[ELSA-2023-12565] Unbreakable Enterprise kernel security update
[4.1.12-124.76.2]
- firewire: fix potential uaf in outbound_phy_packet_callback() (Chengfeng Ye) [Orabug: 35493606] {CVE-2023-3159}
- ath9k: fix use-after-free in ath9k_hif_usb_rx_cb (Pavel Skripkin) [Orabug: 35448003] {CVE-2022-1679}
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern (Mike Snitzer) [Orabug: 35354880] {CVE-2023-2269}
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (Duoming Zhou) [Orabug: 35181652] {CVE-2023-1118}
- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os (Zheng Wang) [Orabug: 35180779] {CVE-2022-3424}
[4.1.12-124.76.1]
- ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum (Tudor Ambarus) [Orabug: 35457204] {CVE-2023-34256}
- igmp: Add ip_mc_list lock in ip_check_mc_rcu (Liu Jian) [Orabug: 35448048] {CVE-2022-20141}
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | < 4.1.12-124.76.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | < 4.1.12-124.76.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | < 4.1.12-124.76.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | < 4.1.12-124.76.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | < 4.1.12-124.76.2.el6uek |
pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | < 4.1.12-124.76.2.el6uek |
- ID
- ELSA-2023-12565
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2023-12565.html
- Published
-
2023-07-04T00:00:00
(14 months ago) - Modified
-
2023-07-04T00:00:00
(14 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1636
- ALAS-2023-1773
- ALAS2-2021-1712
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2023-2100
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:7077
- DSA-5448-1
- DSA-5480-1
- ELSA-2022-8267
- ELSA-2023-12566
- ELSA-2023-13043
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-7077
- FEDORA-2023-00393126a0
- FEDORA-2023-26325e5399
- FEDORA-2023-dfd4a6e8f2
- MS:CVE-2023-1118
- MS:CVE-2023-34256
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:6901
- RHSA-2023:7077
- SSA:2022-237-02
- SSA:2023-048-01
- SSA:2023-172-02
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2696-1
- SUSE-SU-2022:2697-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2710-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2732-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2750-1
- SUSE-SU-2022:2759-1
- SUSE-SU-2022:2762-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2779-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2781-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:3810-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0226-1
- SUSE-SU-2023:0227-1
- SUSE-SU-2023:0229-1
- SUSE-SU-2023:0231-1
- SUSE-SU-2023:0235-1
- SUSE-SU-2023:0237-1
- SUSE-SU-2023:0238-1
- SUSE-SU-2023:0240-1
- SUSE-SU-2023:0245-1
- SUSE-SU-2023:0250-1
- SUSE-SU-2023:0262-1
- SUSE-SU-2023:0263-1
- SUSE-SU-2023:0267-1
- SUSE-SU-2023:0270-1
- SUSE-SU-2023:0271-1
- SUSE-SU-2023:0277-1
- SUSE-SU-2023:0281-1
- SUSE-SU-2023:0331-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0762-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0770-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0778-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:0780-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1971-1
- SUSE-SU-2023:1972-1
- SUSE-SU-2023:1973-1
- SUSE-SU-2023:1975-1
- SUSE-SU-2023:1977-1
- SUSE-SU-2023:1981-1
- SUSE-SU-2023:1982-1
- SUSE-SU-2023:1983-1
- SUSE-SU-2023:1995-1
- SUSE-SU-2023:2007-1
- SUSE-SU-2023:2009-1
- SUSE-SU-2023:2023-1
- SUSE-SU-2023:2024-1
- SUSE-SU-2023:2031-1
- SUSE-SU-2023:2035-1
- SUSE-SU-2023:2043-1
- SUSE-SU-2023:2055-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3035-1
- SUSE-SU-2023:3046-1
- SUSE-SU-2023:3069-1
- SUSE-SU-2023:3073-1
- SUSE-SU-2023:3075-1
- SUSE-SU-2023:3081-1
- SUSE-SU-2023:3083-1
- SUSE-SU-2023:3104-1
- SUSE-SU-2023:3107-1
- SUSE-SU-2023:3333-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5517-1
- USN-5529-1
- USN-5540-1
- USN-5544-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5566-1
- USN-5582-1
- USN-5856-1
- USN-5917-1
- USN-5924-1
- USN-5927-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5975-1
- USN-5981-1
- USN-5982-1
- USN-5984-1
- USN-5987-1
- USN-5991-1
- USN-6000-1
- USN-6001-1
- USN-6004-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6024-1
- USN-6030-1
- USN-6031-1
- USN-6032-1
- USN-6033-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6173-1
- USN-6222-1
- USN-6254-1
- USN-6256-1
- USN-6283-1
- USN-6300-1
- USN-6309-1
- USN-6311-1
- USN-6327-1
- USN-6332-1
- USN-6340-1
- USN-6340-2
- USN-6341-1
- USN-6342-1
- USN-6342-2
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6700-1
- USN-6700-2
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2023-12565 | https://linux.oracle.com/errata/ELSA-2023-12565.html | |
CVE | CVE-2023-3159 | https://linux.oracle.com/cve/CVE-2023-3159.html | |
CVE | CVE-2023-2269 | https://linux.oracle.com/cve/CVE-2023-2269.html | |
CVE | CVE-2023-1118 | https://linux.oracle.com/cve/CVE-2023-1118.html | |
CVE | CVE-2022-3424 | https://linux.oracle.com/cve/CVE-2022-3424.html | |
CVE | CVE-2023-34256 | https://linux.oracle.com/cve/CVE-2023-34256.html | |
CVE | CVE-2022-1679 | https://linux.oracle.com/cve/CVE-2022-1679.html | |
CVE | CVE-2022-20141 | https://linux.oracle.com/cve/CVE-2022-20141.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-124.76.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-124.76.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-124.76.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-124.76.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-124.76.2.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-124.76.2.el6uek | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |