[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2024-1607 -- Oracle kernel_bpftool_perf_python3-perf

ID: oval:org.secpod.oval:def:1507460Date: (C)2024-04-25   (M)2024-04-29
Class: PATCHFamily: unix




[4.18.0-513.24.1.el8_9.OL8] - Update Oracle Linux certificates - Disable signing for aarch64 - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 = 15.3-1.0.3 - Remove upstream reference during boot [Orabug: 34750652] - Drop not needed patch [4.18.0-513.24.1.el8_9] - ceph: add ceph_cap_unlink_work to fire check_caps immediately [RHEL-27496 RHEL-21760] - ceph: always queue a writeback when revoking the Fb caps [RHEL-27496 RHEL-21760] - ceph: always check dir caps asynchronously [RHEL-27496 RHEL-21760] [4.18.0-513.23.1.el8_9] - scsi: smartpqi: Fix disable_managed_interrupts [RHEL-26139 RHEL-25747] - ext4: fix kernel BUG in "ext4_write_inline_data_end" [RHEL-26331 RHEL-23386] {CVE-2021-33631} - serial: core: return early on unsupported ioctls [RHEL-19954 RHEL-19955] {CVE-2023-6546} - lib/hexdump: make print_hex_dump_bytes a nop on !DEBUG builds [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix race condition in status line change on dead connections [RHEL-19954 RHEL-19955] {CVE-2023-6546} - Revert quot;tty: n_gsm: fix UAF in gsm_cleanup_muxquot; [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix UAF in gsm_cleanup_mux [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: add parameter negotiation support [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: add parameters used with parameter negotiation [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: introduce macro for minimal unit size [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: name the debug bits [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: introduce gsm_control_command function [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: replace use of gsm_read_ea with gsm_read_ea_val [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: name gsm tty device minors [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: initialize more members at gsm_alloc_mux [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: add sanity check for gsm-gt;receive in gsm_receive_buf [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix flow control handling in tx path [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix resource allocation order in gsm_activate_mux [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix deadlock and link starvation in outgoing data path [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix race condition in gsmld_write [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix non flow control frames during mux flow off [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix missing timer to handle stalled links [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix tty registration before control channel open [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix user open not possible at responder until initiator open [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Debug output allocation must use GFP_ATOMIC [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Fix packet data hex dump output [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix buffer over-read in gsm_dlci_data [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix software flow control handling [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix invalid use of MSC in advanced option [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix broken virtual tty handling [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix missing update of modem controls after DLCI open [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix reset fifo race condition [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix missing tty wakeup in convergence layer type 2 [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong signal octets encoding in MSC [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong command frame length field encoding [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong command retry handling [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix missing explicit ldisc flush [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong DLCI release order [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix insufficient txframe size [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix frame reception handling [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix mux cleanup after unregister tty device [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix decoupled mux resource [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix restart handling via CLD command [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix deadlock in gsmtty_open [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong modem processing in convergence layer type 2 [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix wrong tty control line for flow control [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix NULL pointer access due to DLCI release [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix encoding of command/response bit [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: fix SW flow control encoding/handling [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove tty parameter from mxser_receive_chars_new [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: don"t throttle manually [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: make mxser_port::ldisc_stop_rx a bool [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Don"t ignore write return value in gsmld_output [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: clean up indenting in gsm_queue [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Save dlci address open status when config requester [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Modify gsmtty driver register method when config requester [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Delete gsmtty open SABM frame when config requester [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Modify CR,PF bit printk info when config requester [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Modify CR,PF bit when config requester [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: stop using alloc_tty_driver [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: don"t store semi-state into tty drivers [RHEL-19954 RHEL-19955] {CVE-2023-6546} - hvsi: don"t panic on tty_register_driver failure [RHEL-19954 RHEL-19955] {CVE-2023-6546} - amiserial: switch rs_table to a single state [RHEL-19954 RHEL-19955] {CVE-2023-6546} - amiserial: expand quot;customquot; [RHEL-19954 RHEL-19955] {CVE-2023-6546} - amiserial: use memset to zero serial_state [RHEL-19954 RHEL-19955] {CVE-2023-6546} - amiserial: remove serial_* strings [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: drop mxser_port::custom_divisor [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: drop mxser_port::baud_base [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove unused mxser_port::stop_rx [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: don"t allocate MXSER_PORTS + 1 [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove cnt from mxser_receive_chars [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_GETMSTATUS ioctl [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_GETDATACOUNT ioctl [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_CHKPORTENABLE ioctl [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_ASPP_LSTATUS ioctl [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_ASPP_MON and friends [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_SET_BAUD_METHOD ioctl [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove MOXA_GET_MAJOR deprecated ioctl [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: drop unused MOXA_DIAGNOSE macro [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: drop UART_MCR_AFE and UART_LSR_SPECIAL defines [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove else from LSR bits checks [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: extract mxser_receive_chars_old [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: extract mxser_receive_chars_new [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: simplify mxser_interrupt and drop mxser_board::vector_mask [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: extract port ISR [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: cleanup LSR handling in mxser_receive_chars [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: remove nonsense from ISR [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: drop constant board::uart_type [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: introduce enum mxser_must_hwid [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: rename mxser_board::chip_flag to must_hwid [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: rename CheckIsMoxaMust to mxser_get_must_hwid [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: cleanup Gpci_uart_info struct [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: integrate mxser.h into .c [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: drop ISA support [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: use goto-failpaths in gsm_init [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: mxser: drop low-latency workaround [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: check error while registering tty devices [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: mxser: fix TIOCSSERIAL jiffies conversions [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm, remove duplicates of parameters [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: do not check tty_unregister_driver"s return value [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: nozomi, remove init/exit messages [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty_port: drop last traces of low_latency [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Demote obvious abuse of kernel-doc and supply other missing docss [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm, eliminate indirection for gsm-gt;{output,error} [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Fix bogus i++ in gsm_data_kick [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Remove unnecessary test in gsm_print_packet [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Fix waking up upper tty layer when room available [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Fix SOF skipping [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Improve debug output [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: switch constipated to bool [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: switch throttled to bool [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: switch dead to bool [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: introduce enum gsm_dlci_mode [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: introduce enum gsm_dlci_state [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: drop unneeded gsm_dlci-gt;fifo field [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Replace zero-length array with flexible-array member [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: avoid recursive locking with async port hangup [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: add helpers to convert mux-num to/from tty-base [RHEL-19954 RHEL-19955] {CVE-2023-6546} - docs: serial: move it to the driver-api [RHEL-19954 RHEL-19955] {CVE-2023-6546} - docs: serial: convert docs to ReST and rename to *.rst [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Mark expected switch fall-throughs [RHEL-19954 RHEL-19955] {CVE-2023-6546} - n_gsm: Constify u8 and unsigned char usage [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty: n_gsm: Add copy_config and gsm_config to prepare for serdev [RHEL-19954 RHEL-19955] {CVE-2023-6546} - mxser: switch to -gt;[sg]et_serial [RHEL-19954 RHEL-19955] {CVE-2023-6546} - amiserial: switch to -gt;[sg]et_serial [RHEL-19954 RHEL-19955] {CVE-2023-6546} - tty/serial_core: add ISO7816 infrastructure [RHEL-19954 RHEL-19955] {CVE-2023-6546} [4.18.0-513.22.1.el8_9] - s390/qeth: Fix vipa deletion [RHEL-25811 RHEL-11194] - smsc95xx: fix stalled rx after link change [RHEL-25719 RHEL-22312] - ceph: don"t let check_caps skip sending responses for revoke msgs [RHEL-20909 RHEL-16412] - ceph: issue a cap release immediately if no cap exists [RHEL-20909 RHEL-16412] - ceph: trigger to flush the buffer when making snapshot [RHEL-20909 RHEL-16412] - ceph: force updating the msg pointer in non-split case [RHEL-20909 RHEL-16412] - ceph: flush cap releases when the session is flushed [RHEL-20909 RHEL-16412] - ceph: reorder fields in "struct ceph_snapid_map" [RHEL-20909 RHEL-16412] - ceph: voluntarily drop Xx caps for requests those touch parent mtime [RHEL-20909 RHEL-16412] - KVM: x86: Constrain guest-supported xfeatures only at KVM_GET_XSAVE{2} [RHEL-23063 RHEL-7558] - x86/fpu: Allow caller to constrain xfeatures when copying to uabi buffer [RHEL-23063 RHEL-7558] - dm-crypt, dm-verity: disable tasklets [RHEL-26101 RHEL-22232] - dm verity: initialize fec io before freeing it [RHEL-26101 RHEL-22232] - dm-verity: don"t use blocking calls from tasklets [RHEL-26101 RHEL-22232] [4.18.0-513.21.1.el8_9] - rbd: don"t move requests to the running list on errors [RHEL-24204 RHEL-21941] - drm/amdgpu: Fix potential fence use-after-free v2 [RHEL-24479 RHEL-22504] {CVE-2023-51042} - perf: Fix perf_event_validate_size lockdep splat [RHEL-22930 RHEL-17968] {CVE-2023-6931} - perf: Fix perf_event_validate_size [RHEL-22930 RHEL-17968] {CVE-2023-6931} - smb: client: fix OOB in receive_encrypted_standard [RHEL-22077 RHEL-21685] {CVE-2024-0565} - ibmveth: Remove condition to recompute TCP header checksum. [RHEL-20822 RHEL-12553] [4.18.0-513.20.1.el8_9] - drm/vmwgfx: Fix possible null pointer derefence with invalid contexts [RHEL-22766 RHEL-3179] {CVE-2022-38096} - drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE [RHEL-21055 RHEL-21054] [4.18.0-513.19.1.el8_9] - libceph: fix potential use-after-free on linger ping and resends [RHEL-21394 RHEL-20390] - netfilter: nf_tables: reject QUEUE/DROP verdict parameters [RHEL-24010 RHEL-23506] {CVE-2024-1086}

Platform:
Oracle Linux 8
Product:
kernel
bpftool
perf
python3-perf
Reference:
ELSA-2024-1607
CVE-2021-33631
CVE-2022-38096
CVE-2023-6546
CVE-2023-6931
CVE-2023-51042
CVE-2024-0565
CVE-2024-1086
CVE    7
CVE-2023-6931
CVE-2022-38096
CVE-2021-33631
CVE-2023-51042
...

© SecPod Technologies