SUSE Updates
2974Warning Date
Severity Level
Warning Number
Target Sector
6 September, 2020
● High
2020-1727
All
Description:
SUSE has released security updates to address vulnerabilities in the following products:
- squid
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- libX11
- SUSE Linux Enterprise Module for Basesystem 15-SP2
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server 12-SP5
- java-1_7_1-ibm
- SUSE Linux Enterprise Server 11-SP4-LTSS
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
- php5
- SUSE Linux Enterprise Module for Web Scripting 12
- Linux Kernel
- SUSE Linux Enterprise High Availability 15-SP2
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Module for Public Cloud 15-SP1
- SUSE Linux Enterprise Module for Development Tools 15-SP2
- SUSE Linux Enterprise Module for Legacy Software 15-SP2
- SUSE Linux Enterprise Module for Live Patching 15-SP2
- SUSE Linux Enterprise Module for Public Cloud 15-SP2
- SUSE Linux Enterprise Real Time Extension 12-SP5
- SUSE Linux Enterprise Workstation Extension 15-SP2
- SUSE Linux Enterprise Module for Realtime 15-SP1
- xorg-x11-server
- SUSE Linux Enterprise Workstation Extension 15-SP1
- SUSE Linux Enterprise Module for Development Tools 15-SP1
- SUSE Linux Enterprise Module for Basesystem 15-SP1
- Linux Kernel (Live Patch 33 for SLE 12 SP2)
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP2-LTSS
- Linux Kernel (Live Patch 32 for SLE 12 SP2)
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP2-LTSS
- Linux Kernel (Live Patch 29 for SLE 12 SP3)
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP3-LTSS
- Linux Kernel (Live Patch 30 for SLE 12 SP3)
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP3-LTS
- Linux Kernel (Live Patch 31 for SLE 12 SP3)
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP2-LTSS
- Linux Kernel (Live Patch 34 for SLE 12 SP3)
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP2-LTSS
- Linux Kernel (Live Patch 12 for SLE 12 SP4)
- SUSE Linux Enterprise Live Patching 12-SP4
- Linux Kernel (Live Patch 13 for SLE 12 SP4)
- SUSE Linux Enterprise Live Patching 12-SP4
- Linux Kernel (Live Patch 14 for SLE 12 SP4)
- SUSE Linux Enterprise Live Patching 12-SP4
- Linux Kernel (Live Patch 11 for SLE 12 SP4)
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Live Patching 12-SP4
- Linux Kernel (Live Patch 18 for SLE 15)
- SUSE Linux Enterprise Module for Live Patching 15
- Linux Kernel (Live Patch 19 for SLE 15)
- SUSE Linux Enterprise Module for Live Patching 15
- Linux Kernel (Live Patch 5 for SLE 15 SP1)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- Linux Kernel (Live Patch 14 for SLE 15)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Module for Live Patching 15
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Live Patching 12-SP4
- Linux Kernel (Live Patch 2 for SLE 12 SP5)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Module for Live Patching 15
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 10 for SLE 15 SP1)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 6 for SLE 12 SP5)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 13 for SLE 15 SP1)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Live Patching 12-SP4
- Linux Kernel (Live Patch 4 for SLE 12 SP5)
- SUSE Linux Enterprise Module for Live Patching 15-SP2
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 1 for SLE 15 SP2)
- SUSE Linux Enterprise Module for Live Patching 15-SP2
- MozillaFirefox
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud 7
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server for SAP 12-SP2
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP2-LTSS
- SUSE Linux Enterprise Server 12-SP2-BCL
- SUSE Enterprise Storage 5
- HPE Helion Openstack 8
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Unauthorized disclosure of information
- Bypass of a protection mechanism
- Denial of service attack (DoS)
- Escalation of privilege
- Buffer overflow
Best practice and Recommendations:
The CERT team encourages users to review SUSE security advisory and apply the necessary updates:
- https://www.suse.com/support/update/announcement/2020/suse-su-20202471-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202474-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202475-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-202014484-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202477-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202478-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202481-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202482-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202485-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202486-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202486-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202487-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202492-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202491-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202497-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202498-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202499-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202502-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202507-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202508-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202506-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202524-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202525-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202526-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202505-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202513-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202531-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202517-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202534-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202515-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202537-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202540-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202541-1/
- https://www.suse.com/support/update/announcement/2020/suse-su-20202544-1/