ELSA-2022-9028

ELSA-2022-9028 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-01-19

Description


[5.4.17-2136.302.7.2.1]
- vfs: fs_context: fix up param length parsing in legacy_parse_param (Jamie Hill-Daniel) [Orabug: 33761451] {CVE-2022-0185}


Related CVEs


CVE-2022-0185

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2136.302.7.2.1.el7uek.src.rpme20b987a488aa8d8dc957fd06abfb205-
kernel-uek-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm10201aeb0014276514eb06ac1df8494f-
kernel-uek-debug-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm11e320f2eb5981de6ad0cbcbd351a917-
kernel-uek-debug-devel-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm9a43d62942df31310c44474b3a37e60e-
kernel-uek-devel-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm729198985ebbf1194652a10b8feba9c3-
kernel-uek-doc-5.4.17-2136.302.7.2.1.el7uek.noarch.rpmd9853d590a2eb5a5324d600f3942e94e-
kernel-uek-tools-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm6425978e907e746e5f1cf17a7981a052-
kernel-uek-tools-libs-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm0e78a7043aeab49efdcea6cf70611de5-
perf-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpm2333af5ecec4e1133029d224bfcf616c-
python-perf-5.4.17-2136.302.7.2.1.el7uek.aarch64.rpmad5c01b4b317dee2feecab2665afd4a3-
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2136.302.7.2.1.el7uek.src.rpme20b987a488aa8d8dc957fd06abfb205-
kernel-uek-5.4.17-2136.302.7.2.1.el7uek.x86_64.rpm816d8c94271e72185a0cb34f08c0762c-
kernel-uek-debug-5.4.17-2136.302.7.2.1.el7uek.x86_64.rpm2db51acf14799134ddc10a60dcd7c79d-
kernel-uek-debug-devel-5.4.17-2136.302.7.2.1.el7uek.x86_64.rpm62711d417ac3bfe934d6007e454547b6-
kernel-uek-devel-5.4.17-2136.302.7.2.1.el7uek.x86_64.rpm14bb23515e173d1f95134c26ff6a8257-
kernel-uek-doc-5.4.17-2136.302.7.2.1.el7uek.noarch.rpmd9853d590a2eb5a5324d600f3942e94e-
kernel-uek-tools-5.4.17-2136.302.7.2.1.el7uek.x86_64.rpm2bdf4dc7e2c04175e64bc0b27f3a4579-
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2136.302.7.2.1.el8uek.src.rpm051cb9eac708df88cac33a72f54d8e83-
kernel-uek-5.4.17-2136.302.7.2.1.el8uek.aarch64.rpmfcce71c6f2536113d2e07d795c5f8f3b-
kernel-uek-debug-5.4.17-2136.302.7.2.1.el8uek.aarch64.rpm9af1d3c545d0f318e8f7f7f7d3bf8509-
kernel-uek-debug-devel-5.4.17-2136.302.7.2.1.el8uek.aarch64.rpm7e839c4f1e82d24d18d4018e4735bd22-
kernel-uek-devel-5.4.17-2136.302.7.2.1.el8uek.aarch64.rpm9521d1d78a0fb3f6133ae27a8c980327-
kernel-uek-doc-5.4.17-2136.302.7.2.1.el8uek.noarch.rpmced735668530d90ff207ce5d967ef7d4-
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2136.302.7.2.1.el8uek.src.rpm051cb9eac708df88cac33a72f54d8e83-
kernel-uek-5.4.17-2136.302.7.2.1.el8uek.x86_64.rpm8388ea51ee1c099e34fab41a7487a5a5-
kernel-uek-debug-5.4.17-2136.302.7.2.1.el8uek.x86_64.rpm569dda5f685f9a60afa9dac4e7c11e2c-
kernel-uek-debug-devel-5.4.17-2136.302.7.2.1.el8uek.x86_64.rpmad9cbdb205822d3315963e59d6eb0ef0-
kernel-uek-devel-5.4.17-2136.302.7.2.1.el8uek.x86_64.rpm497fa8544e6930340ae66a6b83997007-
kernel-uek-doc-5.4.17-2136.302.7.2.1.el8uek.noarch.rpmced735668530d90ff207ce5d967ef7d4-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete