<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:2509-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-09-04T11:31:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-09-04T11:31:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-09-04T11:31:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 4.12.14-95_54 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2020-2509,SUSE-SLE-Live-Patching-12-SP4-2020-2509</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/</URL>
      <Description>Link for SUSE-SU-2020:2509-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:2509-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165631</URL>
      <Description>SUSE Bug 1165631</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173659</URL>
      <Description>SUSE Bug 1173659</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174186</URL>
      <Description>SUSE Bug 1174186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174247</URL>
      <Description>SUSE Bug 1174247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16746/</URL>
      <Description>SUSE CVE CVE-2019-16746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14331/</URL>
      <Description>SUSE CVE CVE-2020-14331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15780/</URL>
      <Description>SUSE CVE CVE-2020-15780 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1749/</URL>
      <Description>SUSE CVE CVE-2020-1749 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4" CPE="cpe:/o:suse:sle-live-patching:12:sp4">SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-95_54-default-2-2.2">
      <FullProductName ProductID="kgraft-patch-4_12_14-95_54-default-2-2.2">kgraft-patch-4_12_14-95_54-default-2-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-4_12_14-95_54-default-2-2.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2">kgraft-patch-4_12_14-95_54-default-2-2.2 as a component of SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2019-16746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16746.html</URL>
        <Description>CVE-2019-16746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1152107</URL>
        <Description>SUSE Bug 1152107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173659</URL>
        <Description>SUSE Bug 1173659</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-14331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14331.html</URL>
        <Description>CVE-2020-14331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174205</URL>
        <Description>SUSE Bug 1174205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174247</URL>
        <Description>SUSE Bug 1174247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.</Note>
    </Notes>
    <CVE>CVE-2020-15780</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15780.html</URL>
        <Description>CVE-2020-15780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173573</URL>
        <Description>SUSE Bug 1173573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174186</URL>
        <Description>SUSE Bug 1174186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-1749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1749.html</URL>
        <Description>CVE-2020-1749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165629</URL>
        <Description>SUSE Bug 1165629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165631</URL>
        <Description>SUSE Bug 1165631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177511</URL>
        <Description>SUSE Bug 1177511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177513</URL>
        <Description>SUSE Bug 1177513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
