Security update for hostinfo, supportutils
Announcement ID: | SUSE-SU-2019:1122-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities and has five security fixes can now be installed.
Description:
This update for hostinfo, supportutils fixes the following issues:
Security issues fixed for supportutils:
- CVE-2018-19640: Fixed an issue where users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).
Other issues fixed for supportutils:
- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info
Issues fixed in hostinfo: - Removed extra kernel install dates (bsc#1099498) - Resolved network bond issue (bsc#1054979)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE OpenStack Cloud 7
zypper in -t patch SUSE-OpenStack-Cloud-7-2019-1122=1
-
SUSE Linux Enterprise Desktop 12 SP3
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1122=1
-
SUSE Linux Enterprise Desktop 12 SP4
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1122=1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2
zypper in -t patch SUSE-SLE-POS-12-SP2-CLIENT-2019-1122=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2
zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-1122=1
-
SUSE Linux Enterprise Server 12 LTSS 12
zypper in -t patch SUSE-SLE-SERVER-12-2019-1122=1
-
SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-1122=1
-
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-1122=1
-
SUSE Linux Enterprise Server 12 SP2 ESPOS 12-SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-ESPOS-2019-1122=1
-
SUSE Linux Enterprise Server 12 SP2 LTSS 12-SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-1122=1
-
SUSE Linux Enterprise Server 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1122=1
-
SUSE Linux Enterprise High Performance Computing 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1122=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1122=1
-
SUSE Linux Enterprise High Performance Computing 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1122=1
-
SUSE Linux Enterprise Server 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1122=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1122=1
-
SUSE Enterprise Storage 4
zypper in -t patch SUSE-Storage-4-2019-1122=1
-
SUSE Container as a Service Platform 2.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. -
SUSE Container as a Service Platform 1.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
Package List:
-
SUSE OpenStack Cloud 7 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Desktop 12 SP3 (noarch)
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Desktop 12 SP4 (noarch)
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 LTSS 12 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 SP2 ESPOS 12-SP2 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 SP2 LTSS 12-SP2 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 SP3 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise High Performance Computing 12 SP4 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server 12 SP4 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Enterprise Storage 4 (noarch)
- hostinfo-1.0.1-19.5.1
- supportutils-3.0-95.21.1
-
SUSE Container as a Service Platform 2.0 (noarch)
- supportutils-3.0-95.21.1
-
SUSE Container as a Service Platform 1.0 (noarch)
- supportutils-3.0-95.21.1
References:
- https://www.suse.com/security/cve/CVE-2018-19636.html
- https://www.suse.com/security/cve/CVE-2018-19637.html
- https://www.suse.com/security/cve/CVE-2018-19638.html
- https://www.suse.com/security/cve/CVE-2018-19639.html
- https://www.suse.com/security/cve/CVE-2018-19640.html
- https://bugzilla.suse.com/show_bug.cgi?id=1054979
- https://bugzilla.suse.com/show_bug.cgi?id=1099498
- https://bugzilla.suse.com/show_bug.cgi?id=1115245
- https://bugzilla.suse.com/show_bug.cgi?id=1117751
- https://bugzilla.suse.com/show_bug.cgi?id=1117776
- https://bugzilla.suse.com/show_bug.cgi?id=1118460
- https://bugzilla.suse.com/show_bug.cgi?id=1118462
- https://bugzilla.suse.com/show_bug.cgi?id=1118463
- https://bugzilla.suse.com/show_bug.cgi?id=1125623
- https://bugzilla.suse.com/show_bug.cgi?id=1125666