Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2023-1470
History
Mar 28, 2023 - 12:00 a.m.
Vulners
/
Oraclelinux
/
kernel security, bug fix, and enhancement update
kernel security, bug fix, and enhancement update
2023-03-28
00:00:00
linux.oracle.com
19
kernel update
oracle linux
bug fix
enhancement
disable signing
conflict resolution
cve-2022-4744
cve-2023-0266
secure boot
s390 fix
scsi fix
cgroup improvement
cve-2022-4269
sched fix
x86/fpu fix
0.001 Low
EPSS
Percentile
41.2%
JSON
[5.14.0-162.22.2_1.OL9]
Update Oracle Linux certificates (Kevin Lyons)
Disable signing for aarch64 (Ilya Okomin)
Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
Update x509.genkey [Orabug: 24817676]
Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
Remove nmap references from kernel (Mridula Shastry) [Orabug: 34313944]
Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
[5.14.0-162.22.2_1]
tun: avoid double free in tun_free_netdev (Jon Maloy) [2156373] {CVE-2022-4744}
[5.14.0-162.22.1_1]
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (Jaroslav Kysela) [2163390 2125540] {CVE-2023-0266}
[5.14.0-162.21.1_1]
s390/boot: add secure boot trailer (Tobias Huschle) [2151528 2141966]
s390/kexec: fix ipl report address for kdump (Tobias Huschle) [2166903 2161327]
s390/qeth: cache link_info for ethtool (Tobias Huschle) [2166304 2110436]
scsi: zfcp: Fix missing auto port scan and thus missing target ports (Tobias Huschle) [2127880 2121088]
[5.14.0-162.20.1_1]
cgroup/cpuset: remove unreachable code (Waiman Long) [2161105 1946801]
kselftest/cgroup: Add cpuset v2 partition root state test (Waiman Long) [2161105 1946801]
cgroup/cpuset: Update description of cpuset.cpus.partition in cgroup-v2.rst (Waiman Long) [2161105 1946801]
cgroup/cpuset: Make partition invalid if cpumask change violates exclusivity rule (Waiman Long) [2161105 1946801]
cgroup/cpuset: Relocate a code block in validate_change() (Waiman Long) [2161105 1946801]
cgroup/cpuset: Show invalid partition reason string (Waiman Long) [2161105 1946801]
cgroup/cpuset: Add a new isolated cpus.partition type (Waiman Long) [2161105 1946801]
cgroup/cpuset: Relax constraints to partition & cpus changes (Waiman Long) [2161105 1946801]
cgroup/cpuset: Allow no-task partition to have empty cpuset.cpus.effective (Waiman Long) [2161105 1946801]
cgroup/cpuset: Miscellaneous cleanups & add helper functions (Waiman Long) [2161105 1946801]
cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (Waiman Long) [2161105 1946801]
cpuset: convert ‘allowed’ in __cpuset_node_allowed() to be boolean (Waiman Long) [2161105 1946801]
cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (Waiman Long) [2161105 1946801]
cgroup: cleanup comments (Waiman Long) [2161105 1946801]
act_mirred: use the backlog for nested calls to mirred ingress (Davide Caratti) [2164655 2150278] {CVE-2022-4269}
net/sched: act_mirred: better wording on protection against excessive stack growth (Davide Caratti) [2164655 2150278] {CVE-2022-4269}
scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (Emanuele Giuseppe Esposito) [2170227 2150660]
[5.14.0-162.19.1_1]
sched/core: Use kfree_rcu() in do_set_cpus_allowed() (Waiman Long) [2160614 2143847]
sched/core: Fix use-after-free bug in dup_user_cpus_ptr() (Waiman Long) [2160614 2143847]
sched: Always clear user_cpus_ptr in do_set_cpus_allowed() (Waiman Long) [2143766 2107354]
sched: Enforce user requested affinity (Waiman Long) [2143766 2107354]
sched: Always preserve the user requested cpumask (Waiman Long) [2143766 2107354]
sched: Introduce affinity_context (Waiman Long) [2143766 2107354]
sched: Add __releases annotations to affine_move_task() (Waiman Long) [2143766 2107354]
x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (Dean Nelson) [2168382 2122851]
x86/fpu: Exclude dynamic states from init_fpstate (Dean Nelson) [2168382 2122851]
x86/fpu: Fix the init_fpstate size check with the actual size (Dean Nelson) [2168382 2122851]
x86/fpu: Configure init_fpstate attributes orderly (Dean Nelson) [2168382 2122851]
x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (Dean Nelson) [2168382 2122851]
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
9
src
kernel
< 5.14.0-162.22.2.el9_1
kernel-5.14.0-162.22.2.el9_1.src.rpm
oracle linux
9
aarch64
bpftool
< 5.14.0-162.22.2.el9_1
bpftool-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
kernel-cross-headers
< 5.14.0-162.22.2.el9_1
kernel-cross-headers-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
kernel-headers
< 5.14.0-162.22.2.el9_1
kernel-headers-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
kernel-tools
< 5.14.0-162.22.2.el9_1
kernel-tools-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
kernel-tools-libs
< 5.14.0-162.22.2.el9_1
kernel-tools-libs-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
kernel-tools-libs-devel
< 5.14.0-162.22.2.el9_1
kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
perf
< 5.14.0-162.22.2.el9_1
perf-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
aarch64
python3-perf
< 5.14.0-162.22.2.el9_1
python3-perf-5.14.0-162.22.2.el9_1.aarch64.rpm
oracle linux
9
src
kernel
< 5.14.0-162.22.2.el9_1
kernel-5.14.0-162.22.2.el9_1.src.rpm
Rows per page:
10
1-10 of 32
1
Related
rocky 5
osv 15
redhat 31
nessus 81
almalinux 4
oraclelinux 2
cvelist 3
nvd 3
redhatcve 3
ubuntucve 3
prion 3
debiancve 3
cve 3
cbl_mariner 4
f5 2
veracode 1
cisa_kev 1
attackerkb 1
ibm 3
openvas 18
googleprojectzero 1
redos 1
ubuntu 6
thn 2
rocky
rocky
5
kernel-rt security and bug fix update
2023-04-06 15:23:50
kernel security, bug fix, and enhancement update
2023-04-06 15:23:59
kernel-rt security and bug fix update
2023-04-26 15:28:18
osv
osv
15
Important: kernel security, bug fix, and enhancement update
2023-04-06 15:23:59
Important: kernel-rt security and bug fix update
2023-04-06 15:23:50
Important: kernel-rt security and bug fix update
2023-03-27 00:00:00
redhat
redhat
31
(RHSA-2023:1469) Important: kernel-rt security and bug fix update
2023-03-27 07:47:53
(RHSA-2023:1470) Important: kernel security, bug fix, and enhancement update
2023-03-27 07:48:31
(RHSA-2023:1471) Important: kpatch-patch security update
2023-03-27 07:48:34
nessus
nessus
81
Rocky Linux 9 : kernel (RLSA-2023:1470)
2023-04-06 00:00:00
RHEL 9 : kernel (RHSA-2023:1470)
2023-03-27 00:00:00
Oracle Linux 9 : kernel (ELSA-2023-1470)
2023-03-28 00:00:00
almalinux
almalinux
4
Important: kernel-rt security and bug fix update
2023-03-27 00:00:00
Important: kernel security, bug fix, and enhancement update
2023-03-27 00:00:00
Important: kernel security, bug fix, and enhancement update
2023-04-04 00:00:00
oraclelinux
oraclelinux
kernel security, bug fix, and enhancement update
2023-04-05 00:00:00
Unbreakable Enterprise kernel security update
2023-03-16 00:00:00
cvelist
cvelist
CVE-2022-4744
2023-03-30 00:00:00
CVE-2022-4269
2022-12-05 00:00:00
CVE-2023-0266 Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel
2023-01-30 13:09:32
nvd
nvd
CVE-2022-4744
2023-03-30 21:15:06
CVE-2022-4269
2022-12-05 16:15:10
CVE-2023-0266
2023-01-30 14:15:10
redhatcve
redhatcve
CVE-2022-4744
2023-03-22 17:43:27
CVE-2023-0266
2023-01-23 11:07:23
CVE-2022-4269
2022-12-02 10:56:05
ubuntucve
ubuntucve
CVE-2022-4744
2023-03-30 00:00:00
CVE-2022-4269
2022-12-05 00:00:00
CVE-2023-0266
2023-01-30 00:00:00
prion
prion
Double free
2023-03-30 21:15:00
Race condition
2022-12-05 16:15:00
Design/Logic Flaw
2023-01-30 14:15:00
debiancve
debiancve
CVE-2022-4744
2023-03-30 21:15:06
CVE-2023-0266
2023-01-30 14:15:10
CVE-2022-4269
2022-12-05 16:15:10
cve
cve
CVE-2022-4269
2022-12-05 16:15:10
CVE-2022-4744
2023-03-30 21:15:06
CVE-2023-0266
2023-01-30 14:15:10
cbl_mariner
cbl_mariner
4
CVE-2023-0266 affecting package kernel for versions less than 5.15.92.1-1
2023-02-14 20:21:22
CVE-2023-0266 affecting package hyperv-daemons 5.10.167.1-1
2023-03-02 04:18:44
CVE-2023-0266 affecting package kernel 5.10.167.1-1
2023-03-02 04:18:44
f5
f5
K000137058 : Linux kernel vulnerability CVE-2022-4269
2023-09-29 00:00:00
K000133644 : Linux kernel vulnerability CVE-2023-0266
2023-04-24 00:00:00
veracode
veracode
Privilege Escalation
2023-03-06 20:47:17
cisa_kev
cisa_kev
Linux Kernel Use-After-Free Vulnerability
2023-03-30 00:00:00
attackerkb
attackerkb
CVE-2023-0266
2023-01-30 00:00:00
ibm
ibm
Security Bulletin: Multiple Linux Kernel vulnerabilities may affect IBM Elastic Storage System
2023-08-11 17:03:57
Security Bulletin: Vulnerabilities in Linux Kernel might affect IBM Spectrum Copy Data Management (CVE-2022-1280, CVE-2023-0386, CVE-2022-4269, CVE-2022-2873, CVE-2022-4378)
2023-06-16 19:23:44
Security Bulletin: Multiple Vulnerabilities in CloudPak for Watson AIOPs
2023-04-26 15:33:20
openvas
openvas
18
SUSE: Security Advisory (SUSE-SU-2023:0394-1)
2023-02-14 00:00:00
openSUSE: Security Advisory for the Linux Kernel (SUSE-SU-2023:0394-1)
2024-03-04 00:00:00
Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2023-1806)
2023-05-09 00:00:00
googleprojectzero
googleprojectzero
Analyzing a Modern In-the-wild Android Exploit
2023-09-19 00:00:00
redos
redos
ROS-20230915-10
2023-09-15 00:00:00
ubuntu
ubuntu
6
Linux kernel vulnerabilities
2023-06-16 00:00:00
Linux kernel (IBM) vulnerabilities
2023-06-22 00:00:00
Linux kernel vulnerabilities
2023-03-23 00:00:00
thn
thn
Critical libwebp Vulnerability Under Active Exploitation - Gets Maximum CVSS Score
2023-09-27 05:23:00
Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices
2023-03-29 13:52:00
0.001 Low
EPSS
Percentile
41.2%
JSON
Related for ELSA-2023-1470
rocky
5
osv
15
redhat
31
nessus
81
almalinux
4
oraclelinux
2
cvelist
3
nvd
3
redhatcve
3
ubuntucve
3
prion
3
debiancve
3
cve
3
cbl_mariner
4
f5
2
veracode
1
cisa_kev
1
attackerkb
1
ibm
3
openvas
18
googleprojectzero
1
redos
1
ubuntu
6
thn
2