quinta-feira, 4 de junho de 2020
Atualização de segurança importante do SUSE para o krb5-appl, aviso SUSE: 2020: 1533-1
Confira !
Uma atualização que corrige uma vulnerabilidade está agora disponível.
Atualização de segurança do SUSE: atualização de segurança para krb5-appl
______________________________________________________________________________
ID do anúncio: SUSE-SU-2020: 1533-1
Classificação: importante
Referências: # 1165787
Referências cruzadas: CVE-2020-10188
Produtos afetados:
Pé-de-cabra do SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Server para SAP 12-SP3
SUSE Linux Enterprise Server para SAP 12-SP2
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP3-LTSS
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise Server 12-SP2-LTSS
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Enterprise Storage 5
HPE Helion Openstack 8
______________________________________________________________________________
Uma atualização que corrige uma vulnerabilidade está agora disponível.
Descrição:
Esta atualização para o krb5-appl corrige os seguintes problemas:
- CVE-2020-10188: corrigida uma execução raiz remota (bsc # 1165787).
Instruções de patch:
Para instalar esta atualização de segurança do SUSE, use os métodos de instalação recomendados pelo SUSE
como o YaST online_update ou "zypper patch".
Como alternativa, você pode executar o comando listado para o seu produto:
- SUSE OpenStack Cloud Crowbar 8:
zypper no patch -t SUSE-OpenStack-Cloud-Crowbar-8-2020-1533 = 1
- SUSE OpenStack Cloud 8:
zypper no patch -t SUSE-OpenStack-Cloud-8-2020-1533 = 1
- SUSE OpenStack Cloud 7:
zypper no patch -t SUSE-OpenStack-Cloud-7-2020-1533 = 1
- SUSE Linux Enterprise Server para SAP 12-SP3:
zypper no patch -t SUSE-SLE-SAP-12-SP3-2020-1533 = 1
- SUSE Linux Enterprise Server para SAP 12-SP2:
zypper no patch -t SUSE-SLE-SAP-12-SP2-2020-1533 = 1
- SUSE Linux Enterprise Server 12-SP5:
zypper no patch -t SUSE-SLE-SERVER-12-SP5-2020-1533 = 1
- SUSE Linux Enterprise Server 12-SP4:
zypper no patch -t SUSE-SLE-SERVER-12-SP4-2020-1533 = 1
- SUSE Linux Enterprise Server 12-SP3-LTSS:
zypper no patch -t SUSE-SLE-SERVER-12-SP3-2020-1533 = 1
- SUSE Linux Enterprise Server 12-SP3-BCL:
zypper no patch -t SUSE-SLE-SERVER-12-SP3-BCL-2020-1533 = 1
- SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper no patch -t SUSE-SLE-SERVER-12-SP2-2020-1533 = 1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper no patch -t SUSE-SLE-SERVER-12-SP2-BCL-2020-1533 = 1
- SUSE Enterprise Storage 5:
zypper no patch -t SUSE-Storage-5-2020-1533 = 1
- HPE Helion Openstack 8:
zypper no patch -t HPE-Helion-OpenStack-8-2020-1533 = 1
Lista de Pacotes:
- SUSE OpenStack Cloud Crowbar 8 (x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE OpenStack Cloud 8 (x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE OpenStack Cloud 7 (s390x x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server para SAP 12-SP3 (ppc64le x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server para SAP 12-SP2 (ppc64le x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- SUSE Enterprise Storage 5 (aarch64 x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
- HPE Helion Openstack 8 (x86_64):
krb5-appl-clients-1.0.3-3.3.1
krb5-appl-clients-debuginfo-1.0.3-3.3.1
krb5-appl-debugsource-1.0.3-3.3.1
krb5-appl-servers-1.0.3-3.3.1
krb5-appl-servers-debuginfo-1.0.3-3.3.1
Referências:
https://www.suse.com/security/cve/CVE-2020-10188.html
https://bugzilla.suse.com/1165787
_______________________________________________
lista de discussão sle-security-updates
sle-security-updates@lists.suse.com
https://lists.suse.com/mailman/listinfo/sle-security-updates
Fonte
Até a próxima !!
Marcadores: Linux, Android, Segurança
Linux,
linux distros,
Linux Segurança,
Notícia,
SUSE
Assinar:
Postar comentários (Atom)
Nenhum comentário:
Postar um comentário