[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:97630
[CLSA-2022:1650986488] Fixed CVEs in kernel: CVE-2021-4155, CVE-2021-0920, CVE-2022-0492, CVE-2020-0466

oval:org.secpod.oval:def:97631
[CLSA-2022:1650986589] Fix of CVE: CVE-2021-0920, CVE-2022-0492, CVE-2020-0466, CVE-2021-4155

oval:org.secpod.oval:def:1505496
[4.18.0-348.20.1.el8_5.OL8] - Update Oracle Linux certificates - Disable signing for aarch64 - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 lt;= 15-11.0.5.el8 [4.18. ...

oval:org.secpod.oval:def:506838
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: use after free in eventpoll.c may lead to escalation of privilege * kernel: Use After Free in unix_gc which could result in a local privilege escalation * kernel: xfs: raw block device dat ...

oval:org.secpod.oval:def:506715
The kernel packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a later upstream version: kernel . Security Fix: * kernel: improper initialization of the flags member of the new pipe_buffer * kernel: Use After Free in unix_gc which ...

oval:org.secpod.oval:def:89046012
This update for the Linux Kernel 4.4.180-94_144 fixes one issue. The following security issue was fixed: - CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc .

oval:org.secpod.oval:def:1505435
[4.14.35-2047.510.5.2] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33722441] {CVE-2021-4155} [4.14.35-2047.510.5.1] - fget: check that the fd still exists after getting a ref to it [Orabug: 33679805] {CVE-2021-0920} - fs: add fget_many and fput_many [Orabug: ...

oval:org.secpod.oval:def:89046032
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes. Transient execution side-channel attacks attacking the Branch History Buffer , named Branch Target Injection and Intra-Mode Branch History Injection are now mitigated. The following security bugs were fixed ...

oval:org.secpod.oval:def:78275
The kernel packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a later upstream version: kernel . Security Fix: * kernel: improper initialization of the flags member of the new pipe_buffer * kernel: Use After Free in unix_gc which ...

oval:org.secpod.oval:def:1505364
[4.1.12-124.59.1.2.el7uek] - fix regression in 'epoll: Keep a reference on files added to the check list' [Orabug: 33679854] {CVE-2021-1048} - fget: check that the fd still exists after getting a ref to it [Orabug: 33679806] {CVE-2021-0920} - fs: add fget_many and fput_many [Orabug: 33679806] - a ...

oval:org.secpod.oval:def:1506014
[2.6.32-754.35.1.0.6.OL6] [[:digit]o_epoll_ctl: clean the failure exits up a bit {CVE-2020-0466} [Orabug: 34086960] - epoll: Keep a reference on files added to the check list {CVE-2020-0466} [Orabug: 34086960] - fix regression in "epoll: Keep a reference on files added to the check list {CVE-2021 ...

oval:org.secpod.oval:def:1505363
[5.4.17-2136.302.7.2.el8uek] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33699625] {CVE-2021-4155} [5.4.17-2136.302.7.1.el8uek] - fget: check that the fd still exists after getting a ref to it [Orabug: 33691332] {CVE-2021-0920} [5.4.17-2136.302.7.el8uek] - rd ...

oval:org.secpod.oval:def:1505362
[5.4.17-2136.302.7.2.el7] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33699625] {CVE-2021-4155} [5.4.17-2136.302.7.1.el7] - fget: check that the fd still exists after getting a ref to it [Orabug: 33691332] {CVE-2021-0920} [5.4.17-2136.302.7.el7] - rds: ib: Re ...

oval:org.secpod.oval:def:506787
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix: * kernel: Use After Free in unix_gc which could result in a local privilege escalation * kernel: local privilege escalation by exploiting the fsconfi ...

oval:org.secpod.oval:def:4501029
The kernel packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a later upstream version: kernel . Security Fix: * kernel: improper initialization of the "flags" member of the new pipe_buffer * kernel: Use After Free in unix_gc whi ...

oval:org.secpod.oval:def:4500897
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: * kernel: improper initialization of the "flags" member of the new pipe_buffer * kernel: Use After Free in unix_gc which could result in a loc ...

oval:org.secpod.oval:def:89046006
This update for the Linux Kernel 4.4.180-94_153 fixes several issues. The following security issues were fixed: - CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc . - CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent ...

oval:org.secpod.oval:def:1505423
[4.1.12-124.59.1.2] - fix regression in "epoll: Keep a reference on files added to the check list" [Orabug: 33679854] {CVE-2021-1048} - fget: check that the fd still exists after getting a ref to it [Orabug: 33679806] {CVE-2021-0920} - fs: add fget_many and fput_many [Orabug: 33679806] - af_unix: ...

oval:org.secpod.oval:def:1505367
[4.14.35-2047.510.5.2.el7uek] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33722441] {CVE-2021-4155} [4.14.35-2047.510.5.1.el7uek] - fget: check that the fd still exists after getting a ref to it [Orabug: 33679805] {CVE-2021-0920} - fs: add fget_many and fput_ ...

oval:org.secpod.oval:def:1505366
[5.4.17-2136.302.7.2.el8] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33699625] {CVE-2021-4155} [5.4.17-2136.302.7.1.el8] - fget: check that the fd still exists after getting a ref to it [Orabug: 33691332] {CVE-2021-0920} [5.4.17-2136.302.7.el8] - rds: ib: Re ...

oval:org.secpod.oval:def:506704
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix: * kernel: use after free in eventpoll.c may lead to escalation of privilege * kernel: Use After Free in unix_gc which could result in a local privile ...

oval:org.secpod.oval:def:1505443
[5.4.17-2136.302.7.2] - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [Orabug: 33699625] {CVE-2021-4155} [5.4.17-2136.302.7.1] - fget: check that the fd still exists after getting a ref to it [Orabug: 33691332] {CVE-2021-0920} [5.4.17-2136.302.7] - rds: ib: Reduce the con ...

oval:org.secpod.oval:def:89046023
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes. Transient execution side-channel attacks attacking the Branch History Buffer , named Branch Target Injection and Intra-Mode Branch History Injection are now mitigated. The following security bugs were fixed ...

oval:org.secpod.oval:def:2500564
The kernel packages contain the Linux kernel, the core of any Linux operating system.

oval:org.secpod.oval:def:205942
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: use after free in eventpoll.c may lead to escalation of privilege * kernel: Use After Free in unix_gc which could result in a local privilege escalation * kernel: xfs: raw block device dat ...

oval:org.secpod.oval:def:1505683
[4.1.12-124.62.3] - fget: check that the fd still exists after getting a ref to it [Orabug: 33679806] {CVE-2021-0920} - fs: add fget_many and fput_many [Orabug: 33679806] - af_unix: fix garbage collect vs MSG_PEEK [Orabug: 33679806] {CVE-2021-0920} - net: split out functions related to registerin ...

oval:org.secpod.oval:def:506703
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: use after free in eventpoll.c may lead to escalation of privilege * kernel: Use After Free in unix_gc which could result in a local privilege escalation * kernel: xfs: raw block device dat ...

oval:org.secpod.oval:def:1505547
[3.10.0-1160.59.1.OL7] - Update Oracle Linux certificates - Oracle Linux RHCK Module Signing Key was compiled into kernel - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 - Update oracle value to match new certificate [3.10.0-1160.59.1] - Revert "Merge: Fix tasks stu ...

oval:org.secpod.oval:def:1505605
[4.1.12-124.62.3.el7uek] - fget: check that the fd still exists after getting a ref to it [Orabug: 33679806] {CVE-2021-0920} - fs: add fget_many and fput_many [Orabug: 33679806] - af_unix: fix garbage collect vs MSG_PEEK [Orabug: 33679806] {CVE-2021-0920} - net: split out functions related to reg ...

oval:org.secpod.oval:def:89045989
The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input . - CVE-2022-0330: Fixed flush TLBs before releasing b ...

oval:org.secpod.oval:def:89045944
The SUSE Linux Enterprise 12 SP5 kernel was updated. The following security bugs were fixed: - CVE-2021-4083: Fixed a race condition with Unix domain socket garbage collection that can lead to read memory after free. - CVE-2021-4149: Fixed an improper lock operation in btrfs which allows users to c ...

oval:org.secpod.oval:def:89046238
The SUSE Linux Enterprise 15 SP2 kernel was updated. The following security bugs were fixed: - CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. - CVE-2022-27666: Fixed a buffer overflow vulnerability in ...

oval:org.secpod.oval:def:3300454
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:89045899
The SUSE Linux Enterprise 12 SP5 kernel was updated. The following security bugs were fixed: - CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka Kr00k. - CVE-2021-33098: Fixed a potential denial of service in Intel Ethernet ixgbe driver due ...

oval:org.secpod.oval:def:1505466
[4.14.35-2047.511.5.2.el7uek] - cgroup-v1: Require capabilities to set release_agent [Orabug: 33876756] {CVE-2022-0492} - scsi: libiscsi: Hold back_lock when calling iscsi_complete_task [Orabug: 33876755] [4.14.35-2047.511.5.1.el7uek] - arm64, mm, efi: Account for GICv3 LPI tables in static memblo ...

oval:org.secpod.oval:def:89045995
The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input . - CVE-2022-0330: Fixed flush TLBs before releasing b ...

oval:org.secpod.oval:def:89045991
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input . - CVE-2021-3564: Fixed double-free memory corruption in the L ...

oval:org.secpod.oval:def:3300949
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:89047350
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-25636: Fixed an issue which allowed a local users to gain privileges because of a heap out-of-bounds write in nf_dup_netdev.c, related to nf_tables_offload ...

oval:org.secpod.oval:def:1507165
[5.4.17-2136.325.5.el7] - perf symbols: Symbol lookup with kcore can fail if multiple segments match stext [Orabug: 35905508] - char: misc: Increase the maximum number of dynamic misc devices to 1048448 [Orabug: 35905508] - perf/arm-cmn: Fix invalid pointer when access dtc object sharing the same ...

CWE    1
CWE-362
*CVE
CVE-2021-0920

© SecPod Technologies