Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux

Multiple vulnerabilities were identified in Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure and security restriction bypass on the targeted system.
[Updated on 2022-11-14]
Updated System / Technologies affected, Solutions and Related Links.
Impact
- Denial of Service
- Elevation of Privilege
- Information Disclosure
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- openSUSE Leap 15.3
- openSUSE Leap Micro 5.2
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- SUSE Linux Enterprise High Performance Computing 15-SP3
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Module for Public Cloud 15-SP3
- SUSE Linux Enterprise Module for Realtime 15-SP3
- SUSE Linux Enterprise Real Time 15-SP3
- SUSE Linux Enterprise Real Time Extension 12-SP5
- SUSE Linux Enterprise Server 15-SP3
- SUSE Linux Enterprise Server for SAP Applications 15-SP3
- SUSE Linux Enterprise Storage 7.1
- SUSE Manager Proxy 4.2
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Server 4.2
Solutions
Before installation of the software, please visit the vendor web-site for more details.
For RedHat
Apply fixes issued by the vendor:
- https://access.redhat.com/errata/RHSA-2022:7444
- https://access.redhat.com/errata/RHSA-2022:7472
- https://access.redhat.com/errata/RHSA-2022:7683
- https://access.redhat.com/errata/RHSA-2022:7885
For SUSE
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2022/suse-su-20223897-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20223929-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20223930-1/
Vulnerability Identifier
- CVE-2020-36516
- CVE-2020-36558
- CVE-2021-3507
- CVE-2021-3640
- CVE-2021-4037
- CVE-2021-30002
- CVE-2022-0168
- CVE-2022-0617
- CVE-2022-0854
- CVE-2022-0897
- CVE-2022-1016
- CVE-2022-1048
- CVE-2022-1055
- CVE-2022-1184
- CVE-2022-1852
- CVE-2022-2078
- CVE-2022-2153
- CVE-2022-2211
- CVE-2022-2586
- CVE-2022-2588
- CVE-2022-2639
- CVE-2022-2938
- CVE-2022-2964
- CVE-2022-2978
- CVE-2022-3169
- CVE-2022-3176
- CVE-2022-3424
- CVE-2022-3521
- CVE-2022-3524
- CVE-2022-3535
- CVE-2022-3542
- CVE-2022-3545
- CVE-2022-3565
- CVE-2022-3577
- CVE-2022-3586
- CVE-2022-3594
- CVE-2022-3621
- CVE-2022-3623
- CVE-2022-3625
- CVE-2022-3629
- CVE-2022-3640
- CVE-2022-3646
- CVE-2022-3649
- CVE-2022-20368
- CVE-2022-21499
- CVE-2022-23645
- CVE-2022-23960
- CVE-2022-24448
- CVE-2022-26373
- CVE-2022-27950
- CVE-2022-28390
- CVE-2022-28748
- CVE-2022-28893
- CVE-2022-29581
- CVE-2022-36946
- CVE-2022-39189
- CVE-2022-40768
- CVE-2022-41674
- CVE-2022-42703
- CVE-2022-42719
- CVE-2022-42720
- CVE-2022-42721
- CVE-2022-42722
- CVE-2022-43750
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2022.5736
- https://www.auscert.org.au/bulletins/ESB-2022.5717
- https://www.auscert.org.au/bulletins/ESB-2022.5706
- https://www.auscert.org.au/bulletins/ESB-2022.5811
- https://www.auscert.org.au/bulletins/ESB-2022.5813
- https://access.redhat.com/errata/RHSA-2022:7444
- https://access.redhat.com/errata/RHSA-2022:7472
- https://access.redhat.com/errata/RHSA-2022:7683
- https://access.redhat.com/errata/RHSA-2022:7885
- https://www.suse.com/support/update/announcement/2022/suse-su-20223897-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20223929-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20223930-1/
沒有留言:
發佈留言