetlb_cgroup reservation counter (Waiman Long) [2039015 2032811]
- hugetlb: remove duplicated code (Waiman Long) [2039015 2032811]
- hugetlb: region_chg provides only cache entry (Waiman Long) [2039015 2032811]
- hugetlbfs: always use address space in inode for resv_map pointer (Waiman Long) [2039015 2032811]
- hugetlbfs: fix potential over/underflow setting node specific nr_hugepages (Waiman Long) [2039015 2032811]
- hugetlb: allow to free gigantic pages regardless of the configuration (Waiman Long) [2039015 2032811]
- powerpc/pseries: Fix update of LPAR security flavor after LPM (Steve Best) [2027448 1997294]
[4.18.0-348.16.1_5]
- drm/vmwgfx: Fix stale file descriptors on failed usercopy (Dave Airlie) [2047601 2047602] {CVE-2022-22942}
- net: openvswitch: Fix ct_state nat flags for conns arriving from tc (Marcelo Ricardo Leitner) [2043548 2040334]
- net: openvswitch: Fix matching zone id for invalid conns arriving from tc (Marcelo Ricardo Leitner) [2043550 2040452]
- net/sched: flow_dissector: Fix matching on zone id for invalid conns (Marcelo Ricardo Leitner) [2043550 2040452]
- net/sched: Extend qdisc control block with tc control block (Marcelo Ricardo Leitner) [2043550 2040452]
[4.18.0-348.15.1_5]
- net/mlx5: DR, Use FW API when updating FW-owned flow table (Michal Schmidt) [2042663 2042651]
- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (Vitaly Kuznetsov) [2043237 1868572]
- drm/mgag200: Select clock in PLL update functions (Bruno Meneguele) [2034949 1953926]
- drm/i915: Fix HAS_LSPCON macro for platforms between GEN9 and GEN10 (Bruno Meneguele) [2027335 2005586]
- crypto: qat - power up 4xxx device (Vladis Dronov) [2016437 1960307]
- RDMA/core: Fix a double free in add_port error flow (Kamal Heib) [2038724 2008555]
- powerpc/iommu: Report the correct most efficient DMA mask for PCI devices (Steve Best) [2018928 2007425]
- powerpc/dma: Fix dma_map_ops::get_required_mask (Steve Best) [2018928 2007425]
[4.18.0-348.14.1_5]
- tcp: fix page frag corruption on page fault (Paolo Abeni) [2041529 1996074]
- net: fix sk_page_frag() recursion from memory reclaim (Paolo Abeni) [2041529 1996074]
- KVM: s390: index kvm->arch.idle_mask by vcpu_idx (Thomas Huth) [2040769 2026230]
- redhat: set LC_ALL=C before sorting config content (Frantisek Hrbata)
[4.18.0-348.13.1_5]
- vfs: Out-of-bounds write of heap buffer in fs_context.c (Frantisek Hrbata) [2040585 2040586] {CVE-2022-0185}
- xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (Bruno Meneguele) [2034864 2034865] {CVE-2021-4155}
- af_unix: fix garbage collect vs MSG_PEEK (Patrick Talbert) [2031974 2031975] {CVE-2021-0920}
- cgroup: verify that source is a string (Waiman Long) [2034608 2034609] {CVE-2021-4154}
- ID
- ELSA-2022-0825
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-0825.html
- Published
-
2022-03-11T00:00:00
(2 years ago) - Modified
-
2022-03-11T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2022-1571
- ALAS2-2022-1749
- ALAS2-2022-1761
- ALSA-2022:0825
- ASB-A-196926917
- ASB-A-218836280
- ASB-A-220741611
- CISA-2022:0425
- CISA-2022:0523
- DSA-5092-1
- DSA-5095-1
- DSA-5096-1
- ELSA-2022-0620
- ELSA-2022-4642
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9141
- ELSA-2022-9142
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9179
- ELSA-2022-9180
- ELSA-2022-9210
- ELSA-2022-9211
- ELSA-2022-9212
- ELSA-2022-9213
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9260
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9348
- ELSA-2022-9667
- ELSA-2022-9781
- FEDORA-2022-48acd4718d
- FEDORA-2022-6f887c7be7
- FEDORA-2022-a39015bec2
- FEDORA-2022-df17aabb12
- MS:CVE-2021-4154
- MS:CVE-2022-0330
- MS:CVE-2022-0435
- MS:CVE-2022-0492
- MS:CVE-2022-0516
- MS:CVE-2022-0847
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- openSUSE-SU-2022:0755-1
- openSUSE-SU-2022:0760-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:4642
- RHSA-2022:4644
- RHSA-2022:4655
- RLSA-2022:819
- SSA:2022-031-01
- SSA:2022-067-01
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0418-1
- SUSE-SU-2022:0429-1
- SUSE-SU-2022:0436-1
- SUSE-SU-2022:0463-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0615-1
- SUSE-SU-2022:0619-1
- SUSE-SU-2022:0647-1
- SUSE-SU-2022:0660-1
- SUSE-SU-2022:0667-1
- SUSE-SU-2022:0668-1
- SUSE-SU-2022:0755-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0760-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0763-1
- SUSE-SU-2022:0764-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:0978-1
- SUSE-SU-2022:0984-1
- SUSE-SU-2022:0991-1
- SUSE-SU-2022:0996-1
- SUSE-SU-2022:0998-1
- SUSE-SU-2022:1012-1
- SUSE-SU-2022:1034-1
- SUSE-SU-2022:1035-1
- SUSE-SU-2022:1036-1
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1172-1
- SUSE-SU-2022:1189-1
- SUSE-SU-2022:1193-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1212-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1242-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1278-1
- SUSE-SU-2022:1569-1
- SUSE-SU-2022:1575-1
- SUSE-SU-2022:1580-1
- SUSE-SU-2022:1589-1
- SUSE-SU-2022:1591-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1605-1
- SUSE-SU-2022:1637-1
- SUSE-SU-2022:1640-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2561-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5302-1
- USN-5317-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5361-1
- USN-5362-1
- USN-5368-1
- USN-5377-1
- USN-5505-1
- USN-5513-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-0825 | https://linux.oracle.com/errata/ELSA-2022-0825.html | |
CVE | CVE-2022-0492 | https://linux.oracle.com/cve/CVE-2022-0492.html | |
CVE | CVE-2022-0330 | https://linux.oracle.com/cve/CVE-2022-0330.html | |
CVE | CVE-2022-22942 | https://linux.oracle.com/cve/CVE-2022-22942.html | |
CVE | CVE-2022-0516 | https://linux.oracle.com/cve/CVE-2022-0516.html | |
CVE | CVE-2022-0847 | https://linux.oracle.com/cve/CVE-2022-0847.html | |
CVE | CVE-2021-0920 | https://linux.oracle.com/cve/CVE-2021-0920.html | |
CVE | CVE-2022-0435 | https://linux.oracle.com/cve/CVE-2022-0435.html | |
CVE | CVE-2021-4154 | https://linux.oracle.com/cve/CVE-2021-4154.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.5 | oraclelinux | python3-perf | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.5 | oraclelinux | perf | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.5 | oraclelinux | kernel | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.5 | oraclelinux | kernel-tools | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.5 | oraclelinux | kernel-tools-libs | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.5 | oraclelinux | kernel-tools-libs-devel | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.5 | oraclelinux | kernel-modules | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.5 | oraclelinux | kernel-modules-extra | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.5 | oraclelinux | kernel-headers | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.5 | oraclelinux | kernel-doc | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.5 | oraclelinux | kernel-devel | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.5 | oraclelinux | kernel-debug | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.5 | oraclelinux | kernel-debug-modules | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.5 | oraclelinux | kernel-debug-modules-extra | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.5 | oraclelinux | kernel-debug-devel | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.5 | oraclelinux | kernel-debug-core | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.5 | oraclelinux | kernel-cross-headers | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.5 | oraclelinux | kernel-core | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-stablelists?distro=oraclelinux-8.5 | oraclelinux | kernel-abi-stablelists | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 | ||
Affected | pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.5 | oraclelinux | bpftool | < 4.18.0-348.20.1.el8_5 | oraclelinux-8.5 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |