Oracle Linux Security Advisory ELSA-2022-10108

https://linux.oracle.com/errata/ELSA-2022-10108.html

The following updated rpms for Oracle Linux 6 Extended Lifecycle Support (ELS) have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-doc-4.1.12-124.70.2.el6uek.noarch.rpm
kernel-uek-firmware-4.1.12-124.70.2.el6uek.noarch.rpm
kernel-uek-4.1.12-124.70.2.el6uek.x86_64.rpm
kernel-uek-devel-4.1.12-124.70.2.el6uek.x86_64.rpm
kernel-uek-debug-4.1.12-124.70.2.el6uek.x86_64.rpm
kernel-uek-debug-devel-4.1.12-124.70.2.el6uek.x86_64.rpm



Related CVEs:

CVE-2022-2663
CVE-2022-3586
CVE-2022-3594
CVE-2022-41850
CVE-2022-43750
CVE-2022-4378




Description of changes:

[4.1.12-124.70.2.el6uek]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds)  [Orabug: 34882781]  {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds)  [Orabug: 34882781]  {CVE-2022-4378}
- netfilter: nf_conntrack_irc: Fix forged IP logic (David Leadbeater)  [Orabug: 34872056]  {CVE-2022-2663}
- r8152: Rate limit overflow messages (Andrew Gaul)  [Orabug: 34719940]  {CVE-2022-3594}
- HID: roccat: Fix use-after-free in roccat_read() (Hyunwoo Kim)  [Orabug: 34670789]  {CVE-2022-41850}

[4.1.12-124.70.1.el6uek]
- usb: mon: make mmapped memory read only (Tadeusz Struk)  [Orabug: 34820828]  {CVE-2022-43750}
- sch_sfb: Also store skb len before calling child enqueue (Toke Høiland-Jørgensen)  [Orabug: 34731314]  {CVE-2022-3586}
- sch_sfb: Don't assume the skb is still around after enqueueing to child (Toke Høiland-Jørgensen)  [Orabug: 34731314]  {CVE-2022-3586}
- sch_sfb: keep backlog updated with qlen (WANG Cong)  [Orabug: 34731314]


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle6: ELSA-2022-10108: Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel I

The following updated rpms for Oracle Linux 6 Extended Lifecycle Support (ELS) have been uploaded to the Unbreakable Linux Network:

Summary

[4.1.12-124.70.2.el6uek] - proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378} - netfilter: nf_conntrack_irc: Fix forged IP logic (David Leadbeater) [Orabug: 34872056] {CVE-2022-2663} - r8152: Rate limit overflow messages (Andrew Gaul) [Orabug: 34719940] {CVE-2022-3594} - HID: roccat: Fix use-after-free in roccat_read() (Hyunwoo Kim) [Orabug: 34670789] {CVE-2022-41850} [4.1.12-124.70.1.el6uek] - usb: mon: make mmapped memory read only (Tadeusz Struk) [Orabug: 34820828] {CVE-2022-43750} - sch_sfb: Also store skb len before calling child enqueue (Toke Høiland-Jørgensen) [Orabug: 34731314] {CVE-2022-3586} - sch_sfb: Don't assume the skb is still around after enqueueing to child (Toke Høiland-Jørgensen) [Orabug: 34731314] {CVE-2022-3586} - sch_sfb: keep backlog updated with qlen (WANG Cong) [Orabug: 34731314]

SRPMs

x86_64

kernel-uek-doc-4.1.12-124.70.2.el6uek.noarch.rpm kernel-uek-firmware-4.1.12-124.70.2.el6uek.noarch.rpm kernel-uek-4.1.12-124.70.2.el6uek.x86_64.rpm kernel-uek-devel-4.1.12-124.70.2.el6uek.x86_64.rpm kernel-uek-debug-4.1.12-124.70.2.el6uek.x86_64.rpm kernel-uek-debug-devel-4.1.12-124.70.2.el6uek.x86_64.rpm

aarch64

i386

Severity
Related CVEs: CVE-2022-2663 CVE-2022-3586 CVE-2022-3594 CVE-2022-41850 CVE-2022-43750 CVE-2022-4378

Related News