[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:3300923
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:3300885
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:88660
linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-lowlatency: Linux low latency kernel - linux-gkeop: Linux kernel for Google Container Engine systems - linux-intel-iotg: Linux kernel for Intel IoT platforms - linux-lowlatency-hwe-5.15: Linux low latency kernel - linux-oracle-5.15 ...

oval:org.secpod.oval:def:4501401
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF * kernel: FUSE filesystem low-privileged user privileges escala ...

oval:org.secpod.oval:def:708001
linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-gcp-4.15: Linux kernel for Google Cloud Platform systems - linux-oracle: Linux kernel for Oracle Cloud systems Several security issues were fixed in the Linu ...

oval:org.secpod.oval:def:1506344
[5.15.0-6.80.3.1.el9uek] - Revert rds: ib: Enable FC by default

oval:org.secpod.oval:def:1506301
[5.4.17-2136.314.6.2.el7] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el7] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to destroy_u ...

oval:org.secpod.oval:def:1506345
[5.15.0-6.80.3.1.el8] - Revert rds: ib: Enable FC by default

oval:org.secpod.oval:def:1701147
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch ...

oval:org.secpod.oval:def:1506340
[5.15.0-6.80.3.1.el8uek] - Revert rds: ib: Enable FC by default

oval:org.secpod.oval:def:1506308
[4.14.35-2047.520.3.1.el7uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883027] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883027] {CVE-2022-4378} - hugetlbfs: don"t delete error page from pagecache [Orabug: 34883072] - mm ...

oval:org.secpod.oval:def:707916
linux-raspi: Linux kernel for Raspberry Pi systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:1506309
[5.4.17-2136.314.6.2.el8] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el8] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to destroy_u ...

oval:org.secpod.oval:def:89048059
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-42328: Guests could trigger denial of service via the netback driver . - CVE-2022-42329: Gues ...

oval:org.secpod.oval:def:88658
linux-oem-5.14: Linux kernel for OEM systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:89048057
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-42328: Guests could trigger denial of service via the netback driver . - CVE-2022-42329: Guests c ...

oval:org.secpod.oval:def:707912
linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:89048056
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-42328: Guests could trigger denial of service via the netback driver . - CVE-2022-42329: Gues ...

oval:org.secpod.oval:def:1506503
[4.18.0-425.19.2.el8_7.OL8] - Update Oracle Linux certificates - Disable signing for aarch64 - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 ;lt;= 15.3-1.0.3 - Remove ...

oval:org.secpod.oval:def:1701145
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch ...

oval:org.secpod.oval:def:707999
linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform systems - linux-gke: Linux kernel for Google Container Engine systems - linux-gkeop: Linux kernel for Goo ...

oval:org.secpod.oval:def:89048055
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-42328: Guests could trigger denial of service via the netback driver . - CVE-2022-42329 ...

oval:org.secpod.oval:def:1506306
[5.4.17-2136.314.6.2] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to destroy_uobj [Or ...

oval:org.secpod.oval:def:88654
linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-gcp: Linux kernel for Google Cloud Platform systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-a ...

oval:org.secpod.oval:def:94912
linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:89464
linux-gke-5.15: Linux kernel for Google Container Engine systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:94911
linux-oem-5.17: Linux kernel for OEM systems - linux-oem-6.0: Linux kernel for OEM systems The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:94916
linux-gke: Linux kernel for Google Container Engine systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:94917
linux-hwe-5.19: Linux hardware enablement kernel Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:507595
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF * kernel: FUSE filesystem low-privileged user privileges escala ...

oval:org.secpod.oval:def:507550
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: use-after-free caused by l2cap_reassemble_sdu in net/bluetooth/l2cap_core.c * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * kernel: use-after-free in __nfs42_ssc_open i ...

oval:org.secpod.oval:def:1506311
[4.1.12-124.69.5.1.el7uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings

oval:org.secpod.oval:def:1506312
[5.4.17-2136.314.6.2.el8uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el8uek] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to des ...

oval:org.secpod.oval:def:1506313
[5.4.17-2136.314.6.2.el7] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el7] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to destroy_u ...

oval:org.secpod.oval:def:507558
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix: * kernel: use-after-free caused by l2cap_reassemble_sdu in net/bluetooth/l2cap_core.c * kernel: stack overflow in do_proc_dointvec and proc_skip_spac ...

