OPENSUSE-SU-2019:0293-1
Vulnerability from csaf_opensuse - Published: 2019-03-23 11:09 - Updated: 2019-03-23 11:09Summary
Security update for supportutils
Notes
Title of the patch
Security update for supportutils
Description of the patch
This update for supportutils fixes the following issues:
Security issues fixed:
- CVE-2018-19640: Fixed an issue where users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
Other issues fixed:
- Fixed invalid exit code commands (bsc#1125666).
- Included additional SUSE separation (bsc#1125609).
- Merged added listing of locked packes by zypper.
- Exclude pam.txt per GDPR by default (bsc#1112461).
- Clarified -x functionality in supportconfig(8) (bsc#1115245).
- udev service and provide the whole journal content in supportconfig (bsc#1051797).
- supportconfig collects tuned profile settings (bsc#1071545).
- sfdisk -d no disk device specified (bsc#1043311).
- Added vulnerabilites status check in basic-health.txt (bsc#1105849).
- Added only sched_domain from cpu0.
- Blacklist sched_domain from proc.txt (bsc#1046681).
- Added firewall-cmd info.
- Add ls -lA --time-style=long-iso /etc/products.d/
- Dump lsof errors.
- Added corosync status to ha_info.
- Dump find errors in ib_info.
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-293
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for supportutils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for supportutils fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-19640: Fixed an issue where users could kill arbitrary processes (bsc#1118463).\n- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).\n- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).\n- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).\n\nOther issues fixed:\n\n- Fixed invalid exit code commands (bsc#1125666).\n- Included additional SUSE separation (bsc#1125609).\n- Merged added listing of locked packes by zypper.\n- Exclude pam.txt per GDPR by default (bsc#1112461).\t \n- Clarified -x functionality in supportconfig(8) (bsc#1115245).\t \n- udev service and provide the whole journal content in supportconfig (bsc#1051797).\n- supportconfig collects tuned profile settings (bsc#1071545).\n- sfdisk -d no disk device specified (bsc#1043311).\n- Added vulnerabilites status check in basic-health.txt (bsc#1105849).\n- Added only sched_domain from cpu0.\n- Blacklist sched_domain from proc.txt (bsc#1046681).\n- Added firewall-cmd info.\n- Add ls -lA --time-style=long-iso /etc/products.d/\n- Dump lsof errors.\n- Added corosync status to ha_info.\n- Dump find errors in ib_info.\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-293",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0293-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:0293-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ/#Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:0293-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ/#Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ"
},
{
"category": "self",
"summary": "SUSE Bug 1043311",
"url": "https://bugzilla.suse.com/1043311"
},
{
"category": "self",
"summary": "SUSE Bug 1046681",
"url": "https://bugzilla.suse.com/1046681"
},
{
"category": "self",
"summary": "SUSE Bug 1051797",
"url": "https://bugzilla.suse.com/1051797"
},
{
"category": "self",
"summary": "SUSE Bug 1071545",
"url": "https://bugzilla.suse.com/1071545"
},
{
"category": "self",
"summary": "SUSE Bug 1105849",
"url": "https://bugzilla.suse.com/1105849"
},
{
"category": "self",
"summary": "SUSE Bug 1112461",
"url": "https://bugzilla.suse.com/1112461"
},
{
"category": "self",
"summary": "SUSE Bug 1115245",
"url": "https://bugzilla.suse.com/1115245"
},
{
"category": "self",
"summary": "SUSE Bug 1117776",
"url": "https://bugzilla.suse.com/1117776"
},
{
"category": "self",
"summary": "SUSE Bug 1118460",
"url": "https://bugzilla.suse.com/1118460"
},
{
"category": "self",
"summary": "SUSE Bug 1118462",
"url": "https://bugzilla.suse.com/1118462"
},
{
"category": "self",
"summary": "SUSE Bug 1118463",
"url": "https://bugzilla.suse.com/1118463"
},
{
"category": "self",
"summary": "SUSE Bug 1125609",
"url": "https://bugzilla.suse.com/1125609"
},
{
"category": "self",
"summary": "SUSE Bug 1125666",
"url": "https://bugzilla.suse.com/1125666"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19637 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19638 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19638/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19640/"
}
],
"title": "Security update for supportutils",
"tracking": {
"current_release_date": "2019-03-23T11:09:34Z",
"generator": {
"date": "2019-03-23T11:09:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:0293-1",
"initial_release_date": "2019-03-23T11:09:34Z",
"revision_history": [
{
"date": "2019-03-23T11:09:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "supportutils-3.1-lp150.4.3.1.noarch",
"product": {
"name": "supportutils-3.1-lp150.4.3.1.noarch",
"product_id": "supportutils-3.1-lp150.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "supportutils-3.1-lp150.4.3.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
},
"product_reference": "supportutils-3.1-lp150.4.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-19637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19637"
}
],
"notes": [
{
"category": "general",
"text": "Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19637",
"url": "https://www.suse.com/security/cve/CVE-2018-19637"
},
{
"category": "external",
"summary": "SUSE Bug 1063385 for CVE-2018-19637",
"url": "https://bugzilla.suse.com/1063385"
},
{
"category": "external",
"summary": "SUSE Bug 1117776 for CVE-2018-19637",
"url": "https://bugzilla.suse.com/1117776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:09:34Z",
"details": "important"
}
],
"title": "CVE-2018-19637"
},
{
"cve": "CVE-2018-19638",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19638"
}
],
"notes": [
{
"category": "general",
"text": "In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19638",
"url": "https://www.suse.com/security/cve/CVE-2018-19638"
},
{
"category": "external",
"summary": "SUSE Bug 1063385 for CVE-2018-19638",
"url": "https://bugzilla.suse.com/1063385"
},
{
"category": "external",
"summary": "SUSE Bug 1118460 for CVE-2018-19638",
"url": "https://bugzilla.suse.com/1118460"
},
{
"category": "external",
"summary": "SUSE Bug 1118462 for CVE-2018-19638",
"url": "https://bugzilla.suse.com/1118462"
},
{
"category": "external",
"summary": "SUSE Bug 1118463 for CVE-2018-19638",
"url": "https://bugzilla.suse.com/1118463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:09:34Z",
"details": "low"
}
],
"title": "CVE-2018-19638"
},
{
"cve": "CVE-2018-19639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19639"
}
],
"notes": [
{
"category": "general",
"text": "If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19639",
"url": "https://www.suse.com/security/cve/CVE-2018-19639"
},
{
"category": "external",
"summary": "SUSE Bug 1063385 for CVE-2018-19639",
"url": "https://bugzilla.suse.com/1063385"
},
{
"category": "external",
"summary": "SUSE Bug 1118460 for CVE-2018-19639",
"url": "https://bugzilla.suse.com/1118460"
},
{
"category": "external",
"summary": "SUSE Bug 1118462 for CVE-2018-19639",
"url": "https://bugzilla.suse.com/1118462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:09:34Z",
"details": "important"
}
],
"title": "CVE-2018-19639"
},
{
"cve": "CVE-2018-19640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19640"
}
],
"notes": [
{
"category": "general",
"text": "If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19640",
"url": "https://www.suse.com/security/cve/CVE-2018-19640"
},
{
"category": "external",
"summary": "SUSE Bug 1063385 for CVE-2018-19640",
"url": "https://bugzilla.suse.com/1063385"
},
{
"category": "external",
"summary": "SUSE Bug 1118463 for CVE-2018-19640",
"url": "https://bugzilla.suse.com/1118463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:supportutils-3.1-lp150.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:09:34Z",
"details": "moderate"
}
],
"title": "CVE-2018-19640"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…