[ELSA-2022-10073] Unbreakable Enterprise kernel-container security update
[4.14.35-2047.520.3.1.el7]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34883027] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34883027] {CVE-2022-4378}
- hugetlbfs: don't delete error page from pagecache (James Houghton) [Orabug: 34883072]
- mm: shmem: don't truncate page if memory failure happens (Yang Shi) [Orabug: 34883072]
- mm: hwpoison: refactor refcount check handling (Yang Shi) [Orabug: 34883072]
[4.14.35-2047.520.3.el7]
- scsi: qla2xxx: Fix use after free in eh_abort path (Quinn Tran) [Orabug:
34841119]
[4.14.35-2047.520.2.el7]
- rds: Remove the cp_rdsinfo_pending flag (Hakon Bugge) [Orabug: 34658891]
- RDMA/mlx5: Change debug log level for remote access error syndromes (Arumugam Kolappan) [Orabug: 34798453]
[4.14.35-2047.520.1.el7]
- rds: ib: Fix cleanup of rds_ib_cache_gc_worker (Hakon Bugge) [Orabug: 34806078]
- scsi: stex: Properly zero out the passthrough command structure (Linus Torvalds) [Orabug: 34670756] {CVE-2022-40768}
- do_wait: make PIDTYPE_PID case O(1) instead of O(n) (Jim Newsome) [Orabug: 34420117]
[4.14.35-2047.520.0.el7]
- uapi: Fix [rs]cq_vector data types in rds[6]_info_rdma_connection (Mark Haywood) [Orabug: 34732042]
- uapi: Fix congested flag type in rds[6]_info_socket (Mark Haywood) [Orabug: 34732042]
- scsi: target: core: Silence the message about unknown VPD pages (Konstantin Shelekhin) [Orabug: 34728690]
- mISDN: fix use-after-free bugs in l1oip timer handlers (Duoming Zhou) [Orabug: 34719782] {CVE-2022-3565}
- uek-rpm: add aarch64 to list of vdso arches (Tom Saeger) [Orabug: 34716203]
- xfs: trim IO to found COW extent limit (Eric Sandeen) [Orabug: 34705398]
[4.14.35-2047.519.2.el7]
- Revert 'xfs: don't use delalloc extents for COW on files with extsize hints' (Saeed Mirzamohammadi) [Orabug: 34715947]
- uapi: Fix linux/rds.h userspace compilation issues (Ka-Cheong Poon) [Orabug: 32392165] [Orabug: 34710962]
- uapi: Fix linux/rds.h userspace compilation errors. (Vinson Lee) [Orabug: 34710962]
- uapi: fix linux/rds.h userspace compilation error (Dmitry V. Levin) [Orabug: 34710962]
- uapi: fix linux/rds.h userspace compilation errors (Dmitry V. Levin) [Orabug: 34710962]
- EDAC: Drop duplicated array of strings for memory type names (Jane Chu) [Orabug: 34645040]
- xfs: don't ever put nlink > 0 inodes on the unlinked list (Darrick J. Wong) [Orabug: 34431355]
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-7 | < 4.14.35-2047.520.3.1.el7 |
- ID
- ELSA-2022-10073
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-10073.html
- Published
-
2022-12-13T00:00:00
(21 months ago) - Modified
-
2022-12-13T00:00:00
(21 months ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1645
- ALAS2-2022-1876
- ALSA-2023:0951
- ALSA-2023:1566
- ALSA-2024:3138
- ELSA-2022-10065
- ELSA-2022-10071
- ELSA-2022-10072
- ELSA-2022-10078
- ELSA-2022-10079
- ELSA-2022-10080
- ELSA-2022-10081
- ELSA-2022-10108
- ELSA-2023-0951
- ELSA-2023-1091
- ELSA-2023-12006
- ELSA-2023-12007
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-1566
- ELSA-2023-1822
- ELSA-2023-6583
- ELSA-2024-3138
- FEDORA-2022-1a5b125ac6
- FEDORA-2022-2cfbe17910
- FEDORA-2022-b948fc3cfb
- MS:CVE-2022-40768
- MS:CVE-2022-4378
- RHSA-2023:0951
- RHSA-2023:0979
- RHSA-2023:1008
- RHSA-2023:1091
- RHSA-2023:1092
- RHSA-2023:1101
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:1566
- RLSA-2024:3138
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3810-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0226-1
- SUSE-SU-2023:0238-1
- SUSE-SU-2023:0250-1
- SUSE-SU-2023:0263-1
- SUSE-SU-2023:0271-1
- SUSE-SU-2023:0416-1
- USN-5693-1
- USN-5727-1
- USN-5727-2
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5729-1
- USN-5729-2
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5774-1
- USN-5779-1
- USN-5799-1
- USN-5803-1
- USN-5809-1
- USN-5814-1
- USN-5831-1
- USN-5832-1
- USN-5860-1
- USN-5877-1
- USN-5879-1
- USN-5883-1
- USN-5913-1
- USN-5919-1
- USN-5920-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-10073 | https://linux.oracle.com/errata/ELSA-2022-10073.html | |
CVE | CVE-2022-3565 | https://linux.oracle.com/cve/CVE-2022-3565.html | |
CVE | CVE-2022-40768 | https://linux.oracle.com/cve/CVE-2022-40768.html | |
CVE | CVE-2022-4378 | https://linux.oracle.com/cve/CVE-2022-4378.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek-container?distro=oraclelinux-7 | oraclelinux | kernel-uek-container | < 4.14.35-2047.520.3.1.el7 | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |