[ELSA-2022-9348] Unbreakable Enterprise kernel security update
[4.1.12-124.62.3]
- fget: check that the fd still exists after getting a ref to it (Linus Torvalds) [Orabug: 33679806] {CVE-2021-0920}
- fs: add fget_many() and fput_many() (Jens Axboe) [Orabug: 33679806]
- af_unix: fix garbage collect vs MSG_PEEK (Miklos Szeredi) [Orabug: 33679806] {CVE-2021-0920}
- net: split out functions related to registering inflight socket files (Jens Axboe) [Orabug: 33679806]
[4.1.12-124.62.2]
- netfilter: nf_tables: initialize registers in nft_do_chain() (Pablo Neira Ayuso) [Orabug: 34012926] {CVE-2022-1016}
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (Nikola Livic) [Orabug: 34020970] {CVE-2021-4157}
[4.1.12-124.62.1]
- Bluetooth: use correct lock to prevent UAF of hdev object (Lin Ma) [Orabug: 33014054] {CVE-2021-3573}
- hugetlbfs: flush TLBs correctly after huge_pmd_unshare (Nadav Amit) [Orabug: 33617221] {CVE-2021-4002}
- udf: Restore i_lenAlloc when inode expansion fails (Jan Kara) [Orabug: 33870269] {CVE-2022-0617}
- udf: Fix NULL ptr deref when converting from inline format (Jan Kara) [Orabug: 33870269] {CVE-2022-0617}
- phonet: refcount leak in pep_sock_accep (Hangyu Hua) [Orabug: 33962762] {CVE-2021-45095}
- btrfs: unlock newly allocated extent buffer after error (Qu Wenruo) [Orabug: 33997139] {CVE-2021-4149}
- quota: correct error number in free_dqentry() (Zhang Yi) [Orabug: 33997256] {CVE-2021-45868}
- quota: check block number when reading the block in quota file (Zhang Yi) [Orabug: 33997256] {CVE-2021-45868}
- af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (Eric Dumazet) [Orabug: 34006847] {CVE-2021-4203}
- ID
- ELSA-2022-9348
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-9348.html
- Published
-
2022-05-03T00:00:00
(2 years ago) - Modified
-
2022-05-03T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2022-1571
- ALAS-2022-1577
- ALAS-2023-1688
- ALAS2-2021-1685
- ALAS2-2021-1727
- ALAS2-2022-1761
- ALAS2-2022-1768
- ALSA-2021:4356
- ALSA-2022:0825
- ALSA-2022:1988
- ALSA-2022:7683
- ALSA-2022:8267
- ASB-A-196926917
- CISA-2022:0523
- DSA-5050-1
- DSA-5095-1
- DSA-5096-1
- DSA-5127-1
- DSA-5173-1
- ELSA-2021-4356
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9458
- ELSA-2021-9460
- ELSA-2021-9485
- ELSA-2021-9488
- ELSA-2022-0620
- ELSA-2022-0825
- ELSA-2022-1988
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9266
- ELSA-2022-9267
- ELSA-2022-9270
- ELSA-2022-9271
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9365
- ELSA-2022-9368
- ELSA-2022-9781
- FEDORA-2021-19ad835cb3
- FEDORA-2021-bc2a819bc5
- FEDORA-2021-db2bb87f35
- MS:CVE-2021-4002
- MS:CVE-2021-4149
- MS:CVE-2021-4157
- MS:CVE-2021-4203
- MS:CVE-2021-45095
- MS:CVE-2021-45868
- MS:CVE-2022-0617
- MS:CVE-2022-1016
- openSUSE-SU-2021:2305-1
- openSUSE-SU-2021:2352-1
- openSUSE-SU-2022:0056-1
- openSUSE-SU-2022:0131-1
- openSUSE-SU-2022:0169-1
- openSUSE-SU-2022:0198-1
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- openSUSE-SU-2022:2549-1
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RLSA-2021:4356
- RLSA-2022:1988
- RLSA-2022:7683
- SSA:2021-202-01
- SSA:2022-031-01
- SSA:2022-129-01
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2305-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2352-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2021:3361-1
- SUSE-SU-2021:3371-1
- SUSE-SU-2021:3374-1
- SUSE-SU-2021:3401-1
- SUSE-SU-2021:3440-1
- SUSE-SU-2021:3443-1
- SUSE-SU-2021:3459-1
- SUSE-SU-2022:0056-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0079-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0131-1
- SUSE-SU-2022:0169-1
- SUSE-SU-2022:0181-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0198-1
- SUSE-SU-2022:0288-1
- SUSE-SU-2022:0289-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0615-1
- SUSE-SU-2022:0619-1
- SUSE-SU-2022:0647-1
- SUSE-SU-2022:0660-1
- SUSE-SU-2022:0667-1
- SUSE-SU-2022:0668-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:0996-1
- SUSE-SU-2022:1034-1
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1270-1
- SUSE-SU-2022:1283-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1322-1
- SUSE-SU-2022:1326-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1335-1
- SUSE-SU-2022:1369-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1453-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:2268-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:2232-1
- USN-5015-1
- USN-5044-1
- USN-5045-1
- USN-5046-1
- USN-5050-1
- USN-5206-1
- USN-5207-1
- USN-5208-1
- USN-5209-1
- USN-5210-1
- USN-5211-1
- USN-5218-1
- USN-5278-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5361-1
- USN-5368-1
- USN-5377-1
- USN-5381-1
- USN-5383-1
- USN-5384-1
- USN-5385-1
- USN-5390-1
- USN-5390-2
- USN-5413-1
- USN-5415-1
- USN-5466-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-9348 | https://linux.oracle.com/errata/ELSA-2022-9348.html | |
CVE | CVE-2021-3573 | https://linux.oracle.com/cve/CVE-2021-3573.html | |
CVE | CVE-2022-1016 | https://linux.oracle.com/cve/CVE-2022-1016.html | |
CVE | CVE-2022-0617 | https://linux.oracle.com/cve/CVE-2022-0617.html | |
CVE | CVE-2021-4002 | https://linux.oracle.com/cve/CVE-2021-4002.html | |
CVE | CVE-2021-4149 | https://linux.oracle.com/cve/CVE-2021-4149.html | |
CVE | CVE-2021-4157 | https://linux.oracle.com/cve/CVE-2021-4157.html | |
CVE | CVE-2021-4203 | https://linux.oracle.com/cve/CVE-2021-4203.html | |
CVE | CVE-2021-45095 | https://linux.oracle.com/cve/CVE-2021-45095.html | |
CVE | CVE-2021-45868 | https://linux.oracle.com/cve/CVE-2021-45868.html | |
CVE | CVE-2021-0920 | https://linux.oracle.com/cve/CVE-2021-0920.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.62.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.62.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.62.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.62.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.62.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.62.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.62.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.62.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.62.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.62.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.62.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.62.3.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |