SUSE Updates
3072Warning Date
Severity Level
Warning Number
Target Sector
22 June, 2020
● High
2020-1376
All
Description:
SUSE has released a security updates to address multiple vulnerabilities in the following products:
- bind
- SUSE Linux Enterprise Server 11-SP4-LTSS
- SUSE Linux Enterprise Point of Sale 11-SP3
- SUSE Linux Enterprise Debuginfo 11-SP4
- SUSE Linux Enterprise Debuginfo 11-SP3
- mozilla-nspr, mozilla-nss
- SUSE Linux Enterprise Server for SAP 15
- SUSE Linux Enterprise Server 15-LTSS
- SUSE Linux Enterprise Module for Server Applications 15-SP2
- SUSE Linux Enterprise Module for Server Applications 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP2
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise High Performance Computing 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-ESPOS
- fwupd
- SUSE Linux Enterprise Module for Desktop Applications 15-SP1
- perl
- SUSE Linux Enterprise Server for SAP 15
- SUSE Linux Enterprise Server 15-LTSS
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
- SUSE Linux Enterprise Module for Development Tools 15-SP2
- SUSE Linux Enterprise Module for Development Tools 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP2
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise High Performance Computing 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-ESPOS
- java-1_7_1-ibm
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Software Development Kit 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- java-1_8_0-ibm
- SUSE Linux Enterprise Server for SAP 15
- SUSE Linux Enterprise Server 15-LTSS
- SUSE Linux Enterprise Module for Legacy Software 15-SP2
- SUSE Linux Enterprise Module for Legacy Software 15-SP1
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Software Development Kit 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- java-1_8_0-openjdk
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- libgxps
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Software Development Kit 12-SP4
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4
- Linux Kernel
- SUSE Linux Enterprise Workstation Extension 12-SP5
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise High Availability 12-SP5
- osc
- SUSE Linux Enterprise Module for Development Tools 15-SP1
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Denial of service (DoS).
- Buffer overflow.
- Memory leak.
Best practice and Recommendations:
The CERT team encourages users to review SUSE security advisory and apply the necessary updates:
- https://www.suse.com/support/update/announcement/2020/suse-su-202014400-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201677-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201681-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201682-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201683-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201684-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201685-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201686-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201687-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201693-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201693-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201695-1/