Revision Date: | 2020-11-05 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1) (Important) |
Description: |
This update for the Linux Kernel 4.12.14-197_45 fixes several issues.
The following security issues were fixed:
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011). - CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381). - CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069). - CVE-2020-24394: The NFS server code can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support. This occurs because the current umask is not considered (bsc#1175518).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1175992 1176012 1176072 1176382 CVE-2020-14381 CVE-2020-14386 CVE-2020-24394 CVE-2020-25212 SUSE-SU-2020:3190-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP1 SUSE Linux Enterprise Module for Live Patching 15 SP1 SUSE Linux Enterprise Server 15 SP1 SUSE Linux Enterprise Server for SAP Applications 15 SP1
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 SP1 is installed AND kernel-livepatch-4_12_14-197_45-default-3-2.2 is installed
|