<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 25 for SLE 15)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:0237-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-01-31T09:41:01Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-01-31T09:41:01Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-01-31T09:41:01Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 25 for SLE 15)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 4.12.14-150_75 fixes several issues.

The following security issues were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2022-237,SUSE-SLE-Module-Live-Patching-15-2022-237,SUSE-SLE-Module-Live-Patching-15-2022-247</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220237-1/</URL>
      <Description>Link for SUSE-SU-2022:0237-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:0237-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191529</URL>
      <Description>SUSE Bug 1191529</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1192036</URL>
      <Description>SUSE Bug 1192036</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193863</URL>
      <Description>SUSE Bug 1193863</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-25020/</URL>
      <Description>SUSE CVE CVE-2018-25020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3702/</URL>
      <Description>SUSE CVE CVE-2020-3702 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-42739/</URL>
      <Description>SUSE CVE CVE-2021-42739 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15" CPE="cpe:/o:suse:sle-module-live-patching:15">SUSE Linux Enterprise Live Patching 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-4_12_14-150_72-default-10-2.2">
      <FullProductName ProductID="kernel-livepatch-4_12_14-150_72-default-10-2.2">kernel-livepatch-4_12_14-150_72-default-10-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-4_12_14-150_75-default-7-2.2">
      <FullProductName ProductID="kernel-livepatch-4_12_14-150_75-default-7-2.2">kernel-livepatch-4_12_14-150_75-default-7-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-livepatch-4_12_14-150_72-default-10-2.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-10-2.2">kernel-livepatch-4_12_14-150_72-default-10-2.2 as a component of SUSE Linux Enterprise Live Patching 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-4_12_14-150_75-default-7-2.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-7-2.2">kernel-livepatch-4_12_14-150_75-default-7-2.2 as a component of SUSE Linux Enterprise Live Patching 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.</Note>
    </Notes>
    <CVE>CVE-2018-25020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-10-2.2</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220237-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-25020.html</URL>
        <Description>CVE-2018-25020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193575</URL>
        <Description>SUSE Bug 1193575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150</Note>
    </Notes>
    <CVE>CVE-2020-3702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-10-2.2</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220237-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3702.html</URL>
        <Description>CVE-2020-3702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191193</URL>
        <Description>SUSE Bug 1191193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191529</URL>
        <Description>SUSE Bug 1191529</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-42739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-10-2.2</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-7-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220237-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-42739.html</URL>
        <Description>CVE-2021-42739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184673</URL>
        <Description>SUSE Bug 1184673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192036</URL>
        <Description>SUSE Bug 1192036</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196722</URL>
        <Description>SUSE Bug 1196722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196914</URL>
        <Description>SUSE Bug 1196914</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
