[ELSA-2023-12323] Unbreakable Enterprise kernel security update
Severity
Important
Affected Packages
11
CVEs
5
[4.1.12-124.74.2]
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (Greg Kroah-Hartman) [Orabug: 35250098] {CVE-2023-1513}
- staging: rtl8712: fix use after free bugs (Dan Carpenter) [Orabug: 35212876] {CVE-2022-4095}
- staging: rtl8712: rtl8712_cmd.c: fixed comparison to null (Juliana Rodrigues) [Orabug: 35212876] {CVE-2022-4095}
- wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid (Szymon Heidrich) [Orabug: 35037715] {CVE-2023-23559}
[4.1.12-124.74.1]
- seq_buf: Fix overflow in seq_buf_putmem_hex() (Yun Zhou) [Orabug: 35217595] {CVE-2023-28772}
- net: mpls: fix stale pointer if allocation fails during device rename (Jakub Kicinski) [Orabug: 35181964] {CVE-2023-26545}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | < 4.1.12-124.74.2.el7uek |
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | < 4.1.12-124.74.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | < 4.1.12-124.74.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | < 4.1.12-124.74.2.el7uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | < 4.1.12-124.74.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | < 4.1.12-124.74.2.el7uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | < 4.1.12-124.74.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | < 4.1.12-124.74.2.el7uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | < 4.1.12-124.74.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | < 4.1.12-124.74.2.el7uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | < 4.1.12-124.74.2.el6uek |
- ID
- ELSA-2023-12323
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2023-12323.html
- Published
-
2023-05-02T00:00:00
(16 months ago) - Modified
-
2023-05-02T00:00:00
(16 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2023-1701
- ALAS2-2021-1696
- ALAS2-2023-1987
- ALSA-2023:7077
- ALSA-2024:3138
- ELSA-2023-12196
- ELSA-2023-12242
- ELSA-2023-12243
- ELSA-2023-12255
- ELSA-2023-12256
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2024-3138
- MS:CVE-2023-1513
- MS:CVE-2023-23559
- MS:CVE-2023-26545
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2024:3138
- SSA:2022-333-01
- SSA:2023-048-01
- SSA:2023-172-02
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0762-1
- SUSE-SU-2023:0767-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0770-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0778-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:0780-1
- SUSE-SU-2023:0796-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1574-1
- SUSE-SU-2023:1576-1
- SUSE-SU-2023:1579-1
- SUSE-SU-2023:1588-1
- SUSE-SU-2023:1591-1
- SUSE-SU-2023:1592-1
- SUSE-SU-2023:1595-1
- SUSE-SU-2023:1599-1
- SUSE-SU-2023:1602-1
- SUSE-SU-2023:1605-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1619-1
- SUSE-SU-2023:1621-1
- SUSE-SU-2023:1635-1
- SUSE-SU-2023:1639-1
- SUSE-SU-2023:1640-1
- SUSE-SU-2023:1647-1
- SUSE-SU-2023:1649-1
- SUSE-SU-2023:1651-1
- SUSE-SU-2023:1653-1
- SUSE-SU-2023:1654-1
- SUSE-SU-2023:1708-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:4135-1
- SUSE-SU-2023:4136-1
- SUSE-SU-2023:4158-1
- SUSE-SU-2023:4159-1
- SUSE-SU-2023:4160-1
- SUSE-SU-2024:0155-1
- USN-5790-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5793-1
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5815-1
- USN-5877-1
- USN-5884-1
- USN-5924-1
- USN-5926-1
- USN-5927-1
- USN-5970-1
- USN-5975-1
- USN-5978-1
- USN-5979-1
- USN-5980-1
- USN-5981-1
- USN-5982-1
- USN-5984-1
- USN-5985-1
- USN-5987-1
- USN-5991-1
- USN-6001-1
- USN-6004-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6020-1
- USN-6024-1
- USN-6025-1
- USN-6027-1
- USN-6029-1
- USN-6030-1
- USN-6031-1
- USN-6032-1
- USN-6040-1
- USN-6045-1
- USN-6057-1
- USN-6071-1
- USN-6072-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6093-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6151-1
- USN-6222-1
- USN-6256-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2023-12323 | https://linux.oracle.com/errata/ELSA-2023-12323.html | |
CVE | CVE-2023-26545 | https://linux.oracle.com/cve/CVE-2023-26545.html | |
CVE | CVE-2023-28772 | https://linux.oracle.com/cve/CVE-2023-28772.html | |
CVE | CVE-2022-4095 | https://linux.oracle.com/cve/CVE-2022-4095.html | |
CVE | CVE-2023-23559 | https://linux.oracle.com/cve/CVE-2023-23559.html | |
CVE | CVE-2023-1513 | https://linux.oracle.com/cve/CVE-2023-1513.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-124.74.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.74.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.74.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-124.74.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.74.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-124.74.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.74.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-124.74.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.74.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.74.2.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.74.2.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |