openSUSE: 2021:0907-1 important: cryptctl | LinuxSecurity.com

Advisories


   openSUSE Security Update: Security update for cryptctl
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0907-1
Rating:             important
References:         #1186226 
Cross-References:   CVE-2019-18906
Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for cryptctl fixes the following issues:

   Update to version 2.4:

   - CVE-2019-18906: Client side password hashing was equivalent to clear
     text password storage (bsc#1186226)
   - First step to use plain text password instead of hashed password.
   - Move repository into the SUSE github organization
   - in RPC server, if client comes from localhost, remember its ipv4
     localhost address instead of ipv6 address
   - tell a record to clear expired pending commands upon saving a command
     result; introduce pending commands RPC test case
   - avoid hard coding 127.0.0.1 in host ID of alive message test; let system
     administrator mount and unmount disks by issuing these two commands on
     key server.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-907=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      cryptctl-2.4-lp152.5.3.1
      cryptctl-debuginfo-2.4-lp152.5.3.1


References:

   https://www.suse.com/security/cve/CVE-2019-18906.html
   https://bugzilla.suse.com/1186226

openSUSE: 2021:0907-1 important: cryptctl

June 24, 2021
An update that fixes one vulnerability is now available

Description

This update for cryptctl fixes the following issues: Update to version 2.4: - CVE-2019-18906: Client side password hashing was equivalent to clear text password storage (bsc#1186226) - First step to use plain text password instead of hashed password. - Move repository into the SUSE github organization - in RPC server, if client comes from localhost, remember its ipv4 localhost address instead of ipv6 address - tell a record to clear expired pending commands upon saving a command result; introduce pending commands RPC test case - avoid hard coding 127.0.0.1 in host ID of alive message test; let system administrator mount and unmount disks by issuing these two commands on key server.

Patch

To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-907=1

Package List

- openSUSE Leap 15.2 (x86_64): cryptctl-2.4-lp152.5.3.1 cryptctl-debuginfo-2.4-lp152.5.3.1

References

https://www.suse.com/security/cve/CVE-2019-18906.html https://bugzilla.suse.com/1186226

Severity
Announcement ID: openSUSE-SU-2021:0907-1
Rating: important
Affected Products: openSUSE Leap 15.2 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.