SUSE SLED15 / SLES15 Security Update : zypper, libzypp / libsolv (SUSE-SU-2019:2030-1)

medium Nessus Plugin ID 127759

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for libzypp and libsolv fixes the following issues :

Security issues fixed :

CVE-2018-20532: Fixed NULL pointer dereference at ext/testcase.c (function testcase_read) (bsc#1120629).

CVE-2018-20533: Fixed NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a (bsc#1120630).

CVE-2018-20534: Fixed illegal address access at src/pool.h (function pool_whatprovides) in libsolv.a (bsc#1120631).

Fixed bugs and enhancements: make cleandeps jobs on patterns work (bnc#1137977)

Fixed an issue where libsolv failed to build against swig 4.0 by updating the version to 0.7.5 (bsc#1135749).

Virtualization host upgrade from SLES-15 to SLES-15-SP1 finished with wrong product name shown up (bsc#1131823).

Copy pattern categories from the rpm that defines the pattern (fate#323785).

Enhance scanning /sys for modaliases (bsc#1130161).

Prevent SEGV if the application sets an empty TextLocale (bsc#1127026).

Handle libgpgme error when gpg key is not completely read and user hits CTRL + C (bsc#1127220).

Added a hint when registration codes have expired (bsc#965786).

Adds a better handling of an error when verifying any repository medium (bsc#1065022).

Will now only write type field when probing (bsc#1114908).

Fixes an issue where zypper has showed the info message 'Installation aborted by user' while the installation was aborted by wicked (bsc#978193).

Suppresses reporting `/memfd:` pseudo files (bsc#1123843).

Fixes an issue where zypper was not able to install or uninstall packages when rpm is unavailable (bsc#1122471).

Fixes an issue where locks were ignored (bsc#1113296).

Simplify complex locks so zypper can display them (bsc#1112911).

zypper will now set `SYSTEMD_OFFLINE=1` during chrooted commits (bsc#1118758).

no-recommends: Nevertheless consider resolver namespaces (hardware, language,..supporting packages) (fate#325513).

Removes world-readable bit from /var/log/zypp (bsc#1099019).

Does no longer fail service-refresh on a empty repoindex.xml (bsc#1116840).

Fixes soname due to libsolv ABI changes (bsc#1115341).

Add infrastructure to flag specific packages to trigger a reboot needed hint (fate#326451).

This update for zypper 1.14.27 fixes the following issues:
bash-completion: add package completion for addlock (bsc#1047962)

bash-completion: fix incorrect detection of command names (bsc#1049826)

Offer to change the 'runSearchPackages' config option at the prompt (bsc#1119373, FATE#325599)

Prompt: provide a 'yes/no/always/never' prompt.

Prompt: support '#NUM' as answer to select the NUMth option...

Augeas: enable writing back changed option values (to ~/.zypper.conf)

removelocale: fix segfault

Move needs-restarting command to subpackage (fixes #254)

Allow empty string as argument (bsc#1125415)

Provide a way to delete cache for volatile repositories (bsc#1053177)

Adapt to boost-1.69 requiring explicit casts tribool->bool (fixes #255)

Show support status in info if not unknown (bsc#764147)

Fix installing plain rpm files with `zypper in` (bsc#1124897)

Show only required info in the summary in quiet mode (bsc#993025)

Stay with legacy behavior and return ZYPPER_EXIT_INF_REBOOT_NEEDED only for patches. We don't extend this return code to packages, although they may also carry the 'reboot-needed' attribute. The preferred way to test whether the system needs to be rebooted is `zypper needs-rebooting`. (openSUSE/zypper#237)

Skip repository on error (bsc#1123967)

New commands for locale management: locales addlocale removelocale Inspect and manipulate the systems `requested locales`, aka. the languages software packages should try support by installing translations, dictionaries and tools, as far as they are available.

Don't throw, just warn if options are repeated (bsc#1123865)

Fix detection whether stdout is a tty (happened too late)

Fix broken --plus-content switch (fixes bsc#1123681)

Fix broken --replacefiles switch (fixes bsc#1123137)

Extend zypper source-install (fixes bsc#663358)

Fix inconsistent results for search (bsc#1119873)

Show reboot hint in zypper ps and summary (fixes bsc#1120263)

Improve handling of partially locked packages (bsc#1113296)

Fix wrong default values in help text (bsc#1121611)

Fixed broken argument parsing for --reposd-dir (bsc#1122062)

Fix wrong zypp::indeterminate use (bsc#1120463)

CLI parser: fix broken initialization enforcing 'select by name' (bsc#1119820)

zypper.conf: [commit] autoAgreeWithLicenses {=false} (fixes #220)

locks: Fix printing of versioned locks (bsc#1112911)

locks: create and write versioned locks correctly (bsc#1112911)

patch: --with update may implicitly assume --with-optional (bsc#1102261)

no-recommends: Nevertheless consider resolver namespaces (hardware, language,..supporting packages) (FATE#325513)

Optionally run 'zypper search-packages' after 'search' (FATE#325599)

zypper.conf: Add [search]runSearchPackages config variable.

Don't iterate twice on --no-cd (bsc#1111319)

zypper-log: Make it Python 3 compatible

man: mention /etc/zypp/needreboot config file (fate#326451, fixes #140)

Add `needs-restarting` shell script and manpage (fate#326451)

Add zypper needs-rebooting command (fate#326451)

Introduce new zypper command framefork. Migrated commands so far:
addlock addrepo addservice clean cleanlocks modifyrepo modifyservice ps refresh refresh-services removelock removerepo removeservice renamerepo repos services

MediaChangeReport: fix https URLs causing 2 prompts on error (bsc#1110542)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 15:zypper in -t patch SUSE-SLE-Product-WE-15-2019-2030=1

SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1:zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2030=1

SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-2030=1

SUSE Linux Enterprise Module for Development Tools 15:zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2019-2030=1

SUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-2030=1

SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-2030=1

SUSE Linux Enterprise Installer 15:zypper in -t patch SUSE-SLE-INSTALLER-15-2019-2030=1

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1047962

https://bugzilla.suse.com/show_bug.cgi?id=1049826

https://bugzilla.suse.com/show_bug.cgi?id=1053177

https://bugzilla.suse.com/show_bug.cgi?id=1065022

https://bugzilla.suse.com/show_bug.cgi?id=1099019

https://bugzilla.suse.com/show_bug.cgi?id=1102261

https://bugzilla.suse.com/show_bug.cgi?id=1110542

https://bugzilla.suse.com/show_bug.cgi?id=1111319

https://bugzilla.suse.com/show_bug.cgi?id=1112911

https://bugzilla.suse.com/show_bug.cgi?id=1113296

https://bugzilla.suse.com/show_bug.cgi?id=1114908

https://bugzilla.suse.com/show_bug.cgi?id=1115341

https://bugzilla.suse.com/show_bug.cgi?id=1116840

https://bugzilla.suse.com/show_bug.cgi?id=1118758

https://bugzilla.suse.com/show_bug.cgi?id=1119373

https://bugzilla.suse.com/show_bug.cgi?id=1119820

https://bugzilla.suse.com/show_bug.cgi?id=1119873

https://bugzilla.suse.com/show_bug.cgi?id=1120263

https://bugzilla.suse.com/show_bug.cgi?id=1120463

https://bugzilla.suse.com/show_bug.cgi?id=1120629

https://bugzilla.suse.com/show_bug.cgi?id=1120630

https://bugzilla.suse.com/show_bug.cgi?id=1120631

https://bugzilla.suse.com/show_bug.cgi?id=1121611

https://bugzilla.suse.com/show_bug.cgi?id=1122062

https://bugzilla.suse.com/show_bug.cgi?id=1122471

https://bugzilla.suse.com/show_bug.cgi?id=1123137

https://bugzilla.suse.com/show_bug.cgi?id=1123681

https://bugzilla.suse.com/show_bug.cgi?id=1123843

https://bugzilla.suse.com/show_bug.cgi?id=1123865

https://bugzilla.suse.com/show_bug.cgi?id=1123967

https://bugzilla.suse.com/show_bug.cgi?id=1124897

https://bugzilla.suse.com/show_bug.cgi?id=1125415

https://bugzilla.suse.com/show_bug.cgi?id=1127026

https://bugzilla.suse.com/show_bug.cgi?id=1127155

https://bugzilla.suse.com/show_bug.cgi?id=1127220

https://bugzilla.suse.com/show_bug.cgi?id=1130161

https://bugzilla.suse.com/show_bug.cgi?id=1131823

https://bugzilla.suse.com/show_bug.cgi?id=1135749

https://bugzilla.suse.com/show_bug.cgi?id=1137977

https://bugzilla.suse.com/show_bug.cgi?id=663358

https://bugzilla.suse.com/show_bug.cgi?id=764147

https://bugzilla.suse.com/show_bug.cgi?id=965786

https://bugzilla.suse.com/show_bug.cgi?id=978193

https://bugzilla.suse.com/show_bug.cgi?id=993025

https://www.suse.com/security/cve/CVE-2018-20532/

https://www.suse.com/security/cve/CVE-2018-20533/

https://www.suse.com/security/cve/CVE-2018-20534/

http://www.nessus.org/u?6949bd7b

Plugin Details

Severity: Medium

ID: 127759

File Name: suse_SU-2019-2030-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 8/12/2019

Updated: 1/13/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:packagekit, p-cpe:/a:novell:suse_linux:packagekit-backend-zypp, p-cpe:/a:novell:suse_linux:packagekit-backend-zypp-debuginfo, p-cpe:/a:novell:suse_linux:packagekit-debuginfo, p-cpe:/a:novell:suse_linux:packagekit-debugsource, p-cpe:/a:novell:suse_linux:packagekit-devel, p-cpe:/a:novell:suse_linux:packagekit-devel-debuginfo, p-cpe:/a:novell:suse_linux:libpackagekit-glib2, p-cpe:/a:novell:suse_linux:libpackagekit-glib2-18-debuginfo, p-cpe:/a:novell:suse_linux:libpackagekit-glib2-devel, p-cpe:/a:novell:suse_linux:libsolv-debuginfo, p-cpe:/a:novell:suse_linux:libsolv-debugsource, p-cpe:/a:novell:suse_linux:libsolv-demo, p-cpe:/a:novell:suse_linux:libsolv-demo-debuginfo, p-cpe:/a:novell:suse_linux:libsolv-devel, p-cpe:/a:novell:suse_linux:libsolv-devel-debuginfo, p-cpe:/a:novell:suse_linux:libsolv-tools, p-cpe:/a:novell:suse_linux:libsolv-tools-debuginfo, p-cpe:/a:novell:suse_linux:libyui-ncurses-pkg-debugsource, p-cpe:/a:novell:suse_linux:libyui-ncurses-pkg-devel, p-cpe:/a:novell:suse_linux:libyui-ncurses-pkg8, p-cpe:/a:novell:suse_linux:libyui-ncurses-pkg8-debuginfo, p-cpe:/a:novell:suse_linux:libyui-qt-pkg-debugsource, p-cpe:/a:novell:suse_linux:libyui-qt-pkg-devel, p-cpe:/a:novell:suse_linux:libyui-qt-pkg8, p-cpe:/a:novell:suse_linux:yast2-pkg-bindings-debuginfo, p-cpe:/a:novell:suse_linux:yast2-pkg-bindings-debugsource, p-cpe:/a:novell:suse_linux:zypper, p-cpe:/a:novell:suse_linux:zypper-debuginfo, p-cpe:/a:novell:suse_linux:zypper-debugsource, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:libyui-qt-pkg8-debuginfo, p-cpe:/a:novell:suse_linux:libzypp, p-cpe:/a:novell:suse_linux:libzypp-debuginfo, p-cpe:/a:novell:suse_linux:libzypp-debugsource, p-cpe:/a:novell:suse_linux:libzypp-devel, p-cpe:/a:novell:suse_linux:libzypp-devel-doc, p-cpe:/a:novell:suse_linux:perl-solv, p-cpe:/a:novell:suse_linux:perl-solv-debuginfo, p-cpe:/a:novell:suse_linux:python-solv, p-cpe:/a:novell:suse_linux:python-solv-debuginfo, p-cpe:/a:novell:suse_linux:python3-solv, p-cpe:/a:novell:suse_linux:python3-solv-debuginfo, p-cpe:/a:novell:suse_linux:ruby-solv, p-cpe:/a:novell:suse_linux:ruby-solv-debuginfo, p-cpe:/a:novell:suse_linux:typelib-1_0-packagekitglib, p-cpe:/a:novell:suse_linux:yast2-pkg-bindings

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/31/2019

Vulnerability Publication Date: 12/28/2018

Reference Information

CVE: CVE-2018-20532, CVE-2018-20533, CVE-2018-20534