Confira !!
Uma atualização que resolve 18 vulnerabilidades e tem duas correções já está disponível.
Atualização de segurança do SUSE: atualização de segurança para u-boot
______________________________________________________________________________
ID do anúncio: SUSE-SU-2020: 3283-1
Avaliação: importante
Referências: # 1098447 # 1098649 # 1134157 # 1134853 # 1143463
# 1143777 # 1143817 # 1143818 # 1143819 # 1143820
# 1143821 # 1143823 # 1143824 # 1143825 # 1143827
# 1143828 # 1143830 # 1143831 # 1162198 # 1167209
Referências cruzadas: CVE-2019-11059 CVE-2019-11690 CVE-2019-13103
CVE-2019-14192 CVE-2019-14193 CVE-2019-14194
CVE-2019-14195 CVE-2019-14196 CVE-2019-14197
CVE-2019-14198 CVE-2019-14199 CVE-2019-14200
CVE-2019-14201 CVE-2019-14202 CVE-2019-14203
CVE-2019-14204 CVE-2020-10648 CVE-2020-8432
Produtos afetados:
SUSE Linux Enterprise Server para SAP 15
SUSE Linux Enterprise Server 15-LTSS
Computação de alto desempenho SUSE Linux Enterprise 15-LTSS
Computação de alto desempenho SUSE Linux Enterprise 15-ESPOS
______________________________________________________________________________
Uma atualização que resolve 18 vulnerabilidades e tem duas correções
está agora disponivel.
Descrição:
Esta atualização para u-boot corrige os seguintes problemas:
- Corrigir inicialização de rede no Raspberry Pi 3 B + (bsc # 1098649)
- Corrigir formato de pixel GOP (bsc # 1098447)
- Correção de gravações SD no Raspberry Pi
- Habilite mais algumas placas armv7 para inicializar com EFI
- Corrigir chamadas de serviço de tempo de execução potencialmente mal compiladas
Fix CVE-2019-14192 (bsc # 1143777), CVE-2019-14193 (bsc # 1143817),
CVE-2019-14199 (bsc # 1143824), CVE-2019-14197 (bsc # 1143821), CVE-2019-14200
(bsc # 1143825), CVE-2019-14201 (bsc # 1143827), CVE-2019-14202 (bsc # 1143828),
CVE-2019-14203 (bsc # 1143830), CVE-2019-14204 (bsc # 1143831), CVE-2019-14194
(bsc # 1143818), CVE-2019-14198 (bsc # 1143823), CVE-2019-14195 (bsc # 1143819),
CVE-2019-14196 (bsc # 1143820), CVE-2019-13103 (bsc # 1143463), CVE-2020-8432
(bsc # 1162198), CVE-2019-11059 (bsc # 1134853), CVE-2019-11690 (bsc # 1134157)
e CVE-2020-10648 (bsc # 1167209)
Instruções do patch:
Para instalar esta atualização de segurança do SUSE, use os métodos de instalação recomendados pelo SUSE
como YaST online_update ou "patch zypper".
Como alternativa, você pode executar o comando listado para o seu produto:
- SUSE Linux Enterprise Server para SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-3283 = 1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2020-3283 = 1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-3283 = 1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-3283 = 1
Lista de Pacotes:
- SUSE Linux Enterprise Server para SAP 15 (ppc64le x86_64):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64):
u-boot-rpi3-2018.03-4.6.2
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64):
u-boot-rpi3-2018.03-4.6.2
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64):
u-boot-rpi3-2018.03-4.6.2
Referências:
https://www.suse.com/security/cve/CVE-2019-11059.html
https://www.suse.com/security/cve/CVE-2019-11690.html
https://www.suse.com/security/cve/CVE-2019-13103.html
https://www.suse.com/security/cve/CVE-2019-14192.html
https://www.suse.com/security/cve/CVE-2019-14193.html
https://www.suse.com/security/cve/CVE-2019-14194.html
https://www.suse.com/security/cve/CVE-2019-14195.html
https://www.suse.com/security/cve/CVE-2019-14196.html
https://www.suse.com/security/cve/CVE-2019-14197.html
https://www.suse.com/security/cve/CVE-2019-14198.html
https://www.suse.com/security/cve/CVE-2019-14199.html
https://www.suse.com/security/cve/CVE-2019-14200.html
https://www.suse.com/security/cve/CVE-2019-14201.html
https://www.suse.com/security/cve/CVE-2019-14202.html
https://www.suse.com/security/cve/CVE-2019-14203.html
https://www.suse.com/security/cve/CVE-2019-14204.html
https://www.suse.com/security/cve/CVE-2020-10648.html
https://www.suse.com/security/cve/CVE-2020-8432.html
https://bugzilla.suse.com/1098447
https://bugzilla.suse.com/1098649
https://bugzilla.suse.com/1134157
https://bugzilla.suse.com/1134853
https://bugzilla.suse.com/1143463
https://bugzilla.suse.com/1143777
https://bugzilla.suse.com/1143817
https://bugzilla.suse.com/1143818
https://bugzilla.suse.com/1143819
https://bugzilla.suse.com/1143820
https://bugzilla.suse.com/1143821
https://bugzilla.suse.com/1143823
https://bugzilla.suse.com/1143824
https://bugzilla.suse.com/1143825
https://bugzilla.suse.com/1143827
https://bugzilla.suse.com/1143828
https://bugzilla.suse.com/1143830
https://bugzilla.suse.com/1143831
https://bugzilla.suse.com/1162198
https://bugzilla.suse.com/1167209
Até a próxima !!
Nenhum comentário:
Postar um comentário