SUSE-SU-2019:0480-1: important: Security update for supportutils

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Feb 25 13:11:24 MST 2019


   SUSE Security Update: Security update for supportutils
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0480-1
Rating:             important
References:         #1043311 #1046681 #1051797 #1071545 #1105849 
                    #1112461 #1115245 #1117776 #1118460 #1118462 
                    #1118463 #1125609 #1125666 
Cross-References:   CVE-2018-19637 CVE-2018-19638 CVE-2018-19639
                    CVE-2018-19640
Affected Products:
                    SUSE Linux Enterprise Module for Basesystem 15
______________________________________________________________________________

   An update that solves four vulnerabilities and has 9 fixes
   is now available.

Description:

   This update for supportutils fixes the following issues:

   Security issues fixed:

   - CVE-2018-19640: Fixed an issue where  users could kill arbitrary
     processes (bsc#1118463).
   - CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log
     files (bsc#1118460).
   - CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
   - CVE-2018-19637: Fixed an issue where static temporary filename could
     allow overwriting of files (bsc#1117776).

   Other issues fixed:

   - Fixed invalid exit code commands (bsc#1125666).
   - Included additional SUSE separation (bsc#1125609).
   - Merged added listing of locked packes by zypper.
   - Exclude pam.txt per GDPR by default (bsc#1112461).
   - Clarified -x functionality in supportconfig(8) (bsc#1115245).
   - udev service and provide the whole journal content in supportconfig
     (bsc#1051797).
   - supportconfig collects tuned profile settings (bsc#1071545).
   - sfdisk -d no disk device specified (bsc#1043311).
   - Added vulnerabilites status check in basic-health.txt (bsc#1105849).
   - Added only sched_domain from cpu0.
   - Blacklist sched_domain from proc.txt (bsc#1046681).
   - Added firewall-cmd info.
   - Add ls -lA --time-style=long-iso /etc/products.d/
   - Dump lsof errors.
   - Added corosync status to ha_info.
   - Dump find errors in ib_info.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Basesystem 15:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-480=1



Package List:

   - SUSE Linux Enterprise Module for Basesystem 15 (noarch):

      supportutils-3.1-5.7.1


References:

   https://www.suse.com/security/cve/CVE-2018-19637.html
   https://www.suse.com/security/cve/CVE-2018-19638.html
   https://www.suse.com/security/cve/CVE-2018-19639.html
   https://www.suse.com/security/cve/CVE-2018-19640.html
   https://bugzilla.suse.com/1043311
   https://bugzilla.suse.com/1046681
   https://bugzilla.suse.com/1051797
   https://bugzilla.suse.com/1071545
   https://bugzilla.suse.com/1105849
   https://bugzilla.suse.com/1112461
   https://bugzilla.suse.com/1115245
   https://bugzilla.suse.com/1117776
   https://bugzilla.suse.com/1118460
   https://bugzilla.suse.com/1118462
   https://bugzilla.suse.com/1118463
   https://bugzilla.suse.com/1125609
   https://bugzilla.suse.com/1125666



More information about the sle-security-updates mailing list