[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2023:3324-1 -- SLES kernel

ID: oval:org.secpod.oval:def:89049268Date: (C)2023-08-30   (M)2024-04-25
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2018-20784: Fixed a denial of service by mishandled leaf cfs_rq in kernel/sched/fair.c . * CVE-2018-3639: Fixed Speculative Store Bypass aka 'Memory Disambiguation' . * CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' . * CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec . * CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM . * CVE-2023-20569: Fixed side channel attack 'Inception' or 'RAS Poisoning' . * CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information . * CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service . * CVE-2023-3106: Fixed crash in XFRM_MSG_GETSA netlink handler . * CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs . * CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege . * CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c . * CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq. * CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after- free . The following non-security bugs were fixed: * net/sched: sch_qfq: refactor parsing of netlink parameters . * ubi: Fix failure attaching when vid_hdr offset equals to page size . * ubi: ensure that VID header offset + VID header size less than;= alloc, size . * x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 No it"s not git-fixes it"s used to make sle12-sp2 compile with newer toolchain to make the life of all the poor souls maintaining this ancient kernel on their modern machines, a little bit easier.... ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
kernel
Reference:
SUSE-SU-2023:3324-1
CVE-2018-20784
CVE-2018-3639
CVE-2022-40982
CVE-2023-0459
CVE-2023-1637
CVE-2023-20569
CVE-2023-20593
CVE-2023-2985
CVE-2023-3106
CVE-2023-3268
CVE-2023-35001
CVE-2023-3567
CVE-2023-3611
CVE-2023-3776
CVE    14
CVE-2023-3106
CVE-2022-40982
CVE-2023-20593
CVE-2023-3268
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:12:sp2
cpe:/o:linux:linux_kernel

© SecPod Technologies