[ELSA-2022-10108] Unbreakable Enterprise kernel security update
[4.1.12-124.70.2]
- proc: proc_skip_spaces() shouldn't think it is working on C strings (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378}
- proc: avoid integer type confusion in get_proc_long (Linus Torvalds) [Orabug: 34882781] {CVE-2022-4378}
- netfilter: nf_conntrack_irc: Fix forged IP logic (David Leadbeater) [Orabug: 34872056] {CVE-2022-2663}
- r8152: Rate limit overflow messages (Andrew Gaul) [Orabug: 34719940] {CVE-2022-3594}
- HID: roccat: Fix use-after-free in roccat_read() (Hyunwoo Kim) [Orabug: 34670789] {CVE-2022-41850}
[4.1.12-124.70.1]
- usb: mon: make mmapped memory read only (Tadeusz Struk) [Orabug: 34820828] {CVE-2022-43750}
- sch_sfb: Also store skb len before calling child enqueue (Toke Hoiland-Jorgensen) [Orabug: 34731314] {CVE-2022-3586}
- sch_sfb: Don't assume the skb is still around after enqueueing to child (Toke Hoiland-Jorgensen) [Orabug: 34731314] {CVE-2022-3586}
- sch_sfb: keep backlog updated with qlen (WANG Cong) [Orabug: 34731314]
- ID
- ELSA-2022-10108
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-10108.html
- Published
-
2023-01-03T00:00:00
(20 months ago) - Modified
-
2023-01-03T00:00:00
(20 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1636
- ALAS-2022-1645
- ALAS2-2022-1852
- ALAS2-2022-1876
- ALSA-2023:0951
- ALSA-2023:1566
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:7077
- DSA-5257-1
- ELSA-2022-10065
- ELSA-2022-10071
- ELSA-2022-10072
- ELSA-2022-10073
- ELSA-2022-10078
- ELSA-2022-10079
- ELSA-2022-10080
- ELSA-2022-10081
- ELSA-2023-0951
- ELSA-2023-1091
- ELSA-2023-12006
- ELSA-2023-12007
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-1566
- ELSA-2023-1822
- ELSA-2023-1987
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-6583
- ELSA-2023-7077
- MS:CVE-2022-3586
- MS:CVE-2022-3594
- MS:CVE-2022-41850
- MS:CVE-2022-43750
- MS:CVE-2022-4378
- RHSA-2023:0951
- RHSA-2023:0979
- RHSA-2023:1008
- RHSA-2023:1091
- RHSA-2023:1092
- RHSA-2023:1101
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2023:1987
- RHSA-2023:1988
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:6901
- RHSA-2023:7077
- RLSA-2023:1566
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3584-1
- SUSE-SU-2022:3586-1
- SUSE-SU-2022:3587-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5789-1
- USN-5790-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5793-1
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5799-1
- USN-5803-1
- USN-5809-1
- USN-5814-1
- USN-5815-1
- USN-5831-1
- USN-5832-1
- USN-5851-1
- USN-5853-1
- USN-5854-1
- USN-5860-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5874-1
- USN-5875-1
- USN-5876-1
- USN-5877-1
- USN-5879-1
- USN-5883-1
- USN-5909-1
- USN-5913-1
- USN-5918-1
- USN-5919-1
- USN-5920-1
- USN-5924-1
- USN-5975-1
- USN-5976-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6045-1
- USN-6071-1
- USN-6124-1
- USN-6247-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-10108 | https://linux.oracle.com/errata/ELSA-2022-10108.html | |
CVE | CVE-2022-3586 | https://linux.oracle.com/cve/CVE-2022-3586.html | |
CVE | CVE-2022-3594 | https://linux.oracle.com/cve/CVE-2022-3594.html | |
CVE | CVE-2022-43750 | https://linux.oracle.com/cve/CVE-2022-43750.html | |
CVE | CVE-2022-2663 | https://linux.oracle.com/cve/CVE-2022-2663.html | |
CVE | CVE-2022-41850 | https://linux.oracle.com/cve/CVE-2022-41850.html | |
CVE | CVE-2022-4378 | https://linux.oracle.com/cve/CVE-2022-4378.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.70.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.70.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.70.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.70.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.70.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.70.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.70.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.70.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.70.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.70.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.70.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.70.2.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |