[ELSA-2022-9260] Unbreakable Enterprise kernel security update
[4.1.12-124.61.2]
- exec, elf: ignore invalid note data (Anthony Yznaga) [Orabug: 34023956]
[4.1.12-124.61.1]
- drm/i915: Flush TLBs before releasing backing store (Tvrtko Ursulin) [Orabug: 33835812] {CVE-2022-0330}
- drm/i915: Reduce locking in execlist command submission (Chris Wilson) [Orabug: 33835812] {CVE-2022-0330}
- ipv4: make exception cache less predictible (Eric Dumazet) [Orabug: 33894531] {CVE-2021-20322}
- route: also update fnhe_genid when updating a route cache (Xin Long) [Orabug: 33894531] {CVE-2021-20322}
- ipv4: avoid using shared IP generator for connected sockets (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- sctp: add vtag check in sctp_sf_violation (Xin Long) [Orabug: 33924717] {CVE-2021-3772}
- sctp: use init_tag from inithdr for ABORT chunk (Xin Long) [Orabug: 33924717] {CVE-2021-3772}
- sr9700: sanity check for packet length (Oliver Neukum) [Orabug: 33962995] {CVE-2022-26966}
- ID
- ELSA-2022-9260
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-9260.html
- Published
-
2022-04-05T00:00:00
(2 years ago) - Modified
-
2022-04-05T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2022-1571
- ALAS-2023-1688
- ALAS2-2021-1727
- ALAS2-2022-1761
- ALSA-2022:0825
- ALSA-2022:1988
- ALSA-2022:7683
- ALSA-2022:8267
- DSA-5092-1
- DSA-5096-1
- ELSA-2022-0620
- ELSA-2022-0825
- ELSA-2022-1988
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9761
- FEDORA-2021-a093973910
- FEDORA-2022-48acd4718d
- FEDORA-2022-a39015bec2
- MS:CVE-2021-3772
- MS:CVE-2022-0330
- MS:CVE-2022-26966
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2021:3941-1
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- openSUSE-SU-2022:1039-1
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RLSA-2022:1988
- RLSA-2022:7683
- RLSA-2022:819
- SSA:2022-031-01
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3877-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3941-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2021:3979-1
- SUSE-SU-2021:3992-1
- SUSE-SU-2021:4021-1
- SUSE-SU-2021:4038-1
- SUSE-SU-2021:4057-1
- SUSE-SU-2021:4075-1
- SUSE-SU-2021:4090-1
- SUSE-SU-2021:4099-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1270-1
- SUSE-SU-2022:1283-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1569-1
- SUSE-SU-2022:1575-1
- SUSE-SU-2022:1580-1
- SUSE-SU-2022:1589-1
- SUSE-SU-2022:1591-1
- SUSE-SU-2022:1605-1
- SUSE-SU-2022:1637-1
- SUSE-SU-2022:1640-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3061-1
- SUSE-SU-2022:3064-1
- SUSE-SU-2022:3072-1
- SUSE-SU-2022:3088-1
- SUSE-SU-2022:3108-1
- SUSE-SU-2022:3123-1
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:4617-1
- USN-5165-1
- USN-5265-1
- USN-5268-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5362-1
- USN-5381-1
- USN-5417-1
- USN-5418-1
- USN-5466-1
- USN-5467-1
- USN-5505-1
- USN-5513-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-9260 | https://linux.oracle.com/errata/ELSA-2022-9260.html | |
CVE | CVE-2022-0330 | https://linux.oracle.com/cve/CVE-2022-0330.html | |
CVE | CVE-2020-36516 | https://linux.oracle.com/cve/CVE-2020-36516.html | |
CVE | CVE-2021-20322 | https://linux.oracle.com/cve/CVE-2021-20322.html | |
CVE | CVE-2021-3772 | https://linux.oracle.com/cve/CVE-2021-3772.html | |
CVE | CVE-2022-26966 | https://linux.oracle.com/cve/CVE-2022-26966.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.61.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.61.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.61.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.61.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.61.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.61.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.61.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.61.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.61.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.61.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.61.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.61.2.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |