Описание
Security update for sca-patterns-sle11
This update for sca-patterns-sle11 fixes the following issues:
- New regular patterns (1) for version 1.3.1
- Special Register Buffer Data Sampling aka CrossTalk (CVE-2020-0543) (bsc#1154824)
Список пакетов
SUSE Enterprise Storage 6
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise Module for Server Applications 15 SP2
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise Server 15 SP1-BCL
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise Server 15 SP1-LTSS
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise Server 15-LTSS
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise Server for SAP Applications 15
sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
sca-patterns-sle11-1.3.1-7.6.1
SUSE Manager Proxy 4.0
sca-patterns-sle11-1.3.1-7.6.1
SUSE Manager Retail Branch Server 4.0
sca-patterns-sle11-1.3.1-7.6.1
SUSE Manager Server 4.0
sca-patterns-sle11-1.3.1-7.6.1
Ссылки
- Link for SUSE-SU-2021:1497-1
- E-Mail link for SUSE-SU-2021:1497-1
- SUSE Security Ratings
- SUSE Bug 1154824
- SUSE CVE CVE-2020-0543 page
Описание
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Затронутые продукты
SUSE Enterprise Storage 6:sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS:sca-patterns-sle11-1.3.1-7.6.1
Ссылки
- CVE-2020-0543
- SUSE Bug 1154824
- SUSE Bug 1172205
- SUSE Bug 1172206
- SUSE Bug 1172207
- SUSE Bug 1172770
- SUSE Bug 1178658
- SUSE Bug 1201877