Revision Date: | 2020-11-05 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important) |
Description: |
This update for the Linux Kernel 5.3.18-22 fixes several issues.
The following security issues were fixed:
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381). - CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069). - CVE-2020-24394: The NFS server code can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support. This occurs because the current umask is not considered (bsc#1175518).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1175992 1176072 1176382 CVE-2020-14386 CVE-2020-24394 CVE-2020-25212 SUSE-SU-2020:3187-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Module for Live Patching 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed AND kernel-livepatch-5_3_18-22-default-3-8.2 is installed
|