Pufferüberlauf in zeromq
ID: | SUSE-SU-2019:1785-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Module for Advanced Systems Management 12, SUSE Enterprise Storage 4, SUSE Manager Tools 12, SUSE Linux Enterprise Point of Sale 12-SP2, SUSE CaaS Platform 3.0, SUSE Enterprise Storage 5, SUSE Manager Server 3.2, SUSE Manager Proxy 3.2, SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Workstation Extension 12-SP4 |
Datum: | Di, 9. Juli 2019, 15:36 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132 |
Applikationen: | 0MQ |
Originalnachricht |
|
SUSE Security Update: Security update for zeromq ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:1785-1 Rating: important References: #1140255 Cross-References: CVE-2019-13132 Affected Products: SUSE Manager Tools 12 SUSE Manager Server 3.2 SUSE Manager Proxy 3.2 SUSE Linux Enterprise Workstation Extension 12-SP4 SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Point of Sale 12-SP2 SUSE Linux Enterprise Module for Advanced Systems Management 12 SUSE Linux Enterprise Desktop 12-SP4 SUSE Enterprise Storage 5 SUSE Enterprise Storage 4 SUSE CaaS Platform 3.0 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for zeromq fixes the following issues: - CVE-2019-13132: An unauthenticated remote attacker could have exploited a stack overflow vulnerability on a server that is supposed to be protected by encryption and authentication to potentially gain a remote code execution. (bsc#1140255) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Manager Tools 12: zypper in -t patch SUSE-SLE-Manager-Tools-12-2019-1785=1 - SUSE Manager Server 3.2: zypper in -t patch SUSE-SUSE-Manager-Server-3.2-2019-1785=1 - SUSE Manager Proxy 3.2: zypper in -t patch SUSE-SUSE-Manager-Proxy-3.2-2019-1785=1 - SUSE Linux Enterprise Workstation Extension 12-SP4: zypper in -t patch SUSE-SLE-WE-12-SP4-2019-1785=1 - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1785=1 - SUSE Linux Enterprise Point of Sale 12-SP2: zypper in -t patch SUSE-SLE-POS-12-SP2-2019-1785=1 - SUSE Linux Enterprise Module for Advanced Systems Management 12: zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2019-1785=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1785=1 - SUSE Enterprise Storage 5: zypper in -t patch SUSE-Storage-5-2019-1785=1 - SUSE Enterprise Storage 4: zypper in -t patch SUSE-Storage-4-2019-1785=1 - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: - SUSE Manager Tools 12 (aarch64 ppc64le s390x x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Manager Server 3.2 (ppc64le s390x x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Manager Proxy 3.2 (x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 zeromq-devel-4.0.4-15.3.1 - SUSE Linux Enterprise Point of Sale 12-SP2 (x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Linux Enterprise Module for Advanced Systems Management 12 (ppc64le s390x x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Linux Enterprise Desktop 12-SP4 (x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Enterprise Storage 5 (aarch64 x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE Enterprise Storage 4 (aarch64 x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 - SUSE CaaS Platform 3.0 (x86_64): libzmq3-4.0.4-15.3.1 libzmq3-debuginfo-4.0.4-15.3.1 zeromq-debugsource-4.0.4-15.3.1 References: https://www.suse.com/security/cve/CVE-2019-13132.html https://bugzilla.suse.com/1140255 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |