Security update for u-boot
Announcement ID: | SUSE-SU-2020:3255-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 18 vulnerabilities and has one security fix can now be installed.
Description:
This update for u-boot fixes the following issues:
CVE-2019-14192 (bsc#1143777), CVE-2019-14193 (bsc#1143817),
CVE-2019-14199 (bsc#1143824), CVE-2019-14197 (bsc#1143821),
CVE-2019-14200 (bsc#1143825), CVE-2019-14201 (bsc#1143827),
CVE-2019-14202 (bsc#1143828), CVE-2019-14203 (bsc#1143830),
CVE-2019-14204 (bsc#1143831), CVE-2019-14194 (bsc#1143818),
CVE-2019-14198 (bsc#1143823), CVE-2019-14195 (bsc#1143819),
CVE-2019-14196 (bsc#1143820), CVE-2019-13103 (bsc#1143463),
CVE-2020-8432 (bsc#1162198), CVE-2019-11059 (bsc#1134853),
CVE-2019-11690 (bsc#1134157) and CVE-2020-10648 (bsc#1167209).
Fix USB keyboard problems (bsc#1160566).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3255=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3255=1
Package List:
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64)
- u-boot-rpi3-2019.01-5.3.1
- u-boot-tools-2019.01-5.3.1
- u-boot-tools-debuginfo-2019.01-5.3.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64)
- u-boot-rpi3-2019.01-5.3.1
- u-boot-tools-2019.01-5.3.1
- u-boot-tools-debuginfo-2019.01-5.3.1
References:
- https://www.suse.com/security/cve/CVE-2019-11059.html
- https://www.suse.com/security/cve/CVE-2019-11690.html
- https://www.suse.com/security/cve/CVE-2019-13103.html
- https://www.suse.com/security/cve/CVE-2019-14192.html
- https://www.suse.com/security/cve/CVE-2019-14193.html
- https://www.suse.com/security/cve/CVE-2019-14194.html
- https://www.suse.com/security/cve/CVE-2019-14195.html
- https://www.suse.com/security/cve/CVE-2019-14196.html
- https://www.suse.com/security/cve/CVE-2019-14197.html
- https://www.suse.com/security/cve/CVE-2019-14198.html
- https://www.suse.com/security/cve/CVE-2019-14199.html
- https://www.suse.com/security/cve/CVE-2019-14200.html
- https://www.suse.com/security/cve/CVE-2019-14201.html
- https://www.suse.com/security/cve/CVE-2019-14202.html
- https://www.suse.com/security/cve/CVE-2019-14203.html
- https://www.suse.com/security/cve/CVE-2019-14204.html
- https://www.suse.com/security/cve/CVE-2020-10648.html
- https://www.suse.com/security/cve/CVE-2020-8432.html
- https://bugzilla.suse.com/show_bug.cgi?id=1134157
- https://bugzilla.suse.com/show_bug.cgi?id=1134853
- https://bugzilla.suse.com/show_bug.cgi?id=1143463
- https://bugzilla.suse.com/show_bug.cgi?id=1143777
- https://bugzilla.suse.com/show_bug.cgi?id=1143817
- https://bugzilla.suse.com/show_bug.cgi?id=1143818
- https://bugzilla.suse.com/show_bug.cgi?id=1143819
- https://bugzilla.suse.com/show_bug.cgi?id=1143820
- https://bugzilla.suse.com/show_bug.cgi?id=1143821
- https://bugzilla.suse.com/show_bug.cgi?id=1143823
- https://bugzilla.suse.com/show_bug.cgi?id=1143824
- https://bugzilla.suse.com/show_bug.cgi?id=1143825
- https://bugzilla.suse.com/show_bug.cgi?id=1143827
- https://bugzilla.suse.com/show_bug.cgi?id=1143828
- https://bugzilla.suse.com/show_bug.cgi?id=1143830
- https://bugzilla.suse.com/show_bug.cgi?id=1143831
- https://bugzilla.suse.com/show_bug.cgi?id=1160566
- https://bugzilla.suse.com/show_bug.cgi?id=1162198
- https://bugzilla.suse.com/show_bug.cgi?id=1167209