Oval Definition:oval:org.opensuse.security:def:65941
Revision Date:2020-12-01Version:1
Title:Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP1) (Important)
Description:

This update for the Linux Kernel 4.12.14-197_40 fixes several issues.

The following security issues were fixed:

- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011). - CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722) - CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381). - CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069). - CVE-2020-24394: The NFS server code can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support. This occurs because the current umask is not considered (bsc#1175518).
Family:unixClass:patch
Status:Reference(s):1055014
1058115
1061843
1065600
1065729
1066382
1077428
1112178
1131277
1134760
1140683
1163592
1167030
1168468
1170415
1170446
1170630
1171558
1171675
1172538
1172873
1173432
1174748
1175306
1175520
1175721
1175992
1176012
1176072
1176354
1176381
1176382
1176400
1176485
1176560
1176713
1176723
1176855
1176896
1176907
1176946
1176983
1177027
1177086
1177101
1177258
1177271
1177281
1177340
1177410
1177411
1177470
1177511
1177513
1177685
1177687
1177703
1177719
1177724
1177725
1177740
1177749
1177750
1177753
1177754
1177755
1177766
1177819
1177820
1177855
1177856
1177861
1178003
1178027
1178123
1178166
1178182
1178185
1178187
1178188
1178202
1178234
1178330
1178393
1178589
1178591
1178622
1178686
1178700
1178765
1178782
1178838
1178878
927455
CVE-2020-0430
CVE-2020-0431
CVE-2020-12351
CVE-2020-12352
CVE-2020-14351
CVE-2020-14381
CVE-2020-14386
CVE-2020-16120
CVE-2020-24394
CVE-2020-25212
CVE-2020-25285
CVE-2020-25645
CVE-2020-25656
CVE-2020-25668
CVE-2020-25669
CVE-2020-25704
CVE-2020-25705
CVE-2020-8694
SUSE-SU-2020:3180-1
SUSE-SU-2020:3484-1
Platform(s):SUSE Linux Enterprise Module for Live Patching 15 SP1
SUSE Linux Enterprise Module for Public Cloud 15 SP1
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Module for Live Patching 15 SP1 is installed
  • AND Package Information
  • kernel-livepatch-4_12_14-197_40-default-5-2 is installed
  • OR kernel-livepatch-SLE15-SP1_Update_11-5-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Public Cloud 15 SP1 is installed
  • AND Package Information
  • kernel-azure-4.12.14-8.52 is installed
  • OR kernel-azure-base-4.12.14-8.52 is installed
  • OR kernel-azure-devel-4.12.14-8.52 is installed
  • OR kernel-devel-azure-4.12.14-8.52 is installed
  • OR kernel-source-azure-4.12.14-8.52 is installed
  • OR kernel-syms-azure-4.12.14-8.52 is installed
  • BACK