[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:2582-1 -- SLES kernel-default, kernel-syms

ID: oval:org.secpod.oval:def:89000151Date: (C)2021-02-22   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-14314: Fixed a potential negative array index in do_split . - CVE-2020-14331: Fixed a missing check in vgacon scrollback handling . - CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG . - CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow . - CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption . The following non-security bugs were fixed: - bonding: fix active-backup failover for current ARP slave . - Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops . - ibmvnic: Fix IRQ mapping disposal in error path . - mm, vmstat: reduce zone-gt;lock holding time by /proc/pagetypeinfo . - ocfs2: add trimfs dlm lock resource . - ocfs2: add trimfs lock to avoid duplicated trims in cluster . - ocfs2: fix the application IO timeout when fstrim is running . Special Instructions and Notes: Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 12 SP3
Product:
kernel-default
kernel-syms
Reference:
SUSE-SU-2020:2582-1
CVE-2019-16746
CVE-2020-14314
CVE-2020-14331
CVE-2020-14386
CVE-2020-16166
CVE    5
CVE-2020-14331
CVE-2020-14386
CVE-2020-14314
CVE-2020-16166
...

© SecPod Technologies