Security update for tcmu-runner
Announcement ID: | SUSE-SU-2017:2109-1 |
Rating: | important |
References: | #1049485 #1049488 #1049489 #1049490 #1049491 |
Affected Products: |
An update that contains security fixes can now be installed.
Description:
This update for tcmu-runner fixes the following issues:
- qcow handler opens up an information leak via the CheckConfig D-Bus
method (bsc#1049491)
- glfs handler allows local DoS via crafted CheckConfig strings
(bsc#1049485)
- UnregisterHandler dbus method in tcmu-runner daemon for non-existing
handler causes denial of service (bsc#1049488)
- UnregisterHandler D-Bus method in tcmu-runner daemon for internal
handler causes denial of service (bsc#1049489)
- Memory leaks can be triggered in tcmu-runner daemon by calling D-Bus
method for (Un)RegisterHandler (bsc#1049490)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1311=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1311=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
- tcmu-runner-debuginfo-1.2.0-2.3.1
- tcmu-runner-debugsource-1.2.0-2.3.1
- tcmu-runner-devel-1.2.0-2.3.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
- libtcmu1-1.2.0-2.3.1
- libtcmu1-debuginfo-1.2.0-2.3.1
- tcmu-runner-1.2.0-2.3.1
- tcmu-runner-debuginfo-1.2.0-2.3.1
- tcmu-runner-debugsource-1.2.0-2.3.1