vulnerability

SUSE: CVE-2021-20265: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Mar 10, 2021
Added
Dec 2, 2021
Modified
Oct 26, 2022

Description

A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.

Solutions

suse-upgrade-cluster-md-kmp-defaultsuse-upgrade-dlm-kmp-defaultsuse-upgrade-gfs2-kmp-defaultsuse-upgrade-kernel-bigmemsuse-upgrade-kernel-bigmem-basesuse-upgrade-kernel-bigmem-develsuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-basesuse-upgrade-kernel-default-develsuse-upgrade-kernel-default-kgraftsuse-upgrade-kernel-default-mansuse-upgrade-kernel-develsuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-basesuse-upgrade-kernel-ec2-develsuse-upgrade-kernel-macrossuse-upgrade-kernel-paesuse-upgrade-kernel-pae-basesuse-upgrade-kernel-pae-develsuse-upgrade-kernel-ppc64suse-upgrade-kernel-ppc64-basesuse-upgrade-kernel-ppc64-develsuse-upgrade-kernel-sourcesuse-upgrade-kernel-symssuse-upgrade-kernel-tracesuse-upgrade-kernel-trace-basesuse-upgrade-kernel-trace-develsuse-upgrade-kernel-xensuse-upgrade-kernel-xen-basesuse-upgrade-kernel-xen-develsuse-upgrade-kgraft-patch-4_4_180-94_150-defaultsuse-upgrade-ocfs2-kmp-default
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.