[ELSA-2023-0951] kernel security and bug fix update
- [5.14.0-162.18.1_1.OL9]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove nmap references from kernel (Mridula Shastry) [Orabug: 34313944]
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
[5.14.0-162.18.1_1]
- powerpc/pseries: Use lparcfg to reconfig VAS windows for DLPAR CPU (Steve Best) [2154305 2133101]
- redhat/configs: Change the amd-pstate driver from builtin to loadable (David Arcari) [2151274 2143793]
- powerpc/pseries/mobility: set NMI watchdog factor during an LPM (Steve Best) [2140085 2122830]
- powerpc/watchdog: introduce a NMI watchdog's factor (Steve Best) [2140085 2122830]
- watchdog: export lockup_detector_reconfigure (Steve Best) [2140085 2122830]
- powerpc/mobility: wait for memory transfer to complete (Steve Best) [2140085 2122830]
[5.14.0-162.17.1_1]
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (Emanuele Giuseppe Esposito) [2155459 2100404]
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (Emanuele Giuseppe Esposito) [2155459 2100404]
- PCI: hv: Fix interrupt mapping for multi-MSI (Emanuele Giuseppe Esposito) [2155459 2100404]
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (Emanuele Giuseppe Esposito) [2155459 2100404]
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (Emanuele Giuseppe Esposito) [2155459 2100404]
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (Emanuele Giuseppe Esposito) [2155459 2100404]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Wander Lairson Costa) [2152580 2152581] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Wander Lairson Costa) [2152580 2152581] {CVE-2022-4378}
- blk-mq: run queue no matter whether the request is the last request (Ming Lei) [2162535 2118511]
- netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits (Florian Westphal) [2161724 2161725] {CVE-2023-0179}
- nvme-tcp: fix regression that causes sporadic requests to time out (Gopal Tiwari) [2161344 2124526]
- netfs: Fix dodgy maths (Xiubo Li) [2161418 2138981]
- netfs: Fix missing xas_retry() calls in xarray iteration (Xiubo Li) [2161418 2138981]
[5.14.0-162.16.1_1]
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (Ricardo Robaina) [2152929 2152931] {CVE-2022-3564}
- gitlab-ci: use CI templates from production branch (Michael Hofmann)
[5.14.0-162.15.1_1]
- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (Thomas Huth) [2158815 2140899]
- x86/fpu: Do not leak fpstate pointer on fork (Rafael Aquini) [2133083 2120448]
- Revert 'usb: typec: ucsi: add a common function ucsi_unregister_connectors()' (Torez Smith) [2153277 2113003]
- i2c: ismt: Fix an out-of-bounds bug in ismt_access() (David Arcari) [2154859 2119067] {CVE-2022-2873}
[5.14.0-162.14.1_1]
- NFSD: fix use-after-free in __nfs42_ssc_open() (Benjamin Coddington) [2152815 2152816] {CVE-2022-4379}
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (Mohammed Gamal) [2155930 2155277]
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (Mohammed Gamal) [2155930 2155277]
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (Mohammed Gamal) [2155930 2155277]
- sched/core: Always flush pending blk_plug (Phil Auld) [2153792 2115520]
[5.14.0-162.13.1_1]
- scsi: qla2xxx: Fix crash when I/O abort times out (Nilesh Javali) [2152178 2115892]
- net: mana: Fix race on per-CQ variable napi work_done (Emanuele Giuseppe Esposito) [2155145 2153431]
- ID
- ELSA-2023-0951
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2023-0951.html
- Published
-
2023-03-01T00:00:00
(18 months ago) - Modified
-
2023-03-01T00:00:00
(18 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1645
- ALAS2-2022-1888
- ALSA-2023:0832
- ALSA-2023:0951
- ALSA-2023:1566
- ALSA-2023:2951
- DSA-5324-1
- ELSA-2022-10071
- ELSA-2022-10072
- ELSA-2022-10073
- ELSA-2022-10078
- ELSA-2022-10079
- ELSA-2022-10080
- ELSA-2022-10081
- ELSA-2022-10108
- ELSA-2023-0832
- ELSA-2023-1091
- ELSA-2023-12006
- ELSA-2023-12007
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12116
- ELSA-2023-12120
- ELSA-2023-12160
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-1566
- ELSA-2023-1822
- ELSA-2023-2951
- ELSA-2023-4151
- FEDORA-2023-0597579983
- FEDORA-2023-3fd7349f60
- FEDORA-2023-58eac2b872
- FEDORA-2023-f4f9182dc8
- MS:CVE-2022-2873
- MS:CVE-2022-4378
- MS:CVE-2022-4379
- RHSA-2023:0832
- RHSA-2023:0854
- RHSA-2023:0951
- RHSA-2023:0979
- RHSA-2023:1008
- RHSA-2023:1091
- RHSA-2023:1092
- RHSA-2023:1101
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:4150
- RHSA-2023:4151
- RHSA-2023:4215
- RLSA-2023:0832
- RLSA-2023:1566
- SSA:2022-237-02
- SSA:2022-333-01
- SSA:2023-048-01
- SSA:2023-172-02
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0146-1
- SUSE-SU-2023:0147-1
- SUSE-SU-2023:0148-1
- SUSE-SU-2023:0149-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0270-1
- SUSE-SU-2023:0273-1
- SUSE-SU-2023:0277-1
- SUSE-SU-2023:0280-1
- SUSE-SU-2023:0320-1
- SUSE-SU-2023:0331-1
- SUSE-SU-2023:0394-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0409-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0519-1
- SUSE-SU-2023:0522-1
- SUSE-SU-2023:0523-1
- SUSE-SU-2023:0525-1
- SUSE-SU-2023:0528-1
- SUSE-SU-2023:0547-1
- SUSE-SU-2023:0552-1
- SUSE-SU-2023:0553-1
- SUSE-SU-2023:0560-1
- SUSE-SU-2023:0562-1
- SUSE-SU-2023:0564-1
- SUSE-SU-2023:0578-1
- SUSE-SU-2023:0591-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0635-1
- SUSE-SU-2023:0637-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- USN-5594-1
- USN-5599-1
- USN-5602-1
- USN-5616-1
- USN-5623-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5789-1
- USN-5799-1
- USN-5803-1
- USN-5809-1
- USN-5814-1
- USN-5831-1
- USN-5832-1
- USN-5856-1
- USN-5857-1
- USN-5858-1
- USN-5859-1
- USN-5860-1
- USN-5877-1
- USN-5879-1
- USN-5883-1
- USN-5911-1
- USN-5912-1
- USN-5913-1
- USN-5914-1
- USN-5915-1
- USN-5919-1
- USN-5920-1
- USN-5929-1
- USN-5935-1
- USN-5938-1
- USN-5941-1
- USN-5950-1
- USN-5962-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2023-0951 | https://linux.oracle.com/errata/ELSA-2023-0951.html | |
CVE | CVE-2023-0179 | https://linux.oracle.com/cve/CVE-2023-0179.html | |
CVE | CVE-2022-4378 | https://linux.oracle.com/cve/CVE-2022-4378.html | |
CVE | CVE-2022-3564 | https://linux.oracle.com/cve/CVE-2022-3564.html | |
CVE | CVE-2022-4379 | https://linux.oracle.com/cve/CVE-2022-4379.html | |
CVE | CVE-2022-2873 | https://linux.oracle.com/cve/CVE-2022-2873.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-9.1 | oraclelinux | python3-perf | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-9.1 | oraclelinux | perf | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-9.1 | oraclelinux | kernel | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-9.1 | oraclelinux | kernel-tools | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-9.1 | oraclelinux | kernel-tools-libs | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-9.1 | oraclelinux | kernel-tools-libs-devel | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-9.1 | oraclelinux | kernel-modules | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-9.1 | oraclelinux | kernel-modules-extra | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-9.1 | oraclelinux | kernel-headers | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-9.1 | oraclelinux | kernel-doc | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-9.1 | oraclelinux | kernel-devel | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel-matched?distro=oraclelinux-9.1 | oraclelinux | kernel-devel-matched | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-9.1 | oraclelinux | kernel-debug | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-9.1 | oraclelinux | kernel-debug-modules | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-9.1 | oraclelinux | kernel-debug-modules-extra | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-9.1 | oraclelinux | kernel-debug-devel | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel-matched?distro=oraclelinux-9.1 | oraclelinux | kernel-debug-devel-matched | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-9.1 | oraclelinux | kernel-debug-core | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-9.1 | oraclelinux | kernel-cross-headers | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-9.1 | oraclelinux | kernel-core | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-stablelists?distro=oraclelinux-9.1 | oraclelinux | kernel-abi-stablelists | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-9.1 | oraclelinux | bpftool | < 5.14.0-162.18.1.el9_1 | oraclelinux-9.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |