Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP5)
Announcement ID: | SUSE-SU-2020:3402-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for the Linux Kernel 4.12.14-122_12 fixes several issues.
The following security issues were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka "BleedingTooth" aka "BadKarma" (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-3392=1 SUSE-SLE-Live-Patching-12-SP5-2020-3391=1 SUSE-SLE-Live-Patching-12-SP5-2020-3399=1 SUSE-SLE-Live-Patching-12-SP5-2020-3398=1 SUSE-SLE-Live-Patching-12-SP5-2020-3397=1 SUSE-SLE-Live-Patching-12-SP5-2020-3396=1 SUSE-SLE-Live-Patching-12-SP5-2020-3395=1 SUSE-SLE-Live-Patching-12-SP5-2020-3394=1 SUSE-SLE-Live-Patching-12-SP5-2020-3393=1
-
SUSE Linux Enterprise Live Patching 15-SP1
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-3410=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3409=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3408=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3407=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3406=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3405=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3404=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3403=1 SUSE-SLE-Module-Live-Patching-15-SP1-2020-3402=1
-
SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-3388=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3387=1 SUSE-SLE-Module-Live-Patching-15-SP2-2020-3386=1
Package List:
-
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le x86_64)
- kgraft-patch-4_12_14-122_12-default-8-2.2
-
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
- kgraft-patch-4_12_14-122_41-default-2-2.1
- kgraft-patch-4_12_14-122_26-default-4-2.2
- kgraft-patch-4_12_14-122_29-default-4-2.1
- kgraft-patch-4_12_14-122_20-default-6-2.2
- kgraft-patch-4_12_14-122_17-default-7-2.2
- kgraft-patch-4_12_14-122_23-default-4-2.2
- kgraft-patch-4_12_14-122_32-default-4-2.1
- kgraft-patch-4_12_14-122_37-default-3-2.1
-
SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64)
- kernel-livepatch-4_12_14-197_29-default-8-2.2
- kernel-livepatch-4_12_14-197_34-default-7-2.2
- kernel-livepatch-4_12_14-197_51-default-4-2.1
- kernel-livepatch-4_12_14-197_40-default-6-2.2
- kernel-livepatch-4_12_14-197_61-default-2-2.1
- kernel-livepatch-4_12_14-197_45-default-4-2.2
- kernel-livepatch-4_12_14-197_48-default-4-2.1
- kernel-livepatch-4_12_14-197_56-default-3-2.1
- kernel-livepatch-4_12_14-197_37-default-7-2.2
-
SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
- kernel-livepatch-5_3_18-24_15-default-3-2.1
- kernel-livepatch-5_3_18-24_12-default-3-2.1
- kernel-livepatch-SLE15-SP2_Update_2-debugsource-3-2.1
- kernel-livepatch-SLE15-SP2_Update_3-debugsource-3-2.1
- kernel-livepatch-5_3_18-24_24-default-debuginfo-3-2.1
- kernel-livepatch-5_3_18-24_12-default-debuginfo-3-2.1
- kernel-livepatch-5_3_18-24_15-default-debuginfo-3-2.1
- kernel-livepatch-SLE15-SP2_Update_4-debugsource-3-2.1
- kernel-livepatch-5_3_18-24_24-default-3-2.1