[ELSA-2022-9667] Unbreakable Enterprise kernel security update
[4.1.12-124.65.1]
- cgroup-v1: Require capabilities to set release_agent (Eric W. Biederman) [Orabug: 33825689] {CVE-2022-0492}
- ocfs2: kill EBUSY from dlmfs_evict_inode (Junxiao Bi) [Orabug: 34091904]
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (Junxiao Bi via Ocfs2-devel) [Orabug: 34091904]
- ocfs2: dlmfs: don't clear USER_LOCK_ATTACHED when destroying lock (Junxiao Bi) [Orabug: 34091904]
- uek: kabi: new kABI symbols by USM and fix kABI files (Saeed Mirzamohammadi) [Orabug: 34233929]
- netfilter: nf_tables: disallow non-stateful expression in sets earlier (Pablo Neira Ayuso) [Orabug: 34247343] {CVE-2022-32250}
- netfilter: nf_tables: fix memory leak if expr init fails (Liping Zhang) [Orabug: 34247343]
- floppy: disable FDRAWCMD by default (Willy Tarreau) [Orabug: 34308428] {CVE-2022-33981}
- ID
- ELSA-2022-9667
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-9667.html
- Published
-
2022-08-02T00:00:00
(2 years ago) - Modified
-
2022-08-02T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2022-1563
- ALAS-2022-1604
- ALAS2-2022-1749
- ALAS2-2022-1813
- ALSA-2022:0825
- ALSA-2022:5819
- DSA-5095-1
- DSA-5096-1
- DSA-5161-1
- DSA-5173-1
- ELSA-2022-0825
- ELSA-2022-4642
- ELSA-2022-5819
- ELSA-2022-9141
- ELSA-2022-9142
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9179
- ELSA-2022-9180
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9781
- MS:CVE-2022-0492
- MS:CVE-2022-32250
- MS:CVE-2022-33981
- openSUSE-SU-2022:0755-1
- openSUSE-SU-2022:0760-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:4642
- RHSA-2022:4644
- RHSA-2022:4655
- RHSA-2022:5214
- RHSA-2022:5216
- RHSA-2022:5232
- RHSA-2022:5236
- RHSA-2022:5249
- RHSA-2022:5267
- RHSA-2022:5819
- RHSA-2022:5834
- RHSA-2022:5839
- RLSA-2022:5819
- RLSA-2022:819
- SSA:2022-067-01
- SSA:2022-237-02
- SUSE-SU-2022:0755-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0760-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:0978-1
- SUSE-SU-2022:0984-1
- SUSE-SU-2022:0991-1
- SUSE-SU-2022:0998-1
- SUSE-SU-2022:1012-1
- SUSE-SU-2022:1035-1
- SUSE-SU-2022:1036-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2214-1
- SUSE-SU-2022:2216-1
- SUSE-SU-2022:2230-1
- SUSE-SU-2022:2239-1
- SUSE-SU-2022:2245-1
- SUSE-SU-2022:2262-1
- SUSE-SU-2022:2268-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2722-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5302-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5362-1
- USN-5368-1
- USN-5377-1
- USN-5514-1
- USN-5518-1
- USN-5539-1
- USN-5560-1
- USN-5560-2
- USN-5564-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-9667 | https://linux.oracle.com/errata/ELSA-2022-9667.html | |
CVE | CVE-2022-0492 | https://linux.oracle.com/cve/CVE-2022-0492.html | |
CVE | CVE-2022-32250 | https://linux.oracle.com/cve/CVE-2022-32250.html | |
CVE | CVE-2022-33981 | https://linux.oracle.com/cve/CVE-2022-33981.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.65.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.65.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.65.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.65.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.65.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.65.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.65.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.65.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.65.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.65.1.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.65.1.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.65.1.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |