Malware Devil

Monday, August 3, 2020

ESB-2020.2642 – [SUSE] kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2642
                   Security update for the Linux Kernel
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Increased Privileges -- Remote/Unauthenticated
                   Increased Privileges -- Existing Account      
                   Reduced Security     -- Unknown/Unspecified   
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14331 CVE-2020-10781 CVE-2020-10135
                   CVE-2020-0305  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20202102-1

- --------------------------BEGIN INCLUDED TEXT--------------------

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2102-1
Rating:            important
References:        #1065729 #1152472 #1152489 #1153274 #1154353 #1154488
                   #1155518 #1155798 #1165933 #1167773 #1168959 #1169771
                   #1171857 #1171988 #1172201 #1173074 #1173849 #1173941
                   #1174072 #1174116 #1174126 #1174127 #1174128 #1174129
                   #1174185 #1174205 #1174247 #1174263 #1174264 #1174331
                   #1174332 #1174333 #1174356 #1174362 #1174396 #1174398
                   #1174407 #1174409 #1174411 #1174438 #1174462 #1174513
                   #1174527 #1174627 #1174645
Cross-References:  CVE-2020-0305 CVE-2020-10135 CVE-2020-10781 CVE-2020-14331
Affected Products:
                   SUSE Linux Enterprise Module for Public Cloud 15-SP2
______________________________________________________________________________

An update that solves four vulnerabilities and has 41 fixes is now available.

Description:

The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  o CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation
    (bnc#1173074).
  o CVE-2020-0305: In cdev_get of char_dev.c, there is a possible
    use-after-free due to a race condition. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1174462).
  o CVE-2020-10135: Legacy pairing and secure-connections pairing
    authentication in bluetooth may have allowed an unauthenticated user to
    complete authentication without pairing credentials via adjacent access. An
    unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR
    master or slave to pair with a previously paired remote device to
    successfully complete the authentication procedure without knowing the link
    key (bnc#1171988).
  o CVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update()
    (bnc#1174205).


The following non-security bugs were fixed:

  o ACPICA: Dispatcher: add status checks (git-fixes).
  o ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
  o ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
  o ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
  o ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#
    SLE-13261).
  o ALSA: hda/realtek - change to suitable link model for ASUS platform
    (git-fixes).
  o ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with
    ALC256 (git-fixes).
  o ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series
    with ALC289 (git-fixes).
  o ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
  o ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
  o ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung
    Notebook Pen S (git-fixes).
  o ALSA: hda/realtek - fixup for yet another Intel reference board
    (git-fixes).
  o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
  o ALSA: line6: Perform sanity check for each URB creation (git-fixes).
  o ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
  o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S
    (git-fixes).
  o ALSA: usb-audio: Fix race against the error recovery URB submission
    (git-fixes).
  o apparmor: ensure that dfa state tables have entries (git-fixes).
  o apparmor: fix introspection of of task mode for unconfined tasks
    (git-fixes).
  o apparmor: Fix memory leak of profile proxy (git-fixes).
  o apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
  o apparmor: remove useless aafs_create_symlink (git-fixes).
  o arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#
    1174398).
  o arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#
    1174398).
  o ASoC: codecs: max98373: Removed superfluous volume control from chip
    default (git-fixes).
  o ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend
    (git-fixes).
  o ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
  o ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
  o ASoC: rt286: fix unexpected interrupt happens (git-fixes).
  o ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo
    Miix 2 10 (git-fixes).
  o ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
  o ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10
    (git-fixes).
  o ASoC: rt5682: Report the button event in the headset type only (git-fixes).
  o ASoC: topology: fix kernel oops on route addition error (git-fixes).
  o ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
  o ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
  o ASoC: wm8974: remove unsupported clock mode (git-fixes).
  o ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
  o ath9k: Fix regression with Atheros 9271 (git-fixes).
  o ax88172a: fix ax88172a_unbind() failures (git-fixes).
  o blk-mq: consider non-idle request as "inflight" in blk_mq_rq_inflight()
    (bsc#1165933).
  o bnxt_en: Init ethtool link settings after reading updated PHY configuration
    (jsc#SLE-8371 bsc#1153274).
  o bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
  o brcmfmac: Transform compatible string for FW loading (bsc#1169771).
  o bridge: Avoid infinite loop when suppressing NS messages with invalid
    options (networking-stable-20_06_10).
  o bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
  o btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#
    1174438).
  o btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#
    1174438).
  o btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc
    #1174438).
  o btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
  o btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
  o btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO
    (bsc#1174438).
  o btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
  o bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
  o dccp: Fix possible memleak in dccp_init and dccp_fini
    (networking-stable-20_06_16).
  o devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
  o /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
  o /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
  o dmaengine: dmatest: stop completed threads when running without set channel
    (git-fixes).
  o dmaengine: dw: Initialize channel before each transfer (git-fixes).
  o dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
  o dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler
    (git-fixes).
  o dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
  o dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler
    (git-fixes).
  o dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
  o dm: do not use waitqueue for request-based DM (bsc#1165933).
  o dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
  o dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
  o drm/amd/display: Use kfree() to free rgb_user in
    calculate_user_regamma_ramp() (git-fixes).
  o drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
  o drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
  o drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).
  o drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
  o drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
  o drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
  o drm/exynos: Properly propagate return value in drm_iommu_attach_device()
    (git-fixes).
  o drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)
  o drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
  o drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489)
  o drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#
    1152489)
  o drm: mcde: Fix display initialization problem (git-fixes).
  o drm/mediatek: Check plane visibility in atomic_update (git-fixes).
  o drm/msm/dpu: allow initialization of encoder locks during encoder init
    (git-fixes).
  o drm/msm: fix potential memleak in error branch (git-fixes).
  o drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
  o drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003
    (git-fixes).
  o drm/radeon: fix double free (git-fixes).
  o drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
  o drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
  o drm/tegra: hub: Do not enable orphaned window group (git-fixes).
  o exfat: add missing brelse() calls on error paths (git-fixes).
  o exfat: fix incorrect update of stream entry in __exfat_truncate()
    (git-fixes).
  o exfat: fix memory leak in exfat_parse_param() (git-fixes).
  o exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
  o fpga: dfl: fix bug in port reset handshake (git-fixes).
  o fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config
    file
  o fuse: copy_file_range should truncate cache (git-fixes).
  o fuse: fix copy_file_range cache issues (git-fixes).
  o geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
  o gpio: pca953x: disable regmap locking for automatic address incrementing
    (git-fixes).
  o gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
  o gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2
    (git-fixes).
  o gpu: host1x: Detach driver on unregister (git-fixes).
  o habanalabs: increase timeout during reset (git-fixes).
  o HID: logitech-hidpp: avoid repeated "multiplier = " log messages
    (git-fixes).
  o HID: magicmouse: do not set up autorepeat (git-fixes).
  o HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
  o HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
  o HID: quirks: Remove ITE 8595 entry from hid_have_special_driver
    (git-fixes).
  o hippi: Fix a size used in a 'pci_free_consistent()' in an error handling
    path (git-fixes).
  o hwmon: (emc2103) fix unable to change fan pwm1_enable attribute
    (git-fixes).
  o hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
  o i2c: eg20t: Load module automatically if ID matches (git-fixes).
  o i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
  o i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
  o i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
  o i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
  o i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
  o i40iw: Report correct firmware version (git-fixes).
  o IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
  o IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
  o IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
  o IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
  o IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
  o IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
  o IB/hfi1: Fix memory leaks in sysfs registration and unregistration
    (git-fixes).
  o IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#
    1174407).
  o IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
  o IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode
    (git-fixes).
  o IB/mad: Fix use after free when destroying MAD agent (git-fixes).
  o IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
  o IB/mlx5: Fix 50G per lane indication (git-fixes).
  o IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
  o IB/mlx5: Fix missing congestion control debugfs on rep rdma device
    (git-fixes).
  o IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads
    (git-fixes).
  o IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
  o IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
  o IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
  o ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
  o iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()'
    (git-fixes).
  o iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
  o iio:health:afe4404 Fix timestamp alignment and prevent data leak
    (git-fixes).
  o iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
  o iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
  o iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
  o iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
  o iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe()
    (git-fixes).
  o iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
  o iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
  o Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
  o Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
  o Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
  o Input: mms114 - add extra compatible for mms345l (git-fixes).
  o intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
  o intel_th: pci: Add Emmitsburg PCH support (git-fixes).
  o intel_th: pci: Add Jasper Lake CPU support (git-fixes).
  o intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
  o iommu/arm-smmu-v3: Do not reserve implementation defined register space
    (bsc#1174126).
  o iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
  o iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
  o ionic: centralize queue reset code (bsc#1167773).
  o ionic: fix up filter locks and debug msgs (bsc#1167773).
  o ionic: keep rss hash after fw update (bsc#1167773).
  o ionic: update filter id after replay (bsc#1167773).
  o ionic: update the queue count on open (bsc#1167773).
  o ionic: use mutex to protect queue operations (bsc#1167773).
  o ionic: use offset for ethtool regs data (bsc#1167773).
  o kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
  o keys: asymmetric: fix error return code in software_key_query()
    (git-fixes).
  o KVM: nVMX: always update CR3 in VMCS (git-fixes).
  o l2tp: add sk_family checks to l2tp_validate_socket
    (networking-stable-20_06_07).
  o l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
  o lib: Reduce user_access_begin() boundaries in strncpy_from_user() and
    strnlen_user() (bsc#1174331).
  o media: cec: silence shift wrapping warning in __cec_s_log_addrs()
    (git-fixes).
  o mei: bus: do not clean driver pointer (git-fixes).
  o mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
  o mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#
    1154488).
  o mlxsw: core: Use different get_trend() callbacks for different thermal
    zones (networking-stable-20_06_10).
  o mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed
    (git-fixes).
  o mmc: sdhci: do not enable card detect interrupt for gpio cd type
    (git-fixes).
  o mm/mmap.c: close race between munmap() and expand_upwards()/downwards()
    (bsc#1174527).
  o nbd: Fix memory leak in nbd_add_socket (git-fixes).
  o net: be more gentle about silly gso requests coming from user
    (networking-stable-20_06_07).
  o net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
  o netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
  o net: dsa: bcm_sf2: Fix node reference count (git-fixes).
  o net_failover: fixed rollback in net_failover_open()
    (networking-stable-20_06_10).
  o netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#
    1171857).
  o netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit
    helpers (bsc#1171857).
  o netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#
    1171857).
  o netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit
    helpers (bsc#1171857).
  o net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
  o net: hns3: check reset pending after FLR prepare (bsc#1154353).
  o net: hns3: fix error handling for desc filling (git-fixes).
  o net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
  o net: hns3: fix return value error when query MAC link status fail
    (git-fixes).
  o net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint()
    (bsc#1154353).
  o net: macb: call pm_runtime_put_sync on failure path (git-fixes).
  o net/mlx5: drain health workqueue in case of driver load error
    (networking-stable-20_06_16).
  o net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash
    (jsc#SLE-8464).
  o net/mlx5e: Fix repeated XSK usage on one channel
    (networking-stable-20_06_16).
  o net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#
    SLE-8464).
  o net/mlx5: Fix fatal error handling during device load
    (networking-stable-20_06_16).
  o net: phy: realtek: add support for configuring the RX delay on RTL8211F
    (bsc#1174398).
  o net/smc: fix restoring of fallback changes (git-fixes).
  o net: stmmac: do not attach interface until resume finishes (bsc#1174072).
  o net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
  o net: stmmac: dwc-qos: use generic device api (bsc#1174072).
  o net: stmmac: enable timestamp snapshot for required PTP packets in dwmac
    v5.10a (networking-stable-20_06_07).
  o net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
  o net/tls: fix encryption error checking (git-fixes).
  o net/tls: free record only on encryption error (git-fixes).
  o net: usb: qmi_wwan: add Telit LE910C1-EUX composition
    (networking-stable-20_06_07).
  o nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
  o nfp: flower: fix used time of merge flow statistics
    (networking-stable-20_06_07).
  o NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#
    1174264).
  o NTB: Fix static check warning in perf_clear_test (git-fixes).
  o NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).
  o ntb: hw: remove the code that sets the DMA mask (git-fixes).
  o NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).
  o NTB: ntb_test: Fix bug when counting remote files (git-fixes).
  o NTB: ntb_tool: reading the link file should not end in a NULL byte
    (git-fixes).
  o NTB: perf: Do not require one more memory window than number of peers
    (git-fixes).
  o NTB: perf: Fix race condition when run with ntb_test (git-fixes).
  o NTB: perf: Fix support for hardware that does not have port numbers
    (git-fixes).
  o ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
  o NTB: Revert the change to use the NTB device dev for DMA allocations
    (git-fixes).
  o ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
  o ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
  o padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
  o padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
  o PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#
    1174356).
  o PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
  o PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
  o PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#
    1172201).
  o pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
  o percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc
    #1174332).
  o phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked
    (git-fixes).
  o platform/x86: ISST: Increase timeout (bsc#1174185).
  o powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable
    pkey (bsc#1065729).
  o powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc
    #1168959 ltc#185010).
  o powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
  o powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
  o qed: suppress "do not support RoCE & iWARP" flooding on HW init
    (git-fixes).
  o qed: suppress false-positives interrupt error messages on HW init
    (git-fixes).
  o RDMA/cm: Add missing locking around id.state in cm_dup_req_handler
    (git-fixes).
  o RDMA/cma: Protect bind_list and listen_list while finding matching cm id
    (git-fixes).
  o RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
  o RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
  o RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id()
    (git-fixes).
  o RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
  o RDMA/cm: Remove a race freeing timewait_info (git-fixes).
  o RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
  o RDMA/core: Fix double destruction of uobject (git-fixes).
  o RDMA/core: Fix double put of resource (git-fixes).
  o RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
  o RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
  o RDMA/core: Fix race between destroy and release FD object (git-fixes).
  o RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
  o RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
  o RDMA/counter: Query a counter before release (git-fixes).
  o RDMA/efa: Set maximum pkeys device attribute (git-fixes).
  o RDMA/hns: Bugfix for querying qkey (git-fixes).
  o RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
  o RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
  o RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
  o RDMA/mad: Do not crash if the rdma device does not have a umad interface
    (git-fixes).
  o RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads()
    (git-fixes).
  o RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
  o RDMA/mlx5: Add init2init as a modify command (git-fixes).
  o RDMA/mlx5: Fix access to wrong pointer while performing flush due to error
    (git-fixes).
  o RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
  o RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
  o RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#
    SLE-8446).
  o RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
  o RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
  o RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
  o RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
    (git-fixes).
  o RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
  o RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532
    (git-fixes).
  o RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
  o RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
  o RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
  o RDMA/rxe: Set default vendor ID (git-fixes).
  o RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
  o RDMA/siw: Fix failure handling during device creation (git-fixes).
  o RDMA/siw: Fix passive connection establishment (git-fixes).
  o RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
  o RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr()
    (git-fixes).
  o RDMA/siw: Fix reporting vendor_part_id (git-fixes).
  o RDMA/siw: Fix setting active_mtu attribute (git-fixes).
  o RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
  o RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
  o RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
  o regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
  o regmap: fix alignment issue (git-fixes).
  o regmap: Fix memory leak from regmap_register_patch (git-fixes).
  o Revert "i2c: cadence: Fix the hold bit setting" (git-fixes).
  o Revert "RDMA/cma: Simplify rdma_resolve_addr() error flow" (git-fixes).
  o Revert "thermal: mediatek: fix register index error" (git-fixes).
  o RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen()
    (git-fixes).
  o rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).
  o rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
  o s390: fix syscall_get_error for compat processes (git-fixes).
  o s390/ism: fix error return code in ism_probe() (git-fixes).
  o s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
  o s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
  o s390/qdio: consistently restore the IRQ handler (git-fixes).
  o s390/qdio: put thinint indicator after early error (git-fixes).
  o s390/qdio: tear down thinint indicator after early error (git-fixes).
  o s390/qeth: fix error handling for isolation mode cmds (git-fixes).
  o sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU
    scheduler functional and performance backports)).
  o scsi: libfc: free response frame from GPN_ID (bsc#1173849).
  o scsi: libfc: Handling of extra kref (bsc#1173849).
  o scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
  o scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#
    1173849).
  o scsi: libfc: Skip additional kref updating work event (bsc#1173849).
  o scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
  o scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action
    (git-fixes).
  o selftests/net: in rxtimestamp getopt_long needs terminating null entry
    (networking-stable-20_06_16).
  o selinux: fall back to ref-walk if audit is required (bsc#1174333).
  o selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
    (bsc#1174333).
  o serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
  o SMB3: Honor lease disabling for multiuser mounts (git-fixes).
  o soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
  o spi: spidev: fix a potential use-after-free in spidev_release()
    (git-fixes).
  o spi: spidev: fix a race between spidev_release and spidev_remove
    (git-fixes).
  o spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate
    (git-fixes).
  o staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift
    (git-fixes).
  o staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift
    (git-fixes).
  o staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift
    (git-fixes).
  o staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
  o staging: comedi: verify array index is correct before using it (git-fixes).
  o SUNRPC dont update timeout value on connection reset (bsc#1174263).
  o sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
  o tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
  o thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
  o thermal: int3403_thermal: Downgrade error message (git-fixes).
  o tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
  o tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
    (git-fixes).
  o tty: hvc_console, fix crashes on parallel open/close (git-fixes).
  o udp: Copy has_conns in reuseport_grow() (git-fixes).
  o udp: Improve load balancing for SO_REUSEPORT (git-fixes).
  o USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
  o usb: chipidea: core: add wakeup support for extcon (git-fixes).
  o usb: dwc2: Fix shutdown callback in platform (git-fixes).
  o usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work
    (git-fixes).
  o usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
  o usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
  o usb: gadget: udc: atmel: fix uninitialized read in debug printk
    (git-fixes).
  o usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable()
    (git-fixes).
  o usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
  o USB: serial: ch341: add new Product ID for CH340 (git-fixes).
  o USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
  o USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
  o USB: serial: option: add GosunCn GM500 series (git-fixes).
  o USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
  o usb: tegra: Fix allocation for the FPCI context (git-fixes).
  o usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
  o vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
  o virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial
    (git-fixes).
  o virt: vbox: Fix guest capabilities mask check (git-fixes).
  o virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match
    upstream (git-fixes).
  o vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
  o vxlan: Avoid infinite loop when suppressing NS messages with invalid
    options (networking-stable-20_06_10).
  o watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
  o workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
  o xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Public Cloud 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2102=1

Package List:

  o SUSE Linux Enterprise Module for Public Cloud 15-SP2 (x86_64):
       kernel-azure-5.3.18-18.12.1
       kernel-azure-debuginfo-5.3.18-18.12.1
       kernel-azure-debugsource-5.3.18-18.12.1
       kernel-azure-devel-5.3.18-18.12.1
       kernel-azure-devel-debuginfo-5.3.18-18.12.1
       kernel-syms-azure-5.3.18-18.12.1
  o SUSE Linux Enterprise Module for Public Cloud 15-SP2 (noarch):
       kernel-devel-azure-5.3.18-18.12.1
       kernel-source-azure-5.3.18-18.12.1


References:

  o https://www.suse.com/security/cve/CVE-2020-0305.html
  o https://www.suse.com/security/cve/CVE-2020-10135.html
  o https://www.suse.com/security/cve/CVE-2020-10781.html
  o https://www.suse.com/security/cve/CVE-2020-14331.html
  o https://bugzilla.suse.com/1065729
  o https://bugzilla.suse.com/1152472
  o https://bugzilla.suse.com/1152489
  o https://bugzilla.suse.com/1153274
  o https://bugzilla.suse.com/1154353
  o https://bugzilla.suse.com/1154488
  o https://bugzilla.suse.com/1155518
  o https://bugzilla.suse.com/1155798
  o https://bugzilla.suse.com/1165933
  o https://bugzilla.suse.com/1167773
  o https://bugzilla.suse.com/1168959
  o https://bugzilla.suse.com/1169771
  o https://bugzilla.suse.com/1171857
  o https://bugzilla.suse.com/1171988
  o https://bugzilla.suse.com/1172201
  o https://bugzilla.suse.com/1173074
  o https://bugzilla.suse.com/1173849
  o https://bugzilla.suse.com/1173941
  o https://bugzilla.suse.com/1174072
  o https://bugzilla.suse.com/1174116
  o https://bugzilla.suse.com/1174126
  o https://bugzilla.suse.com/1174127
  o https://bugzilla.suse.com/1174128
  o https://bugzilla.suse.com/1174129
  o https://bugzilla.suse.com/1174185
  o https://bugzilla.suse.com/1174205
  o https://bugzilla.suse.com/1174247
  o https://bugzilla.suse.com/1174263
  o https://bugzilla.suse.com/1174264
  o https://bugzilla.suse.com/1174331
  o https://bugzilla.suse.com/1174332
  o https://bugzilla.suse.com/1174333
  o https://bugzilla.suse.com/1174356
  o https://bugzilla.suse.com/1174362
  o https://bugzilla.suse.com/1174396
  o https://bugzilla.suse.com/1174398
  o https://bugzilla.suse.com/1174407
  o https://bugzilla.suse.com/1174409
  o https://bugzilla.suse.com/1174411
  o https://bugzilla.suse.com/1174438
  o https://bugzilla.suse.com/1174462
  o https://bugzilla.suse.com/1174513
  o https://bugzilla.suse.com/1174527
  o https://bugzilla.suse.com/1174627
  o https://bugzilla.suse.com/1174645

