Описание
Security update for u-boot
This update for u-boot fixes the following issues:
- Fix network boot on Raspberry Pi 3 B+ (bsc#1098649)
- Fix GOP pixel format (bsc#1098447)
- Fix SD writes on Raspberry Pi
- Enable a few more armv7 boards to boot with EFI
- Fix potentially miscompiled runtime service calls
Fix CVE-2019-14192 (bsc#1143777), CVE-2019-14193 (bsc#1143817),
CVE-2019-14199 (bsc#1143824), CVE-2019-14197 (bsc#1143821),
CVE-2019-14200 (bsc#1143825), CVE-2019-14201 (bsc#1143827),
CVE-2019-14202 (bsc#1143828), CVE-2019-14203 (bsc#1143830),
CVE-2019-14204 (bsc#1143831), CVE-2019-14194 (bsc#1143818),
CVE-2019-14198 (bsc#1143823), CVE-2019-14195 (bsc#1143819),
CVE-2019-14196 (bsc#1143820), CVE-2019-13103 (bsc#1143463),
CVE-2020-8432 (bsc#1162198), CVE-2019-11059 (bsc#1134853),
CVE-2019-11690 (bsc#1134157) and CVE-2020-10648 (bsc#1167209)
Список пакетов
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server for SAP Applications 15
Ссылки
- Link for SUSE-SU-2020:3283-1
- E-Mail link for SUSE-SU-2020:3283-1
- SUSE Security Ratings
- SUSE Bug 1098447
- SUSE Bug 1098649
- SUSE Bug 1134157
- SUSE Bug 1134853
- SUSE Bug 1143463
- SUSE Bug 1143777
- SUSE Bug 1143817
- SUSE Bug 1143818
- SUSE Bug 1143819
- SUSE Bug 1143820
- SUSE Bug 1143821
- SUSE Bug 1143823
- SUSE Bug 1143824
- SUSE Bug 1143825
- SUSE Bug 1143827
- SUSE Bug 1143828
- SUSE Bug 1143830
Описание
Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension, resulting in a buffer overflow.
Затронутые продукты
Ссылки
- CVE-2019-11059
- SUSE Bug 1134853
Описание
gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
Затронутые продукты
Ссылки
- CVE-2019-11690
- SUSE Bug 1134157
Описание
A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data.
Затронутые продукты
Ссылки
- CVE-2019-13103
- SUSE Bug 1143463
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call.
Затронутые продукты
Ссылки
- CVE-2019-14192
- SUSE Bug 1143777
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.
Затронутые продукты
Ссылки
- CVE-2019-14193
- SUSE Bug 1143817
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case.
Затронутые продукты
Ссылки
- CVE-2019-14194
- SUSE Bug 1143818
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.
Затронутые продукты
Ссылки
- CVE-2019-14195
- SUSE Bug 1143819
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply.
Затронутые продукты
Ссылки
- CVE-2019-14196
- SUSE Bug 1143820
- SUSE Bug 1199623
Описание
An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply.
Затронутые продукты
Ссылки
- CVE-2019-14197
- SUSE Bug 1143821
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case.
Затронутые продукты
Ссылки
- CVE-2019-14198
- SUSE Bug 1143823
Описание
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.
Затронутые продукты
Ссылки
- CVE-2019-14199
- SUSE Bug 1143824
Описание
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
Затронутые продукты
Ссылки
- CVE-2019-14200
- SUSE Bug 1143825
Описание
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.
Затронутые продукты
Ссылки
- CVE-2019-14201
- SUSE Bug 1143827
Описание
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.
Затронутые продукты
Ссылки
- CVE-2019-14202
- SUSE Bug 1143828
Описание
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
Затронутые продукты
Ссылки
- CVE-2019-14203
- SUSE Bug 1143830
Описание
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
Затронутые продукты
Ссылки
- CVE-2019-14204
- SUSE Bug 1143831
Описание
Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
Затронутые продукты
Ссылки
- CVE-2020-10648
- SUSE Bug 1167209
Описание
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
Затронутые продукты
Ссылки
- CVE-2020-8432
- SUSE Bug 1162198