Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP1)

SUSE Security Update: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP1)
Announcement ID: SUSE-SU-2020:3402-1
Rating: important
References: #1177513 #1177729
Cross-References:CVE-2020-12351 CVE-2020-25645
Affected Products:
  • SUSE Linux Enterprise Module for Live Patching 15-SP2
  • SUSE Linux Enterprise Module for Live Patching 15-SP1
  • SUSE Linux Enterprise Live Patching 12-SP5

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-197_34 fixes several issues.
The following security issues were fixed:

  • CVE-2020-12351: Fixed a type confusion while processing AMP packets aka "BleedingTooth" aka "BadKarma" (bsc#1177724, bsc#1177729, bsc#1178397).
  • CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Live Patching 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-3386=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3387=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3388=1
  • SUSE Linux Enterprise Module for Live Patching 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-3402=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3403=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3404=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3405=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3406=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3407=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3408=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3409=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3410=1
  • SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-3391=1 SUSE-SLE-Live-Patching-12-SP5-2020-3392=1 SUSE-SLE-Live-Patching-12-SP5-2020-3393=1 SUSE-SLE-Live-Patching-12-SP5-2020-3394=1 SUSE-SLE-Live-Patching-12-SP5-2020-3395=1 SUSE-SLE-Live-Patching-12-SP5-2020-3396=1 SUSE-SLE-Live-Patching-12-SP5-2020-3397=1 SUSE-SLE-Live-Patching-12-SP5-2020-3398=1 SUSE-SLE-Live-Patching-12-SP5-2020-3399=1

Package List:

  • SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64):
    • kernel-livepatch-5_3_18-24_12-default-3-2.1
    • kernel-livepatch-5_3_18-24_12-default-debuginfo-3-2.1
    • kernel-livepatch-5_3_18-24_15-default-3-2.1
    • kernel-livepatch-5_3_18-24_15-default-debuginfo-3-2.1
    • kernel-livepatch-5_3_18-24_24-default-3-2.1
    • kernel-livepatch-5_3_18-24_24-default-debuginfo-3-2.1
    • kernel-livepatch-SLE15-SP2_Update_2-debugsource-3-2.1
    • kernel-livepatch-SLE15-SP2_Update_3-debugsource-3-2.1
    • kernel-livepatch-SLE15-SP2_Update_4-debugsource-3-2.1
  • SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64):
    • kernel-livepatch-4_12_14-197_29-default-8-2.2
    • kernel-livepatch-4_12_14-197_34-default-7-2.2
    • kernel-livepatch-4_12_14-197_37-default-7-2.2
    • kernel-livepatch-4_12_14-197_40-default-6-2.2
    • kernel-livepatch-4_12_14-197_45-default-4-2.2
    • kernel-livepatch-4_12_14-197_48-default-4-2.1
    • kernel-livepatch-4_12_14-197_51-default-4-2.1
    • kernel-livepatch-4_12_14-197_56-default-3-2.1
    • kernel-livepatch-4_12_14-197_61-default-2-2.1
  • SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
    • kgraft-patch-4_12_14-122_17-default-7-2.2
    • kgraft-patch-4_12_14-122_20-default-6-2.2
    • kgraft-patch-4_12_14-122_23-default-4-2.2
    • kgraft-patch-4_12_14-122_26-default-4-2.2
    • kgraft-patch-4_12_14-122_29-default-4-2.1
    • kgraft-patch-4_12_14-122_32-default-4-2.1
    • kgraft-patch-4_12_14-122_37-default-3-2.1
    • kgraft-patch-4_12_14-122_41-default-2-2.1
  • SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le x86_64):
    • kgraft-patch-4_12_14-122_12-default-8-2.2

References: