Oracle7: ELSA-2022-5937: kernel Moderate Security Update | LinuxSec...
Oracle Linux Security Advisory ELSA-2022-5937

https://linux.oracle.com/errata/ELSA-2022-5937.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unb=
reakable Linux Network:

x86_64:
bpftool-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.76.1.0.1.el7.noarch.rpm
kernel-debug-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-doc-3.10.0-1160.76.1.0.1.el7.noarch.rpm
kernel-headers-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
perf-3.10.0-1160.76.1.0.1.el7.x86_64.rpm
python-perf-3.10.0-1160.76.1.0.1.el7.x86_64.rpm


SRPMS:
https://oss.oracle.com/ol7/SRPMS-updates/kernel-3.10.0-1160.76.1.0.1.el7.src=
.rpm

Related CVEs:

CVE-2022-21123
CVE-2022-21125
CVE-2022-21166




Description of changes:

[3.10.0-1160.76.1.0.1.el7.OL7]
[debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}

[3.10.0-1160.76.1.el7.OL7]
[Update Oracle Linux certificates (Ilya Okomin)
[Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_sign=
ing_key.x509)([email protected])
[Update x509.genkey [Orabug: 24817676]
[Conflict with shim-ia32 and shim-x64 <=3D 15-2.0.9]
[Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)

[3.10.0-1160.76.1.el7]
[sfc: complete the next packet when we receive a timestamp (=CD=F1igo Hugue=
t) [1793280]

[3.10.0-1160.75.1.el7]
[xfs: fix up non-directory creation in SGID directories (Andrey Albershteyn=
) [2089360]
[x86/speculation/mmio: Print SMT warning (Rafael Aquini) [2090249] {CVE-202=
2-21123 CVE-2022-21125 CVE-2022-21166}
[KVM: x86/speculation: Disable Fill buffer clear within guests (Rafael Aqui=
ni) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Rafael Aquini) [209=
0249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/srbds: Update SRBDS mitigation selection (Rafael Aquini) [=
2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (R=
afael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[cpu/speculation: Add prototype for cpu_show_srbds() (Rafael Aquini) [20902=
49] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Rafael Aqui=
ni) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Rafael A=
quini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Rafael=
 Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation: Add a common function for MD_CLEAR mitigation update (Raf=
ael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Rafael Aqui=
ni) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[Documentation: Add documentation for Processor MMIO Stale Data (Rafael Aqu=
ini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[[s390] s390/zcrypt: use kvmalloc instead of kmalloc for 256k alloc (Mete D=
urlu) [2072970]

[3.10.0-1160.74.1.el7]
[tracing: Fix bad use of igrab in trace_uprobe.c (Oleg Nesterov) [2096884]

[3.10.0-1160.73.1.el7]
[qede: Reduce verbosity of ptp tx timestamp (Manish Chopra) [2080646]
[RDMA/cma: Fix unbalanced cm_id reference count during address resolve (Kam=
al Heib) [2085425]

[3.10.0-1160.72.1.el7]
[sched,perf: Fix periodic timers (Valentin Schneider) [2077346]
[sched: debug: Remove the cfs bandwidth timer_active printout (Valentin Sch=
neider) [2077346]
[sched: Cleanup bandwidth timers (Valentin Schneider) [2077346]


_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2022-5937: kernel Moderate Security Update

Summary

Description of changes: [3.10.0-1160.76.1.0.1.el7.OL7] [debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499} [3.10.0-1160.76.1.el7.OL7] [Update Oracle Linux certificates (Ilya Okomin) [Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_sign= ing_key.x509)([email protected]) [Update x509.genkey [Orabug: 24817676] [Conflict with shim-ia32 and shim-x64 <=3D 15-2.0.9] [Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin) [3.10.0-1160.76.1.el7] [sfc: complete the next packet when we receive a timestamp (=CD=F1igo Hugue= t) [1793280] [3.10.0-1160.75.1.el7] [xfs: fix up non-directory creation in SGID directories (Andrey Albershteyn= ) [2089360] [x86/speculation/mmio: Print SMT warning (Rafael Aquini) [2090249] {CVE-202= 2-21123 CVE-2022-21125 CVE-2022-21166} [KVM: x86/speculation: Disable Fill buffer clear within guests (Rafael Aqui= ni) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Rafael Aquini) [209= 0249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation/srbds: Update SRBDS mitigation selection (Rafael Aquini) [= 2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (R= afael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [cpu/speculation: Add prototype for cpu_show_srbds() (Rafael Aquini) [20902= 49] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Rafael Aqui= ni) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Rafael A= quini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Rafael= Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation: Add a common function for MD_CLEAR mitigation update (Raf= ael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Rafael Aqui= ni) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [Documentation: Add documentation for Processor MMIO Stale Data (Rafael Aqu= ini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} [[s390] s390/zcrypt: use kvmalloc instead of kmalloc for 256k alloc (Mete D= urlu) [2072970] [3.10.0-1160.74.1.el7] [tracing: Fix bad use of igrab in trace_uprobe.c (Oleg Nesterov) [2096884] [3.10.0-1160.73.1.el7] [qede: Reduce verbosity of ptp tx timestamp (Manish Chopra) [2080646] [RDMA/cma: Fix unbalanced cm_id reference count during address resolve (Kam= al Heib) [2085425] [3.10.0-1160.72.1.el7] [sched,perf: Fix periodic timers (Valentin Schneider) [2077346] [sched: debug: Remove the cfs bandwidth timer_active printout (Valentin Sch= neider) [2077346] [sched: Cleanup bandwidth timers (Valentin Schneider) [2077346]

i386

x86_64

bpftool-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-abi-whitelists-3.10.0-1160.76.1.0.1.el7.noarch.rpm kernel-debug-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-doc-3.10.0-1160.76.1.0.1.el7.noarch.rpm kernel-headers-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.76.1.0.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.76.1.0.1.el7.x86_64.rpm perf-3.10.0-1160.76.1.0.1.el7.x86_64.rpm python-perf-3.10.0-1160.76.1.0.1.el7.x86_64.rpm

SRPMS

https://oss.oracle.com/ol7/SRPMS-updates/kernel-3.10.0-1160.76.1.0.1.el7.src= .rpm

Severity
Related CVEs: CVE-2022-21123 CVE-2022-21125 CVE-2022-21166

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.