SUSE Linux Kernel Multiple Vulnerabilities
Last Update Date:
7 Jun 2022
Release Date:
6 Jun 2022
6775
Views
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in SUSE Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege and security restriction bypass on the targeted system.
[Updated on 2022-06-07]
Updated System / Technologies affected, Solutions and Related Links.
Impact
- Elevation of Privilege
- Security Restriction Bypass
System / Technologies affected
- SUSE Linux Enterprise High Performance Computing 15
- SUSE Linux Enterprise High Performance Computing 15-SP1
- SUSE Linux Enterprise High Performance Computing 15-SP2
- SUSE Linux Enterprise High Performance Computing 15-SP3
- SUSE Linux Enterprise Live Patching 12-SP4
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Module for Live Patching 15
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Module for Live Patching 15-SP2
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- SUSE Linux Enterprise Server 15
- SUSE Linux Enterprise Server 15-SP1
- SUSE Linux Enterprise Server 15-SP2
- SUSE Linux Enterprise Server 15-SP3
- SUSE Linux Enterprise Server for SAP Applications 15
- SUSE Linux Enterprise Server for SAP Applications 15-SP1
- SUSE Linux Enterprise Server for SAP Applications 15-SP2
- SUSE Linux Enterprise Server for SAP Applications 15-SP3
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2022/suse-su-20222000-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221988-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221974-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221955-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221949-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221948-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221947-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221945-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221942-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221940-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221939-1
Vulnerability Identifier
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2022.2790
- https://www.auscert.org.au/bulletins/ESB-2022.2789
- https://www.auscert.org.au/bulletins/ESB-2022.2788
- https://www.auscert.org.au/bulletins/ESB-2022.2752
- https://www.auscert.org.au/bulletins/ESB-2022.2751
- https://www.auscert.org.au/bulletins/ESB-2022.2750
- https://www.auscert.org.au/bulletins/ESB-2022.2749
- https://www.suse.com/support/update/announcement/2022/suse-su-20222000-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221988-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221974-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221955-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20221949-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221948-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221947-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221945-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221942-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221940-1
- https://www.suse.com/support/update/announcement/2022/suse-su-20221939-1
Share with