SUSE Security Update: Security update for grub2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:2074-1
Rating:             important
References:         #1168994 #1173812 #1174463 #1174570 
Cross-References:   CVE-2020-10713 CVE-2020-14308 CVE-2020-14309
                    CVE-2020-14310 CVE-2020-14311 CVE-2020-15706
                    CVE-2020-15707
Affected Products:
                    SUSE Linux Enterprise Module for Server Applications 15-SP2
                    SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for grub2 fixes the following issues:

   - Fix for CVE-2020-10713 (bsc#1168994)
   - Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
     (bsc#1173812)
   - Fix for CVE-2020-15706 (bsc#1174463)
   - Fix for CVE-2020-15707 (bsc#1174570)

   - Use overflow checking primitives where the arithmetic expression for
     buffer
   - Use grub_calloc for overflow check and return NULL when it would occur


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2020-2074=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2074=1



Package List:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):

      grub2-x86_64-xen-2.04-9.7.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):

      grub2-2.04-9.7.1
      grub2-debuginfo-2.04-9.7.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 s390x x86_64):

      grub2-debugsource-2.04-9.7.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):

      grub2-arm64-efi-2.04-9.7.1
      grub2-i386-pc-2.04-9.7.1
      grub2-powerpc-ieee1275-2.04-9.7.1
      grub2-snapper-plugin-2.04-9.7.1
      grub2-systemd-sleep-plugin-2.04-9.7.1
      grub2-x86_64-efi-2.04-9.7.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (s390x):

      grub2-s390x-emu-2.04-9.7.1


References:

   https://www.suse.com/security/cve/CVE-2020-10713.html
   https://www.suse.com/security/cve/CVE-2020-14308.html
   https://www.suse.com/security/cve/CVE-2020-14309.html
   https://www.suse.com/security/cve/CVE-2020-14310.html
   https://www.suse.com/security/cve/CVE-2020-14311.html
   https://www.suse.com/security/cve/CVE-2020-15706.html
   https://www.suse.com/security/cve/CVE-2020-15707.html
   https://bugzilla.suse.com/1168994
   https://bugzilla.suse.com/1173812
   https://bugzilla.suse.com/1174463
   https://bugzilla.suse.com/1174570

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:2074-1 important: grub2

July 29, 2020
An update that fixes 7 vulnerabilities is now available

Summary

This update for grub2 fixes the following issues: - Fix for CVE-2020-10713 (bsc#1168994) - Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311 (bsc#1173812) - Fix for CVE-2020-15706 (bsc#1174463) - Fix for CVE-2020-15707 (bsc#1174570) - Use overflow checking primitives where the arithmetic expression for buffer - Use grub_calloc for overflow check and return NULL when it would occur Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP2: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2020-2074=1 - SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2074=1 Package List: - SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch): grub2-x86_64-xen-2.04-9.7.1 - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): grub2-2.04-9.7.1 grub2-debuginfo-2.04-9.7.1 - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 s390x x86_64): grub2-debugsource-2.04-9.7.1 - SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch): grub2-arm64-efi-2.04-9.7.1 grub2-i386-pc-2.04-9.7.1 grub2-powerpc-ieee1275-2.04-9.7.1 grub2-snapper-plugin-2.04-9.7.1 grub2-systemd-sleep-plugin-2.04-9.7.1 grub2-x86_64-efi-2.04-9.7.1 - SUSE Linux Enterprise Module for Basesystem 15-SP2 (s390x): grub2-s390x-emu-2.04-9.7.1

References

#1168994 #1173812 #1174463 #1174570

Cross- CVE-2020-10713 CVE-2020-14308 CVE-2020-14309

CVE-2020-14310 CVE-2020-14311 CVE-2020-15706

CVE-2020-15707

Affected Products:

SUSE Linux Enterprise Module for Server Applications 15-SP2

SUSE Linux Enterprise Module for Basesystem 15-SP2

https://www.suse.com/security/cve/CVE-2020-10713.html

https://www.suse.com/security/cve/CVE-2020-14308.html

https://www.suse.com/security/cve/CVE-2020-14309.html

https://www.suse.com/security/cve/CVE-2020-14310.html

https://www.suse.com/security/cve/CVE-2020-14311.html

https://www.suse.com/security/cve/CVE-2020-15706.html

https://www.suse.com/security/cve/CVE-2020-15707.html

https://bugzilla.suse.com/1168994

https://bugzilla.suse.com/1173812

https://bugzilla.suse.com/1174463

https://bugzilla.suse.com/1174570

Severity
Announcement ID: SUSE-SU-2020:2074-1
Rating: important

Related News