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=JNYd
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/03/esb-2020-2642-suse-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2642-suse-kernel-multiple-vulnerabilities

ESB-2020.2640 – [SUSE] MozillaFirefox: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2640
                    Security update for MozillaFirefox
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MozillaFirefox
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-15659 CVE-2020-15658 CVE-2020-15657
                   CVE-2020-15656 CVE-2020-15655 CVE-2020-15654
                   CVE-2020-15653 CVE-2020-15652 CVE-2020-6514
                   CVE-2020-6463  

Reference:         ESB-2020.2605
                   ESB-2020.2598

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20202100-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for MozillaFirefox

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2100-1
Rating:            moderate
References:        #1173948 #1174538
Cross-References:  CVE-2020-15652 CVE-2020-15653 CVE-2020-15654 CVE-2020-15655
                   CVE-2020-15656 CVE-2020-15657 CVE-2020-15658 CVE-2020-15659
                   CVE-2020-6463 CVE-2020-6514
Affected Products:
                   SUSE OpenStack Cloud Crowbar 9
                   SUSE OpenStack Cloud Crowbar 8
                   SUSE OpenStack Cloud 9
                   SUSE OpenStack Cloud 8
                   SUSE OpenStack Cloud 7
                   SUSE Linux Enterprise Software Development Kit 12-SP5
                   SUSE Linux Enterprise Server for SAP 12-SP4
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server for SAP 12-SP2
                   SUSE Linux Enterprise Server 12-SP5
                   SUSE Linux Enterprise Server 12-SP4-LTSS
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   SUSE Linux Enterprise Server 12-SP2-LTSS
                   SUSE Linux Enterprise Server 12-SP2-BCL
                   SUSE Enterprise Storage 5
                   HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes 10 vulnerabilities is now available.

Description:

This update for MozillaFirefox fixes the following issues:

  o Firefox Extended Support Release 78.1.0 ESR * Fixed: Various stability,
    functionality, and security fixes (bsc#1174538) * CVE-2020-15652: Potential
    leak of redirect targets when loading scripts in a worker * CVE-2020-6514:
    WebRTC data channel leaks internal address to peer * CVE-2020-15655:
    Extension APIs could be used to bypass Same-Origin Policy * CVE-2020-15653:
    Bypassing iframe sandbox when allowing popups * CVE-2020-6463:
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture *
    CVE-2020-15656: Type confusion for special arguments in IonMonkey *
    CVE-2020-15658: Overriding file type when saving to disk * CVE-2020-15657:
    DLL hijacking due to incorrect loading path * CVE-2020-15654: Custom cursor
    can overlay user interface * CVE-2020-15659: Memory safety bugs fixed in
    Firefox 79 and Firefox ESR 78.1

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 9:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-2100=1
  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-2100=1
  o SUSE OpenStack Cloud 9:
    zypper in -t patch SUSE-OpenStack-Cloud-9-2020-2100=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2020-2100=1
  o SUSE OpenStack Cloud 7:
    zypper in -t patch SUSE-OpenStack-Cloud-7-2020-2100=1
  o SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2100=1
  o SUSE Linux Enterprise Server for SAP 12-SP4:
    zypper in -t patch SUSE-SLE-SAP-12-SP4-2020-2100=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2100=1
  o SUSE Linux Enterprise Server for SAP 12-SP2:
    zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2100=1
  o SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2100=1
  o SUSE Linux Enterprise Server 12-SP4-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-2100=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2100=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-2100=1
  o SUSE Linux Enterprise Server 12-SP2-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2100=1
  o SUSE Linux Enterprise Server 12-SP2-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-2100=1
  o SUSE Enterprise Storage 5:
    zypper in -t patch SUSE-Storage-5-2020-2100=1
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2020-2100=1

Package List:

  o SUSE OpenStack Cloud Crowbar 9 (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE OpenStack Cloud 9 (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE OpenStack Cloud 8 (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE OpenStack Cloud 7 (s390x x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
    s390x x86_64):
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
  o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o SUSE Enterprise Storage 5 (aarch64 x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1
  o HPE Helion Openstack 8 (x86_64):
       MozillaFirefox-78.1.0-112.8.1
       MozillaFirefox-debuginfo-78.1.0-112.8.1
       MozillaFirefox-debugsource-78.1.0-112.8.1
       MozillaFirefox-devel-78.1.0-112.8.1
       MozillaFirefox-translations-common-78.1.0-112.8.1


References:

  o https://www.suse.com/security/cve/CVE-2020-15652.html
  o https://www.suse.com/security/cve/CVE-2020-15653.html
  o https://www.suse.com/security/cve/CVE-2020-15654.html
  o https://www.suse.com/security/cve/CVE-2020-15655.html
  o https://www.suse.com/security/cve/CVE-2020-15656.html
  o https://www.suse.com/security/cve/CVE-2020-15657.html
  o https://www.suse.com/security/cve/CVE-2020-15658.html
  o https://www.suse.com/security/cve/CVE-2020-15659.html
  o https://www.suse.com/security/cve/CVE-2020-6463.html
  o https://www.suse.com/security/cve/CVE-2020-6514.html
  o https://bugzilla.suse.com/1173948
  o https://bugzilla.suse.com/1174538

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4eu0
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/03/esb-2020-2640-suse-mozillafirefox-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2640-suse-mozillafirefox-multiple-vulnerabilities

ESB-2020.2641 – [SUSE] targetcli-fb: Reduced security – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2641
                     Security update for targetcli-fb
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           targetcli-fb
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Reduced Security -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-13867  

Reference:         ESB-2020.2620

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20202101-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for targetcli-fb

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2101-1
Rating:            moderate
References:        #1172743
Cross-References:  CVE-2020-13867
Affected Products:
                   SUSE Linux Enterprise Module for Python2 15-SP2
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for targetcli-fb fixes the following issues:

  o CVE-2020-13867: Fixed the permissions in /etc/target (bsc#1172743)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Python2 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Python2-15-SP2-2020-2101=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2101=1

Package List:

  o SUSE Linux Enterprise Module for Python2 15-SP2 (noarch):
       python2-targetcli-fb-2.1.52-3.3.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
       python3-targetcli-fb-2.1.52-3.3.1
       targetcli-fb-common-2.1.52-3.3.1


References:

  o https://www.suse.com/security/cve/CVE-2020-13867.html
  o https://bugzilla.suse.com/1172743

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=1ec1
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/03/esb-2020-2641-suse-targetcli-fb-reduced-security-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2641-suse-targetcli-fb-reduced-security-existing-account

ESB-2020.2639 – [UNIX/Linux][SUSE] ghostscript: Execute arbitrary code/commands – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2639
                      Security update for ghostscript
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ghostscript
Publisher:         SUSE
Operating System:  SUSE
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Read-only Data Access           -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-15900  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20202095-1
   https://www.suse.com/support/update/announcement/2020/suse-su-20202097-1

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than SUSE. It is recommended that administrators 
         running ghostscript check for an updated version of the software for
         their operating system.
         
         This bulletin contains two (2) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2095-1
Rating:            important
References:        #1174415
Cross-References:  CVE-2020-15900
Affected Products:
                   SUSE Linux Enterprise Server for SAP 15
                   SUSE Linux Enterprise Server 15-LTSS
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
                   SUSE Linux Enterprise Module for Basesystem 15-SP1
                   SUSE Linux Enterprise High Performance Computing 15-LTSS
                   SUSE Linux Enterprise High Performance Computing 15-ESPOS
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for ghostscript fixes the following issues:

  o fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout) cf. https:/
    /bugs.ghostscript.com/show_bug.cgiid=702582 (bsc#1174415)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 15:
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-2095=1
  o SUSE Linux Enterprise Server 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-SLES-15-2020-2095=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2095=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-2095=1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2020-2095=1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2020-2095=1

Package List:

  o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
       ghostscript-9.52-3.32.1
       ghostscript-debuginfo-9.52-3.32.1
       ghostscript-debugsource-9.52-3.32.1
       ghostscript-devel-9.52-3.32.1
       ghostscript-x11-9.52-3.32.1
       ghostscript-x11-debuginfo-9.52-3.32.1
  o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
       ghostscript-9.52-3.32.1
       ghostscript-debuginfo-9.52-3.32.1
       ghostscript-debugsource-9.52-3.32.1
       ghostscript-devel-9.52-3.32.1
       ghostscript-x11-9.52-3.32.1
       ghostscript-x11-debuginfo-9.52-3.32.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       ghostscript-9.52-3.32.1
       ghostscript-debuginfo-9.52-3.32.1
       ghostscript-debugsource-9.52-3.32.1
       ghostscript-devel-9.52-3.32.1
       ghostscript-x11-9.52-3.32.1
       ghostscript-x11-debuginfo-9.52-3.32.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x
    x86_64):
       ghostscript-9.52-3.32.1
       ghostscript-debuginfo-9.52-3.32.1
       ghostscript-debugsource-9.52-3.32.1
       ghostscript-devel-9.52-3.32.1
       ghostscript-x11-9.52-3.32.1
       ghostscript-x11-debuginfo-9.52-3.32.1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
       ghostscript-9.52-3.32.1
       ghostscript-debuginfo-9.52-3.32.1
       ghostscript-debugsource-9.52-3.32.1
       ghostscript-devel-9.52-3.32.1
       ghostscript-x11-9.52-3.32.1
       ghostscript-x11-debuginfo-9.52-3.32.1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
       ghostscript-9.52-3.32.1
       ghostscript-debuginfo-9.52-3.32.1
       ghostscript-debugsource-9.52-3.32.1
       ghostscript-devel-9.52-3.32.1
       ghostscript-x11-9.52-3.32.1
       ghostscript-x11-debuginfo-9.52-3.32.1


