SUSE: 2020:3402-1 important: the Linux Kernel (Live Patch 9 for SLE 15 SP1)
Summary
This update for the Linux Kernel 4.12.14-197_34 fixes several issues. The following security issues were fixed: - CVE-2020-12351: Fixed a type confusion while processing AMP packets aka "BleedingTooth" aka "BadKarma" (bsc#1177724, bsc#1177729, bsc#1178397). - CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-3386=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3387=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3388=1 - SUSE Linux Enterprise Module for Live Patching 15-SP1: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-3402=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3403=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3404=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3405=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3406=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3407=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3408=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3409=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3410=1 - SUSE Linux Enterprise Live Patching 12-SP5: zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-3391=1 SUSE-SLE-Live-Patching-12-SP5-2020-3392=1 SUSE-SLE-Live-Patching-12-SP5-2020-3393=1 SUSE-SLE-Live-Patching-12-SP5-2020-3394=1 SUSE-SLE-Live-Patching-12-SP5-2020-3395=1 SUSE-SLE-Live-Patching-12-SP5-2020-3396=1 SUSE-SLE-Live-Patching-12-SP5-2020-3397=1 SUSE-SLE-Live-Patching-12-SP5-2020-3398=1 SUSE-SLE-Live-Patching-12-SP5-2020-3399=1 Package List: - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-24_12-default-3-2.1 kernel-livepatch-5_3_18-24_12-default-debuginfo-3-2.1 kernel-livepatch-5_3_18-24_15-default-3-2.1 kernel-livepatch-5_3_18-24_15-default-debuginfo-3-2.1 kernel-livepatch-5_3_18-24_24-default-3-2.1 kernel-livepatch-5_3_18-24_24-default-debuginfo-3-2.1 kernel-livepatch-SLE15-SP2_Update_2-debugsource-3-2.1 kernel-livepatch-SLE15-SP2_Update_3-debugsource-3-2.1 kernel-livepatch-SLE15-SP2_Update_4-debugsource-3-2.1 - SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64): kernel-livepatch-4_12_14-197_29-default-8-2.2 kernel-livepatch-4_12_14-197_34-default-7-2.2 kernel-livepatch-4_12_14-197_37-default-7-2.2 kernel-livepatch-4_12_14-197_40-default-6-2.2 kernel-livepatch-4_12_14-197_45-default-4-2.2 kernel-livepatch-4_12_14-197_48-default-4-2.1 kernel-livepatch-4_12_14-197_51-default-4-2.1 kernel-livepatch-4_12_14-197_56-default-3-2.1 kernel-livepatch-4_12_14-197_61-default-2-2.1 - SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64): kgraft-patch-4_12_14-122_17-default-7-2.2 kgraft-patch-4_12_14-122_20-default-6-2.2 kgraft-patch-4_12_14-122_23-default-4-2.2 kgraft-patch-4_12_14-122_26-default-4-2.2 kgraft-patch-4_12_14-122_29-default-4-2.1 kgraft-patch-4_12_14-122_32-default-4-2.1 kgraft-patch-4_12_14-122_37-default-3-2.1 kgraft-patch-4_12_14-122_41-default-2-2.1 - SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le x86_64): kgraft-patch-4_12_14-122_12-default-8-2.2
References
#1177513 #1177729
Cross- CVE-2020-12351 CVE-2020-25645
Affected Products:
SUSE Linux Enterprise Module for Live Patching 15-SP2
SUSE Linux Enterprise Module for Live Patching 15-SP1
SUSE Linux Enterprise Live Patching 12-SP5
https://www.suse.com/security/cve/CVE-2020-12351.html
https://www.suse.com/security/cve/CVE-2020-25645.html
https://bugzilla.suse.com/1177513
https://bugzilla.suse.com/1177729