SUSE-SU-2022:0762-1 -- SLES kernel, kgraft-patch-4_4_180-94_156-defaultID: oval:org.secpod.oval:def:89046032 | Date: (C)2022-03-11 (M)2024-04-17 |
Class: PATCH | Family: unix |
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes. Transient execution side-channel attacks attacking the Branch History Buffer , named Branch Target Injection and Intra-Mode Branch History Injection are now mitigated. The following security bugs were fixed: - CVE-2022-0001: Fixed Branch History Injection vulnerability . - CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability . - CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter via a malicious UDF image. - CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly . - CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor . - CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc . - CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd and read_rindex_entry . Special Instructions and Notes: Please reboot the system after installing this update.
Platform: |
SUSE Linux Enterprise Server 12 SP3 |
Product: |
kernel |
kgraft-patch-4_4_180-94_156-default |