<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:1779-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-06-26T07:00:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-06-26T07:00:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-06-26T07:00:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 4.4.180-94_116 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171252).
- CVE-2020-1749: Fixed an issue where some ipv6 protocols were not encrypted over ipsec tunnel (bsc#1165631).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2020-1779,SUSE-SLE-SAP-12-SP3-2020-1779,SUSE-SLE-SERVER-12-SP3-2020-1779</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201779-1/</URL>
      <Description>Link for SUSE-SU-2020:1779-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:1779-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165631</URL>
      <Description>SUSE Bug 1165631</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171252</URL>
      <Description>SUSE Bug 1171252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171254</URL>
      <Description>SUSE Bug 1171254</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172437</URL>
      <Description>SUSE Bug 1172437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10757/</URL>
      <Description>SUSE CVE CVE-2020-10757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12653/</URL>
      <Description>SUSE CVE CVE-2020-12653 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12654/</URL>
      <Description>SUSE CVE CVE-2020-12654 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1749/</URL>
      <Description>SUSE CVE CVE-2020-1749 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp3">SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3" CPE="cpe:/o:suse:sles_sap:12:sp3">SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_4_180-94_116-default-2-2.1">
      <FullProductName ProductID="kgraft-patch-4_4_180-94_116-default-2-2.1">kgraft-patch-4_4_180-94_116-default-2-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-4_4_180-94_116-default-2-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-2-2.1">kgraft-patch-4_4_180-94_116-default-2-2.1 as a component of SUSE Linux Enterprise Server 12 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_4_180-94_116-default-2-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-2-2.1">kgraft-patch-4_4_180-94_116-default-2-2.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2020-10757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201779-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10757.html</URL>
        <Description>CVE-2020-10757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172317</URL>
        <Description>SUSE Bug 1172317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172437</URL>
        <Description>SUSE Bug 1172437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.</Note>
    </Notes>
    <CVE>CVE-2020-12653</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201779-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12653.html</URL>
        <Description>CVE-2020-12653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171195</URL>
        <Description>SUSE Bug 1171195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171254</URL>
        <Description>SUSE Bug 1171254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.</Note>
    </Notes>
    <CVE>CVE-2020-12654</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201779-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12654.html</URL>
        <Description>CVE-2020-12654</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159281</URL>
        <Description>SUSE Bug 1159281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171202</URL>
        <Description>SUSE Bug 1171202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171252</URL>
        <Description>SUSE Bug 1171252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2020-1749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-2-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201779-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1749.html</URL>
        <Description>CVE-2020-1749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165629</URL>
        <Description>SUSE Bug 1165629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165631</URL>
        <Description>SUSE Bug 1165631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177511</URL>
        <Description>SUSE Bug 1177511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177513</URL>
        <Description>SUSE Bug 1177513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189302</URL>
        <Description>SUSE Bug 1189302</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
