Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2022-9590
History
Jul 12, 2022 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2022-07-12
00:00:00
linux.oracle.com
42
kernel security update
unbreakable enterprise
vulnerability
cve-2022-1652
cve-2022-29901
cve-2022-23816
x86
arm64
kvm
amd
spectre
ibrs
rsb
retbleed
EPSS
0.001
Percentile
31.1%
JSON
[5.15.0-0.30.20]
floppy: use a statically allocated error counter (Willy Tarreau) [Orabug: 34218638] {CVE-2022-1652}
x86: Disable RET on kexec (Konrad Rzeszutek Wilk) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
arm64: proton-pack: provide vulnerability file value for RETBleed (James Morse) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/common: Stamp out the stepping madness (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
objtool: Add entry UNRET validation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Add retbleed=ibpb (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/xen: Rename SYS* entry points (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
objtool: Update Retpoline validation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
intel_idle: Disable IBRS during long idle (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/entry: Add kernel IBRS implementation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86: Add magic AMD return-thunk (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86: Use return-thunk in asm code (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/sev: Avoid using __x86_return_thunk (Kim Phillips) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/vsyscall_emu/64: Don’t use RET in vsyscall emulation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/bpf: Use alternative RET encoding (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/ftrace: Use alternative RET encoding (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86,static_call: Use alternative RET encoding (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86,objtool: Create .return_sites (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86: Undo return-thunk damage (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/retpoline: Use -mfunction-return (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/entry: Remove skip_r11rcx (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/entry: Fix register corruption in compat syscall (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/entry: Use PUSH_AND_CLEAR_REGS for compat (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/entry: Simplify entry_INT80_compat() (Linus Torvalds) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/mm: Simplify RESERVE_BRK() (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
crypto: x86/poly1305 - Fixup SLS (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86,static_call: Fix __static_call_return0 for i386 (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
kvm/emulate: Fix SETcc emulation function offsets with SLS (Borislav Petkov) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
objtool: Default ignore INT3 for unreachable (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/ibt,paravirt: Use text_gen_insn() for paravirt_patch() (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86: Add straight-line-speculation mitigation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
objtool: Add straight-line-speculation validation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86: Prepare inline-asm for straight-line-speculation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86: Prepare asm files for straight-line-speculation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/lib/atomic64_386_32: Rename things (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/alternative: Relax text_poke_bp() constraint (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
static_call,x86: Robustify trampoline patching (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
x86/xen: Move hypercall_page to top of the file (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
8
src
kernel-uek
< 5.15.0-0.30.20.el8uek
kernel-uek-5.15.0-0.30.20.el8uek.src.rpm
oracle linux
8
aarch64
bpftool
< 5.15.0-0.30.20.el8uek
bpftool-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek
< 5.15.0-0.30.20.el8uek
kernel-uek-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-core
< 5.15.0-0.30.20.el8uek
kernel-uek-core-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-debug
< 5.15.0-0.30.20.el8uek
kernel-uek-debug-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-debug-core
< 5.15.0-0.30.20.el8uek
kernel-uek-debug-core-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-debug-devel
< 5.15.0-0.30.20.el8uek
kernel-uek-debug-devel-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-debug-modules
< 5.15.0-0.30.20.el8uek
kernel-uek-debug-modules-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-debug-modules-extra
< 5.15.0-0.30.20.el8uek
kernel-uek-debug-modules-extra-5.15.0-0.30.20.el8uek.aarch64.rpm
oracle linux
8
aarch64
kernel-uek-devel
< 5.15.0-0.30.20.el8uek
kernel-uek-devel-5.15.0-0.30.20.el8uek.aarch64.rpm
Rows per page:
10
1-10 of 52
1
Related
oraclelinux 13
nessus 73
openvas 24
ibm 2
xen 1
fedora 4
ubuntucve 3
osv 15
mscve 2
nvd 3
cvelist 3
redhatcve 4
debiancve 3
veracode 2
vmware 3
cve 3
prion 2
intel 1
cbl_mariner 2
almalinux 2
rocky 2
redhat 11
f5 2
thn 1
ubuntu 6
amd 1
hp 1
mageia 2
amazon 1
cloudlinux 2
debian 3
photon 1
suse 1
oraclelinux
oraclelinux
13
Unbreakable Enterprise kernel-container security update
2022-07-12 00:00:00
Unbreakable Enterprise kernel security update
2024-06-12 00:00:00
Unbreakable Enterprise kernel security update
2022-08-15 00:00:00
nessus
nessus
73
Oracle Linux 8 / 9 : Unbreakable Enterprise kernel (ELSA-2024-12433)
2024-06-13 00:00:00
Oracle Linux 8 / 9 : Unbreakable Enterprise kernel (ELSA-2022-9590)
2022-07-12 00:00:00
Oracle Linux 8 : Unbreakable Enterprise kernel-container (ELSA-2022-9591)
2022-07-12 00:00:00
openvas
openvas
24
Fedora: Security Advisory for kernel (FEDORA-2022-c69ef9c1dd)
2022-07-15 00:00:00
Fedora: Security Advisory for kernel (FEDORA-2022-8aab5b5cde)
2022-07-16 00:00:00
Missing Linux Kernel mitigations for 'RETbleed' hardware vulnerabilities (INTEL-SA-00702, AMD-SB-1037)
2023-03-08 00:00:00
ibm
ibm
Security Bulletin: Multiple vulnerabilities in VMware ESXi affect IBM Cloud Pak System
2023-03-31 16:13:36
Security Bulletin: IBM QRadar SIEM is vulnerable to using components with known vulnerabilities
2023-03-29 18:49:02
xen
xen
Retbleed - arbitrary speculative code execution with return instructions
2022-07-12 16:35:00
fedora
fedora
4
[SECURITY] Fedora 36 Update: kernel-5.18.11-200.fc36
2022-07-14 01:49:14
[SECURITY] Fedora 35 Update: kernel-5.18.11-100.fc35
2022-07-15 01:37:00
[SECURITY] Fedora 36 Update: xen-4.16.1-6.fc36
2022-07-18 01:09:01
ubuntucve
ubuntucve
CVE-2022-23816
2022-07-13 00:00:00
CVE-2022-29901
2022-07-12 00:00:00
CVE-2022-1652
2022-06-02 00:00:00
osv
osv
15
CVE-2022-23816
2023-01-17 06:15:10
Important: kernel-rt security and bug fix update
2022-10-25 00:00:00
Important: kernel security, bug fix, and enhancement update
2022-10-25 07:23:52
mscve
mscve
AMD: CVE-2022-23816 AMD CPU Branch Type Confusion
2022-07-12 07:00:00
AMD: CVE-2022-29900 AMD CPU Branch Type Confusion
2022-07-12 07:00:00
