SUSE Updates
2580Warning Date
Severity Level
Warning Number
Target Sector
1 November, 2020
● High
2020-1998
All
Description:
SUSE has released security updates to address multiple vulnerabilities in the following products:
- pacemaker
- SUSE Linux Enterprise High Availability 15
- SUSE Linux Enterprise High Availability 12-SP4
- SUSE Linux Enterprise High Availability 12-SP3
- samba
- SUSE Linux Enterprise Module for Python2 15-SP2
- SUSE Linux Enterprise Module for Basesystem 15-SP2
- SUSE Linux Enterprise High Availability 15-SP2
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise High Availability 12-SP5
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Linux Enterprise High Availability 12-SP2
- SUSE Linux Enterprise Server for SAP 15
- SUSE Linux Enterprise Server 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-ESPOS
- SUSE Linux Enterprise High Availability 15
- SUSE Linux Enterprise Module for Python2 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise High Availability 15-SP1
- SUSE Enterprise Storage 6
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise High Availability 12-SP4
- SUSE Linux Enterprise High Availability 12-SP3
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- SUSE Linux Enterprise Server 11-SP4-LTSS
- SUSE Linux Enterprise Point of Sale 11-SP3
- SUSE Linux Enterprise Debuginfo 11-SP4
- SUSE Linux Enterprise Debuginfo 11-SP3
- spice, spice-gtk
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- xen
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud 9
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server 12-SP4-LTSS
- graphviz
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise High Availability 12-SP5
- SUSE Linux Enterprise High Availability 12-SP4
- SUSE Linux Enterprise High Availability 12-SP3
- SUSE Linux Enterprise High Availability Extension 11-SP4
- zstd
- SUSE Linux Enterprise Installer 15-SP1
- SUSE Linux Enterprise Installer 15
- MozillaThunderbird, mozilla-nspr
- SUSE Linux Enterprise Workstation Extension 15-SP2
- SUSE Linux Enterprise Workstation Extension 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP2
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- libvirt
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 8
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- python-Jinja2
- SUSE Manager Tools 12
- SUSE Linux Enterprise Module for Public Cloud 12
- SUSE Linux Enterprise Module for Advanced Systems Management 12
- sapconf
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Denial of service (DoS)
- Command injection.
Best practice and Recommendations:
The CERT team encourages users to review SUSE security advisory and apply the necessary updates:
- https://www.suse.com/support/update/announcement/2020/suse-su-20203080-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203081-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203082-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203083-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203084-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203085-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203086-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203087-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203088-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203089-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203090-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20201396-3/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203091-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203092-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203093-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203094-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203095-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20203096-1/
- https://www.suse.com/support/update/announcement/2020/suse-ru-20203105-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-202014524-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-202014525-1/