[ELSA-2022-9088] Unbreakable Enterprise kernel security update
[4.1.12-124.60.1]
- xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (Darrick J. Wong) [Orabug: 33699627] [Orabug: 33762471] {CVE-2021-4155}
- fix regression in 'epoll: Keep a reference on files added to the check list' (Al Viro) [Orabug: 33679854] [Orabug: 33762505] {CVE-2021-1048} {CVE-2021-1048}
- Bluetooth: fix use-after-free error in lock_sock_nested() (Wang ShaoBo) [Orabug: 33406421] {CVE-2021-3752}
- vt_kdsetmode: extend console locking (Linus Torvalds) [Orabug: 33406445] {CVE-2021-3753}
- Bluetooth: SMP: Fail if remote and local public keys are identical (Luiz Augusto von Dentz) [Orabug: 33556779] {CVE-2021-0129}
- Bluetooth: use constant time memory comparison for secret values (Jason A. Donenfeld) [Orabug: 33556779] {CVE-2021-0129}
- Bluetooth: Add bt_dev logging macros (Loic Poulain) [Orabug: 33556779] {CVE-2021-0129}
- ovl: fix missing negative dentry check in ovl_rename() (Zheng Liang) [Orabug: 33694378] {CVE-2021-20321}
- ID
- ELSA-2022-9088
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-9088.html
- Published
-
2022-02-01T00:00:00
(2 years ago) - Modified
-
2022-02-01T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1563
- ALAS-2023-1688
- ALAS2-2021-1685
- ALAS2-2021-1704
- ALAS2-2021-1719
- ALAS2-2022-1749
- ALSA-2021:4356
- ALSA-2021:5227
- ALSA-2022:0188
- ALSA-2022:1988
- ALSA-2024:3138
- ASB-A-204573007
- CISA-2022:0523
- DSA-4951-1
- DSA-4978-1
- DSA-5050-1
- DSA-5096-1
- ELSA-2021-4356
- ELSA-2021-5227
- ELSA-2022-0188
- ELSA-2022-0620
- ELSA-2022-1988
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9781
- ELSA-2024-3138
- GLSA-202209-16
- MS:CVE-2021-20321
- MS:CVE-2021-4155
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:2184-1
- openSUSE-SU-2021:2202-1
- openSUSE-SU-2021:2291-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3876-1
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2021:5227
- RHSA-2021:5241
- RHSA-2022:0176
- RHSA-2022:0188
- RHSA-2022:0232
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2021:4356
- RLSA-2022:176
- RLSA-2022:1988
- RLSA-2024:3138
- SSA:2021-202-01
- SSA:2022-031-01
- SUSE-SU-2021:2184-1
- SUSE-SU-2021:2202-1
- SUSE-SU-2021:2291-1
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3684-1
- SUSE-SU-2021:3710-1
- SUSE-SU-2021:3735-1
- SUSE-SU-2021:3737-1
- SUSE-SU-2021:3738-1
- SUSE-SU-2021:3751-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3687-1
- SUSE-SU-2022:3691-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2948-1
- USN-5017-1
- USN-5018-1
- USN-5046-1
- USN-5050-1
- USN-5113-1
- USN-5115-1
- USN-5117-1
- USN-5136-1
- USN-5137-1
- USN-5137-2
- USN-5208-1
- USN-5209-1
- USN-5210-1
- USN-5218-1
- USN-5265-1
- USN-5267-1
- USN-5267-3
- USN-5268-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5299-1
- USN-5343-1
- USN-5362-1
- USN-5505-1
- USN-5513-1
- USN-5884-1
- USN-5926-1
- USN-6221-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-9088 | https://linux.oracle.com/errata/ELSA-2022-9088.html | |
CVE | CVE-2021-0129 | https://linux.oracle.com/cve/CVE-2021-0129.html | |
CVE | CVE-2021-3752 | https://linux.oracle.com/cve/CVE-2021-3752.html | |
CVE | CVE-2021-3753 | https://linux.oracle.com/cve/CVE-2021-3753.html | |
CVE | CVE-2021-20321 | https://linux.oracle.com/cve/CVE-2021-20321.html | |
CVE | CVE-2021-1048 | https://linux.oracle.com/cve/CVE-2021-1048.html | |
CVE | CVE-2021-4155 | https://linux.oracle.com/cve/CVE-2021-4155.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.60.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.60.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.60.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.60.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.60.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.60.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.60.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.60.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.60.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.60.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.60.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.60.1.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |