SUSE Security Update: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3389-1
Rating:             important
References:         #1177513 #1177727 #1177729 
Cross-References:   CVE-2020-12351 CVE-2020-24490 CVE-2020-25645
                   
Affected Products:
                    SUSE Linux Enterprise Module for Live Patching 15-SP2
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

   The following security issues were fixed:

   - CVE-2020-12351: Fixed a type confusion while processing AMP packets aka
     "BleedingTooth" aka "BadKarma" (bsc#1177724, bsc#1177729, bsc#1178397).
   - CVE-2020-24490: Fixed a heap buffer overflow when processing extended
     advertising report events aka "BleedingTooth" aka "BadVibes"
     (bsc#1177726, bsc#1177727).
   - CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between
     two Geneve endpoints to be unencrypted (bnc#1177513).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Live Patching 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-3389=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3390=1



Package List:

   - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64):

      kernel-livepatch-5_3_18-22-default-4-11.2
      kernel-livepatch-5_3_18-22-default-debuginfo-4-11.2
      kernel-livepatch-5_3_18-24_9-default-4-2.1
      kernel-livepatch-5_3_18-24_9-default-debuginfo-4-2.1
      kernel-livepatch-SLE15-SP2_Update_0-debugsource-4-11.2
      kernel-livepatch-SLE15-SP2_Update_1-debugsource-4-2.1


References:

   https://www.suse.com/security/cve/CVE-2020-12351.html
   https://www.suse.com/security/cve/CVE-2020-24490.html
   https://www.suse.com/security/cve/CVE-2020-25645.html
   https://bugzilla.suse.com/1177513
   https://bugzilla.suse.com/1177727
   https://bugzilla.suse.com/1177729