Lucene search

K
oraclelinuxOracleLinuxELSA-2022-10108
HistoryJan 03, 2023 - 12:00 a.m.

Unbreakable Enterprise kernel security update

2023-01-0300:00:00
linux.oracle.com
24
enterprise kernel security
integer type confusion
forged ip logic
rate limit overflow
use-after-free
memory read only
vulnerabilities.

0.005 Low

EPSS

Percentile

76.5%

[4.1.12-124.70.2]

  • proc: proc_skip_spaces() shouldn’t think it is working on C strings (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378}
  • proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378}
  • netfilter: nf_conntrack_irc: Fix forged IP logic (David Leadbeater) [Orabug: 34872056] {CVE-2022-2663}
  • r8152: Rate limit overflow messages (Andrew Gaul) [Orabug: 34719940] {CVE-2022-3594}
  • HID: roccat: Fix use-after-free in roccat_read() (Hyunwoo Kim) [Orabug: 34670789] {CVE-2022-41850}
    [4.1.12-124.70.1]
  • usb: mon: make mmapped memory read only (Tadeusz Struk) [Orabug: 34820828] {CVE-2022-43750}
  • sch_sfb: Also store skb len before calling child enqueue (Toke Hoiland-Jorgensen) [Orabug: 34731314] {CVE-2022-3586}
  • sch_sfb: Don’t assume the skb is still around after enqueueing to child (Toke Hoiland-Jorgensen) [Orabug: 34731314] {CVE-2022-3586}
  • sch_sfb: keep backlog updated with qlen (WANG Cong) [Orabug: 34731314]