Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP1) (Important) |
Description: |
This update for the Linux Kernel 4.12.14-197_40 fixes several issues.
The following security issues were fixed:
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011). - CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722) - CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381). - CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069). - CVE-2020-24394: The NFS server code can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support. This occurs because the current umask is not considered (bsc#1175518).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1055014 1058115 1061843 1065600 1065729 1066382 1077428 1112178 1131277 1134760 1140683 1163592 1167030 1168468 1170415 1170446 1170630 1171558 1171675 1172538 1172873 1173432 1174748 1175306 1175520 1175721 1175992 1176012 1176072 1176354 1176381 1176382 1176400 1176485 1176560 1176713 1176723 1176855 1176896 1176907 1176946 1176983 1177027 1177086 1177101 1177258 1177271 1177281 1177340 1177410 1177411 1177470 1177511 1177513 1177685 1177687 1177703 1177719 1177724 1177725 1177740 1177749 1177750 1177753 1177754 1177755 1177766 1177819 1177820 1177855 1177856 1177861 1178003 1178027 1178123 1178166 1178182 1178185 1178187 1178188 1178202 1178234 1178330 1178393 1178589 1178591 1178622 1178686 1178700 1178765 1178782 1178838 1178878 927455 CVE-2020-0430 CVE-2020-0431 CVE-2020-12351 CVE-2020-12352 CVE-2020-14351 CVE-2020-14381 CVE-2020-14386 CVE-2020-16120 CVE-2020-24394 CVE-2020-25212 CVE-2020-25285 CVE-2020-25645 CVE-2020-25656 CVE-2020-25668 CVE-2020-25669 CVE-2020-25704 CVE-2020-25705 CVE-2020-8694 SUSE-SU-2020:3180-1 SUSE-SU-2020:3484-1
|
Platform(s): | SUSE Linux Enterprise Module for Live Patching 15 SP1 SUSE Linux Enterprise Module for Public Cloud 15 SP1
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 SP1 is installed AND Package Information
kernel-livepatch-4_12_14-197_40-default-5-2 is installed
OR kernel-livepatch-SLE15-SP1_Update_11-5-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Public Cloud 15 SP1 is installed
AND Package Information
kernel-azure-4.12.14-8.52 is installed
OR kernel-azure-base-4.12.14-8.52 is installed
OR kernel-azure-devel-4.12.14-8.52 is installed
OR kernel-devel-azure-4.12.14-8.52 is installed
OR kernel-source-azure-4.12.14-8.52 is installed
OR kernel-syms-azure-4.12.14-8.52 is installed
|