drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2020:1713-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise High Availability 12-SP3, SUSE OpenStack Cloud Crowbar 8, SUSE HPE Helion Openstack 8, SUSE OpenStack Cloud 8, SUSE Enterprise Storage 5, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL |
|
Datum: |
Mi, 24. Juni 2020, 00:04 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768 |
|
Applikationen: |
Linux |
|
Originalnachricht |
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________
Announcement ID: SUSE-SU-2020:1713-1 Rating: important References: #1172049 #1172781 #1172782 #1172783 Cross-References: CVE-2020-10766 CVE-2020-10767 CVE-2020-10768 Affected Products: SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud 8 SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise High Availability 12-SP3 SUSE Enterprise Storage 5 HPE Helion Openstack 8 ______________________________________________________________________________
An update that solves three vulnerabilities and has one errata is now available.
Description:
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783). - CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782). - CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud Crowbar 8:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-1713=1
- SUSE OpenStack Cloud 8:
zypper in -t patch SUSE-OpenStack-Cloud-8-2020-1713=1
- SUSE Linux Enterprise Server for SAP 12-SP3:
zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-1713=1
- SUSE Linux Enterprise Server 12-SP3-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-1713=1
- SUSE Linux Enterprise Server 12-SP3-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-1713=1
- SUSE Linux Enterprise High Availability 12-SP3:
zypper in -t patch SUSE-SLE-HA-12-SP3-2020-1713=1
- SUSE Enterprise Storage 5:
zypper in -t patch SUSE-Storage-5-2020-1713=1
- HPE Helion Openstack 8:
zypper in -t patch HPE-Helion-OpenStack-8-2020-1713=1
Package List:
- SUSE OpenStack Cloud Crowbar 8 (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- SUSE OpenStack Cloud Crowbar 8 (x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-default-kgraft-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1 kgraft-patch-4_4_180-94_124-default-1-4.3.1 kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1
- SUSE OpenStack Cloud 8 (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- SUSE OpenStack Cloud 8 (x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-default-kgraft-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1 kgraft-patch-4_4_180-94_124-default-1-4.3.1 kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1
- SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-default-kgraft-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1 kgraft-patch-4_4_180-94_124-default-1-4.3.1 kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1
- SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1
- SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
kernel-default-kgraft-4.4.180-94.124.1 kgraft-patch-4_4_180-94_124-default-1-4.3.1 kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1
- SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):
kernel-default-man-4.4.180-94.124.1
- SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1
- SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.180-94.124.1 cluster-md-kmp-default-debuginfo-4.4.180-94.124.1 dlm-kmp-default-4.4.180-94.124.1 dlm-kmp-default-debuginfo-4.4.180-94.124.1 gfs2-kmp-default-4.4.180-94.124.1 gfs2-kmp-default-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 ocfs2-kmp-default-4.4.180-94.124.1 ocfs2-kmp-default-debuginfo-4.4.180-94.124.1
- SUSE Enterprise Storage 5 (aarch64 x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1
- SUSE Enterprise Storage 5 (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- SUSE Enterprise Storage 5 (x86_64):
kernel-default-kgraft-4.4.180-94.124.1 kgraft-patch-4_4_180-94_124-default-1-4.3.1 kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1
- HPE Helion Openstack 8 (noarch):
kernel-devel-4.4.180-94.124.1 kernel-macros-4.4.180-94.124.1 kernel-source-4.4.180-94.124.1
- HPE Helion Openstack 8 (x86_64):
kernel-default-4.4.180-94.124.1 kernel-default-base-4.4.180-94.124.1 kernel-default-base-debuginfo-4.4.180-94.124.1 kernel-default-debuginfo-4.4.180-94.124.1 kernel-default-debugsource-4.4.180-94.124.1 kernel-default-devel-4.4.180-94.124.1 kernel-default-kgraft-4.4.180-94.124.1 kernel-syms-4.4.180-94.124.1 kgraft-patch-4_4_180-94_124-default-1-4.3.1 kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1
References:
https://www.suse.com/security/cve/CVE-2020-10766.html https://www.suse.com/security/cve/CVE-2020-10767.html https://www.suse.com/security/cve/CVE-2020-10768.html https://bugzilla.suse.com/1172049 https://bugzilla.suse.com/1172781 https://bugzilla.suse.com/1172782 https://bugzilla.suse.com/1172783
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|