Mehrere Probleme in grub2
ID: | SUSE-SU-2020:2077-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Module for Server Applications 15-SP1, SUSE Linux Enterprise Module for Basesystem 15-SP1 |
Datum: | Do, 30. Juli 2020, 00:46 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309 |
Applikationen: | GRUB |
Originalnachricht |
|
SUSE Security Update: Security update for grub2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:2077-1 Rating: important References: #1168994 #1173812 #1174463 #1174570 Cross-References: CVE-2020-10713 CVE-2020-14308 CVE-2020-14309 CVE-2020-14310 CVE-2020-14311 CVE-2020-15706 CVE-2020-15707 Affected Products: SUSE Linux Enterprise Module for Server Applications 15-SP1 SUSE Linux Enterprise Module for Basesystem 15-SP1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for grub2 fixes the following issues: - CVE-2020-10713 (bsc#1168994) - CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311 (bsc#1173812) - CVE-2020-15706 (bsc#1174463) - CVE-2020-15707 (bsc#1174570) - Use overflow checking primitives where the arithmetic expression for buffer allocations may include unvalidated data - Use grub_calloc for overflow check and return NULL when it would occur Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-2077=1 - SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-2077=1 Package List: - SUSE Linux Enterprise Module for Server Applications 15-SP1 (noarch): grub2-x86_64-xen-2.02-26.25.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): grub2-2.02-26.25.1 grub2-debuginfo-2.02-26.25.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 s390x x86_64): grub2-debugsource-2.02-26.25.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch): grub2-arm64-efi-2.02-26.25.1 grub2-i386-pc-2.02-26.25.1 grub2-powerpc-ieee1275-2.02-26.25.1 grub2-snapper-plugin-2.02-26.25.1 grub2-systemd-sleep-plugin-2.02-26.25.1 grub2-x86_64-efi-2.02-26.25.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (s390x): grub2-s390x-emu-2.02-26.25.1 References: https://www.suse.com/security/cve/CVE-2020-10713.html https://www.suse.com/security/cve/CVE-2020-14308.html https://www.suse.com/security/cve/CVE-2020-14309.html https://www.suse.com/security/cve/CVE-2020-14310.html https://www.suse.com/security/cve/CVE-2020-14311.html https://www.suse.com/security/cve/CVE-2020-15706.html https://www.suse.com/security/cve/CVE-2020-15707.html https://bugzilla.suse.com/1168994 https://bugzilla.suse.com/1173812 https://bugzilla.suse.com/1174463 https://bugzilla.suse.com/1174570 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |