SUSE: 2020:3188-1 important: the Linux Kernel (Live Patch 15 for SLE 15 SP1)
Summary
This update for the Linux Kernel 4.12.14-197_56 fixes several issues. The following security issues were fixed: - CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011). - CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Live Patching 15-SP1: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-3188=1 Package List: - SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64): kernel-livepatch-4_12_14-197_56-default-2-2.1
References
#1176012 #1176382
Cross- CVE-2020-14381 CVE-2020-25212
Affected Products:
SUSE Linux Enterprise Module for Live Patching 15-SP1
https://www.suse.com/security/cve/CVE-2020-14381.html
https://www.suse.com/security/cve/CVE-2020-25212.html
https://bugzilla.suse.com/1176012
https://bugzilla.suse.com/1176382