SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:1713-1
Rating:             important
References:         #1172049 #1172781 #1172782 #1172783 
Cross-References:   CVE-2020-10766 CVE-2020-10767 CVE-2020-10768
                   
Affected Products:
                    SUSE OpenStack Cloud Crowbar 8
                    SUSE OpenStack Cloud 8
                    SUSE Linux Enterprise Server for SAP 12-SP3
                    SUSE Linux Enterprise Server 12-SP3-LTSS
                    SUSE Linux Enterprise Server 12-SP3-BCL
                    SUSE Linux Enterprise High Availability 12-SP3
                    SUSE Enterprise Storage 5
                    HPE Helion Openstack 8
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2020-10768: Fixed an issue with the prctl() function which could
     have allowed indirect branch speculation even after it has been disabled
     (bsc#1172783).
   - CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction
     Barrier (IBPB) would have been disabled when STIBP is unavailable or
     enhanced IBRS is available making the system vulnerable to spectre v2
     (bsc#1172782).
   - CVE-2020-10766: Fixed an issue with Linux scheduler which could have
     allowed an attacker to turn off the SSBD protection (bsc#1172781).

   - xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Crowbar 8:

      zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-1713=1

   - SUSE OpenStack Cloud 8:

      zypper in -t patch SUSE-OpenStack-Cloud-8-2020-1713=1

   - SUSE Linux Enterprise Server for SAP 12-SP3:

      zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-1713=1

   - SUSE Linux Enterprise Server 12-SP3-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-1713=1

   - SUSE Linux Enterprise Server 12-SP3-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-1713=1

   - SUSE Linux Enterprise High Availability 12-SP3:

      zypper in -t patch SUSE-SLE-HA-12-SP3-2020-1713=1

   - SUSE Enterprise Storage 5:

      zypper in -t patch SUSE-Storage-5-2020-1713=1

   - HPE Helion Openstack 8:

      zypper in -t patch HPE-Helion-OpenStack-8-2020-1713=1



Package List:

   - SUSE OpenStack Cloud Crowbar 8 (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - SUSE OpenStack Cloud Crowbar 8 (x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-default-kgraft-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1
      kgraft-patch-4_4_180-94_124-default-1-4.3.1
      kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

   - SUSE OpenStack Cloud 8 (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - SUSE OpenStack Cloud 8 (x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-default-kgraft-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1
      kgraft-patch-4_4_180-94_124-default-1-4.3.1
      kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-default-kgraft-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1
      kgraft-patch-4_4_180-94_124-default-1-4.3.1
      kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):

      kernel-default-kgraft-4.4.180-94.124.1
      kgraft-patch-4_4_180-94_124-default-1-4.3.1
      kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):

      kernel-default-man-4.4.180-94.124.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1

   - SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):

      cluster-md-kmp-default-4.4.180-94.124.1
      cluster-md-kmp-default-debuginfo-4.4.180-94.124.1
      dlm-kmp-default-4.4.180-94.124.1
      dlm-kmp-default-debuginfo-4.4.180-94.124.1
      gfs2-kmp-default-4.4.180-94.124.1
      gfs2-kmp-default-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      ocfs2-kmp-default-4.4.180-94.124.1
      ocfs2-kmp-default-debuginfo-4.4.180-94.124.1

   - SUSE Enterprise Storage 5 (aarch64 x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1

   - SUSE Enterprise Storage 5 (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - SUSE Enterprise Storage 5 (x86_64):

      kernel-default-kgraft-4.4.180-94.124.1
      kgraft-patch-4_4_180-94_124-default-1-4.3.1
      kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1

   - HPE Helion Openstack 8 (noarch):

      kernel-devel-4.4.180-94.124.1
      kernel-macros-4.4.180-94.124.1
      kernel-source-4.4.180-94.124.1

   - HPE Helion Openstack 8 (x86_64):

      kernel-default-4.4.180-94.124.1
      kernel-default-base-4.4.180-94.124.1
      kernel-default-base-debuginfo-4.4.180-94.124.1
      kernel-default-debuginfo-4.4.180-94.124.1
      kernel-default-debugsource-4.4.180-94.124.1
      kernel-default-devel-4.4.180-94.124.1
      kernel-default-kgraft-4.4.180-94.124.1
      kernel-syms-4.4.180-94.124.1
      kgraft-patch-4_4_180-94_124-default-1-4.3.1
      kgraft-patch-4_4_180-94_124-default-debuginfo-1-4.3.1


References:

   https://www.suse.com/security/cve/CVE-2020-10766.html
   https://www.suse.com/security/cve/CVE-2020-10767.html
   https://www.suse.com/security/cve/CVE-2020-10768.html
   https://bugzilla.suse.com/1172049
   https://bugzilla.suse.com/1172781
   https://bugzilla.suse.com/1172782
   https://bugzilla.suse.com/1172783

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:1713-1 important: the Linux Kernel

June 23, 2020
An update that solves three vulnerabilities and has one errata is now available

Summary

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783). - CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782). - CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781). - xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).

References

#1172049 #1172781 #1172782 #1172783

Cross- CVE-2020-10766 CVE-2020-10767 CVE-2020-10768

Affected Products:

SUSE OpenStack Cloud Crowbar 8

SUSE OpenStack Cloud 8

SUSE Linux Enterprise Server for SAP 12-SP3

SUSE Linux Enterprise Server 12-SP3-LTSS

SUSE Linux Enterprise Server 12-SP3-BCL

SUSE Linux Enterprise High Availability 12-SP3

SUSE Enterprise Storage 5

HPE Helion Openstack 8

https://www.suse.com/security/cve/CVE-2020-10766.html

https://www.suse.com/security/cve/CVE-2020-10767.html

https://www.suse.com/security/cve/CVE-2020-10768.html

https://bugzilla.suse.com/1172049

https://bugzilla.suse.com/1172781

https://bugzilla.suse.com/1172782

https://bugzilla.suse.com/1172783

Severity
Announcement ID: SUSE-SU-2020:1713-1
Rating: important

Related News