References:

  o https://www.suse.com/security/cve/CVE-2020-15900.html
  o https://bugzilla.suse.com/1174415

- ---------------------------------------------------------------------------------

SUSE Security Update: Security update for ghostscript

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2097-1
Rating:            important
References:        #1174415
Cross-References:  CVE-2020-15900
Affected Products:
                   SUSE OpenStack Cloud Crowbar 9
                   SUSE OpenStack Cloud Crowbar 8
                   SUSE OpenStack Cloud 9
                   SUSE OpenStack Cloud 8
                   SUSE OpenStack Cloud 7
                   SUSE Linux Enterprise Software Development Kit 12-SP5
                   SUSE Linux Enterprise Server for SAP 12-SP4
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server for SAP 12-SP2
                   SUSE Linux Enterprise Server 12-SP5
                   SUSE Linux Enterprise Server 12-SP4-LTSS
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   SUSE Linux Enterprise Server 12-SP2-LTSS
                   SUSE Linux Enterprise Server 12-SP2-BCL
                   SUSE Enterprise Storage 5
                   HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for ghostscript fixes the following issues:

  o fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout) cf. https:/
    /bugs.ghostscript.com/show_bug.cgiid=702582 (bsc#1174415)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 9:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-2097=1
  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-2097=1
  o SUSE OpenStack Cloud 9:
    zypper in -t patch SUSE-OpenStack-Cloud-9-2020-2097=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2020-2097=1
  o SUSE OpenStack Cloud 7:
    zypper in -t patch SUSE-OpenStack-Cloud-7-2020-2097=1
  o SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2097=1
  o SUSE Linux Enterprise Server for SAP 12-SP4:
    zypper in -t patch SUSE-SLE-SAP-12-SP4-2020-2097=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2097=1
  o SUSE Linux Enterprise Server for SAP 12-SP2:
    zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2097=1
  o SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2097=1
  o SUSE Linux Enterprise Server 12-SP4-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-2097=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2097=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-2097=1
  o SUSE Linux Enterprise Server 12-SP2-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2097=1
  o SUSE Linux Enterprise Server 12-SP2-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-2097=1
  o SUSE Enterprise Storage 5:
    zypper in -t patch SUSE-Storage-5-2020-2097=1
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2020-2097=1

Package List:

  o SUSE OpenStack Cloud Crowbar 9 (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE OpenStack Cloud 9 (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE OpenStack Cloud 8 (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE OpenStack Cloud 7 (s390x x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
    s390x x86_64):
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-devel-9.52-23.39.1
  o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o SUSE Enterprise Storage 5 (aarch64 x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1
  o HPE Helion Openstack 8 (x86_64):
       ghostscript-9.52-23.39.1
       ghostscript-debuginfo-9.52-23.39.1
       ghostscript-debugsource-9.52-23.39.1
       ghostscript-x11-9.52-23.39.1
       ghostscript-x11-debuginfo-9.52-23.39.1


References:

  o https://www.suse.com/security/cve/CVE-2020-15900.html
  o https://bugzilla.suse.com/1174415

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=X573
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/03/esb-2020-2639-unix-linuxsuse-ghostscript-execute-arbitrary-code-commands-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2639-unix-linuxsuse-ghostscript-execute-arbitrary-code-commands-remote-unauthenticated

ESB-2020.2637 – [UNIX/Linux][Debian] ark: Create arbitrary files – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2637
                            ark security update
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ark
Publisher:         Debian
Operating System:  Debian GNU/Linux 10
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Create Arbitrary Files -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-16116  

Original Bulletin: 
   http://www.debian.org/security/2020/dsa-4738

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running ark check for an updated version of the software for their 
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4738-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 31, 2020                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : ark
CVE ID         : CVE-2020-16116

Dominik Penner discovered that the Ark archive manager did not sanitise
extraction paths, which could result in maliciously crafted archives
writing outside the extraction directory.

For the stable distribution (buster), this problem has been fixed in
version 4:18.08.3-1+deb10u1.

We recommend that you upgrade your ark packages.

For the detailed security status of ark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=LSjb
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=fybl
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/03/esb-2020-2637-unix-linuxdebian-ark-create-arbitrary-files-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2637-unix-linuxdebian-ark-create-arbitrary-files-remote-with-user-interaction

ESB-2020.2638 – [Debian] thunderbird: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2638
                        thunderbird security update
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           thunderbird
Publisher:         Debian
Operating System:  Debian GNU/Linux 10
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-15659 CVE-2020-15652 CVE-2020-6514
                   CVE-2020-6463  

Reference:         ESB-2020.2623

Original Bulletin: 
   http://www.debian.org/security/2020/dsa-4740

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4740-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 02, 2020                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : thunderbird
CVE ID         : CVE-2020-6463 CVE-2020-6514 CVE-2020-15652 CVE-2020-15659

Multiple security issues have been found in Thunderbird which could
result in denial of service or potentially the execution of arbitrary
code.

For the stable distribution (buster), these problems have been fixed in
version 1:68.11.0-1~deb10u1.

