Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU59473
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-36322
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists in the FUSE filesystem implementation in the Linux kernel due to fuse_do_getattr() calls make_bad_inode() in inappropriate situations. A local user can run a specially crafted program to trigger kernel crash.
Note, the vulnerability exists due to incomplete fix for #VU58207 (CVE-2021-28950).
Update the affected package the Linux Kernel (Live Patch 35 for SLE 12 SP3) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 12-SP3
SUSE Linux Enterprise Server: 12-SP3-LTSS
kgraft-patch-4_4_180-94_135-default-debuginfo: before 7-2.2
kgraft-patch-4_4_180-94_135-default: before 7-2.2
kgraft-patch-4_4_180-94_130-default-debuginfo: before 9-2.2
kgraft-patch-4_4_180-94_130-default: before 9-2.2
kgraft-patch-4_4_180-94_127-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_127-default: before 10-2.2
kgraft-patch-4_4_180-94_124-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_124-default: before 10-2.2
kgraft-patch-4_4_180-94_121-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_121-default: before 10-2.2
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211865-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58207
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-28950
CWE-ID:
CWE-834 - Excessive Iteration
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to excessive iteration in fs/fuse/fuse_i.h in the Linux kernel. A local user can run a specially crafted program to perform a denial of service attack.
Update the affected package the Linux Kernel (Live Patch 35 for SLE 12 SP3) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 12-SP3
SUSE Linux Enterprise Server: 12-SP3-LTSS
kgraft-patch-4_4_180-94_135-default-debuginfo: before 7-2.2
kgraft-patch-4_4_180-94_135-default: before 7-2.2
kgraft-patch-4_4_180-94_130-default-debuginfo: before 9-2.2
kgraft-patch-4_4_180-94_130-default: before 9-2.2
kgraft-patch-4_4_180-94_127-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_127-default: before 10-2.2
kgraft-patch-4_4_180-94_124-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_124-default: before 10-2.2
kgraft-patch-4_4_180-94_121-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_121-default: before 10-2.2
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211865-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56241
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-29154
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect computation of branch displacements within the BPF JIT compilers in the Linux kernel in arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c. A local user can inject and execute arbitrary commands with elevated privileges.
Update the affected package the Linux Kernel (Live Patch 35 for SLE 12 SP3) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP: 12-SP3
SUSE Linux Enterprise Server: 12-SP3-LTSS
kgraft-patch-4_4_180-94_135-default-debuginfo: before 7-2.2
kgraft-patch-4_4_180-94_135-default: before 7-2.2
kgraft-patch-4_4_180-94_130-default-debuginfo: before 9-2.2
kgraft-patch-4_4_180-94_130-default: before 9-2.2
kgraft-patch-4_4_180-94_127-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_127-default: before 10-2.2
kgraft-patch-4_4_180-94_124-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_124-default: before 10-2.2
kgraft-patch-4_4_180-94_121-default-debuginfo: before 10-2.2
kgraft-patch-4_4_180-94_121-default: before 10-2.2
External linkshttp://www.suse.com/support/update/announcement/2021/suse-su-20211865-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.