SUSE Security Update: Security update for cpio
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:3064-1
Rating:             moderate
References:         #1155199 
Cross-References:   CVE-2019-14866
Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server 12-SP4
                    SUSE Linux Enterprise Desktop 12-SP4
                    SUSE CaaS Platform 3.0
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for cpio fixes the following issues:

   - CVE-2019-14866: Fixed an improper validation of the values written in
     the header of a TAR file through the to_oct() function which could have
     led to unexpected TAR generation (bsc#1155199).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-3064=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3064=1

   - SUSE Linux Enterprise Desktop 12-SP4:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-3064=1

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      cpio-2.11-36.6.1
      cpio-debuginfo-2.11-36.6.1
      cpio-debugsource-2.11-36.6.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      cpio-lang-2.11-36.6.1

   - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

      cpio-2.11-36.6.1
      cpio-debuginfo-2.11-36.6.1
      cpio-debugsource-2.11-36.6.1

   - SUSE Linux Enterprise Server 12-SP4 (noarch):

      cpio-lang-2.11-36.6.1

   - SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

      cpio-2.11-36.6.1
      cpio-debuginfo-2.11-36.6.1
      cpio-debugsource-2.11-36.6.1

   - SUSE Linux Enterprise Desktop 12-SP4 (noarch):

      cpio-lang-2.11-36.6.1

   - SUSE CaaS Platform 3.0 (x86_64):

      cpio-2.11-36.6.1
      cpio-debuginfo-2.11-36.6.1
      cpio-debugsource-2.11-36.6.1


References:

   https://www.suse.com/security/cve/CVE-2019-14866.html
   https://bugzilla.suse.com/1155199

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:3064-1 moderate: cpio

November 25, 2019
An update that fixes one vulnerability is now available

Summary

This update for cpio fixes the following issues: - CVE-2019-14866: Fixed an improper validation of the values written in the header of a TAR file through the to_oct() function which could have led to unexpected TAR generation (bsc#1155199). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-3064=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3064=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-3064=1 - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of th...

Read the Full Advisory

References

#1155199

Cross- CVE-2019-14866

Affected Products:

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server 12-SP4

SUSE Linux Enterprise Desktop 12-SP4

SUSE CaaS Platform 3.0

https://www.suse.com/security/cve/CVE-2019-14866.html

https://bugzilla.suse.com/1155199

Severity
Announcement ID: SUSE-SU-2019:3064-1
Rating: moderate

Related News