[ELSA-2022-9761] Unbreakable Enterprise kernel security update
[4.1.12-124.66.3]
- fuse: fix pipe buffer lifetime for direct_io (Miklos Szeredi) [Orabug: 33981149] {CVE-2022-1011}
- vt: drop old FONT ioctls (Jiri Slaby) [Orabug: 34408794] {CVE-2021-33656}
- video: of_display_timing.h: include errno.h (Hsin-Yi Wang) [Orabug: 34408910] {CVE-2021-33655}
- fbcon: Disallow setting font bigger than screen size (Helge Deller) [Orabug: 34408910] {CVE-2021-33655}
- scsi: target: Fix WRITE_SAME No Data Buffer crash (Mike Christie) [Orabug: 34419974] {CVE-2022-21546}
- scsi/eh: fix hang adding ehandler wakeups after decrementing host_busy (Gulam Mohamed) [Orabug: 33349684] [Orabug: 34492498]
[4.1.12-124.66.2]
- mm: enforce min addr even if capable() in expand_downwards() (Jann Horn) [Orabug: 29501997] {CVE-2019-9213}
- ACPICA: Reference Counts: increase max to 0x4000 for large servers (Erik Schmauss)
- ipv4: tcp: send zero IPID in SYNACK messages (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- ipv4: Cache net in ip_build_and_send_pkt and ip_queue_xmit (Eric W. Biederman) [Orabug: 33917058] {CVE-2020-36516}
- ipv4: igmp: guard against silly MTU values (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- inet: constify ip_dont_fragment() arguments (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- ip: constify ip_build_and_send_pkt() socket argument (Eric Dumazet) [Orabug: 33917058] {CVE-2020-36516}
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (Eric Biggers) [Orabug: 34433461] {CVE-2020-36557}
- vt: vt_ioctl: fix race in VT_RESIZEX (Eric Dumazet) [Orabug: 34433476] {CVE-2020-36558}
- VT_RESIZEX: get rid of field-by-field copyin (Al Viro) [Orabug: 34433476]
- net_sched: cls_route: remove from list when handle is 0 (Thadeu Lima de Souza Cascardo) [Orabug: 34460939] [Orabug: 34484730] {CVE-2022-2588}
[4.1.12-124.66.1]
- net: fix uninit-value in __hw_addr_add_ex() (Eric Dumazet) [Orabug: 34395887]
- mac80211: silence an uninitialized variable warning (Dan Carpenter) [Orabug: 34396283]
- ID
- ELSA-2022-9761
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2022-9761.html
- Published
-
2022-09-06T00:00:00
(2 years ago) - Modified
-
2022-09-06T00:00:00
(2 years ago) - Rights
- Copyright 2022 Oracle, Inc.
- Other Advisories
-
- ALAS-2019-1179
- ALAS-2022-1591
- ALAS-2022-1636
- ALAS2-2019-1179
- ALAS2-2022-1793
- ALAS2-2022-1833
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2024-2569
- ALSA-2022:1988
- ALSA-2022:7110
- ALSA-2022:7683
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- DSA-5173-1
- DSA-5191-1
- DSA-5207-1
- ELSA-2019-1479
- ELSA-2019-4612
- ELSA-2022-1988
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9260
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9689
- ELSA-2022-9690
- ELSA-2022-9691
- ELSA-2022-9692
- ELSA-2022-9693
- ELSA-2022-9694
- ELSA-2022-9699
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9787
- ELSA-2022-9788
- ELSA-2022-9827
- ELSA-2022-9828
- ELSA-2022-9829
- ELSA-2022-9830
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2024-2004
- FEDORA-2019-196ab64d65
- FEDORA-2019-87e7046631
- FEDORA-2022-484e226872
- FEDORA-2022-9342e59a98
- FEDORA-2022-9bbb1d9b7b
- FEDORA-2022-de4474b89d
- MS:CVE-2021-33655
- MS:CVE-2021-33656
- MS:CVE-2022-1011
- openSUSE-SU-2019:1193-1
- RHSA-2019:1479
- RHSA-2019:1480
- RHSA-2021:1578
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7137
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7344
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2022:1988
- RLSA-2022:7110
- RLSA-2022:7683
- SSA:2019-169-01
- SSA:2022-129-01
- SSA:2022-237-02
- SUSE-SU-2019:0645-1
- SUSE-SU-2019:0672-1
- SUSE-SU-2019:0683-1
- SUSE-SU-2019:0709-1
- SUSE-SU-2019:0722-1
- SUSE-SU-2019:0726-1
- SUSE-SU-2019:0740-1
- SUSE-SU-2019:0745-1
- SUSE-SU-2019:0754-1
- SUSE-SU-2019:0761-1
- SUSE-SU-2019:0765-1
- SUSE-SU-2019:0767-1
- SUSE-SU-2019:0784-1
- SUSE-SU-2019:0785-1
- SUSE-SU-2019:0801-1
- SUSE-SU-2019:0828-1
- SUSE-SU-2019:0845-1
- SUSE-SU-2019:0901-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1322-1
- SUSE-SU-2022:1326-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1335-1
- SUSE-SU-2022:1369-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1453-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1598-1
- SUSE-SU-2022:1611-1
- SUSE-SU-2022:1634-1
- SUSE-SU-2022:1641-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2719-1
- SUSE-SU-2022:2720-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2722-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2803-1
- SUSE-SU-2022:2808-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2827-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3061-1
- SUSE-SU-2022:3064-1
- SUSE-SU-2022:3072-1
- SUSE-SU-2022:3088-1
- SUSE-SU-2022:3108-1
- SUSE-SU-2022:3123-1
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-3930-1
- USN-3930-2
- USN-3931-1
- USN-3931-2
- USN-3932-1
- USN-3932-2
- USN-3933-1
- USN-3933-2
- USN-5381-1
- USN-5467-1
- USN-5515-1
- USN-5541-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5577-1
- USN-5580-1
- USN-5582-1
- USN-5588-1
- USN-5589-1
- USN-5591-1
- USN-5591-2
- USN-5591-3
- USN-5591-4
- USN-5592-1
- USN-5595-1
- USN-5596-1
- USN-5597-1
- USN-5598-1
- USN-5600-1
- USN-5603-1
- USN-5605-1
- USN-5621-1
- USN-5622-1
- USN-5623-1
- USN-5624-1
- USN-5630-1
- USN-5633-1
- USN-5635-1
- USN-5639-1
- USN-5640-1
- USN-5644-1
- USN-5647-1
- USN-5648-1
- USN-5650-1
- USN-5652-1
- USN-5654-1
- USN-5655-1
- USN-5660-1
- USN-5683-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2022-9761 | https://linux.oracle.com/errata/ELSA-2022-9761.html | |
CVE | CVE-2019-9213 | https://linux.oracle.com/cve/CVE-2019-9213.html | |
CVE | CVE-2020-36516 | https://linux.oracle.com/cve/CVE-2020-36516.html | |
CVE | CVE-2022-2588 | https://linux.oracle.com/cve/CVE-2022-2588.html | |
CVE | CVE-2021-33655 | https://linux.oracle.com/cve/CVE-2021-33655.html | |
CVE | CVE-2022-21546 | https://linux.oracle.com/cve/CVE-2022-21546.html | |
CVE | CVE-2021-33656 | https://linux.oracle.com/cve/CVE-2021-33656.html | |
CVE | CVE-2020-36557 | https://linux.oracle.com/cve/CVE-2020-36557.html | |
CVE | CVE-2020-36558 | https://linux.oracle.com/cve/CVE-2020-36558.html | |
CVE | CVE-2022-1011 | https://linux.oracle.com/cve/CVE-2022-1011.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.66.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.66.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.66.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.66.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.66.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.66.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.66.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.66.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.66.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.66.3.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.66.3.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.66.3.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |