SUSE: 2020:1693-1 important: the Linux Kernel
Summary
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-10768: The prctl() function could be used to enable indirect branch speculation even after it has been disabled. (bnc#1172783) - CVE-2020-10766: A bug in the logic handling could allow an attacker with a local account to disable SSBD protection. (bnc#1172781) - CVE-2020-10767: A IBPB would be disabled when STIBP was not available or when Enhanced Indirect Branch Restricted Speculation (IBRS) was available. This is unexpected behaviour could leave the system open to a spectre v2 style attack (bnc#1172782) - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row (bnc#1172775) - CVE-2019-20810: go7007_snd_init did not call snd_card_free for a failure path, which caused a memory leak (bnc#1172458) The following non-secur...
Read the Full AdvisoryReferences
#1051510 #1065729 #1071995 #1085030 #1111666
#1113956 #1114279 #1144333 #1148868 #1158983
#1161016 #1162063 #1166985 #1168081 #1169194
#1170592 #1171904 #1172458 #1172472 #1172537
#1172538 #1172759 #1172775 #1172781 #1172782
#1172783 #1172884
Cross- CVE-2019-20810 CVE-2020-10766 CVE-2020-10767
CVE-2020-10768 CVE-2020-13974
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise High Availability 12-SP5
https://www.suse.com/security/cve/CVE-2019-20810.html
https://www.suse.com/security/cve/CVE-2020-10766.html
https://www.suse.com/security/cve/CVE-2020-10767.html
https://www.suse.com/security/cve/CVE-2020-10768.html
https://www.suse.com/security/cve/...
Read the Full Advisory