SUSE Security Update: Security update for webyast
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1894-1
Rating:             important
References:         #851116 
Cross-References:   CVE-2013-3709
Affected Products:
                    WebYaST 1.3
                    SUSE Studio Onsite 1.3
                    SUSE Lifecycle Management Server 1.3
______________________________________________________________________________

   An update that fixes one vulnerability is now available. It
   includes one version update.

Description:


   The following security issue has been fixed:

   * CVE-2013-3709: webyast: local privilege escalation
   via secret rails tokens execution. This vulnerability was
   reported by joernchen of Phenoelit.

   Security Issue reference:

   * CVE-2013-3709
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - WebYaST 1.3:

      zypper in -t patch slewyst13-webyast-base-8608

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-webyast-base-8608

   - SUSE Lifecycle Management Server 1.3:

      zypper in -t patch sleslms13-webyast-base-8608

   To bring your system up-to-date, use "zypper patch".


Package List:

   - WebYaST 1.3 (noarch) [New Version: 0.3.43.1]:

      webyast-base-0.3.43.1-0.5.1
      webyast-base-branding-default-0.3.43.1-0.5.1

   - SUSE Studio Onsite 1.3 (noarch) [New Version: 0.3.43.1]:

      webyast-base-0.3.43.1-0.5.1
      webyast-base-branding-default-0.3.43.1-0.5.1

   - SUSE Lifecycle Management Server 1.3 (noarch) [New Version: 0.3.43.1]:

      webyast-base-0.3.43.1-0.5.1
      webyast-base-branding-default-0.3.43.1-0.5.1


References:

   https://www.suse.com/security/cve/CVE-2013-3709.html
   https://bugzilla.novell.com/851116
   https://login.microfocus.com/nidp/app/login

SuSE: 2013:1894-1: important: webyast

December 16, 2013
An update that fixes one vulnerability is now available

Summary

The following security issue has been fixed: * CVE-2013-3709: webyast: local privilege escalation via secret rails tokens execution. This vulnerability was reported by joernchen of Phenoelit. Security Issue reference: * CVE-2013-3709 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.3: zypper in -t patch slewyst13-webyast-base-8608 - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-webyast-base-8608 - SUSE Lifecycle Management Server 1.3: zypper in -t patch sleslms13-webyast-base-8608 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.3 (noarch) [New Version: 0.3.43.1]: webyast-base-0.3.43.1-0.5.1 webyast-base-branding-default-0.3.43.1-0.5.1 - SUSE Studio Onsite 1.3 (noarch) [New Version: 0.3.43.1]: webyast-base-0.3.43.1-0.5.1 webyast-base...

Read the Full Advisory

References

#851116

Cross- CVE-2013-3709

Affected Products:

WebYaST 1.3

SUSE Studio Onsite 1.3

SUSE Lifecycle Management Server 1.3

https://www.suse.com/security/cve/CVE-2013-3709.html

https://bugzilla.novell.com/851116

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2013:1894-1
Rating: important

Related News