Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2020:1713-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise High Availability 12-SP3, SUSE OpenStack Cloud Crowbar 8, SUSE HPE Helion Openstack 8, SUSE OpenStack Cloud 8, SUSE Enterprise Storage 5, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL
Datum: Mi, 24. Juni 2020, 00:04
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768
Applikationen: Linux

Originalnachricht


SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: SUSE-SU-2020:1713-1
Rating: important
References: #1172049 #1172781 #1172782 #1172783
Cross-References: CVE-2020-10766 CVE-2020-10767 CVE-2020-10768

Affected Products:
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud 8
SUSE Linux Enterprise Server for SAP 12-SP3
SUSE Linux Enterprise Server 12-SP3-LTSS
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise High Availability 12-SP3
SUSE Enterprise Storage 5
HPE Helion Openstack 8
______________________________________________________________________________

An update that solves three vulnerabilities and has one
errata is now available.

Description:

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

- CVE-2020-10768: Fixed an issue with the prctl() function which could
have allowed indirect branch speculation even after it has been disabled
(bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction
Barrier (IBPB) would have been disabled when STIBP is unavailable or
enhanced IBRS is available making the system vulnerable to spectre v2
(bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have
allowed an attacker to turn off the SSBD protection (bsc#1172781).

- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud Crowbar 8:

zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-1713=1

- SUSE OpenStack Cloud 8:

zypper in -t patch SUSE-OpenStack-Cloud-8-2020-1713=1

- SUSE Linux Enterprise Server for SAP 12-SP3:

zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-1713=1

- SUSE Linux Enterprise Server 12-SP3-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-1713=1

- SUSE Linux Enterprise Server 12-SP3-BCL:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-1713=1

- SUSE Linux Enterprise High Availability 12-SP3:

zypper in -t patch SUSE-SLE-HA-12-SP3-2020-1713=1

- SUSE Enterprise Storage 5:

zypper in -t patch SUSE-Storage-5-2020-1713=1

- HPE Helion Openstack 8:

zypper in -t patch HPE-Helion-OpenStack-8-2020-1713=1



Package List:

- SUSE OpenStack Cloud Crowbar 8 (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- SUSE OpenStack Cloud Crowbar 8 (x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-default-kgraft-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1
kgraft-patch-4_4_180-94_124-default-1-4.3.1
kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

- SUSE OpenStack Cloud 8 (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- SUSE OpenStack Cloud 8 (x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-default-kgraft-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1
kgraft-patch-4_4_180-94_124-default-1-4.3.1
kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

- SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-default-kgraft-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1
kgraft-patch-4_4_180-94_124-default-1-4.3.1
kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

- SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1

- SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):

kernel-default-kgraft-4.4.180-94.124.1
kgraft-patch-4_4_180-94_124-default-1-4.3.1
kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

- SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):

kernel-default-man-4.4.180-94.124.1

- SUSE Linux Enterprise Server 12-SP3-BCL (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1

- SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):

cluster-md-kmp-default-4.4.180-94.124.1
cluster-md-kmp-default-debuginfo-4.4.180-94.124.1
dlm-kmp-default-4.4.180-94.124.1
dlm-kmp-default-debuginfo-4.4.180-94.124.1
gfs2-kmp-default-4.4.180-94.124.1
gfs2-kmp-default-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
ocfs2-kmp-default-4.4.180-94.124.1
ocfs2-kmp-default-debuginfo-4.4.180-94.124.1

- SUSE Enterprise Storage 5 (aarch64 x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1

- SUSE Enterprise Storage 5 (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- SUSE Enterprise Storage 5 (x86_64):

kernel-default-kgraft-4.4.180-94.124.1
kgraft-patch-4_4_180-94_124-default-1-4.3.1
kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

- HPE Helion Openstack 8 (noarch):

kernel-devel-4.4.180-94.124.1
kernel-macros-4.4.180-94.124.1
kernel-source-4.4.180-94.124.1

- HPE Helion Openstack 8 (x86_64):

kernel-default-4.4.180-94.124.1
kernel-default-base-4.4.180-94.124.1
kernel-default-base-debuginfo-4.4.180-94.124.1
kernel-default-debuginfo-4.4.180-94.124.1
kernel-default-debugsource-4.4.180-94.124.1
kernel-default-devel-4.4.180-94.124.1
kernel-default-kgraft-4.4.180-94.124.1
kernel-syms-4.4.180-94.124.1
kgraft-patch-4_4_180-94_124-default-1-4.3.1
kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1


References:

https://www.suse.com/security/cve/CVE-2020-10766.html
https://www.suse.com/security/cve/CVE-2020-10767.html
https://www.suse.com/security/cve/CVE-2020-10768.html
https://bugzilla.suse.com/1172049
https://bugzilla.suse.com/1172781
https://bugzilla.suse.com/1172782
https://bugzilla.suse.com/1172783

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung