QID 174818

QID 174818: SUSE Enterprise Linux Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP5) (SUSE-SU-2021:0809-1)

This update for the Linux Kernel 4.12.14-122_57 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which
could have granted unintended write access because of a race condition
in a THP mapcount check (bsc#1179664).
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault
handling, allowing local users to execute code in the kernel
(bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led
to memory corruption or privilege escalation (bsc#1179616).
- CVE-2021-0342: Fixed a potential memory corruption due to a use after
free which could have led to local escalation of privilege with System
execution privileges required (bsc#1180859).

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:0809-1 to address this issue and obtain further details.

    CVEs related to QID 174818

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:0809-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html