QID 174812

QID 174812: SUSE Enterprise Linux Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1) (SUSE-SU-2021:0859-1)

This update for the Linux Kernel 4.12.14-197_48 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which
could have granted unintended write access because of a race condition
in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over
(bsc#1182468).
- Fixed an issue where NFS client hanged on write errors (bsc#1182108).
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault
handling, allowing local users to execute code in the kernel
(bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led
to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI
target code which could have been used by remote attackers to read or
write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2021-0342: Fixed a potential memory corruption due to a use after
free which could have led to local escalation of privilege with System
execution privileges required (bsc#1180859).

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:0859-1 to address this issue and obtain further details.
    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:0859-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html