Security update for tcmu-runner

SUSE Security Update: Security update for tcmu-runner
Announcement ID: SUSE-SU-2017:2109-1
Rating: important
References: #1049485 #1049488 #1049489 #1049490 #1049491
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12-SP3
  • SUSE Linux Enterprise Server 12-SP3

  • An update that contains security fixes can now be installed.

    Description:

    This update for tcmu-runner fixes the following issues:

    - qcow handler opens up an information leak via the CheckConfig D-Bus
    method (bsc#1049491)
    - glfs handler allows local DoS via crafted CheckConfig strings
    (bsc#1049485)
    - UnregisterHandler dbus method in tcmu-runner daemon for non-existing
    handler causes denial of service (bsc#1049488)
    - UnregisterHandler D-Bus method in tcmu-runner daemon for internal
    handler causes denial of service (bsc#1049489)
    - Memory leaks can be triggered in tcmu-runner daemon by calling D-Bus
    method for (Un)RegisterHandler (bsc#1049490)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 12-SP3:
      zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1311=1
    • SUSE Linux Enterprise Server 12-SP3:
      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1311=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
      • tcmu-runner-debuginfo-1.2.0-2.3.1
      • tcmu-runner-debugsource-1.2.0-2.3.1
      • tcmu-runner-devel-1.2.0-2.3.1
    • SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
      • libtcmu1-1.2.0-2.3.1
      • libtcmu1-debuginfo-1.2.0-2.3.1
      • tcmu-runner-1.2.0-2.3.1
      • tcmu-runner-debuginfo-1.2.0-2.3.1
      • tcmu-runner-debugsource-1.2.0-2.3.1

    References: