|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2021:1865-1)|
|Summary:||The remote host is missing an update for the 'Linux Kernel (Live Patch 35 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2021:1865-1 advisory.|
The remote host is missing an update for the 'Linux Kernel (Live Patch 35 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2021:1865-1 advisory.
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.
The following security issues were fixed:
Fix a kernel warning during sysfs read (bsc#1186235)
CVE-2020-36322: An issue was discovered in the FUSE filesystem
implementation in the Linux kernel aka CID-5d069dbe8aaf.
fuse_do_getattr() calls make_bad_inode() in inappropriate situations,
causing a system crash. NOTE: the original fix for this vulnerability
was incomplete, and its incompleteness is tracked as CVE-2021-28950
CVE-2021-29154: BPF JIT compilers in the Linux kernel have incorrect
computation of branch displacements, allowing them to execute arbitrary
code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c
and arch/x86/net/bpf_jit_comp32.c (bsc#1184710)
'Linux Kernel (Live Patch 35 for SLE 12 SP3)' package(s) on SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-36322|
Common Vulnerability Exposure (CVE) ID: CVE-2021-28950
Common Vulnerability Exposure (CVE) ID: CVE-2021-29154
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.