[ELSA-2022-5937] kernel security and bug fix update
[3.10.0-1160.76.1.0.1.OL7]
[debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}
[3.10.0-1160.76.1.OL7]
[Update Oracle Linux certificates (Ilya Okomin)
[Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
[Update x509.genkey [Orabug: 24817676]
[Conflict with shim-ia32 and shim-x64 <= 15-2.0.9
[Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)
[3.10.0-1160.76.1]
[sfc: complete the next packet when we receive a timestamp (Inigo Huguet) [1793280]
[3.10.0-1160.75.1]
[xfs: fix up non-directory creation in SGID directories (Andrey Albershteyn) [2089360]
[x86/speculation/mmio: Print SMT warning (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[KVM: x86/speculation: Disable Fill buffer clear within guests (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/srbds: Update SRBDS mitigation selection (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[cpu/speculation: Add prototype for cpu_show_srbds() (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation: Add a common function for MD_CLEAR mitigation update (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[Documentation: Add documentation for Processor MMIO Stale Data (Rafael Aquini) [2090249] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166}
[[s390] s390/zcrypt: use kvmalloc instead of kmalloc for 256k alloc (Mete Durlu) [2072970]
[3.10.0-1160.74.1]
[tracing: Fix bad use of igrab in trace_uprobe.c (Oleg Nesterov) [2096884]
[3.10.0-1160.73.1]
[qede: Reduce verbosity of ptp tx timestamp (Manish Chopra) [2080646]
[RDMA/cma: Fix unbalanced cm_id reference count during address resolve (Kamal Heib) [2085425]
[3.10.0-1160.72.1]
[sched,perf: Fix periodic timers (Valentin Schneider) [2077346]
[sched: debug: Remove the cfs bandwidth timer_active printout (Valentin Schneider) [2077346]
[sched: Cleanup bandwidth timers (Valentin Schneider) [2077346]
- ID
- ELSA-2022-5937
- Severity
- moderate
- URL
- https://linux.oracle.com/errata/ELSA-2022-5937.html
- Published
-
2022-08-11T00:00:00
(2 years ago) - Modified
-
2022-08-11T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1606
- ALAS2-2022-1813
- ALPINE:CVE-2022-21123
- ALPINE:CVE-2022-21125
- ALPINE:CVE-2022-21166
- ALSA-2022:6460
- ALSA-2022:8267
- DSA-5173-1
- DSA-5178-1
- DSA-5184-1
- ELSA-2022-6460
- ELSA-2022-8267
- ELSA-2022-9481
- ELSA-2022-9482
- ELSA-2022-9483
- ELSA-2022-9484
- ELSA-2022-9485
- ELSA-2022-9486
- ELSA-2022-9507
- ELSA-2022-9508
- ELSA-2022-9670
- FEDORA-2022-177a008b98
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-391e24517d
- FEDORA-2022-925fc688c1
- GLSA-202208-23
- MS:CVE-2022-21123
- MS:CVE-2022-21125
- MS:CVE-2022-21166
- openSUSE-SU-2022:2177-1
- RHSA-2022:5937
- RHSA-2022:5939
- RHSA-2022:6437
- RHSA-2022:6460
- RHSA-2022:7933
- RHSA-2022:8267
- RLSA-2022:6460
- SSA:2022-237-02
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2078-1
- SUSE-SU-2022:2079-1
- SUSE-SU-2022:2080-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2116-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2023:0416-1
- USN-5484-1
- USN-5485-1
- USN-5485-2
- USN-5486-1
- USN-5505-1
- USN-5513-1
- USN-5529-1
- USN-5535-1
- VMSA-2022-0016
- XSA-404
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-5937 | https://linux.oracle.com/errata/ELSA-2022-5937.html | |
CVE | CVE-2022-21123 | https://linux.oracle.com/cve/CVE-2022-21123.html | |
CVE | CVE-2022-21125 | https://linux.oracle.com/cve/CVE-2022-21125.html | |
CVE | CVE-2022-21166 | https://linux.oracle.com/cve/CVE-2022-21166.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python-perf?distro=oraclelinux-7 | oraclelinux | python-perf | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-7 | oraclelinux | perf | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-7 | oraclelinux | kernel | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-7 | oraclelinux | kernel-tools | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-7 | oraclelinux | kernel-tools-libs | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-7 | oraclelinux | kernel-tools-libs-devel | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-7 | oraclelinux | kernel-headers | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-7 | oraclelinux | kernel-doc | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-7 | oraclelinux | kernel-devel | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-7 | oraclelinux | kernel-debug | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-debug-devel | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-whitelists?distro=oraclelinux-7 | oraclelinux | kernel-abi-whitelists | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-7 | oraclelinux | bpftool | < 3.10.0-1160.76.1.0.1.el7 | oraclelinux-7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |