Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2019.2030.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2019:2030-1)
Summary:The remote host is missing an update for the 'zypper, libzypp and libsolv' package(s) announced via the SUSE-SU-2019:2030-1 advisory.
Description:Summary:
The remote host is missing an update for the 'zypper, libzypp and libsolv' package(s) announced via the SUSE-SU-2019:2030-1 advisory.

Vulnerability Insight:
This update for libzypp and libsolv fixes the following issues:

Security issues fixed:
CVE-2018-20532: Fixed NULL pointer dereference at ext/testcase.c
(function testcase_read) (bsc#1120629).

CVE-2018-20533: Fixed NULL pointer dereference at ext/testcase.c
(function testcase_str2dep_complex) in libsolvext.a (bsc#1120630).

CVE-2018-20534: Fixed illegal address access at src/pool.h (function
pool_whatprovides) in libsolv.a (bsc#1120631).

Fixed bugs and enhancements:
make cleandeps jobs on patterns work (bnc#1137977)

Fixed an issue where libsolv failed to build against swig 4.0 by
updating the version to 0.7.5 (bsc#1135749).

Virtualization host upgrade from SLES-15 to SLES-15-SP1 finished with
wrong product name shown up (bsc#1131823).

Copy pattern categories from the rpm that defines the pattern
(fate#323785).

Enhance scanning /sys for modaliases (bsc#1130161).

Prevent SEGV if the application sets an empty TextLocale (bsc#1127026).

Handle libgpgme error when gpg key is not completely read and user hits
CTRL + C (bsc#1127220).

Added a hint when registration codes have expired (bsc#965786).

Adds a better handling of an error when verifying any repository medium
(bsc#1065022).

Will now only write type field when probing (bsc#1114908).

Fixes an issue where zypper has showed the info message 'Installation
aborted by user' while the installation was aborted by wicked
(bsc#978193).

Suppresses reporting `/memfd:` pseudo files (bsc#1123843).

Fixes an issue where zypper was not able to install or uninstall
packages when rpm is unavailable (bsc#1122471).

Fixes an issue where locks were ignored (bsc#1113296).

Simplify complex locks so zypper can display them (bsc#1112911).

zypper will now set `SYSTEMD_OFFLINE=1` during chrooted commits
(bsc#1118758).

no-recommends: Nevertheless consider resolver namespaces (hardware,
language,..supporting packages) (fate#325513).

Removes world-readable bit from /var/log/zypp (bsc#1099019).

Does no longer fail service-refresh on a empty repoindex.xml
(bsc#1116840).

Fixes soname due to libsolv ABI changes (bsc#1115341).

Add infrastructure to flag specific packages to trigger a reboot needed
hint (fate#326451).

This update for zypper 1.14.27 fixes the following issues:
bash-completion: add package completion for addlock (bsc#1047962)

bash-completion: fix incorrect detection of command names (bsc#1049826)
Offer to change the 'runSearchPackages' config option at the prompt
(bsc#1119373, FATE#325599)

Prompt: provide a 'yes/no/always/never' prompt.

Prompt: support '#NUM' as answer to select the NUMth option...

Augeas: enable writing back changed option values (to ~
/.zypper.conf)

removelocale: fix segfault

Move needs-restarting command to subpackage (fixes #254)

Allow empty string as argument (bsc#1125415)

Provide a way to delete cache for volatile repositories (bsc#1053177)

Adapt to boost-1.69 requiring explici... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'zypper, libzypp and libsolv' package(s) on SUSE Linux Enterprise Workstation Extension 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Desktop Applications 15, SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Installer 15

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-20532
Common Vulnerability Exposure (CVE) ID: CVE-2018-20533
Common Vulnerability Exposure (CVE) ID: CVE-2018-20534
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.