Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2021.14764.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2021:14764-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2021:14764-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2021:14764-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

CVE-2021-0512: Fixed a possible out of bounds write due to a heap buffer
overflow in __hidinput_change_resolution_multipliers. This could lead to
local escalation of privilege with no additional execution privileges
needed. User interaction is not needed for exploitation. (bsc#1187595)

CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local
users to obtain sensitive information from kernel stack memory because
parts of a data structure are uninitialized. (bsc#1187452)

CVE-2020-36386: Fixed an out-of-bounds read in
hci_extended_inquiry_result_evt. (bsc#1187038)

CVE-2020-24588: Fixed a bug that could allow an adversary to abuse
devices that support receiving non-SSP A-MSDU frames to inject arbitrary
network packets. (bsc#1185861 bsc#1185863)

CVE-2021-29154: Fixed an incorrect computation of branch displacements
in the BPF JIT compilers, which could allow to execute arbitrary code
within the kernel context. (bsc#1184391)

CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c
for removal of the HCI controller. (bsc#1184611)

CVE-2020-24586: Fixed a bug that, under the right circumstances, allows
to inject arbitrary network packets and/or exfiltrate user data when
another device sends fragmented frames encrypted using WEP, CCMP, or
GCMP. (bsc#1185859 bsc#1185863)

CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward
EAPOL frames to other clients even though the sender has not yet
successfully authenticated. This might be abused in projected Wi-Fi
networks to launch denial-of-service attacks against connected clients
and made it easier to exploit other vulnerabilities in connected
clients. (bsc#1185863 bsc#1186062)

CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected
fragments when another device sends fragmented frames and the WEP, CCMP,
or GCMP encryption key is periodically renewed. (bsc#1185862 bsc#1185863)

The following non-security bugs were fixed:

md: do not flush workqueue unconditionally in md_open (bsc#1184081).

md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).

md: md_open returns -EBUSY when entering racing area (bsc#1184081).

md: split mddev_find (bsc#1184081).

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 11-SP4.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-0512
https://source.android.com/security/bulletin/2021-06-01
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.