oval:org.secpod.oval:def:1701136
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch ...

oval:org.secpod.oval:def:1506472
[3.10.0-1160.88.1.0.1.el7.OL7] - debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499} [3.10.0-1160.88.1.el7.OL7] - Update Oracle Linux certificates - Oracle Linux RHCK Module Signing Key was compiled into kernel - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 - U ...

oval:org.secpod.oval:def:1506310
[5.4.17-2136.314.6.2.el7uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883034] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883034] {CVE-2022-4378} [5.4.17-2136.314.6.1.el7uek] - RDMA/uverbs: Move IB_EVENT_DEVICE_FATAL to des ...

oval:org.secpod.oval:def:1701130
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch ...

oval:org.secpod.oval:def:707948
linux-gke: Linux kernel for Google Container Engine systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:1701135
Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an assumption in the rest of the Linux network stack that packet protocol hea ...

oval:org.secpod.oval:def:1701133
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this ...

oval:org.secpod.oval:def:89048074
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-3635: Fixed a use-after-free in the tst_timer of the file drivers/atm/idt77252.c . - CVE-2022 ...

oval:org.secpod.oval:def:89048073
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-42328: Guests could trigger denial of service via the netback driver . - CVE-2022-42329: Gues ...

oval:org.secpod.oval:def:3300984
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:707892
linux-oem-5.14: Linux kernel for OEM systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:707895
linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-lowlatency: Linux low latency kernel - linux-gkeop: Linux kernel for Google Container Engine systems - linux-intel-iotg: Linux kernel for Intel IoT platforms - linux-lowlatency-hwe-5.15: Linux low latency kernel - linux-oracle-5.15 ...

oval:org.secpod.oval:def:3300745
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:5800040
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: * kernel: use-after-free caused by l2cap_reassemble_sdu in net/bluetooth/l2cap_core.c * kernel: stack overflow in do_proc_dointvec and proc_sk ...

oval:org.secpod.oval:def:507565
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces For more details about the security issue, including the impact, a CVSS score, ackn ...

oval:org.secpod.oval:def:1506323
[5.15.0-5.76.5.1] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883037] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883037] {CVE-2022-4378} [5.15.0-5.76.5] - KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit ...

oval:org.secpod.oval:def:1506400
[4.14.35-2047.521.4.el7] - tcp: Tunables for TCP delayed ack timers [Orabug: 34883100] [4.14.35-2047.521.3.el7] - Revert "random: use expired timer rather than wq for mixing fast pool" [Orabug: 34918228] [4.14.35-2047.521.2.el7] - RDS/IB: Fix the misplaced counter update rdma dto path [Orabug: 3 ...

oval:org.secpod.oval:def:206019
Security Fix: kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free related to leaf anon_vma double reuse For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in ...

oval:org.secpod.oval:def:1506324
[4.1.12-124.69.5.1] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883048] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883048] {CVE-2022-4378}

oval:org.secpod.oval:def:1701126
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this ...

oval:org.secpod.oval:def:1506325
[4.14.35-2047.520.3.1.el7] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883027] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883027] {CVE-2022-4378} - hugetlbfs: don"t delete error page from pagecache [Orabug: 34883072] - mm: s ...

oval:org.secpod.oval:def:507568
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * kernel: use-after-free related to leaf anon_vma double reuse For more details about the security issue, including the impact, a CV ...

oval:org.secpod.oval:def:1701124
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch ...

oval:org.secpod.oval:def:1506327
[5.15.0-5.76.5.1] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34883037] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34883037] {CVE-2022-4378} [5.15.0-5.76.5] - KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit ...

oval:org.secpod.oval:def:1506405
[4.1.12-124.70.2] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34882781] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long [Orabug: 34882781] {CVE-2022-4378} - netfilter: nf_conntrack_irc: Fix forged IP logic [Orabug: 34872056] {CVE-2022-2663} - ...

oval:org.secpod.oval:def:1506329
[4.1.12-124.70.2.el7uek] - proc: proc_skip_spaces shouldn"t think it is working on C strings [Orabug: 34882781] {CVE-2022-4378} - proc: avoid integer type confusion in get_proc_long

oval:org.secpod.oval:def:89048063
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-42328: Guests could trigger denial of service via the netback driver . - CVE-2022-42329: Gues ...

oval:org.secpod.oval:def:89488
linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-dell300x: Linux kernel for Dell 300x platforms - linux-gcp-4.15: Linux kernel for Google Cloud Platform systems - linux-oracle: Linux kernel for Oracle Cloud systems Several security issues were fixed in the Linu ...

oval:org.secpod.oval:def:707962
linux-gke-5.15: Linux kernel for Google Container Engine systems Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:707965
linux-hwe-5.19: Linux hardware enablement kernel Several security issues were fixed in the Linux kernel.

oval:org.secpod.oval:def:89486
linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform systems - linux-gke: Linux kernel for Google Container Engine systems - linux-gkeop: Linux kernel for Goo ...

oval:org.secpod.oval:def:707887
linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services systems - linux-gcp: Linux kernel for Google Cloud Platform systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-a ...

oval:org.secpod.oval:def:2600166
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

oval:org.secpod.oval:def:707882
linux-oem-5.17: Linux kernel for OEM systems - linux-oem-6.0: Linux kernel for OEM systems The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:97726
[CLSA-2023:1682711481] kernel: Fix of 7 CVEs

oval:org.secpod.oval:def:2600163
The kernel packages contain the Linux kernel, the core of any Linux operating system.

oval:org.secpod.oval:def:97725
[CLSA-2023:1682705952] kernel: Fix of 7 CVEs

oval:org.secpod.oval:def:1506333
[4.14.35-2047.521.4.el7uek] - tcp: Tunables for TCP delayed ack timers [Orabug: 34883100] [4.14.35-2047.521.3.el7uek] - Revert random: use expired timer rather than wq for mixing fast pool

oval:org.secpod.oval:def:2501034
The kernel packages contain the Linux kernel, the core of any Linux operating system.

oval:org.secpod.oval:def:2501035
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

oval:org.secpod.oval:def:507614
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer ...

oval:org.secpod.oval:def:1506335
[5.4.17-2136.315.5.el7] - Revert xfs: fix use-after-free on CIL context on shutdown

oval:org.secpod.oval:def:1701158
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this ...

oval:org.secpod.oval:def:1507189
[2.6.32-754.35.1.0.10.el6.OL6] - proc: proc_skip_spaces shouldn"t think it is working on C strings {CVE-2022-4378} [Orabug: 35304147] - proc: avoid integer type confusion in get_proc_long {CVE-2022-4378} [Orabug: 35304147]

oval:org.secpod.oval:def:1506453
- [5.14.0-162.18.1.el9_1.OL9] - Update Oracle Linux certificates - Disable signing for aarch64 - Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list [Orabug: 29539237] - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64] - Remove nmap referenc ...

oval:org.secpod.oval:def:4501406
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF * kern ...

oval:org.secpod.oval:def:1701151
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this ...

oval:org.secpod.oval:def:89048068
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec . - CVE-2022-3635: Fixed a use-after-free in the tst_timer of the file drivers/atm/idt77252.c . - CVE-2022 ...

oval:org.secpod.oval:def:1506337
[5.4.17-2136.315.5.el7uek] - Revert xfs: Lower CIL flush limit for large logs [Orabug: 34917369] - Revert xfs: Throttle commits on delayed background CIL push [Orabug: 34917369] - Revert xfs: fix use-after-free on CIL context on shutdown [Orabug: 34917369] [5.4.17-2136.315.4.el7uek] - net/mlx5: S ...

oval:org.secpod.oval:def:1506338
[5.4.17-2136.315.5.el8] - Revert xfs: fix use-after-free on CIL context on shutdown

oval:org.secpod.oval:def:1506339
[5.4.17-2136.315.5.el8uek] - Revert xfs: Lower CIL flush limit for large logs

oval:org.secpod.oval:def:3301154
SUSE Security Update: Security update for the Linux Kernel

oval:org.secpod.oval:def:19500119
2023-05-11: CVE-2023-2019 was added to this advisory.A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system ...

oval:org.secpod.oval:def:507596
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix: * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF * kernel: FUS ...

oval:org.secpod.oval:def:1507165
[5.4.17-2136.325.5.el7] - perf symbols: Symbol lookup with kcore can fail if multiple segments match stext [Orabug: 35905508] - char: misc: Increase the maximum number of dynamic misc devices to 1048448 [Orabug: 35905508] - perf/arm-cmn: Fix invalid pointer when access dtc object sharing the same ...

CPE    1
cpe:/o:linux:linux_kernel
CWE    1
CWE-787
*CVE
CVE-2022-4378

© SecPod Technologies