QID 750675

Date Published: 2021-06-24

QID 750675: SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (SUSE-SU-2021:2026-1)

This update for the linux kernel 4.4.180-94_144 fixes several issues.
the following issues were fixed: - cve-2021-33034: fixed a use-after-free when destroying an hci_chan.
This could lead to writing an arbitrary values (bsc#1186111).
- cve-2021-28688: fixed an issue introduced by xsa-365, leaving around zombie domains after xen guest has died (bsc#1183646).
- cve-2020-0429: in l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free.
This could lead to local escalation of privilege with system execution privileges needed. (
Bsc#1176724).
- fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 4.6 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2026-1 to address this issue and obtain further details.

    CVEs related to QID 750675

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2026-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html