Anfälligkeitssuche        Suche in 211766 CVE Beschreibungen
und 97459 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2021.1865.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2021:1865-1)
Zusammenfassung:The remote host is missing an update for the 'Linux Kernel (Live Patch 35 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2021:1865-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'Linux Kernel (Live Patch 35 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2021:1865-1 advisory.

Vulnerability Insight:
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.

The following security issues were fixed:

Fix a kernel warning during sysfs read (bsc#1186235)

CVE-2020-36322: An issue was discovered in the FUSE filesystem
implementation in the Linux kernel aka CID-5d069dbe8aaf.
fuse_do_getattr() calls make_bad_inode() in inappropriate situations,
causing a system crash. NOTE: the original fix for this vulnerability
was incomplete, and its incompleteness is tracked as CVE-2021-28950
(bsc#1184952).

CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect
computation of branch displacements, allowing them to execute arbitrary
code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c
and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)

Affected Software/OS:
'Linux Kernel (Live Patch 35 for SLE 12 SP3)' package(s) on SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP3

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-36322
Common Vulnerability Exposure (CVE) ID: CVE-2021-28950
Common Vulnerability Exposure (CVE) ID: CVE-2021-29154
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 97459 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.