SUSE Updates
2440Warning Date
Severity Level
Warning Number
Target Sector
2 April, 2020
● High
2020-1090
All
Description:
SUSE has released security updates to address vulnerabilities in the following products:
- spamassassin
- SUSE Linux Enterprise Server for SAP 15
- SUSE Linux Enterprise Server 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-ESPOS
- cloud-init
- SUSE Linux Enterprise Module for Public Cloud 12
- SUSE CaaS Platform 3.0
- icu
- SUSE Linux Enterprise Server for SAP 15
- SUSE Linux Enterprise Server 15-LTSS
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise High Performance Computing 15-LTSS
- SUSE Linux Enterprise High Performance Computing 15-ESPOS
- mariadb
- SUSE OpenStack Cloud 7
- glibc
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Software Development Kit 12-SP4
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4
- Linux Kernel
- SUSE Linux Enterprise Workstation Extension 15-SP1
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Module for Legacy Software 15-SP1
- SUSE Linux Enterprise Module for Development Tools 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise High Availability 15-SP1
- memcached
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Software Development Kit 12-SP4
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4
- qemu
- SUSE Linux Enterprise Module for Server Applications 15-SP1
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise Server 12-SP5
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Unauthorized disclosure of information
- Buffer overflow
- Denial of service attack (DoS)
Best practice and Recommendations:
The CERT team encourages users to review SUSE security advisory and apply the necessary updates:
- https://www.suse.com/support/update/announcement/2020/suse-su-20200813-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200818-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200819-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200831-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200832-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200836-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200843-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200844-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20200845-1/