Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2020.0087.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2020:0087-1) |
Summary: | The remote host is missing an update for the 'libsolv, libzypp, zypper' package(s) announced via the SUSE-SU-2020:0087-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'libsolv, libzypp, zypper' package(s) announced via the SUSE-SU-2020:0087-1 advisory. Vulnerability Insight: This update for libsolv, libzypp, zypper fixes the following issues: Security issue fixed: CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763). Bug fixes Fixed removing orphaned packages dropped by to-be-installed products (bsc#1155819). Adds libzypp API to mark all obsolete kernels according to the existing purge-kernel script rules (bsc#1155198). Do not enforce 'en' being in RequestedLocales If the user decides to have a system without explicit language support he may do so (bsc#1155678). Load only target resolvables for zypper rm (bsc#1157377). Fix broken search by filelist (bsc#1135114). Replace python by a bash script in zypper-log (fixes#304, fixes#306, bsc#1156158). Do not sort out requested locales which are not available (bsc#1155678). Prevent listing duplicate matches in tables. XML result is provided within the new list-patches-byissue element (bsc#1154805). XML add patch issue-date and issue-list (bsc#1154805). Fix zypper lp --cve/bugzilla/issue options (bsc#1155298). Always execute commit when adding/removing locales (fixes bsc#1155205). Fix description of --table-style,-s in man page (bsc#1154804). Affected Software/OS: 'libsolv, libzypp, zypper' package(s) on SUSE Linux Enterprise Installer 15, SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1. Solution: Please install the updated package(s). CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-18900 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |