{"id":"SUSE-SU-2020:2502-1","summary":"Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)","details":"This update for the Linux Kernel 4.4.180-94_127 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n","modified":"2025-05-02T04:08:59.784990Z","published":"2020-09-04T11:30:30Z","related":["CVE-2019-16746","CVE-2020-11668","CVE-2020-14331","CVE-2020-1749"],"upstream":["CVE-2019-16746","CVE-2020-11668","CVE-2020-14331","CVE-2020-1749"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20202502-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1165631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174247"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-16746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-1749"}],"affected":[{"package":{"name":"kgraft-patch-SLE12-SP2_Update_35","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_35&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_135-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_138-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_35","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_35&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_135-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_36","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_138-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_32","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_121-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_33","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_124-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_34","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_127-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_32","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_121-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_33","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_124-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_34","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_127-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_32","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_121-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_33","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_124-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_34","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_127-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_35","ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_35&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_135-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_138-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_35","ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_35&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_135-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP2_Update_36","ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_121-92_138-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_32","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_121-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_33","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_124-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_34","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_127-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_32","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_121-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_33","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_124-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_34","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_127-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_32","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_121-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_33","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_124-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}},{"package":{"name":"kgraft-patch-SLE12-SP3_Update_34","ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2-2.2"}]}],"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_180-94_127-default":"2-2.2"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:2502-1.json"}}],"schema_version":"1.7.3"}