Fecha de publicación: noviembre 18, 2022 5:21 pm Nivel de importancia: Alta
Sistemas Afectados
- openSUSE Leap 15.3
- openSUSE Leap 15.4
- openSUSE Leap Micro 5.2
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time 8 x86_64
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 8.1 x86_64
- Red Hat Enterprise Linux for x86_64 – Update Services for SAP Solutions 8.2 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 8.1 ppc64le
- Red Hat Enterprise Linux Server for Power LE – Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Satellite 6.12 x86_64
- Red Hat Satellite Capsule 6.12 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- SUSE Linux Enterprise High Performance Computing 15-SP3
- SUSE Linux Enterprise High Performance Computing 15-SP4
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Module for Live Patching 15-SP4
- SUSE Linux Enterprise Module for Public Cloud 15-SP3
- SUSE Linux Enterprise Module for Public Cloud 15-SP4
- SUSE Linux Enterprise Module for Realtime 15-SP3
- SUSE Linux Enterprise Real Time 15-SP3
- SUSE Linux Enterprise Real Time Extension 12-SP5
- SUSE Linux Enterprise Server 15-SP3
- SUSE Linux Enterprise Server 15-SP4
- SUSE Linux Enterprise Server for SAP Applications 15-SP3
- SUSE Linux Enterprise Server for SAP Applications 15-SP4
- SUSE Linux Enterprise Storage 7.1
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
Descripción
Se identificaron múltiples vulnerabilidades en el kernel de Linux. Un atacante remoto podría explotar algunas de estas vulnerabilidades para desencadenar una condición de denegación de servicio, elevación de privilegios, ejecución remota de código, divulgación de información confidencial, omisión de restricciones de seguridad y secuencias de comandos entre sitios en el sistema objetivo.
Referencia
- CVE-2020-36516
- CVE-2020-36558
- CVE-2021-3507
- CVE-2021-3611
- CVE-2021-3640
- CVE-2021-3750
- CVE-2021-4037
- CVE-2021-4158
- CVE-2021-30002
- CVE-2021-37136
- CVE-2021-37137
- CVE-2022-0168
- CVE-2022-0617
- CVE-2022-0854
- CVE-2022-0897
- CVE-2022-1016
- CVE-2022-1048
- CVE-2022-1055
- CVE-2022-1184
- CVE-2022-1280
- CVE-2022-1353
- CVE-2022-1679
- CVE-2022-1852
- CVE-2022-1882
- CVE-2022-1998
- CVE-2022-2078
- CVE-2022-2153
- CVE-2022-2211
- CVE-2022-2586
- CVE-2022-2588
- CVE-2022-2601
- CVE-2022-2639
- CVE-2022-2938
- CVE-2022-2964
- CVE-2022-2978
- CVE-2022-3169
- CVE-2022-3176
- CVE-2022-3424
- CVE-2022-3435
- CVE-2022-3521
- CVE-2022-3524
- CVE-2022-3526
- CVE-2022-3535
- CVE-2022-3542
- CVE-2022-3545
- CVE-2022-3565
- CVE-2022-3577
- CVE-2022-3586
- CVE-2022-3594
- CVE-2022-3619
- CVE-2022-3621
- CVE-2022-3623
- CVE-2022-3625
- CVE-2022-3628
- CVE-2022-3629
- CVE-2022-3633
- CVE-2022-3640
- CVE-2022-3646
- CVE-2022-3649
- CVE-2022-3775
- CVE-2022-3787
- CVE-2022-20368
- CVE-2022-21123
- CVE-2022-21125
- CVE-2022-21166
- CVE-2022-21499
- CVE-2022-22818
- CVE-2022-23645
- CVE-2022-23816
- CVE-2022-23825
- CVE-2022-23960
- CVE-2022-24448
- CVE-2022-24836
- CVE-2022-25648
- CVE-2022-26373
- CVE-2022-27950
- CVE-2022-28390
- CVE-2022-28748
- CVE-2022-28893
- CVE-2022-29581
- CVE-2022-29900
- CVE-2022-29901
- CVE-2022-29970
- CVE-2022-32209
- CVE-2022-33981
- CVE-2022-34265
- CVE-2022-36946
- CVE-2022-39189
- CVE-2022-39190
- CVE-2022-40476
- CVE-2022-40768
- CVE-2022-41674
- CVE-2022-42703
- CVE-2022-42719
- CVE-2022-42720
- CVE-2022-42721
- CVE-2022-42722
- CVE-2022-43750
Solución
Se recomienda aplicar las actualizaciones y correcciones emitidas por el proveedor en los productos afectados.
Suscríbete a nuestro boletín de alertas
Enlaces de interés
- CNCS e Idoppril suscriben acuerdo en favor de ciberseguridad nacional
- República Dominicana reúne a líderes de los Equipos de Respuesta ante Incidentes Cibernéticos (CSIRT’s) nacionales de América Latina y el Caribe
- Centro de Ciberseguridad presenta Plataforma de Concientización en Ciberseguridad al Infotep
- CNCS e Idoppril suscriben acuerdo en favor de ciberseguridad nacional
- República Dominicana reúne a líderes de los Equipos de Respuesta ante Incidentes Cibernéticos (CSIRT’s) nacionales de América Latina y el Caribe
- Centro de Ciberseguridad presenta Plataforma de Concientización en Ciberseguridad al Infotep
Siguenos
Este sitio web utiliza Cookies para garantizar la mejor experiencia del usuario. Si continúas utilizando este sitio asumiremos que estás de acuerdo. Leer más acerca del uso de Cookies.AceptarRechazar Leer más
Privacidad y Políticas de cookies
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.