drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in netatalk
Name: |
Ausführen beliebiger Kommandos in netatalk |
|
ID: |
SUSE-SU-2018:4217-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Workstation Extension 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Workstation Extension 12-SP4 |
|
Datum: |
Fr, 21. Dezember 2018, 18:27 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1160 |
|
Applikationen: |
netatalk |
|
Originalnachricht |
SUSE Security Update: Security update for netatalk ______________________________________________________________________________
Announcement ID: SUSE-SU-2018:4217-1 Rating: important References: #1119540 Cross-References: CVE-2018-1160 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP4 SUSE Linux Enterprise Workstation Extension 12-SP3 SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Desktop 12-SP4 SUSE Linux Enterprise Desktop 12-SP3 ______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for netatalk fixes the following issues:
Security issue fixed:
- CVE-2018-1160 Fixed a missing bounds check in the handling of the DSI OPEN SESSION request, which allowed an unauthenticated to overwrite memory with data of their choice leading to arbitrary code execution with root privileges. (bsc#1119540)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP4:
zypper in -t patch SUSE-SLE-WE-12-SP4-2018-3027=1
- SUSE Linux Enterprise Workstation Extension 12-SP3:
zypper in -t patch SUSE-SLE-WE-12-SP3-2018-3027=1
- SUSE Linux Enterprise Software Development Kit 12-SP4:
zypper in -t patch SUSE-SLE-SDK-12-SP4-2018-3027=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-3027=1
- SUSE Linux Enterprise Desktop 12-SP4:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2018-3027=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-3027=1
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64):
libatalk12-3.1.0-3.3.1 libatalk12-debuginfo-3.1.0-3.3.1 netatalk-3.1.0-3.3.1 netatalk-debuginfo-3.1.0-3.3.1 netatalk-debugsource-3.1.0-3.3.1
- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
libatalk12-3.1.0-3.3.1 libatalk12-debuginfo-3.1.0-3.3.1 netatalk-3.1.0-3.3.1 netatalk-debuginfo-3.1.0-3.3.1 netatalk-debugsource-3.1.0-3.3.1
- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
libatalk12-3.1.0-3.3.1 libatalk12-debuginfo-3.1.0-3.3.1 netatalk-3.1.0-3.3.1 netatalk-debuginfo-3.1.0-3.3.1 netatalk-debugsource-3.1.0-3.3.1 netatalk-devel-3.1.0-3.3.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
libatalk12-3.1.0-3.3.1 libatalk12-debuginfo-3.1.0-3.3.1 netatalk-3.1.0-3.3.1 netatalk-debuginfo-3.1.0-3.3.1 netatalk-debugsource-3.1.0-3.3.1 netatalk-devel-3.1.0-3.3.1
- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
libatalk12-3.1.0-3.3.1 libatalk12-debuginfo-3.1.0-3.3.1 netatalk-3.1.0-3.3.1 netatalk-debuginfo-3.1.0-3.3.1 netatalk-debugsource-3.1.0-3.3.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
libatalk12-3.1.0-3.3.1 libatalk12-debuginfo-3.1.0-3.3.1 netatalk-3.1.0-3.3.1 netatalk-debuginfo-3.1.0-3.3.1 netatalk-debugsource-3.1.0-3.3.1
References:
https://www.suse.com/security/cve/CVE-2018-1160.html https://bugzilla.suse.com/1119540
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|