[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:3274-1 -- SLES kernel

ID: oval:org.secpod.oval:def:89047018Date: (C)2022-10-10   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c . - CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice . - CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets . - CVE-2022-2977: Fixed reference counting for struct tpm_chip . - CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module . - CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors . - CVE-2022-2588: Fixed use-after-free in cls_route . - CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs that allowed unprivileged local users to crash the machine . - CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c . - CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg . - CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers . - CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen . - CVE-2020-36558: Fixed a race condition involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault . - CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could have led to a use-after-free . - CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim"s TCP session . The following non-security bugs were fixed: - cifs: fix error paths in cifs_tree_connect . - cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share . - cifs: report error instead of invalid when revalidating a dentry fails . - cifs: skip trailing separators of prefix paths . - kernel-obs-build: include qemu_fw_cfg - lightnvm: Remove lightnvm implemenation . - mm/rmap.c: do not reuse anon_vma if we just want a copy . - mm/rmap: Fix anon_vma-degree ambiguity leading to double-reuse . - net_sched: cls_route: disallow handle of 0 . - objtool: Add --backtrace support . - objtool: Add support for intra-function calls . - objtool: Allow no-op CFI ops in alternatives . - objtool: Convert insn type to enum . - objtool: Do not use ignore flag for fake jumps . - objtool: Fix !CFI insn_state propagation . - objtool: Fix ORC vs alternatives . - objtool: Fix sibling call detection . - objtool: Make handle_insn_ops unconditional . - objtool: Remove INSN_STACK . - objtool: Remove check preventing branches within alternative . - objtool: Rename elf_open to prevent conflict with libelf from elftoolchain . - objtool: Rename struct cfi_state . - objtool: Rework allocating stack_ops on decode . - objtool: Rewrite alt-skip_orig . - objtool: Set insn-func for alternatives . - objtool: Support conditional retpolines . - objtool: Support multiple stack_op per instruction . - objtool: Track original function across branches . - objtool: Uniquely identify alternative instruction groups . - objtool: Use Elf_Scn typedef instead of assuming struct name . - powerpc/pci: Fix broken INTx configuration via OF . - powerpc/pci: Remove LSI mappings on device teardown . - powerpc/pci: Use of_irq_parse_and_map_pci helper . - rpm: Fix parsing of rpm/macros.kernel-source on SLE12 . Special Instructions and Notes: Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 12 SP4
Product:
kernel
Reference:
SUSE-SU-2022:3274-1
CVE-2020-36516
CVE-2020-36557
CVE-2020-36558
CVE-2021-4203
CVE-2022-20166
CVE-2022-20368
CVE-2022-20369
CVE-2022-21385
CVE-2022-2588
CVE-2022-26373
CVE-2022-2639
CVE-2022-2977
CVE-2022-3028
CVE-2022-36879
CVE-2022-36946
CVE    15
CVE-2021-4203
CVE-2022-2977
CVE-2020-36557
CVE-2022-3028
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:12:sp4
cpe:/o:linux:linux_kernel

© SecPod Technologies