Security update for resource-agents

SUSE Security Update: Security update for resource-agents
Announcement ID: SUSE-SU-2020:1091-1
Rating: important
References: #1021689 #1146687 #1146690 #1146691 #1146692 #1146766 #1146776 #1146784 #1146785 #1146787 #1146789
Affected Products:
  • SUSE Linux Enterprise High Availability 12-SP5
  • SUSE Linux Enterprise High Availability 12-SP4

An update that contains security fixes can now be installed.

Description:

This update for resource-agents fixes the following issues:

  • Fixed multiple vulnerabilities related to unsafe tempfile usage. (bsc#1146690, bsc#1146691, bsc#1146692, bsc#1146766, bsc#1146776, bsc#1146784, bsc#1146785, bsc#1146787, bsc#1146789)
  • Fixed issues where the ocfmon user was created with a default password (bsc#1021689, bsc#1146687).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise High Availability 12-SP5:
    zypper in -t patch SUSE-SLE-HA-12-SP5-2020-1091=1
  • SUSE Linux Enterprise High Availability 12-SP4:
    zypper in -t patch SUSE-SLE-HA-12-SP4-2020-1091=1

Package List:

  • SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64):
    • ldirectord-4.3.018.a7fb5035-3.42.1
    • resource-agents-4.3.018.a7fb5035-3.42.1
    • resource-agents-debuginfo-4.3.018.a7fb5035-3.42.1
    • resource-agents-debugsource-4.3.018.a7fb5035-3.42.1
  • SUSE Linux Enterprise High Availability 12-SP5 (noarch):
    • monitoring-plugins-metadata-4.3.018.a7fb5035-3.42.1
  • SUSE Linux Enterprise High Availability 12-SP4 (ppc64le s390x x86_64):
    • ldirectord-4.3.018.a7fb5035-3.42.1
    • resource-agents-4.3.018.a7fb5035-3.42.1
    • resource-agents-debuginfo-4.3.018.a7fb5035-3.42.1
    • resource-agents-debugsource-4.3.018.a7fb5035-3.42.1
  • SUSE Linux Enterprise High Availability 12-SP4 (noarch):
    • monitoring-plugins-metadata-4.3.018.a7fb5035-3.42.1

References: