SUSE-SU-2019:0480-1: important: Security update for supportutils

sle-updates at sle-updates at
Mon Feb 25 13:11:24 MST 2019

   SUSE Security Update: Security update for supportutils

Announcement ID:    SUSE-SU-2019:0480-1
Rating:             important
References:         #1043311 #1046681 #1051797 #1071545 #1105849 
                    #1112461 #1115245 #1117776 #1118460 #1118462 
                    #1118463 #1125609 #1125666 
Cross-References:   CVE-2018-19637 CVE-2018-19638 CVE-2018-19639
Affected Products:
                    SUSE Linux Enterprise Module for Basesystem 15

   An update that solves four vulnerabilities and has 9 fixes
   is now available.


   This update for supportutils fixes the following issues:

   Security issues fixed:

   - CVE-2018-19640: Fixed an issue where  users could kill arbitrary
     processes (bsc#1118463).
   - CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log
     files (bsc#1118460).
   - CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
   - CVE-2018-19637: Fixed an issue where static temporary filename could
     allow overwriting of files (bsc#1117776).

   Other issues fixed:

   - Fixed invalid exit code commands (bsc#1125666).
   - Included additional SUSE separation (bsc#1125609).
   - Merged added listing of locked packes by zypper.
   - Exclude pam.txt per GDPR by default (bsc#1112461).
   - Clarified -x functionality in supportconfig(8) (bsc#1115245).
   - udev service and provide the whole journal content in supportconfig
   - supportconfig collects tuned profile settings (bsc#1071545).
   - sfdisk -d no disk device specified (bsc#1043311).
   - Added vulnerabilites status check in basic-health.txt (bsc#1105849).
   - Added only sched_domain from cpu0.
   - Blacklist sched_domain from proc.txt (bsc#1046681).
   - Added firewall-cmd info.
   - Add ls -lA --time-style=long-iso /etc/products.d/
   - Dump lsof errors.
   - Added corosync status to ha_info.
   - Dump find errors in ib_info.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Basesystem 15:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-480=1

Package List:

   - SUSE Linux Enterprise Module for Basesystem 15 (noarch):



More information about the sle-updates mailing list