QID 750947
Date Published: 2021-08-11
QID 750947: SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2644-1)
The suse linux enterprise 12 sp5 azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed: - cve-2021-3659: fixed a null pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- cve-2021-22543: fixed improper handling of vm_io|vm_pfnmap vmas in kvm, which could bypass ro checks and can lead to pages being freed while still accessible by the vmm and guest.
This allowed users with the ability to start and control a vm to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- cve-2021-37576: fixed an issue on the powerpc platform, where a kvm guest os user could cause host os memory corruption via rtas_args.nargs (bsc#1188838).
- cve-2020-0429: in l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free.
This could lead to local escalation of privilege with system execution privileges needed. (
Bsc#1176724).
- cve-2020-36386: fixed a slab out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038).
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:2644-1 -
lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html
CVEs related to QID 750947
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:2644-1 | SUSE Enterprise Linux |
|