You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa grub2

Sigurnosni nedostatak programskog paketa grub2

openSUSE Security Update: Security update for grub2
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1282-1
Rating: important
References: #1172745 #1174421
Cross-References: CVE-2020-15705
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for grub2 fixes the following issue:

– CVE-2020-15705: Fail kernel validation without shim protocol
(bsc#1174421).
– Add fibre channel device’s ofpath support to grub-ofpathname and search
hint to speed up root device discovery (bsc#1172745).

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-1282=1

Package List:

– openSUSE Leap 15.2 (i586 x86_64):

grub2-2.04-lp152.7.9.1
grub2-branding-upstream-2.04-lp152.7.9.1
grub2-debuginfo-2.04-lp152.7.9.1
grub2-debugsource-2.04-lp152.7.9.1

– openSUSE Leap 15.2 (noarch):

grub2-i386-efi-2.04-lp152.7.9.1
grub2-i386-efi-debug-2.04-lp152.7.9.1
grub2-i386-pc-2.04-lp152.7.9.1
grub2-i386-pc-debug-2.04-lp152.7.9.1
grub2-i386-xen-2.04-lp152.7.9.1
grub2-snapper-plugin-2.04-lp152.7.9.1
grub2-systemd-sleep-plugin-2.04-lp152.7.9.1
grub2-x86_64-efi-2.04-lp152.7.9.1
grub2-x86_64-efi-debug-2.04-lp152.7.9.1
grub2-x86_64-xen-2.04-lp152.7.9.1

References:

https://www.suse.com/security/cve/CVE-2020-15705.html
https://bugzilla.suse.com/1172745
https://bugzilla.suse.com/1174421


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for grub2
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1280-1
Rating: important
References: #1172745 #1174421
Cross-References: CVE-2020-15705
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for grub2 fixes the following issues:

– CVE-2020-15705: Fail kernel validation without shim protocol
(bsc#1174421).
– Add fibre channel device’s ofpath support to grub-ofpathname and search
hint to speed up root device discovery (bsc#1172745).

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1280=1

Package List:

– openSUSE Leap 15.1 (i586 x86_64):

grub2-2.02-lp151.21.27.1
grub2-branding-upstream-2.02-lp151.21.27.1
grub2-debuginfo-2.02-lp151.21.27.1
grub2-debugsource-2.02-lp151.21.27.1

– openSUSE Leap 15.1 (noarch):

grub2-i386-efi-2.02-lp151.21.27.1
grub2-i386-pc-2.02-lp151.21.27.1
grub2-i386-xen-2.02-lp151.21.27.1
grub2-snapper-plugin-2.02-lp151.21.27.1
grub2-systemd-sleep-plugin-2.02-lp151.21.27.1
grub2-x86_64-efi-2.02-lp151.21.27.1
grub2-x86_64-xen-2.02-lp151.21.27.1

References:

https://www.suse.com/security/cve/CVE-2020-15705.html
https://bugzilla.suse.com/1172745
https://bugzilla.suse.com/1174421


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa qt

Otkriven je sigurnosni nedostatak u programskom paketu qt za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close