Oracle Linux 6277 Published by

An unbreakable Enterprise kernel security update has been released for Oracle Linux 8.



El-errata: ELSA-2022-9601 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update


Oracle Linux Security Advisory ELSA-2022-9601

  http://linux.oracle.com/errata/ELSA-2022-9601.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-core-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-debug-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-debug-core-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-debug-devel-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-debug-modules-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-debug-modules-extra-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-devel-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-doc-5.15.0-0.30.20.1.el8uek.noarch.rpm
kernel-uek-modules-5.15.0-0.30.20.1.el8uek.x86_64.rpm
kernel-uek-modules-extra-5.15.0-0.30.20.1.el8uek.x86_64.rpm

aarch64:
bpftool-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-core-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-debug-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-debug-core-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-debug-devel-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-debug-modules-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-debug-modules-extra-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-devel-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-doc-5.15.0-0.30.20.1.el8uek.noarch.rpm
kernel-uek-modules-5.15.0-0.30.20.1.el8uek.aarch64.rpm
kernel-uek-modules-extra-5.15.0-0.30.20.1.el8uek.aarch64.rpm

SRPMS:
  http://oss.oracle.com/ol8/SRPMS-updates/kernel-uek-5.15.0-0.30.20.1.el8uek.src.rpm

Related CVEs:

CVE-2022-21505



Description of changes:

[5.15.0-0.30.20.1.el8uek]
- lockdown: Fix kexec lockdown bypass with ima policy (Eric Snowberg) [Orabug: 34386636] {CVE-2022-21505}

_______________________________________________