[ELSA-2022-0620] kernel security and bug fix update
[3.10.0-1160.59.1.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)
[3.10.0-1160.59.1]
- Revert 'Merge: Fix tasks stuck in IO waiting for buffer_head lock' (Rado Vrbovsky) [2030609]
[3.10.0-1160.58.1]
- Bluetooth: fix use-after-free error in lock_sock_nested() (Gopal Tiwari) [2005687]
- drm/vmwgfx: Fix stale file descriptors on failed usercopy (Dave Airlie) [2047597] {CVE-2022-22942}
[3.10.0-1160.57.1]
- fix regression in 'epoll: Keep a reference on files added to the check list' (Carlos Maiolino) [2042760] {CVE-2020-0466}
- epoll: Keep a reference on files added to the check list (Carlos Maiolino) [2042760] {CVE-2020-0466}
- drm/i915: Flush TLBs before releasing backing store (Dave Airlie) [2044319] {CVE-2022-0330}
[3.10.0-1160.56.1]
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (Kamal Heib) [1984070]
- af_unix: fix garbage collect vs MSG_PEEK (William Zhao) [2031970] {CVE-2021-0920}
- selinux: fix race condition when computing ocontext SIDs (Ondrej Mosnacek) [2040196]
- Bluetooth: fix the erroneous flush_work() order (Chris von Recklinghausen) [1964556] {CVE-2021-3564}
[3.10.0-1160.55.1]
- SUNRPC: Fix null rpc_clnt dereference in rpc_task_queued tracepoint (Benjamin Coddington) [2039508]
- buffer: eliminate the need to call free_more_memory() in __getblk_slow() (Carlos Maiolino) [2030609]
- buffer: grow_dev_page() should use __GFP_NOFAIL for all cases (Carlos Maiolino) [2030609]
- buffer: have alloc_page_buffers() use __GFP_NOFAIL (Carlos Maiolino) [2030609]
- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (Sabrina Dubroca) [2033561]
- efi: Decode IA32/X64 Context Info structure (Aristeu Rozanski) [1950302]
- efi: Decode IA32/X64 MS Check structure (Aristeu Rozanski) [1950302]
- efi: Decode additional IA32/X64 Bus Check fields (Aristeu Rozanski) [1950302]
- efi: Decode IA32/X64 Cache, TLB, and Bus Check structures (Aristeu Rozanski) [1950302]
- efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs (Aristeu Rozanski) [1950302]
- efi: Decode IA32/X64 Processor Error Info Structure (Aristeu Rozanski) [1950302]
- efi: Decode IA32/X64 Processor Error Section (Aristeu Rozanski) [1950302]
- efi: Fix IA32/X64 Processor Error Record definition (Aristeu Rozanski) [1950302]
- HID: core: Sanitize event code and type when mapping input (Aristeu Rozanski) [1920848] {CVE-2020-0465}
[3.10.0-1160.54.1]
- block: queue lock must be acquired when iterating over rls (Ming Lei) [2029574]
- Bluetooth: use correct lock to prevent UAF of hdev object (Chris von Recklinghausen) [1968211] {CVE-2021-3573}
- xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (Carlos Maiolino) [2034857] {CVE-2021-4155}
- ID
- ELSA-2022-0620
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-0620.html
- Published
-
2022-02-23T00:00:00
(2 years ago) - Modified
-
2022-02-23T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2022-1571
- ALAS-2023-1688
- ALAS2-2021-1685
- ALAS2-2022-1749
- ALAS2-2022-1761
- ALSA-2021:1093
- ALSA-2021:4356
- ALSA-2022:0188
- ALSA-2022:0825
- ALSA-2022:1988
- ASB-A-147802478
- ASB-A-162844689
- ASB-A-196926917
- CISA-2022:0523
- DSA-5050-1
- DSA-5092-1
- DSA-5096-1
- ELSA-2021-1093
- ELSA-2021-4356
- ELSA-2021-9215
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9458
- ELSA-2021-9460
- ELSA-2021-9485
- ELSA-2021-9488
- ELSA-2021-9534
- ELSA-2022-0188
- ELSA-2022-0825
- ELSA-2022-1988
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9088
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9260
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9348
- ELSA-2022-9781
- ELSA-2023-12527
- FEDORA-2021-bc2a819bc5
- FEDORA-2021-db2bb87f35
- FEDORA-2022-48acd4718d
- FEDORA-2022-a39015bec2
- MS:CVE-2021-3564
- MS:CVE-2021-4155
- MS:CVE-2022-0330
- openSUSE-SU-2021:0060-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:2305-1
- openSUSE-SU-2021:2352-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- RHSA-2021:1081
- RHSA-2021:1093
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2022:0176
- RHSA-2022:0188
- RHSA-2022:0232
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2021:4356
- RLSA-2022:176
- RLSA-2022:1988
- RLSA-2022:819
- SSA:2021-202-01
- SSA:2022-031-01
- SUSE-SU-2021:0094-1
- SUSE-SU-2021:0095-1
- SUSE-SU-2021:0096-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0108-1
- SUSE-SU-2021:0117-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0362-1
- SUSE-SU-2021:0367-1
- SUSE-SU-2021:0377-1
- SUSE-SU-2021:0408-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2305-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2352-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2021:3361-1
- SUSE-SU-2021:3371-1
- SUSE-SU-2021:3374-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3401-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3440-1
- SUSE-SU-2021:3443-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3459-1
- SUSE-SU-2021:3684-1
- SUSE-SU-2021:3710-1
- SUSE-SU-2021:3735-1
- SUSE-SU-2021:3737-1
- SUSE-SU-2021:3738-1
- SUSE-SU-2021:3751-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0615-1
- SUSE-SU-2022:0619-1
- SUSE-SU-2022:0647-1
- SUSE-SU-2022:0660-1
- SUSE-SU-2022:0667-1
- SUSE-SU-2022:0668-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0996-1
- SUSE-SU-2022:1034-1
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1172-1
- SUSE-SU-2022:1189-1
- SUSE-SU-2022:1193-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1212-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1242-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1278-1
- SUSE-SU-2022:1569-1
- SUSE-SU-2022:1575-1
- SUSE-SU-2022:1580-1
- SUSE-SU-2022:1589-1
- SUSE-SU-2022:1591-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1605-1
- SUSE-SU-2022:1637-1
- SUSE-SU-2022:1640-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2561-1
- USN-4912-1
- USN-5015-1
- USN-5044-1
- USN-5045-1
- USN-5046-1
- USN-5050-1
- USN-5265-1
- USN-5267-1
- USN-5267-3
- USN-5268-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5299-1
- USN-5343-1
- USN-5361-1
- USN-5362-1
- USN-5505-1
- USN-5513-1
- USN-5884-1
- USN-5926-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-0620 | https://linux.oracle.com/errata/ELSA-2022-0620.html | |
CVE | CVE-2020-0466 | https://linux.oracle.com/cve/CVE-2020-0466.html | |
CVE | CVE-2020-0465 | https://linux.oracle.com/cve/CVE-2020-0465.html | |
CVE | CVE-2021-3573 | https://linux.oracle.com/cve/CVE-2021-3573.html | |
CVE | CVE-2021-3564 | https://linux.oracle.com/cve/CVE-2021-3564.html | |
CVE | CVE-2021-3752 | https://linux.oracle.com/cve/CVE-2021-3752.html | |
CVE | CVE-2022-0330 | https://linux.oracle.com/cve/CVE-2022-0330.html | |
CVE | CVE-2022-22942 | https://linux.oracle.com/cve/CVE-2022-22942.html | |
CVE | CVE-2021-0920 | https://linux.oracle.com/cve/CVE-2021-0920.html | |
CVE | CVE-2021-4155 | https://linux.oracle.com/cve/CVE-2021-4155.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | oraclelinux | python-perf | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | oraclelinux | perf | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-7 | oraclelinux | kernel | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-7 | oraclelinux | kernel-tools | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-7 | oraclelinux | kernel-tools-libs | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-7 | oraclelinux | kernel-tools-libs-devel | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-7 | oraclelinux | kernel-headers | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-7 | oraclelinux | kernel-doc | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-7 | oraclelinux | kernel-devel | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-7 | oraclelinux | kernel-debug | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-debug-devel | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-7 | oraclelinux | kernel-abi-whitelists | < 3.10.0-1160.59.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-7 | oraclelinux | bpftool | < 3.10.0-1160.59.1.el7 | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |