ELSA-2022-9609

ELSA-2022-9609 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-07-19

Description


[5.4.17-2136.309.5]
- lockdown: Fix kexec lockdown bypass with ima policy (Eric Snowberg) [Orabug: 34386637] {CVE-2022-21505}


Related CVEs


CVE-2022-21505

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2136.309.5.el7uek.src.rpmab5d13a699c77063b4d5d1d53d86eb22-
kernel-uek-5.4.17-2136.309.5.el7uek.aarch64.rpmf92e342e3e8f6e94a7b5557ee11141df-
kernel-uek-debug-5.4.17-2136.309.5.el7uek.aarch64.rpm4c2e82885665f1f89495444fcbe3483e-
kernel-uek-debug-devel-5.4.17-2136.309.5.el7uek.aarch64.rpma7301017c5bfb4ac0a80663a323475ef-
kernel-uek-devel-5.4.17-2136.309.5.el7uek.aarch64.rpm4ba1dc25a9158b62e8a73f5064e5f615-
kernel-uek-doc-5.4.17-2136.309.5.el7uek.noarch.rpm4a716967ea13c5774007b878b7c519ad-
kernel-uek-tools-5.4.17-2136.309.5.el7uek.aarch64.rpm7c5ce80414d6977d5ecc432857216213-
kernel-uek-tools-libs-5.4.17-2136.309.5.el7uek.aarch64.rpmccc91677a31592bba6b921abd67c45b7-
perf-5.4.17-2136.309.5.el7uek.aarch64.rpm8f31ff569647c97aaf7cc2f4a359a9af-
python-perf-5.4.17-2136.309.5.el7uek.aarch64.rpm9b71b86b08f9f4f7f25a0465aa9157c5-
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2136.309.5.el7uek.src.rpmab5d13a699c77063b4d5d1d53d86eb22-
kernel-uek-5.4.17-2136.309.5.el7uek.x86_64.rpm46bbfe975a6a69ca9d0bb11b3a487a33-
kernel-uek-debug-5.4.17-2136.309.5.el7uek.x86_64.rpm30d86cd8277661b05c35f981de7db968-
kernel-uek-debug-devel-5.4.17-2136.309.5.el7uek.x86_64.rpm1bc34d918f96dc50ecd2ee4e2b66e0a1-
kernel-uek-devel-5.4.17-2136.309.5.el7uek.x86_64.rpma8ef980258f823d42cbe54adc6e149a1-
kernel-uek-doc-5.4.17-2136.309.5.el7uek.noarch.rpm4a716967ea13c5774007b878b7c519ad-
kernel-uek-tools-5.4.17-2136.309.5.el7uek.x86_64.rpm6d503313887818ee497e4d52716a8b20-
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2136.309.5.el8uek.src.rpmf08c1fa55b1907675aa3ee377566ce11-
kernel-uek-5.4.17-2136.309.5.el8uek.aarch64.rpm42b53b5fafbdce71de83c793feec3dea-
kernel-uek-debug-5.4.17-2136.309.5.el8uek.aarch64.rpmca4470b2b4b08820dd2f8fe7f6eea28a-
kernel-uek-debug-devel-5.4.17-2136.309.5.el8uek.aarch64.rpme0ddcce3c7939e0e7365e977821392d1-
kernel-uek-devel-5.4.17-2136.309.5.el8uek.aarch64.rpm91ed8febc2aeb213b5df2d3d954dfd7f-
kernel-uek-doc-5.4.17-2136.309.5.el8uek.noarch.rpmaf4883454a60d769b127b664f219c961-
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2136.309.5.el8uek.src.rpmf08c1fa55b1907675aa3ee377566ce11-
kernel-uek-5.4.17-2136.309.5.el8uek.x86_64.rpma85580d5f4cfaeeb86d14781008eb3ee-
kernel-uek-debug-5.4.17-2136.309.5.el8uek.x86_64.rpme97c68c6005486f361f57d0a0ab1f313-
kernel-uek-debug-devel-5.4.17-2136.309.5.el8uek.x86_64.rpm4faa2d9ce867f2c24b0a2eb5a734a497-
kernel-uek-devel-5.4.17-2136.309.5.el8uek.x86_64.rpm9817cdac949ee2d7b2870c27940c3a15-
kernel-uek-doc-5.4.17-2136.309.5.el8uek.noarch.rpmaf4883454a60d769b127b664f219c961-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete