[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2024-1249 -- Oracle kernel_bpftool_perf_python-perf

ID: oval:org.secpod.oval:def:1507396Date: (C)2024-03-25   (M)2024-04-25
Class: PATCHFamily: unix




[3.10.0-1160.114.2.0.1.el7.OL7] - debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499} [3.10.0-1160.114.2.el7.OL7] - Update Oracle Linux certificates - Oracle Linux RHCK Module Signing Key was compiled into kernel - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 = 15-2.0.9] - Update oracle value to match new certificate [3.10.0-1160.114.2.el7] - sched/membarrier: reduce the ability to hammer on sys_membarrier [RHEL-26402] {CVE-2024-26602} [3.10.0-1160.114.1.el7] - netfilter: nf_tables: reject QUEUE/DROP verdict parameters [RHEL-23500] {CVE-2024-1086} [3.10.0-1160.113.1.el7] - igb: set max size RX buffer when store bad packet is enabled [RHEL-15181] {CVE-2023-45871} - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm [RHEL-2742] {CVE-2022-42896} - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM [RHEL-2742] {CVE-2022-42896} - Bluetooth: Use separate L2CAP LE credit based connection result values [RHEL-2742] {CVE-2022-42896} - Bluetooth: L2CAP: Fix L2CAP_CR_SCID_IN_USE value [RHEL-2742] {CVE-2022-42896} [3.10.0-1160.112.1.el7] - net: sched: sch_qfq: Use non-work-conserving warning handler [RHEL-14397] - net: sched: sch_qfq: Fix UAF in qfq_dequeue [RHEL-14397] {CVE-2023-4921} - cpufreq: Initialize policy-kobj while allocating policy [2161654] - net: bonding: fix possible NULL deref in rlb code [RHEL-17227] - net: bonding: fix use-after-free after 802.3ad slave unbind [RHEL-17227] [3.10.0-1160.111.1.el7] - redhat: rewrite genlog and support Y- tags - scsi: zfcp: Fix double free of FSF request when qdio send fails [RHEL-16335] - fbcon: set_con2fb_map needs to set con2fb_map! [RHEL-1204] {CVE-2023-38409} [3.10.0-1160.110.1.el7] - gfs2: Fix glock recursion on withdraw during recovery [RHEL-17223] [3.10.0-1160.109.1.el7] - x86/speculation: Mark all Skylake CPUs as vulnerable to GDS [RHEL-17703] - scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read directly [2224973] - scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read directly [2224973] - scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read directly [2224973]

Platform:
Oracle Linux 7
Product:
kernel
bpftool
perf
python-perf
Reference:
ELSA-2024-1249
CVE-2022-42896
CVE-2023-4921
CVE-2023-38409
CVE-2023-45871
CVE-2024-1086
CVE-2024-26602
CVE-2022-21499
CVE    7
CVE-2022-42896
CVE-2022-21499
CVE-2023-38409
CVE-2023-45871
...
CPE    5
cpe:/a:python-perf:python-perf
cpe:/a:bpf:bpftool
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
...

© SecPod Technologies