Описание
Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3)
This update for the Linux Kernel 4.4.180-94_130 fixes several issues.
The following security issues were fixed:
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).
- CVE-2020-1749: A flaw was found in the implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link, rather sending the data unencrypted. This would have allowed anyone in between the two endpoints to read the traffic unencrypted. (bsc#1165629)
Список пакетов
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP3
Ссылки
- Link for SUSE-SU-2020:3219-1
- E-Mail link for SUSE-SU-2020:3219-1
- SUSE Security Ratings
- SUSE Bug 1165631
- SUSE Bug 1173942
- SUSE Bug 1176012
- SUSE Bug 1176382
- SUSE Bug 1176896
- SUSE Bug 1176931
- SUSE CVE CVE-2020-0429 page
- SUSE CVE CVE-2020-0431 page
- SUSE CVE CVE-2020-11668 page
- SUSE CVE CVE-2020-14381 page
- SUSE CVE CVE-2020-1749 page
- SUSE CVE CVE-2020-25212 page
Описание
In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806
Затронутые продукты
Ссылки
- CVE-2020-0429
- SUSE Bug 1176724
- SUSE Bug 1176931
- SUSE Bug 1188026
Описание
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
Затронутые продукты
Ссылки
- CVE-2020-0431
- SUSE Bug 1176722
- SUSE Bug 1176896
Описание
In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
Затронутые продукты
Ссылки
- CVE-2020-11668
- SUSE Bug 1168952
- SUSE Bug 1173942
Описание
A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Затронутые продукты
Ссылки
- CVE-2020-14381
- SUSE Bug 1176011
- SUSE Bug 1176012
Описание
A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
Затронутые продукты
Ссылки
- CVE-2020-1749
- SUSE Bug 1165629
- SUSE Bug 1165631
- SUSE Bug 1177511
- SUSE Bug 1177513
- SUSE Bug 1189302
Описание
A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
Затронутые продукты
Ссылки
- CVE-2020-25212
- SUSE Bug 1176381
- SUSE Bug 1176382
- SUSE Bug 1177027