[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2022-10078 -- Oracle kernel-uek_bpftool

ID: oval:org.secpod.oval:def:1506327Date: (C)2023-01-02   (M)2024-05-22
Class: PATCHFamily: unix




[5.15.0-5.76.5.1] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883037] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883037] {CVE-2022-4378} [5.15.0-5.76.5] - KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit [Orabug: 34817119] - KVM: x86: Don"t inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID [Orabug: 34817119] - KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated [Orabug: 34817119] - KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target [Orabug: 34817119] - KVM: SVM: Flush the "current" TLB when activating AVIC [Orabug: 34817119] - KVM: x86: Purge "highest ISR" cache when updating APICv state [Orabug: 34817119] - iommu/amd: Simplify and Consolidate Virtual APIC Enablement [Orabug: 34817119] - KVM: SVM: Add AVIC doorbell tracepoint [Orabug: 34817119] - KVM: x86: Warning APICv inconsistency only when vcpu APIC mode is valid [Orabug: 34817119] - KVM: SVM: Introduce hybrid-AVIC mode [Orabug: 34817119] - KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu [Orabug: 34817119] - KVM: SVM: Introduce logic to activate x2AVIC mode [Orabug: 34817119] - KVM: SVM: Refresh AVIC configuration when changing APIC mode [Orabug: 34817119] - KVM: x86: Deactivate APICv on vCPU with APIC disabled [Orabug: 34817119] - KVM: SVM: Do not virtualize MSR accesses for APIC LVTT register [Orabug: 34817119] - KVM: SVM: Fix x2APIC MSRs interception [Orabug: 34817119] - KVM: SVM: Adding support for configuring x2APIC MSRs interception [Orabug: 34817119] - KVM: SVM: Do not support updating APIC ID when in x2APIC mode [Orabug: 34817119] - KVM: SVM: Compute dest based on sender"s x2APIC status for AVIC kick [Orabug: 34817119] - KVM: SVM: Update avic_kick_target_vcpus to support 32-bit APIC ID [Orabug: 34817119] - KVM: SVM: Update max number of vCPUs supported for x2AVIC mode [Orabug: 34817119] - KVM: SVM: Detect X2APIC virtualization support [Orabug: 34817119] - KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/SET]_XAPIC_DEST_FIELD [Orabug: 34817119] - x86/cpufeatures: Introduce x2AVIC CPUID bit [Orabug: 34817119] - KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps [Orabug: 34817119] - KVM: x86: Bug the VM if an accelerated x2APIC trap occurs on a "bad" reg [Orabug: 34817119] - KVM: x86: Do not block APIC write for non ICR registers [Orabug: 34817119] - KVM: x86: Add support for vICR APIC-write VM-Exits in x2APIC mode [Orabug: 34817119] - KVM: x86: disable preemption while updating apicv inhibition [Orabug: 34817119] - KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast [Orabug: 34817119] - KVM: x86: SVM: fix avic_kick_target_vcpus_fast [Orabug: 34817119] - KVM: x86: SVM: remove avic"s broken code that updated APIC ID [Orabug: 34817119] - KVM: x86: Don"t inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled [Orabug: 34817119] - KVM: x86: inhibit APICv/AVIC on changes to APIC ID or APIC base [Orabug: 34817119] - KVM: x86: document AVIC/APICv inhibit reasons [Orabug: 34817119] - KVM: x86: SVM: allow to force AVIC to be enabled [Orabug: 34817119] - KVM: SVM: Introduce trace point for the slow-path of avic_kic_target_vcpus [Orabug: 34817119] - KVM: SVM: Use target APIC ID to complete AVIC IRQs when possible [Orabug: 34817119] - KVM: x86: Skip KVM_GUESTDBG_BLOCKIRQ APICv update if APICv is disabled [Orabug: 34817119] - KVM: SVM: Do not activate AVIC for SEV-enabled guest [Orabug: 34817119] - KVM: x86: Trace all APICv inhibit changes and capture overall status [Orabug: 34817119] - KVM: x86: Add wrappers for setting/clearing APICv inhibits [Orabug: 34817119] - KVM: x86: Make APICv inhibit reasons an enum and cleanup naming [Orabug: 34817119] - KVM: SVM: Disable preemption across AVIC load/put during APICv refresh [Orabug: 34817119] - KVM: x86: Treat x2APIC"s ICR as a 64-bit register, not two 32-bit regs [Orabug: 34817119] - KVM: x86: Add helpers to handle 64-bit APIC MSR read/writes [Orabug: 34817119] - KVM: x86: WARN if KVM emulates an IPI without clearing the BUSY flag [Orabug: 34817119] - KVM: SVM: Don"t rewrite guest ICR on AVIC IPI virtualization failure [Orabug: 34817119] - KVM: x86: Use "raw" APIC register read for handling APIC-write VM-Exit [Orabug: 34817119] - KVM: VMX: Handle APIC-write offset wrangling in VMX code [Orabug: 34817119] - KVM: SVM: Rename AVIC helpers to use "avic" prefix instead of "svm" [Orabug: 34817119] - KVM: VMX: Rename VMX functions to conform to kvm_x86_ops names [Orabug: 34817119] - KVM: x86: Rename kvm_x86_ops pointers to align w/ preferred vendor names [Orabug: 34817119] - KVM: x86: Drop export for .tlb_flush_current static_call key [Orabug: 34817119] - KVM: x86: Skip APICv update if APICv is disable at the module level [Orabug: 34817119] - KVM: x86: Unexport __kvm_request_apicv_update [Orabug: 34817119] - KVM: SVM: fix race between interrupt delivery and AVIC inhibition [Orabug: 34817119] - KVM: SVM: set IRR in svm_deliver_interrupt [Orabug: 34817119] - KVM: SVM: extract avic_ring_doorbell [Orabug: 34817119] - KVM: x86: SVM: move avic definitions from AMD"s spec to svm.h [Orabug: 34817119] - KVM: x86: lapic: don"t touch irr_pending in kvm_apic_update_apicv when inhibiting it [Orabug: 34817119] - KVM: x86: Move delivery of non-APICv interrupt into vendor code [Orabug: 34817119] - KVM: SVM: Drop AVIC"s intermediate avic_set_running helper [Orabug: 34817119] - KVM: SVM: Skip AVIC and IRTE updates when loading blocking vCPU [Orabug: 34817119] - KVM: SVM: Use kvm_vcpu_is_blocking in AVIC load to handle preemption [Orabug: 34817119] - KVM: SVM: Remove unnecessary APICv/AVIC update in vCPU unblocking path [Orabug: 34817119] - KVM: SVM: Don"t bother checking for "running" AVIC when kicking for IPIs [Orabug: 34817119] - KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode [Orabug: 34817119] - KVM: x86: add a tracepoint for APICv/AVIC interrupt delivery [Orabug: 34817119] - KVM: Add helpers to wake/query blocking vCPU [Orabug: 34817119] - KVM: SVM: Ensure target pCPU is read once when signalling AVIC doorbell [Orabug: 34817119] - KVM: ensure APICv is considered inactive if there is no APIC [Orabug: 34817119] - KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active [Orabug: 34817119] - KVM: x86: Use rw_semaphore for APICv lock to allow vCPU parallelism [Orabug: 34817119] - KVM: x86: Move SVM"s APICv sanity check to common x86 [Orabug: 34817119] - rds: Remove the cp_rdsinfo_pending flag [Orabug: 34658657] - RDMA/mlx5: Change debug log level for remote access error syndromes [Orabug: 34798451] - uek-rpm: kernel-uek.spec: make -modules-extra depend on -modules [Orabug: 34820756] - Feature: Add cmdline param sched_uek=[preempt,wakeidle] [Orabug: 34779451] - rds: ib: Fix cleanup of rds_ib_cache_gc_worker [Orabug: 34806076] - KVM: nVMX: Add tracepoint for nested VM-Enter [Orabug: 34806794] - KVM: x86: Update trace function for nested VM entry to support VMX [Orabug: 34806794] - KVM: nVMX: Allow VMREAD when Enlightened VMCS is in use [Orabug: 34806794] - KVM: nVMX: Implement evmcs_field_offset suitable for handle_vmread [Orabug: 34806794] - KVM: nVMX: Rename vmcs_to_field_offset{,_table} [Orabug: 34806794] - x86/kvm: Always inline evmcs_write64 [Orabug: 34806794] - RDMA/uverbs: restrack shared PDs [Orabug: 34812520] [5.15.0-5.76.4] - x86: Ignore iommu=off for AMD cpus [Orabug: 34211826] - virtio-net: use mtu size as buffer length for big packets [Orabug: 34756664] - virtio-net: introduce and use helper function for guest gso support checks [Orabug: 34756664] - vdpa/mlx5: Use consistent RQT size [Orabug: 34756664] - vdpa: mlx5: synchronize driver status with CVQ [Orabug: 34756664] - vdpa: support exposing the count of vqs to userspace [Orabug: 34756664] - vdpa: change the type of nvqs to u32 [Orabug: 34756664] - vdpa: support exposing the config size to userspace [Orabug: 34756664] - vdpa/mlx5: re-create forwarding rules after mac modified [Orabug: 34756664] - Add definition of VIRTIO_F_IN_ORDER feature bit [Orabug: 34756664] - vdpa: factor out vdpa_set_features_unlocked for vdpa internal use [Orabug: 34756664] - RDMA/cma: Use output interface for net_dev check [Orabug: 34774007] - Revert "RDMA/cma: Use output interface for net_dev check" [Orabug: 34774007] - Revert "rdmaip: Flush ARP cache after address has been cleared" [Orabug: 34783631] - Revert "sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle" [Orabug: 34807135] [5.15.0-5.76.3] - uek-rpm: Add Documentation to kernel-uek-devel [Orabug: 34734127] - kfence: add sysfs interface to disable kfence for selected slabs. [Orabug: 34744270] - scsi: target: core: Silence the message about unknown VPD pages [Orabug: 34764767] - x86/microcode/AMD: Apply the patch late on every logical thread [Orabug: 34765295] - perf/x86/intel: Hide Topdown metrics events if slots is not enumerated [Orabug: 34771183] [5.15.0-5.76.2] - LTS version: v5.15.76 - mm: /proc/pid/smaps_rollup: fix no vma"s null-deref - mmc: core: Add SD card quirk for broken discard - Makefile.debug: re-enable debug info for .S files - x86/Kconfig: Drop check for -mabi=ms for CONFIG_EFI_STUB - ACPI: video: Force backlight native for more TongFang devices - perf: Skip and warn on unknown format "configN" attrs - mmc: sdhci-tegra: Use actual clock rate for SW tuning correction - tracing: Do not free snapshot if tracer is on cmdline - tracing: Simplify conditional compilation code in tracing_set_tracer - ksmbd: fix incorrect handling of iterate_dir - ksmbd: handle smb2 query dir request for OutputBufferLength that is too small - arm64: mte: move register initialization to C - fs: dlm: fix invalid derefence of sb_lvbptr - iommu/vt-d: Clean up si_domain in the init_dmars error path - iommu/vt-d: Allow NVS regions in arch_rmrr_sanity_check - net: phy: dp83822: disable MDI crossover status change interrupt - net: sched: fix race condition in qdisc_graft - net: hns: fix possible memory leak in hnae_ae_register - wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new - sfc: include vport_id in filter spec hash and equal - net: sched: sfb: fix null pointer access issue when sfb_init fails - net: sched: delete duplicate cleanup of backlog and qlen - net: sched: cake: fix null pointer access issue when cake_init fails - nvmet: fix workqueue MEM_RECLAIM flushing dependency - nvme-hwmon: kmalloc the NVME SMART log buffer - nvme-hwmon: consistently ignore errors from nvme_hwmon_init - netfilter: nf_tables: relax NFTA_SET_ELEM_KEY_END set flags requirements - ionic: catch NULL pointer issue on reconfig - net: hsr: avoid possible NULL deref in skb_clone - dm: remove unnecessary assignment statement in alloc_dev - cifs: Fix xid leak in cifs_ses_add_channel - cifs: Fix xid leak in cifs_flock - cifs: Fix xid leak in cifs_copy_file_range - cifs: Fix xid leak in cifs_create - udp: Update reuse-

Platform:
Oracle Linux 8
Oracle Linux 9
Product:
kernel-uek
bpftool
Reference:
ELSA-2022-10078
CVE-2022-4378
CVE-2022-1184
CVE    2
CVE-2022-4378
CVE-2022-1184
CPE    4
cpe:/o:oracle:kernel-uek:5.x
cpe:/o:oracle:linux:8
cpe:/a:bpf:bpftool
cpe:/o:oracle:linux:9
...

© SecPod Technologies