Mehrere Probleme in grub2
ID: | SUSE-SU-2020:2078-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Server for SAP 12-SP4, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 9, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 12-SP4-LTSS |
Datum: | Do, 30. Juli 2020, 00:46 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713 |
Applikationen: | GRUB |
Originalnachricht |
|
SUSE Security Update: Security update for grub2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:2078-1 Rating: important References: #1168994 #1173812 #1174463 #1174570 Cross-References: CVE-2020-10713 CVE-2020-14308 CVE-2020-14309 CVE-2020-14310 CVE-2020-14311 CVE-2020-15706 CVE-2020-15707 Affected Products: SUSE OpenStack Cloud Crowbar 9 SUSE OpenStack Cloud 9 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server 12-SP4-LTSS ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for grub2 fixes the following issues: - Fix for CVE-2020-10713 (bsc#1168994) - Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311 (bsc#1173812) - Fix for CVE-2020-15706 (bsc#1174463) - Fix for CVE-2020-15707 (bsc#1174570) - Use overflow checking primitives where the arithmetic expression for buffer allocations may include unvalidated data - Use grub_calloc for overflow check and return NULL when it would occur - Use gcc-9 compiler for overflow check builtins - Backport gcc-9 build fixes Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-2078=1 - SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2020-2078=1 - SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2020-2078=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2078=1 - SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-2078=1 Package List: - SUSE OpenStack Cloud Crowbar 9 (x86_64): grub2-2.02-12.31.1 grub2-debuginfo-2.02-12.31.1 grub2-debugsource-2.02-12.31.1 grub2-i386-pc-2.02-12.31.1 grub2-x86_64-efi-2.02-12.31.1 - SUSE OpenStack Cloud Crowbar 9 (noarch): grub2-snapper-plugin-2.02-12.31.1 grub2-systemd-sleep-plugin-2.02-12.31.1 grub2-x86_64-xen-2.02-12.31.1 - SUSE OpenStack Cloud 9 (x86_64): grub2-2.02-12.31.1 grub2-debuginfo-2.02-12.31.1 grub2-debugsource-2.02-12.31.1 grub2-i386-pc-2.02-12.31.1 grub2-x86_64-efi-2.02-12.31.1 - SUSE OpenStack Cloud 9 (noarch): grub2-snapper-plugin-2.02-12.31.1 grub2-systemd-sleep-plugin-2.02-12.31.1 grub2-x86_64-xen-2.02-12.31.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): grub2-2.02-12.31.1 grub2-debuginfo-2.02-12.31.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le): grub2-powerpc-ieee1275-2.02-12.31.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64): grub2-debugsource-2.02-12.31.1 grub2-i386-pc-2.02-12.31.1 grub2-x86_64-efi-2.02-12.31.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (noarch): grub2-snapper-plugin-2.02-12.31.1 grub2-systemd-sleep-plugin-2.02-12.31.1 grub2-x86_64-xen-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): grub2-2.02-12.31.1 grub2-debuginfo-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 s390x x86_64): grub2-debugsource-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64): grub2-arm64-efi-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (ppc64le): grub2-powerpc-ieee1275-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (noarch): grub2-snapper-plugin-2.02-12.31.1 grub2-systemd-sleep-plugin-2.02-12.31.1 grub2-x86_64-xen-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (x86_64): grub2-i386-pc-2.02-12.31.1 grub2-x86_64-efi-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP5 (s390x): grub2-s390x-emu-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64): grub2-2.02-12.31.1 grub2-debuginfo-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 s390x x86_64): grub2-debugsource-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64): grub2-arm64-efi-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (ppc64le): grub2-powerpc-ieee1275-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (noarch): grub2-snapper-plugin-2.02-12.31.1 grub2-systemd-sleep-plugin-2.02-12.31.1 grub2-x86_64-xen-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (x86_64): grub2-i386-pc-2.02-12.31.1 grub2-x86_64-efi-2.02-12.31.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (s390x): grub2-s390x-emu-2.02-12.31.1 References: https://www.suse.com/security/cve/CVE-2020-10713.html https://www.suse.com/security/cve/CVE-2020-14308.html https://www.suse.com/security/cve/CVE-2020-14309.html https://www.suse.com/security/cve/CVE-2020-14310.html https://www.suse.com/security/cve/CVE-2020-14311.html https://www.suse.com/security/cve/CVE-2020-15706.html https://www.suse.com/security/cve/CVE-2020-15707.html https://bugzilla.suse.com/1168994 https://bugzilla.suse.com/1173812 https://bugzilla.suse.com/1174463 https://bugzilla.suse.com/1174570 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |