Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:0868-1

Опубликовано: 03 апр. 2020
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

  • CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
  • CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP4
kgraft-patch-4_12_14-95_45-default-3-2.1
kgraft-patch-4_12_14-95_40-default-3-2.1
kgraft-patch-4_12_14-95_37-default-4-2.1
kgraft-patch-4_12_14-95_32-default-5-2.1
kgraft-patch-4_12_14-95_29-default-6-2.1
kgraft-patch-4_12_14-95_24-default-6-2.1
kgraft-patch-4_12_14-95_19-default-7-2.1
kgraft-patch-4_12_14-95_16-default-8-2.1
SUSE Linux Enterprise Live Patching 12 SP5
kgraft-patch-4_12_14-122_12-default-3-2.1
kgraft-patch-4_12_14-122_7-default-3-2.1
kgraft-patch-4_12_14-120-default-3-6.2
SUSE Linux Enterprise Live Patching 15
kernel-livepatch-4_12_14-150_47-default-3-2.1
kernel-livepatch-4_12_14-150_38-default-5-2.1
kernel-livepatch-4_12_14-150_35-default-5-2.1
kernel-livepatch-4_12_14-150_32-default-6-2.1
kernel-livepatch-4_12_14-150_27-default-6-2.1
kernel-livepatch-4_12_14-150_22-default-7-2.1
kernel-livepatch-4_12_14-150_17-default-8-2.1
kernel-livepatch-4_12_14-150_14-default-8-2.1
SUSE Linux Enterprise Live Patching 15 SP1
kernel-livepatch-4_12_14-197_29-default-3-2.1
kernel-livepatch-4_12_14-197_26-default-3-2.1
kernel-livepatch-4_12_14-197_21-default-5-2.1
kernel-livepatch-4_12_14-197_18-default-5-2.1
kernel-livepatch-4_12_14-197_15-default-6-2.1
kernel-livepatch-4_12_14-197_10-default-6-2.1
kernel-livepatch-4_12_14-197_7-default-8-2.1
kernel-livepatch-4_12_14-197_4-default-9-2.1
kernel-livepatch-4_12_14-195-default-10-28.2
SUSE Linux Enterprise Server 12 SP1-LTSS
kgraft-patch-3_12_74-60_64_124-default-4-2.1
kgraft-patch-3_12_74-60_64_124-xen-4-2.1
kgraft-patch-3_12_74-60_64_121-default-6-2.1
kgraft-patch-3_12_74-60_64_121-xen-6-2.1
kgraft-patch-3_12_74-60_64_118-default-6-2.1
kgraft-patch-3_12_74-60_64_118-xen-6-2.1
kgraft-patch-3_12_74-60_64_115-default-8-2.1
kgraft-patch-3_12_74-60_64_115-xen-8-2.1
kgraft-patch-3_12_74-60_64_110-default-9-2.1
kgraft-patch-3_12_74-60_64_110-xen-9-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kgraft-patch-4_4_121-92_125-default-4-2.1
kgraft-patch-4_4_121-92_120-default-6-2.1
kgraft-patch-4_4_121-92_117-default-7-2.1
kgraft-patch-4_4_121-92_114-default-8-2.1
kgraft-patch-4_4_121-92_109-default-9-2.1
kgraft-patch-4_4_121-92_104-default-9-2.1
SUSE Linux Enterprise Server 12 SP3-LTSS
kgraft-patch-4_4_176-94_88-default-8-2.1
kgraft-patch-4_4_180-94_113-default-3-2.1
kgraft-patch-4_4_180-94_107-default-4-2.1
kgraft-patch-4_4_180-94_103-default-6-2.1
kgraft-patch-4_4_180-94_100-default-6-2.1
kgraft-patch-4_4_180-94_97-default-8-2.1
kgraft-patch-4_4_178-94_91-default-8-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
kgraft-patch-3_12_74-60_64_124-default-4-2.1
kgraft-patch-3_12_74-60_64_124-xen-4-2.1
kgraft-patch-3_12_74-60_64_121-default-6-2.1
kgraft-patch-3_12_74-60_64_121-xen-6-2.1
kgraft-patch-3_12_74-60_64_118-default-6-2.1
kgraft-patch-3_12_74-60_64_118-xen-6-2.1
kgraft-patch-3_12_74-60_64_115-default-8-2.1
kgraft-patch-3_12_74-60_64_115-xen-8-2.1
kgraft-patch-3_12_74-60_64_110-default-9-2.1
kgraft-patch-3_12_74-60_64_110-xen-9-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kgraft-patch-4_4_121-92_125-default-4-2.1
kgraft-patch-4_4_121-92_120-default-6-2.1
kgraft-patch-4_4_121-92_117-default-7-2.1
kgraft-patch-4_4_121-92_114-default-8-2.1
kgraft-patch-4_4_121-92_109-default-9-2.1
kgraft-patch-4_4_121-92_104-default-9-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
kgraft-patch-4_4_176-94_88-default-8-2.1
kgraft-patch-4_4_180-94_113-default-3-2.1
kgraft-patch-4_4_180-94_107-default-4-2.1
kgraft-patch-4_4_180-94_103-default-6-2.1
kgraft-patch-4_4_180-94_100-default-6-2.1
kgraft-patch-4_4_180-94_97-default-8-2.1
kgraft-patch-4_4_178-94_91-default-8-2.1

Описание

An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-8-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-7-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-6-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-6-2.1

Ссылки

Описание

A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-8-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-7-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_24-default-6-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-6-2.1

Ссылки