SUSE Security Update: Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3651-1
Rating:             important
References:         #1178622 #1178700 #1178783 
Cross-References:   CVE-2020-25668 CVE-2020-25705 CVE-2020-8694
                   
Affected Products:
                    SUSE Linux Enterprise Server for SAP 12-SP3
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server 12-SP3-LTSS
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Module for Live Patching 15-SP2
                    SUSE Linux Enterprise Module for Live Patching 15
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for the Linux Kernel 4.4.180-94_121 fixes several issues.

   The following security issues were fixed:

   - CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op
     (bsc#1178622).
   - CVE-2020-8694: Fixed an insufficient access control in the Linux kernel
     driver for some Intel(R) Processors which might have allowed an
     authenticated user to potentially enable information disclosure via
     local access (bsc#1178700).
   - CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote
     user to effectively bypass source port UDP randomization (bsc#1178783).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 12-SP3:

      zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-3649=1 SUSE-SLE-SAP-12-SP3-2020-3650=1 SUSE-SLE-SAP-12-SP3-2020-3651=1 SUSE-SLE-SAP-12-SP3-2020-3652=1 SUSE-SLE-SAP-12-SP3-2020-3654=1 SUSE-SLE-SAP-12-SP3-2020-3655=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-3644=1 SUSE-SLE-SAP-12-SP2-2020-3645=1 SUSE-SLE-SAP-12-SP2-2020-3646=1 SUSE-SLE-SAP-12-SP2-2020-3647=1

   - SUSE Linux Enterprise Server 12-SP3-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-3649=1 SUSE-SLE-SERVER-12-SP3-2020-3650=1 SUSE-SLE-SERVER-12-SP3-2020-3651=1 SUSE-SLE-SERVER-12-SP3-2020-3652=1 SUSE-SLE-SERVER-12-SP3-2020-3654=1 SUSE-SLE-SERVER-12-SP3-2020-3655=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-3644=1 SUSE-SLE-SERVER-12-SP2-2020-3645=1 SUSE-SLE-SERVER-12-SP2-2020-3646=1 SUSE-SLE-SERVER-12-SP2-2020-3647=1

   - SUSE Linux Enterprise Module for Live Patching 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-3691=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3692=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3693=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3694=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3695=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3696=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3697=1

   - SUSE Linux Enterprise Module for Live Patching 15:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2020-3676=1 SUSE-SLE-Module-Live-Patching-15-2020-3677=1 SUSE-SLE-Module-Live-Patching-15-2020-3678=1 SUSE-SLE-Module-Live-Patching-15-2020-3679=1



Package List:

   - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):

      kgraft-patch-4_4_180-94_113-default-9-2.2
      kgraft-patch-4_4_180-94_113-default-debuginfo-9-2.2
      kgraft-patch-4_4_180-94_116-default-6-2.2
      kgraft-patch-4_4_180-94_116-default-debuginfo-6-2.2
      kgraft-patch-4_4_180-94_121-default-5-2.2
      kgraft-patch-4_4_180-94_121-default-debuginfo-5-2.2
      kgraft-patch-4_4_180-94_124-default-5-2.2
      kgraft-patch-4_4_180-94_124-default-debuginfo-5-2.2
      kgraft-patch-4_4_180-94_127-default-5-2.1
      kgraft-patch-4_4_180-94_127-default-debuginfo-5-2.1
      kgraft-patch-4_4_180-94_130-default-4-2.1
      kgraft-patch-4_4_180-94_130-default-debuginfo-4-2.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

      kgraft-patch-4_4_121-92_129-default-7-2.2
      kgraft-patch-4_4_121-92_135-default-5-2.2
      kgraft-patch-4_4_121-92_138-default-5-2.1
      kgraft-patch-4_4_121-92_141-default-4-2.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):

      kgraft-patch-4_4_180-94_113-default-9-2.2
      kgraft-patch-4_4_180-94_113-default-debuginfo-9-2.2
      kgraft-patch-4_4_180-94_116-default-6-2.2
      kgraft-patch-4_4_180-94_116-default-debuginfo-6-2.2
      kgraft-patch-4_4_180-94_121-default-5-2.2
      kgraft-patch-4_4_180-94_121-default-debuginfo-5-2.2
      kgraft-patch-4_4_180-94_124-default-5-2.2
      kgraft-patch-4_4_180-94_124-default-debuginfo-5-2.2
      kgraft-patch-4_4_180-94_127-default-5-2.1
      kgraft-patch-4_4_180-94_127-default-debuginfo-5-2.1
      kgraft-patch-4_4_180-94_130-default-4-2.1
      kgraft-patch-4_4_180-94_130-default-debuginfo-4-2.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le x86_64):

      kgraft-patch-4_4_121-92_129-default-7-2.2
      kgraft-patch-4_4_121-92_135-default-5-2.2
      kgraft-patch-4_4_121-92_138-default-5-2.1
      kgraft-patch-4_4_121-92_141-default-4-2.1

   - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64):

      kernel-livepatch-5_3_18-22-default-5-5.2
      kernel-livepatch-5_3_18-22-default-debuginfo-5-5.2
      kernel-livepatch-5_3_18-24_12-default-4-2.1
      kernel-livepatch-5_3_18-24_12-default-debuginfo-4-2.1
      kernel-livepatch-5_3_18-24_15-default-4-2.1
      kernel-livepatch-5_3_18-24_15-default-debuginfo-4-2.1
      kernel-livepatch-5_3_18-24_24-default-4-2.1
      kernel-livepatch-5_3_18-24_24-default-debuginfo-4-2.1
      kernel-livepatch-5_3_18-24_29-default-2-2.1
      kernel-livepatch-5_3_18-24_29-default-debuginfo-2-2.1
      kernel-livepatch-5_3_18-24_34-default-2-2.1
      kernel-livepatch-5_3_18-24_34-default-debuginfo-2-2.1
      kernel-livepatch-5_3_18-24_9-default-5-2.1
      kernel-livepatch-5_3_18-24_9-default-debuginfo-5-2.1
      kernel-livepatch-SLE15-SP2_Update_0-debugsource-5-5.2
      kernel-livepatch-SLE15-SP2_Update_1-debugsource-5-2.1
      kernel-livepatch-SLE15-SP2_Update_2-debugsource-4-2.1
      kernel-livepatch-SLE15-SP2_Update_3-debugsource-4-2.1
      kernel-livepatch-SLE15-SP2_Update_4-debugsource-4-2.1
      kernel-livepatch-SLE15-SP2_Update_5-debugsource-2-2.1
      kernel-livepatch-SLE15-SP2_Update_6-debugsource-2-2.1

   - SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):

      kernel-livepatch-4_12_14-150_47-default-9-2.2
      kernel-livepatch-4_12_14-150_47-default-debuginfo-9-2.2
      kernel-livepatch-4_12_14-150_52-default-5-2.2
      kernel-livepatch-4_12_14-150_52-default-debuginfo-5-2.2
      kernel-livepatch-4_12_14-150_55-default-5-2.1
      kernel-livepatch-4_12_14-150_55-default-debuginfo-5-2.1
      kernel-livepatch-4_12_14-150_58-default-4-2.1
      kernel-livepatch-4_12_14-150_58-default-debuginfo-4-2.1


References:

   https://www.suse.com/security/cve/CVE-2020-25668.html
   https://www.suse.com/security/cve/CVE-2020-25705.html
   https://www.suse.com/security/cve/CVE-2020-8694.html
   https://bugzilla.suse.com/1178622
   https://bugzilla.suse.com/1178700
   https://bugzilla.suse.com/1178783

SUSE: 2020:3651-1 important: the Linux Kernel (Live Patch 32 for SLE 12 SP3)

December 7, 2020
An update that fixes three vulnerabilities is now available

Summary

This update for the Linux Kernel 4.4.180-94_121 fixes several issues. The following security issues were fixed: - CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622). - CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700). - CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-3649=1 SUSE-SLE-SAP-12-SP3-2020-3650=1 SUSE-SLE-SAP-12-SP3-2020-3651=1 SUSE-SLE-SAP-12-SP3-2020-3652=1 SUSE-SLE-SAP-12-SP3-2020-3654=1 SUSE-SLE-SAP-12-SP3-2020-3655=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-3644=1 SUSE-SLE-SAP-12-SP2-2020-3645=1 SUSE-SLE-SAP-12-SP2-2020-3646=1 SUSE-SLE-SAP-12-SP2-2020-3647=1 - SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-3649=1 SUSE-SLE-SERVER-12-SP3-2020-3650=1 SUSE-SLE-SERVER-12-SP3-2020-3651=1 SUSE-SLE-SERVER-12-SP3-2020-3652=1 SUSE-SLE-SERVER-12-SP3-2020-3654=1 SUSE-SLE-SERVER-12-SP3-2020-3655=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-3644=1 SUSE-SLE-SERVER-12-SP2-2020-3645=1 SUSE-SLE-SERVER-12-SP2-2020-3646=1 SUSE-SLE-SERVER-12-SP2-2020-3647=1 - SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-3691=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3692=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3693=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3694=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3695=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3696=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3697=1 - SUSE Linux Enterprise Module for Live Patching 15: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2020-3676=1 SUSE-SLE-Module-Live-Patching-15-2020-3677=1 SUSE-SLE-Module-Live-Patching-15-2020-3678=1 SUSE-SLE-Module-Live-Patching-15-2020-3679=1 Package List: - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): kgraft-patch-4_4_180-94_113-default-9-2.2 kgraft-patch-4_4_180-94_113-default-debuginfo-9-2.2 kgraft-patch-4_4_180-94_116-default-6-2.2 kgraft-patch-4_4_180-94_116-default-debuginfo-6-2.2 kgraft-patch-4_4_180-94_121-default-5-2.2 kgraft-patch-4_4_180-94_121-default-debuginfo-5-2.2 kgraft-patch-4_4_180-94_124-default-5-2.2 kgraft-patch-4_4_180-94_124-default-debuginfo-5-2.2 kgraft-patch-4_4_180-94_127-default-5-2.1 kgraft-patch-4_4_180-94_127-default-debuginfo-5-2.1 kgraft-patch-4_4_180-94_130-default-4-2.1 kgraft-patch-4_4_180-94_130-default-debuginfo-4-2.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): kgraft-patch-4_4_121-92_129-default-7-2.2 kgraft-patch-4_4_121-92_135-default-5-2.2 kgraft-patch-4_4_121-92_138-default-5-2.1 kgraft-patch-4_4_121-92_141-default-4-2.1 - SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64): kgraft-patch-4_4_180-94_113-default-9-2.2 kgraft-patch-4_4_180-94_113-default-debuginfo-9-2.2 kgraft-patch-4_4_180-94_116-default-6-2.2 kgraft-patch-4_4_180-94_116-default-debuginfo-6-2.2 kgraft-patch-4_4_180-94_121-default-5-2.2 kgraft-patch-4_4_180-94_121-default-debuginfo-5-2.2 kgraft-patch-4_4_180-94_124-default-5-2.2 kgraft-patch-4_4_180-94_124-default-debuginfo-5-2.2 kgraft-patch-4_4_180-94_127-default-5-2.1 kgraft-patch-4_4_180-94_127-default-debuginfo-5-2.1 kgraft-patch-4_4_180-94_130-default-4-2.1 kgraft-patch-4_4_180-94_130-default-debuginfo-4-2.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le x86_64): kgraft-patch-4_4_121-92_129-default-7-2.2 kgraft-patch-4_4_121-92_135-default-5-2.2 kgraft-patch-4_4_121-92_138-default-5-2.1 kgraft-patch-4_4_121-92_141-default-4-2.1 - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-22-default-5-5.2 kernel-livepatch-5_3_18-22-default-debuginfo-5-5.2 kernel-livepatch-5_3_18-24_12-default-4-2.1 kernel-livepatch-5_3_18-24_12-default-debuginfo-4-2.1 kernel-livepatch-5_3_18-24_15-default-4-2.1 kernel-livepatch-5_3_18-24_15-default-debuginfo-4-2.1 kernel-livepatch-5_3_18-24_24-default-4-2.1 kernel-livepatch-5_3_18-24_24-default-debuginfo-4-2.1 kernel-livepatch-5_3_18-24_29-default-2-2.1 kernel-livepatch-5_3_18-24_29-default-debuginfo-2-2.1 kernel-livepatch-5_3_18-24_34-default-2-2.1 kernel-livepatch-5_3_18-24_34-default-debuginfo-2-2.1 kernel-livepatch-5_3_18-24_9-default-5-2.1 kernel-livepatch-5_3_18-24_9-default-debuginfo-5-2.1 kernel-livepatch-SLE15-SP2_Update_0-debugsource-5-5.2 kernel-livepatch-SLE15-SP2_Update_1-debugsource-5-2.1 kernel-livepatch-SLE15-SP2_Update_2-debugsource-4-2.1 kernel-livepatch-SLE15-SP2_Update_3-debugsource-4-2.1 kernel-livepatch-SLE15-SP2_Update_4-debugsource-4-2.1 kernel-livepatch-SLE15-SP2_Update_5-debugsource-2-2.1 kernel-livepatch-SLE15-SP2_Update_6-debugsource-2-2.1 - SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64): kernel-livepatch-4_12_14-150_47-default-9-2.2 kernel-livepatch-4_12_14-150_47-default-debuginfo-9-2.2 kernel-livepatch-4_12_14-150_52-default-5-2.2 kernel-livepatch-4_12_14-150_52-default-debuginfo-5-2.2 kernel-livepatch-4_12_14-150_55-default-5-2.1 kernel-livepatch-4_12_14-150_55-default-debuginfo-5-2.1 kernel-livepatch-4_12_14-150_58-default-4-2.1 kernel-livepatch-4_12_14-150_58-default-debuginfo-4-2.1

References

#1178622 #1178700 #1178783

Cross- CVE-2020-25668 CVE-2020-25705 CVE-2020-8694

Affected Products:

SUSE Linux Enterprise Server for SAP 12-SP3

SUSE Linux Enterprise Server for SAP 12-SP2

SUSE Linux Enterprise Server 12-SP3-LTSS

SUSE Linux Enterprise Server 12-SP2-LTSS

SUSE Linux Enterprise Module for Live Patching 15-SP2

SUSE Linux Enterprise Module for Live Patching 15

https://www.suse.com/security/cve/CVE-2020-25668.html

https://www.suse.com/security/cve/CVE-2020-25705.html

https://www.suse.com/security/cve/CVE-2020-8694.html

https://bugzilla.suse.com/1178622

https://bugzilla.suse.com/1178700

https://bugzilla.suse.com/1178783

Severity
Announcement ID: SUSE-SU-2020:3651-1
Rating: important

Related News