SUSE Security Update: Security update for audit
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:1166-1
Rating:             moderate
References:         #1042781 #1085003 #1125535 #941922 
Cross-References:   CVE-2015-5186
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

   An update that solves one vulnerability and has three fixes
   is now available.

Description:


   This update for audit fixes the following issues:

   Audit on SUSE Linux Enterprise 12 SP3 was updated to 2.8.1 to bring new
   features and bugfixes.  (bsc#1125535 FATE#326346)

   * Many features were added to auparse_normalize
   * cli option added to auditd and audispd for setting config dir
   * In auditd, restore the umask after creating a log file
   * Option added to auditd for skipping email verification

   The full changelog can be found here:
   https://people.redhat.com/sgrubb/audit/ChangeLog


   - Change openldap dependency to client only (bsc#1085003)

   Minor security issue fixed:

   - CVE-2015-5186: Audit: log terminal emulator escape sequences handling
     (bsc#941922)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-1166=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1166=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1166=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      audit-debugsource-2.8.1-8.3.1
      audit-devel-2.8.1-8.3.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      audit-2.8.1-8.3.3
      audit-audispd-plugins-2.8.1-8.3.3
      audit-debugsource-2.8.1-8.3.1
      libaudit1-2.8.1-8.3.1
      libaudit1-debuginfo-2.8.1-8.3.1
      libauparse0-2.8.1-8.3.1
      libauparse0-debuginfo-2.8.1-8.3.1

   - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):

      libaudit1-32bit-2.8.1-8.3.1
      libaudit1-debuginfo-32bit-2.8.1-8.3.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      audit-2.8.1-8.3.3
      audit-debugsource-2.8.1-8.3.1
      libaudit1-2.8.1-8.3.1
      libaudit1-32bit-2.8.1-8.3.1
      libaudit1-debuginfo-2.8.1-8.3.1
      libaudit1-debuginfo-32bit-2.8.1-8.3.1
      libauparse0-2.8.1-8.3.1
      libauparse0-debuginfo-2.8.1-8.3.1


References:

   https://www.suse.com/security/cve/CVE-2015-5186.html
   https://bugzilla.suse.com/1042781
   https://bugzilla.suse.com/1085003
   https://bugzilla.suse.com/1125535
   https://bugzilla.suse.com/941922

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:1166-1 moderate: audit

May 7, 2019
An update that solves one vulnerability and has three fixes is now available

Summary

This update for audit fixes the following issues: Audit on SUSE Linux Enterprise 12 SP3 was updated to 2.8.1 to bring new features and bugfixes. (bsc#1125535 FATE#326346) * Many features were added to auparse_normalize * cli option added to auditd and audispd for setting config dir * In auditd, restore the umask after creating a log file * Option added to auditd for skipping email verification The full changelog can be found here: https://people.redhat.com/sgrubb/audit/ChangeLog - Change openldap dependency to client only (bsc#1085003) Minor security issue fixed: - CVE-2015-5186: Audit: log terminal emulator escape sequences handling (bsc#941922) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-1166=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1166=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1166=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64): audit-debugsource-2.8.1-8.3.1 audit-devel-2.8.1-8.3.1 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): audit-2.8.1-8.3.3 audit-audispd-plugins-2.8.1-8.3.3 audit-debugsource-2.8.1-8.3.1 libaudit1-2.8.1-8.3.1 libaudit1-debuginfo-2.8.1-8.3.1 libauparse0-2.8.1-8.3.1 libauparse0-debuginfo-2.8.1-8.3.1 - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64): libaudit1-32bit-2.8.1-8.3.1 libaudit1-debuginfo-32bit-2.8.1-8.3.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): audit-2.8.1-8.3.3 audit-debugsource-2.8.1-8.3.1 libaudit1-2.8.1-8.3.1 libaudit1-32bit-2.8.1-8.3.1 libaudit1-debuginfo-2.8.1-8.3.1 libaudit1-debuginfo-32bit-2.8.1-8.3.1 libauparse0-2.8.1-8.3.1 libauparse0-debuginfo-2.8.1-8.3.1

References

#1042781 #1085003 #1125535 #941922

Cross- CVE-2015-5186

Affected Products:

SUSE Linux Enterprise Software Development Kit 12-SP3

SUSE Linux Enterprise Server 12-SP3

SUSE Linux Enterprise Desktop 12-SP3

https://www.suse.com/security/cve/CVE-2015-5186.html

https://bugzilla.suse.com/1042781

https://bugzilla.suse.com/1085003

https://bugzilla.suse.com/1125535

https://bugzilla.suse.com/941922

Severity
Announcement ID: SUSE-SU-2019:1166-1
Rating: moderate

Related News