<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 16 for SLE 15)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:0940-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-04-07T09:13:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-04-07T09:13:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-04-07T09:13:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 16 for SLE 15)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 4.12.14-150_41 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2020-940,SUSE-SLE-Module-Live-Patching-15-2020-940</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20200940-1/</URL>
      <Description>Link for SUSE-SU-2020:0940-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:0940-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159913</URL>
      <Description>SUSE Bug 1159913</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165631</URL>
      <Description>SUSE Bug 1165631</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5108/</URL>
      <Description>SUSE CVE CVE-2019-5108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1749/</URL>
      <Description>SUSE CVE CVE-2020-1749 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15" CPE="cpe:/o:suse:sle-module-live-patching:15">SUSE Linux Enterprise Live Patching 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-4_12_14-150_41-default-3-2.2">
      <FullProductName ProductID="kernel-livepatch-4_12_14-150_41-default-3-2.2">kernel-livepatch-4_12_14-150_41-default-3-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-livepatch-4_12_14-150_41-default-3-2.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-3-2.2">kernel-livepatch-4_12_14-150_41-default-3-2.2 as a component of SUSE Linux Enterprise Live Patching 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2019-5108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-3-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20200940-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5108.html</URL>
        <Description>CVE-2019-5108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159912</URL>
        <Description>SUSE Bug 1159912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159913</URL>
        <Description>SUSE Bug 1159913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-1749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-3-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20200940-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1749.html</URL>
        <Description>CVE-2020-1749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165629</URL>
        <Description>SUSE Bug 1165629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165631</URL>
        <Description>SUSE Bug 1165631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177511</URL>
        <Description>SUSE Bug 1177511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177513</URL>
        <Description>SUSE Bug 1177513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
