SUSE-SU-2020:3283-1: important: Security update for u-boot
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Wed Nov 11 07:43:25 MST 2020
SUSE Security Update: Security update for u-boot
______________________________________________________________________________
Announcement ID: SUSE-SU-2020:3283-1
Rating: important
References: #1098447 #1098649 #1134157 #1134853 #1143463
#1143777 #1143817 #1143818 #1143819 #1143820
#1143821 #1143823 #1143824 #1143825 #1143827
#1143828 #1143830 #1143831 #1162198 #1167209
Cross-References: CVE-2019-11059 CVE-2019-11690 CVE-2019-13103
CVE-2019-14192 CVE-2019-14193 CVE-2019-14194
CVE-2019-14195 CVE-2019-14196 CVE-2019-14197
CVE-2019-14198 CVE-2019-14199 CVE-2019-14200
CVE-2019-14201 CVE-2019-14202 CVE-2019-14203
CVE-2019-14204 CVE-2020-10648 CVE-2020-8432
Affected Products:
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
______________________________________________________________________________
An update that solves 18 vulnerabilities and has two fixes
is now available.
Description:
This update for u-boot fixes the following issues:
- Fix network boot on Raspberry Pi 3 B+ (bsc#1098649)
- Fix GOP pixel format (bsc#1098447)
- Fix SD writes on Raspberry Pi
- Enable a few more armv7 boards to boot with EFI
- Fix potentially miscompiled runtime service calls
Fix CVE-2019-14192 (bsc#1143777), CVE-2019-14193 (bsc#1143817),
CVE-2019-14199 (bsc#1143824), CVE-2019-14197 (bsc#1143821), CVE-2019-14200
(bsc#1143825), CVE-2019-14201 (bsc#1143827), CVE-2019-14202 (bsc#1143828),
CVE-2019-14203 (bsc#1143830), CVE-2019-14204 (bsc#1143831), CVE-2019-14194
(bsc#1143818), CVE-2019-14198 (bsc#1143823), CVE-2019-14195 (bsc#1143819),
CVE-2019-14196 (bsc#1143820), CVE-2019-13103 (bsc#1143463), CVE-2020-8432
(bsc#1162198), CVE-2019-11059 (bsc#1134853), CVE-2019-11690 (bsc#1134157)
and CVE-2020-10648 (bsc#1167209)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-3283=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2020-3283=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-3283=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-3283=1
Package List:
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64):
u-boot-rpi3-2018.03-4.6.2
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64):
u-boot-rpi3-2018.03-4.6.2
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
u-boot-tools-2018.03-4.6.1
u-boot-tools-debuginfo-2018.03-4.6.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64):
u-boot-rpi3-2018.03-4.6.2
References:
https://www.suse.com/security/cve/CVE-2019-11059.html
https://www.suse.com/security/cve/CVE-2019-11690.html
https://www.suse.com/security/cve/CVE-2019-13103.html
https://www.suse.com/security/cve/CVE-2019-14192.html
https://www.suse.com/security/cve/CVE-2019-14193.html
https://www.suse.com/security/cve/CVE-2019-14194.html
https://www.suse.com/security/cve/CVE-2019-14195.html
https://www.suse.com/security/cve/CVE-2019-14196.html
https://www.suse.com/security/cve/CVE-2019-14197.html
https://www.suse.com/security/cve/CVE-2019-14198.html
https://www.suse.com/security/cve/CVE-2019-14199.html
https://www.suse.com/security/cve/CVE-2019-14200.html
https://www.suse.com/security/cve/CVE-2019-14201.html
https://www.suse.com/security/cve/CVE-2019-14202.html
https://www.suse.com/security/cve/CVE-2019-14203.html
https://www.suse.com/security/cve/CVE-2019-14204.html
https://www.suse.com/security/cve/CVE-2020-10648.html
https://www.suse.com/security/cve/CVE-2020-8432.html
https://bugzilla.suse.com/1098447
https://bugzilla.suse.com/1098649
https://bugzilla.suse.com/1134157
https://bugzilla.suse.com/1134853
https://bugzilla.suse.com/1143463
https://bugzilla.suse.com/1143777
https://bugzilla.suse.com/1143817
https://bugzilla.suse.com/1143818
https://bugzilla.suse.com/1143819
https://bugzilla.suse.com/1143820
https://bugzilla.suse.com/1143821
https://bugzilla.suse.com/1143823
https://bugzilla.suse.com/1143824
https://bugzilla.suse.com/1143825
https://bugzilla.suse.com/1143827
https://bugzilla.suse.com/1143828
https://bugzilla.suse.com/1143830
https://bugzilla.suse.com/1143831
https://bugzilla.suse.com/1162198
https://bugzilla.suse.com/1167209
More information about the sle-updates
mailing list