nvd
nvd
CVE-2022-23816
2023-01-17 06:15:10
CVE-2022-29901
2022-07-12 19:15:08
CVE-2022-1652
2022-06-02 14:15:32
cvelist
cvelist
CVE-2022-23816
1976-01-01 00:00:00
CVE-2022-29901 Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)
2022-07-12 00:00:00
CVE-2022-1652
2022-05-31 18:05:47
redhatcve
redhatcve
4
CVE-2022-23816
2022-07-13 04:44:07
CVE-2022-29901
2022-07-13 05:14:12
CVE-2022-1652
2022-05-12 08:28:52
debiancve
debiancve
CVE-2022-23816
2023-01-17 06:15:00
CVE-2022-29901
2022-07-12 19:15:08
CVE-2022-1652
2022-06-02 14:15:32
veracode
veracode
Arbitrary Code Execution
2022-07-15 02:32:22
Authentication Bypass
2022-11-10 00:24:39
vmware
vmware
VMware ESXi addresses Return-Stack-Buffer-Underflow and Branch Type Confusion vulnerabilities
2022-07-12 00:00:00
VMware ESXi addresses Return-Stack-Buffer-Underflow and Branch Type Confusion vulnerabilities
2022-07-12 00:00:00
VMware ESXi addresses Return-Stack-Buffer-Underflow and Branch Type Confusion vulnerabilities
2022-07-12 00:00:00
cve
cve
CVE-2022-23816
2023-01-17 06:15:10
CVE-2022-29901
2022-07-12 19:15:08
CVE-2022-1652
2022-06-02 14:15:32
prion
prion
Design/Logic Flaw
2022-07-12 19:15:00
Design/Logic Flaw
2022-06-02 14:15:00
intel
intel
Intel® Processors Return Stack Buffer Underflow Advisory
2022-07-12 00:00:00
cbl_mariner
cbl_mariner
CVE-2022-1652 affecting package kernel 5.10.123.1-1
2022-08-12 16:45:24
CVE-2022-1652 affecting package kernel for versions less than 5.15.55.1-1
2022-08-03 21:15:19
almalinux
almalinux
Important: kernel-rt security and bug fix update
2022-10-25 00:00:00
Important: kernel security, bug fix, and enhancement update
2022-10-25 00:00:00
rocky
rocky
kernel-rt security and bug fix update
2022-10-25 07:38:43
kernel security, bug fix, and enhancement update
2022-10-25 07:23:52
redhat
redhat
11
(RHSA-2022:7337) Important: kernel security and bug fix update
2022-11-02 16:03:50
(RHSA-2022:7338) Important: kernel-rt security and bug fix update
2022-11-02 16:04:02
(RHSA-2022:7134) Important: kernel-rt security and bug fix update
2022-10-25 07:38:43
f5
f5
K57185580 : RetBleed CPU vulnerability CVE-2022-29900
2022-08-02 00:00:00
K83713003 : RetBleed CPU vulnerability CVE-2022-29901
2022-08-02 00:00:00
thn
thn
New 'Retbleed' Speculative Execution Attack Affects AMD and Intel CPUs
2022-07-13 14:22:00
ubuntu
ubuntu
6
Linux kernel vulnerabilities
2022-08-10 00:00:00
Linux kernel vulnerabilities
2022-08-02 00:00:00
Linux kernel vulnerabilities
2022-08-10 00:00:00
amd
amd
AMD CPU Branch Type Confusion
2022-07-12 00:00:00
hp
hp
HP Wolf Security Software July 2022 Update
2022-07-12 00:00:00
mageia
mageia
Updated kernel-linus packages fix security vulnerabilities
2022-08-06 18:43:47
Updated kernel packages fix security vulnerabilities
2022-08-06 18:43:47
amazon
amazon
Important: kernel
2022-09-01 21:09:00
cloudlinux
cloudlinux
kernel: Fix of 7 CVEs
2023-04-28 19:55:00
kernel: Fix of 7 CVEs
2023-04-28 18:43:13
debian
debian
[SECURITY] [DSA 5207-1] linux security update
2022-08-15 19:52:20
[SECURITY] [DLA 3102-1] linux-5.10 new package
2022-09-11 19:35:03
[SECURITY] [DSA 5184-1] xen security update
2022-07-15 18:05:47
photon
photon
Important Photon OS Security Update - PHSA-2022-0248
2022-09-20 00:00:00
suse
suse
Security update for the Linux Kernel (important)
2022-07-13 00:00:00
EPSS
0.001
Percentile
31.1%
JSON
Related for ELSA-2022-9590
oraclelinux
13
nessus
73
openvas
24
ibm
2
xen
1
fedora
4
ubuntucve
3
osv
15
mscve
2
nvd
3
cvelist
3
redhatcve
4
debiancve
3
veracode
2
vmware
3
cve
3
prion
2
intel
1
cbl_mariner
2
almalinux
2
rocky
2
redhat
11
f5
2
thn
1
ubuntu
6
amd
1
hp
1
mageia
2
amazon
1
cloudlinux
2
debian
3
photon
1
suse
1