Download
| Alert*
oval:org.secpod.oval:def:62918
kernel-uek 5.x is installed oval:org.secpod.oval:def:1504634 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1504637 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1506141 [5.4.17-2136.313.6.el8uek] - Uninitialized variable image_ext in fixup_vdso_exception of extable.c [Orabug: 33000550] - NFSD: fix use-after-free on source server when doing inter-server copy [Orabug: 34475857] oval:org.secpod.oval:def:1506719 [5.4.17-2136.321.4] - tick/common: Align tick period during sched_timer setup [Orabug: 35520079] - net/rds: Fix endless rds_send_xmit loop if cp_index oval:org.secpod.oval:def:1506968 [5.4.17-2136.321.4.el7uek] - tick/common: Align tick period during sched_timer setup oval:org.secpod.oval:def:1506969 [5.4.17-2136.321.4.el8uek] - tick/common: Align tick period during sched_timer setup [Orabug: 35520079] - net/rds: Fix endless rds_send_xmit loop if cp_index 0 [Orabug: 35510149] [5.4.17-2136.321.3.el8uek] - selinux: don"t use make"s grouped targets feature yet - lib: cpu_rmap: Fix potential use ... oval:org.secpod.oval:def:1506137 [5.4.17-2136.313.6.el7uek] - Uninitialized variable image_ext in fixup_vdso_exception of extable.c [Orabug: 33000550] - NFSD: fix use-after-free on source server when doing inter-server copy [Orabug: 34475857] oval:org.secpod.oval:def:1506421 [5.4.17-2136.316.7.el7uek] - runtime revert of virtio_net: Stripe queue affinities across cores. [Orabug: 35001045] [5.4.17-2136.316.6.el7uek] - block: Change the granularity of io ticks from ms to ns oval:org.secpod.oval:def:1506423 [5.4.17-2136.316.7.el8uek] - runtime revert of virtio_net: Stripe queue affinities across cores. [Orabug: 35001045] [5.4.17-2136.316.6.el8uek] - block: Change the granularity of io ticks from ms to ns oval:org.secpod.oval:def:1505934 [5.4.17-2136.310.7.el7uek] - net_sched: cls_route: remove from list when handle is 0 [Orabug: 34480880] {CVE-2022-2588} - x86/spec_ctrl: limit IBRS_FW to retpoline only [Orabug: 34450896] - x86/bugs: display dynamic retbleed state [Orabug: 34450896] - x86/bugs: remove incorrect __init/__ro_after_ ... oval:org.secpod.oval:def:1505936 [5.4.17-2136.310.7.el8uek] - net_sched: cls_route: remove from list when handle is 0 [Orabug: 34480880] {CVE-2022-2588} - x86/spec_ctrl: limit IBRS_FW to retpoline only [Orabug: 34450896] - x86/bugs: display dynamic retbleed state [Orabug: 34450896] - x86/bugs: remove incorrect __init/__ro_after_ ... oval:org.secpod.oval:def:1506312 [5.4.17-2136.314.6.2.el8uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el8uek] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to des ... oval:org.secpod.oval:def:1506310 [5.4.17-2136.314.6.2.el7uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el7uek] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to des ... oval:org.secpod.oval:def:1506327 [5.15.0-5.76.5.1] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883037] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883037] {CVE-2022-4378} [5.15.0-5.76.5] - KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit ... oval:org.secpod.oval:def:1506337 [5.4.17-2136.315.5.el7uek] - Revert xfs: Lower CIL flush limit for large logs [Orabug: 34917369] - Revert xfs: Throttle commits on delayed background CIL push [Orabug: 34917369] - Revert xfs: fix use-after-free on CIL context on shutdown [Orabug: 34917369] [5.4.17-2136.315.4.el7uek] - net/mlx5: S ... oval:org.secpod.oval:def:1506339 [5.4.17-2136.315.5.el8uek] - Revert xfs: Lower CIL flush limit for large logs oval:org.secpod.oval:def:1505373 [5.4.17-2136.302.7.2.1.el7uek] - vfs: fs_context: fix up param length parsing in legacy_parse_param [Orabug: 33761451] {CVE-2022-0185} oval:org.secpod.oval:def:1506027 [5.4.17-2136.311.6.el7uek] - Revert KVM: x86: Print error code in exception injection tracepoint iff valid [Orabug: 34535896 oval:org.secpod.oval:def:1506028 [5.15.0-2.52.3.el8uek] - posix-cpu-timers: Cleanup CPU timers before freeing them during exec oval:org.secpod.oval:def:1506029 [5.4.17-2136.311.6.el8uek] - Revert KVM: x86: Print error code in exception injection tracepoint iff valid [Orabug: 34535896] oval:org.secpod.oval:def:1507007 [5.4.17-2136.323.8.1.el8uek] - rds: Fix lack of reentrancy for connection reset with dst addr zero [Orabug: 35713696] {CVE-2023-22024} oval:org.secpod.oval:def:1506033 [5.15.0-2.52.3.el9uek] - posix-cpu-timers: Cleanup CPU timers before freeing them during exec oval:org.secpod.oval:def:1505421 [5.4.17-2136.302.7.2.1] - vfs: fs_context: fix up param length parsing in legacy_parse_param [Orabug: 33761451] {CVE-2022-0185} oval:org.secpod.oval:def:1505821 [5.4.17-2136.309.5] - lockdown: Fix kexec lockdown bypass with ima policy [Orabug: 34386637] {CVE-2022-21505} oval:org.secpod.oval:def:1506635 [5.4.17-2136.320.7] - selftests: fib_tests: mute cleanup error message - KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode [Orabug: 35449815] - KVM: arm64: Filter out v8.1+ events on v8.0 HW [Orabug: 35449815] - KVM: arm64: Add kvm_vcpu_has_pmu helper [Orabug: 35 ... oval:org.secpod.oval:def:1507009 [5.4.17-2136.323.8.1.el7uek] - rds: Fix lack of reentrancy for connection reset with dst addr zero [Orabug: 35713696] {CVE-2023-22024} oval:org.secpod.oval:def:1505559 [5.4.17-2136.305.5.5.el8uek] - KVM: x86/mmu: do compare-and-exchange of gPTE via the user address [Orabug: 34034594] {CVE-2022-1158} oval:org.secpod.oval:def:1505636 [5.4.17-2136.307.3.2.el7uek] - perf: Fix sys_perf_event_open race against self [Orabug: 34172709] {CVE-2022-1729} oval:org.secpod.oval:def:1505557 [5.4.17-2136.305.5.5.el7uek] - KVM: x86/mmu: do compare-and-exchange of gPTE via the user address [Orabug: 34034594] {CVE-2022-1158} oval:org.secpod.oval:def:1505637 [5.4.17-2136.307.3.2.el8uek] - perf: Fix sys_perf_event_open race against self [Orabug: 34172709] {CVE-2022-1729} oval:org.secpod.oval:def:1505443 [5.4.17-2136.302.7.2] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33699625] {CVE-2021-4155} [5.4.17-2136.302.7.1] - fget: check that the fd still exists after getting a ref to it [Orabug: 33691332] {CVE-2021-0920} [5.4.17-2136.302.7] - rds: ib: Reduce the con ... oval:org.secpod.oval:def:1505846 [5.4.17-2136.309.5.el7uek] - lockdown: Fix kexec lockdown bypass with ima policy [Orabug: 34386637] {CVE-2022-21505} oval:org.secpod.oval:def:1505844 [5.4.17-2136.309.5.el8uek] - lockdown: Fix kexec lockdown bypass with ima policy [Orabug: 34386637] {CVE-2022-21505} oval:org.secpod.oval:def:1505050 [5.4.17-2102.204.4.2.el7uek] - rds/ib: quarantine STALE mr before dereg [Orabug: 33150447] [5.4.17-2102.204.4.1.el7uek] - rds/ib: update mr incarnation after forming inv wr [Orabug: 33177348] - rds/ib: avoid dereg of mr in frwr_clean [Orabug: 33150427] - arm64: mm: kdump: Fix /proc/kcore [Orabug ... oval:org.secpod.oval:def:1505453 [5.4.17-2136.304.4.1] - Revert rds/ib: Kernel upgrade to rds_ib_conns info displayed by rds-info [Orabug: 33832625] - cgroup-v1: Require capabilities to set release_agent [Orabug: 33832582] {CVE-2022-0492} [5.4.17-2136.304.4] - scsi: libiscsi: Fix iscsi_task use after free [Orabug: 33794250] - sc ... oval:org.secpod.oval:def:1505026 [5.4.17-2102.203.6.el7uek] - seq_file: disallow extremely large seq buffer allocations [Orabug: 33135632] {CVE-2021-33909} oval:org.secpod.oval:def:1505031 [5.4.17-2102.203.6.el8uek] - seq_file: disallow extremely large seq buffer allocations [Orabug: 33135632] {CVE-2021-33909} oval:org.secpod.oval:def:1505079 [5.4.17-2102.204.4.3.el7uek] - KVM: nSVM: always intercept VMLOAD/VMSAVE when nested [Orabug: 33205365] {CVE-2021-3656} {CVE-2021-3656} - KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl [Orabug: 33205443] {CVE-2021-3653} {CVE-2021-3653} oval:org.secpod.oval:def:1505047 [5.4.17-2102.204.4.2.el8uek] - rds/ib: quarantine STALE mr before dereg [Orabug: 33150447] [5.4.17-2102.204.4.1.el8uek] - rds/ib: update mr incarnation after forming inv wr [Orabug: 33177348] - rds/ib: avoid dereg of mr in frwr_clean [Orabug: 33150427] - arm64: mm: kdump: Fix /proc/kcore [Orabug ... oval:org.secpod.oval:def:1504624 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1504625 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1504708 [5.4.17-2036.104.4.el8uek] - KVM: arm64: guest context in x18 instead of x29 [Orabug: 32545182] [5.4.17-2036.104.3.el8uek] - config: enable CONFIG_MLX5_MPFS [Orabug: 32249042] - net: Fix bridge enslavement failure [Orabug: 32503298] - inet: do not call sublist_rcv on empty list [Orabug: 32512814 ... oval:org.secpod.oval:def:1504590 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1503064 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1503063 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1504711 [5.4.17-2036.104.4.el7uek] - KVM: arm64: guest context in x18 instead of x29 [Orabug: 32545182] [5.4.17-2036.104.3.el7uek] - config: enable CONFIG_MLX5_MPFS [Orabug: 32249042] - net: Fix bridge enslavement failure [Orabug: 32503298] - inet: do not call sublist_rcv on empty list [Orabug: 32512814 ... oval:org.secpod.oval:def:1504599 [5.4.17-2036.102.0.2uek] - xen-blkback: set ring- oval:org.secpod.oval:def:70440 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1503042 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1503044 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1503016 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1507145 [5.4.17-2136.325.5.el8uek] - perf symbols: Symbol lookup with kcore can fail if multiple segments match stext [Orabug: 35905508] - char: misc: Increase the maximum number of dynamic misc devices to 1048448 [Orabug: 35905508] - perf/arm-cmn: Fix invalid pointer when access dtc object sharing the sa ... oval:org.secpod.oval:def:1507146 [5.4.17-2136.325.5.el7uek] - perf symbols: Symbol lookup with kcore can fail if multiple segments match stext [Orabug: 35905508] - char: misc: Increase the maximum number of dynamic misc devices to 1048448 [Orabug: 35905508] - perf/arm-cmn: Fix invalid pointer when access dtc object sharing the sa ... oval:org.secpod.oval:def:1506519 [5.4.17-2136.318.7.1.el7uek] - KVM: arm64: Disabling disabled PMU counters wastes a lot of time [Orabug: 33312587] - KVM: arm64: Don"t zero the cycle count register when PMCR_EL0.P is set oval:org.secpod.oval:def:1506515 [5.4.17-2136.318.7.1.el8uek] - KVM: arm64: Disabling disabled PMU counters wastes a lot of time [Orabug: 33312587] - KVM: arm64: Don"t zero the cycle count register when PMCR_EL0.P is set |