We recommend that you upgrade your thunderbird packages.

For the detailed security status of thunderbird please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/thunderbird

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=VbZb
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=v0dE
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/03/esb-2020-2638-debian-thunderbird-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2638-debian-thunderbird-multiple-vulnerabilities

Network Security News Summary for Monday August 3 2020

A brief daily summary of what is important in cybersecurity. The podcast is published every weekday and designed to get you ready for the day with a brief, usually about 5 minutes long, summary of current network security-related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .



https://www.malwaredevil.com/2020/08/03/network-security-news-summary-for-monday-august-3-2020/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-august-3-2020

Sunday, August 2, 2020

Ransomware feared as possible saboteur for November election

Federal authorities say one of the gravest threats to the November election is a well-timed ransomware attack that could paralyze voting operations.
Read More



https://www.malwaredevil.com/2020/08/02/ransomware-feared-as-possible-saboteur-for-november-election/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-feared-as-possible-saboteur-for-november-election

SpaceX Starlink Satellite Getting Closer To Providing Service

How would you like to get your internet signal from outer space? You can! Elon Musk’s SpaceX company has moved another step closer to offering internet connectivity via its Starlink service. However, at the moment, there’s an important catch and caveat.

Starlink has recently emailed fans to get their home addresses in anticipation of the company’s third beta test.

Elon Musk has commented that setting up a Starlink terminal is easy, but, given that this is a beta test, he also warned that the testers themselves are liable for anything that goes wrong. They are held liable for any damaged caused by setting up the terminals and using the experimental service.

Starlink Terminals have been described as looking a bit like a UFO on a stick. They don’t require the presence of a professional installer. All the user has to do is plug the device in and give it a clear view of the sky. Assuming that’s true, the terminal will scan the sky for the satellite offering the best signal and connect automatically, giving the user internet access.

If you’re interested in participating in the open beta, be aware that initially, although the service quality will be high, the connectivity itself will be spotty in the early stages. As such, it may support streaming video with buffering but would not be suitable for things like online gaming.

Also be aware that Starlink will require you to sign a non-disclosure agreement so you will not be able to share details of your Starlink experience online.

Finally, per the company’s instructions to its beta testers:

“You are responsible for installing the Starlink Kit. Do not allow third parties, or those not associated with SpaceX, to access or install the Starlink Kit unless you obtain approval from SpaceX.”

“Do not install the Starlink Kit at your home if you do not have the authority to do so. It is your responsibility to ensure compliance with all applicable zoning, ordinances, covenants, conditions, restrictions, lease obligations and landlord/owner approvals related to the installation location.”

Even with all the caveats and conditions, you have to admit, it’s going to be a really cool thing to be a part of.

Used with permission from Article Aggregator

Read More



https://www.malwaredevil.com/2020/08/01/spacex-starlink-satellite-getting-closer-to-providing-service/?utm_source=rss&utm_medium=rss&utm_campaign=spacex-starlink-satellite-getting-closer-to-providing-service

Saturday, August 1, 2020

Twitter hack – three suspects charged in the US

Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over.
Read More



https://www.malwaredevil.com/2020/08/01/twitter-hack-three-suspects-charged-in-the-us/?utm_source=rss&utm_medium=rss&utm_campaign=twitter-hack-three-suspects-charged-in-the-us

Friday, July 31, 2020

IDA colonoscopy

One of the most annoying things I come across during analysis are … function names. It’s great to have many of them resolved either via flirt of symbols, but the length of some of these function names is making it really hard to read code.

It is especially important with ‘basic’ string functions that hide behind constructs like:

std::basic_string,std::allocator,_STL70>::assign
(std::basic_string,std::allocator,_STL70> const &,uint,uint)
std::basic_string,std::allocator,_STL70>::operator=(ushort const *)

Why not simple ‘assign’ and ‘operator’?

It’s because it’s puristic and accurate, that’s why 🙂

Reading code listings relying on these functions is difficult, and it involves a lot of mental processing to find the actual method name in these long strings.

I got bored doing so and coded a very badly written idapython script that replaces these names with a shorter version. Again, this is a blasphemy to both IDA and IDAPython so you have been warned.

import idaapi
import idc
import types
import os
import pprint
import random

mask = idc.GetLongPrm(idc.INF_SHORT_DN)

for func_ea in idautils.Functions():
    function_name = idc.GetFunctionName(func_ea)
    function_name_dem = idc.Demangle(function_name, mask)
    if function_name_dem != None:
       function_name = function_name_dem
    m=re.search(r'hex_',function_name,re.IGNORECASE) 
    if not m:
       print function_name 
       m=re.search(r'basic_string.*?::([^:=]+)(',function_name,re.IGNORECASE) 
       if m: 
          short_fun = m.group(1) 
          short_fun1 = re.sub('[(=< ~'"+`-].+$','',short_fun) 
          cnt=0 
          while True: 
             short_fun = 'hex_string_' + short_fun1 + "_" + str(cnt) 
             res = MakeName(func_ea,short_fun) 
             if res: 
                print short_fun 
                break 
             cnt = cnt + 1 
             if cnt>1000: 
                break

The result:

before

after

Read More



https://www.malwaredevil.com/2020/07/31/ida-colonoscopy/?utm_source=rss&utm_medium=rss&utm_campaign=ida-colonoscopy

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...