Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
SUSE: Security Advisory (SUSE-SU-2021:2538-1)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update for the 'Linux Kernel (Live Patch 36 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2021:2538-1 advisory.
Insight
Insight
This update for the Linux Kernel 4.4.180-94_135 fixes several issues. The following security issues were fixed: CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062) CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116) CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
Affected Software
Affected Software
'Linux Kernel (Live Patch 36 for SLE 12 SP3)' package(s) on SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Module for Live Patching 15-SP2, SUSE Linux Enterprise Module for Live Patching 15-SP1, SUSE Linux Enterprise Module for Live Patching 15, SUSE Linux Enterprise Live Patching 12-SP5, SUSE Linux Enterprise Live Patching 12-SP4.
Detection Method
Detection Method
Checks if a vulnerable package version is present on the target host.
Solution
Solution
Please install the updated package(s).