Linux Security
    Linux Security
    Linux Security

    openSUSE: 2021:0089-1 important: open-iscsi

    Date 16 Jan 2021
    Posted By LinuxSecurity Advisories
    An update that contains security fixes can now be installed.
       openSUSE Security Update: Security update for open-iscsi
    Announcement ID:    openSUSE-SU-2021:0089-1
    Rating:             important
    References:         #1179440 #1179908 
    Affected Products:
                        openSUSE Leap 15.2
       An update that contains security fixes can now be installed.
       This update for open-iscsi fixes the following issues:
       - Updated to upstream version 2.1.3 as 2.1.3-suse, for bsc#1179908,
         * uip: check for TCP urgent pointer past end of frame
         * uip: check for u8 overflow when processing TCP options
         * uip: check for header length underflow during checksum calculation
         * fwparam_ppc: Fix memory leak in fwparam_ppc.c
         * iscsiuio: Remove unused macro IFNAMSIZ defined in iscsid_ipc.c
         * fwparam_ppc: Fix illegal memory access in fwparam_ppc.c
         * sysfs: Verify parameter of sysfs_device_get()
         * fwparam_ppc: Fix NULL pointer dereference in find_devtree()
         * open-iscsi: Clean user_param list when process exit
         * iscsi_net_util: Fix NULL pointer dereference in find_vlan_dev()
         * open-iscsi: Fix NULL pointer dereference in mgmt_ipc_read_req()
         * open-iscsi: Fix invalid pointer deference in find_initiator()
         * iscsiuio: Fix invalid parameter when call fstat()
         * iscsi-iname: Verify open() return value before calling read()
         * iscsi_sysfs: Fix NULL pointer deference in iscsi_sysfs_read_iface
       - Updatged to latest upstream, including:
         * iscsiadm: Optimize the the verification of mode paramters
         * iscsid: Poll timeout value to 1 minute for iscsid
         * iscsiadm: fix host stats mode coredump
         * iscsid: fix logging level when starting and shutting down daemon
         * Updated iscsiadm man page.
         * Fix memory leak in sysfs_get_str
         * libopeniscsiusr: Compare with max int instead of max long
       - Systemd unit files should not depend on (bsc#1179440).
       - Updated to latest upstream, including async login ability:
        * Implement login "no_wait" for iscsiadm NODE mode
        * iscsiadm buffer overflow regression when discovering many targets at
        * iscsid: Check Invalid Session id for stop connection
        * Add ability to attempt target logins asynchronously
       - %service_del_postun_without_restart is now available on SLE More
         accurately it's been introduced in SLE12-SP2+ and SLE15+
       This update was imported from the SUSE:SLE-15-SP2:Update update project.
    Patch Instructions:
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
       Alternatively you can run the command listed for your product:
       - openSUSE Leap 15.2:
          zypper in -t patch openSUSE-2021-89=1
    Package List:
       - openSUSE Leap 15.2 (i586 x86_64):

    LinuxSecurity Poll

    Which is the best secure Linux distro for pentesting?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"174","title":"Kali Linux","votes":"9","type":"x","order":"1","pct":56.25,"resources":[]},{"id":"175","title":"Parrot OS","votes":"7","type":"x","order":"2","pct":43.75,"resources":[]},{"id":"176","title":"BlackArch Linux","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.