Security update for tcmu-runner
Announcement ID: | SUSE-SU-2017:2601-1 |
Rating: | moderate |
References: | #1049485 #1049491 |
Affected Products: |
An update that fixes two vulnerabilities is now available.
Description:
This update for tcmu-runner fixes the following issues:
Security issues fixed:
- CVE-2017-1000198: The glfs handler allowed local DoS via crafted
CheckConfig strings (bsc#1049485)
- CVE-2017-1000199: The qcow handler leaked information via the
CheckConfig D-Bus method (bsc#1049491)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1611=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1611=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1611=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
- tcmu-runner-debuginfo-1.0.4-3.3.10
- tcmu-runner-debugsource-1.0.4-3.3.10
- tcmu-runner-devel-1.0.4-3.3.10
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
- tcmu-runner-1.0.4-3.3.10
- tcmu-runner-debuginfo-1.0.4-3.3.10
- tcmu-runner-debugsource-1.0.4-3.3.10
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
- tcmu-runner-1.0.4-3.3.10
- tcmu-runner-debuginfo-1.0.4-3.3.10
- tcmu-runner-debugsource-1.0.4-3.3.10