SUSE Security Update: Security update for smt
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3467-1
Rating:             moderate
References:         #1104076 #1111056 
Cross-References:   CVE-2018-12472
Affected Products:
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP1-LTSS
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Enterprise Storage 4
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:



   SMT was updated to version 3.0.38.

   Following security issue was fixed:

   - CVE-2018-12472: Harden hostname check during sibling check by forcing
     double reverse lookup (bsc#1104076)

   Following non security issues were fixed:

   - Add migration path check when registration sharing is enabled
   - Fix sibling sync errors (bsc#1111056):
     - Synchronize all registered products
     - Handle duplicate registrations when syncing
     - Force resync to the sibling instance in `upgrade` and `synchronize`
       API calls


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2481=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2481=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2481=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2481=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2481=1

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2481=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2018-2481=1

   - SUSE Enterprise Storage 4:

      zypper in -t patch SUSE-Storage-4-2018-2481=1



Package List:

   - SUSE OpenStack Cloud 7 (s390x x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (aarch64 ppc64le s390x x86_64):

      smt-ha-3.0.38-52.26.1

   - SUSE Enterprise Storage 4 (x86_64):

      res-signingkeys-3.0.38-52.26.1
      smt-3.0.38-52.26.1
      smt-debuginfo-3.0.38-52.26.1
      smt-debugsource-3.0.38-52.26.1
      smt-support-3.0.38-52.26.1


References:

   https://www.suse.com/security/cve/CVE-2018-12472.html
   https://bugzilla.suse.com/1104076
   https://bugzilla.suse.com/1111056

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
https://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:3467-1 moderate: smt

October 26, 2018
An update that solves one vulnerability and has one errata is now available

Summary

SMT was updated to version 3.0.38. Following security issue was fixed: - CVE-2018-12472: Harden hostname check during sibling check by forcing double reverse lookup (bsc#1104076) Following non security issues were fixed: - Add migration path check when registration sharing is enabled - Fix sibling sync errors (bsc#1111056): - Synchronize all registered products - Handle duplicate registrations when syncing - Force resync to the sibling instance in `upgrade` and `synchronize` API calls Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2481=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2481=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2481=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2481=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2481=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2481=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2018-2481=1 - SUSE Enterprise Storage 4: zypper in -t patch SUSE-Storage-4-2018-2481=1 Package List: - SUSE OpenStack Cloud 7 (s390x x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1 - SUSE Linux Enterprise Module for Public Cloud 12 (aarch64 ppc64le s390x x86_64): smt-ha-3.0.38-52.26.1 - SUSE Enterprise Storage 4 (x86_64): res-signingkeys-3.0.38-52.26.1 smt-3.0.38-52.26.1 smt-debuginfo-3.0.38-52.26.1 smt-debugsource-3.0.38-52.26.1 smt-support-3.0.38-52.26.1

References

#1104076 #1111056

Cross- CVE-2018-12472

Affected Products:

SUSE OpenStack Cloud 7

SUSE Linux Enterprise Server for SAP 12-SP2

SUSE Linux Enterprise Server 12-SP3

SUSE Linux Enterprise Server 12-SP2-LTSS

SUSE Linux Enterprise Server 12-SP2-BCL

SUSE Linux Enterprise Server 12-SP1-LTSS

SUSE Linux Enterprise Module for Public Cloud 12

SUSE Enterprise Storage 4

https://www.suse.com/security/cve/CVE-2018-12472.html

https://bugzilla.suse.com/1104076

https://bugzilla.suse.com/1111056

Severity
Announcement ID: SUSE-SU-2018:3467-1
Rating: moderate