[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:0762-1 -- SLES kernel, kgraft-patch-4_4_180-94_156-default

ID: oval:org.secpod.oval:def:89046032Date: (C)2022-03-11   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes. Transient execution side-channel attacks attacking the Branch History Buffer , named Branch Target Injection and Intra-Mode Branch History Injection are now mitigated. The following security bugs were fixed: - CVE-2022-0001: Fixed Branch History Injection vulnerability . - CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability . - CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter via a malicious UDF image. - CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly . - CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor . - CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc . - CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd and read_rindex_entry . Special Instructions and Notes: Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 12 SP3
Product:
kernel
kgraft-patch-4_4_180-94_156-default
Reference:
SUSE-SU-2022:0762-1
CVE-2016-10905
CVE-2021-0920
CVE-2022-0001
CVE-2022-0002
CVE-2022-0492
CVE-2022-0617
CVE-2022-24448
CVE    7
CVE-2016-10905
CVE-2022-0001
CVE-2022-0002
CVE-2021-0920
...
CPE    3
cpe:/o:suse:suse_linux_enterprise_server:12:sp3
cpe:/o:linux:linux_kernel
cpe:/o:linux:linux_kernel:4.2.0

© SecPod Technologies