[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2022-10081 -- Oracle kernel-uek-container

ID: oval:org.secpod.oval:def:1506301Date: (C)2022-12-13   (M)2024-05-22
Class: PATCHFamily: unix




[5.4.17-2136.314.6.2.el7] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el7] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to destroy_uobj [Orabug: 34859614] - RDMA/uverbs: Do not discard the IB_EVENT_DEVICE_FATAL event [Orabug: 34859614] - Adding a new sysfs entry point -- forcepower -- to /sys/bus/pci/slots/X. [Orabug: 34859609] - nvme: paring quiesce/unquiesce [Orabug: 34859609] - nvme: prepare for pairing quiescing and unquiescing [Orabug: 34859609] - nvme: apply nvme API to quiesce/unquiesce admin queue [Orabug: 34859609] - nvme: add APIs for stopping/starting admin queue [Orabug: 34859609] - nvme-fc: remove freeze/unfreeze around update_nr_hw_queues [Orabug: 34859609] - nvme-fc: avoid race between time out and tear down [Orabug: 34859609] - nvme-fc: update hardware queues before using them [Orabug: 34859609] - nvme-fabrics: reject I/O to offline device [Orabug: 34859609] - nvme-fc: wait for queues to freeze before calling update_hr_hw_queues [Orabug: 34859609] [5.4.17-2136.314.6.el7] - RDMA/mlx5: Change debug log level for remote access error syndromes [Orabug: 34798452] - KVM: x86: Don"t inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID [Orabug: 34160613] - KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated [Orabug: 34160613] - KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target [Orabug: 34160613] - KVM: SVM: Flush the "current" TLB when activating AVIC [Orabug: 34160613] - KVM: x86: Purge "highest ISR" cache when updating APICv state [Orabug: 34160613] - KVM: SVM: Add AVIC doorbell tracepoint [Orabug: 34160613] - KVM: x86: Warning APICv inconsistency only when vcpu APIC mode is valid [Orabug: 34160613] - KVM: SVM: Introduce hybrid-AVIC mode [Orabug: 34160613] - KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu [Orabug: 34160613] - KVM: SVM: Introduce logic to activate x2AVIC mode [Orabug: 34160613] - KVM: SVM: Refresh AVIC configuration when changing APIC mode [Orabug: 34160613] - KVM: x86: Deactivate APICv on vCPU with APIC disabled [Orabug: 34160613] - KVM: SVM: Do not virtualize MSR accesses for APIC LVTT register [Orabug: 34160613] - KVM: SVM: Fix x2APIC MSRs interception [Orabug: 34160613] - KVM: SVM: Adding support for configuring x2APIC MSRs interception [Orabug: 34160613] - KVM: SVM: Do not support updating APIC ID when in x2APIC mode [Orabug: 34160613] - KVM: SVM: Compute dest based on sender"s x2APIC status for AVIC kick [Orabug: 34160613] - KVM: SVM: Update avic_kick_target_vcpus to support 32-bit APIC ID [Orabug: 34160613] - KVM: SVM: Update max number of vCPUs supported for x2AVIC mode [Orabug: 34160613] - KVM: SVM: Detect X2APIC virtualization support [Orabug: 34160613] - KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/SET]_XAPIC_DEST_FIELD [Orabug: 34160613] - x86/cpufeatures: Introduce x2AVIC CPUID bit [Orabug: 34160613] - KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps [Orabug: 34160613] - KVM: x86: Bug the VM if an accelerated x2APIC trap occurs on a "bad" reg [Orabug: 34160613] - KVM: x86: Do not block APIC write for non ICR registers [Orabug: 34160613] - KVM: x86: Add support for vICR APIC-write VM-Exits in x2APIC mode [Orabug: 34160613] - KVM: x86: disable preemption while updating apicv inhibition [Orabug: 34160613] - KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast [Orabug: 34160613] - KVM: x86: SVM: fix avic_kick_target_vcpus_fast [Orabug: 34160613] - KVM: x86: SVM: remove avic"s broken code that updated APIC ID [Orabug: 34160613] - KVM: x86: Don"t inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled [Orabug: 34160613] - KVM: x86: inhibit APICv/AVIC on changes to APIC ID or APIC base [Orabug: 34160613] - KVM: x86: document AVIC/APICv inhibit reasons [Orabug: 34160613] - KVM: x86: SVM: allow to force AVIC to be enabled [Orabug: 34160613] - KVM: SVM: Introduce trace point for the slow-path of avic_kic_target_vcpus [Orabug: 34160613] - KVM: SVM: Use target APIC ID to complete AVIC IRQs when possible [Orabug: 34160613] - KVM: SVM: Do not activate AVIC for SEV-enabled guest [Orabug: 34160613] - KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race [Orabug: 34160613] - KVM: x86: Trace all APICv inhibit changes and capture overall status [Orabug: 34160613] - KVM: x86: Add wrappers for setting/clearing APICv inhibits [Orabug: 34160613] - KVM: x86: Make APICv inhibit reasons an enum and cleanup naming [Orabug: 34160613] - KVM: SVM: fix panic on out-of-bounds guest IRQ [Orabug: 34160613] - KVM: SVM: Allow AVIC support on system w/ physical APIC ID

Platform:
Oracle Linux 8
Oracle Linux 7
Product:
kernel-uek-container
Reference:
ELSA-2022-10081
CVE-2022-2602
CVE-2022-3565
CVE-2022-4378
CVE    3
CVE-2022-4378
CVE-2022-3565
CVE-2022-2602

© SecPod Technologies