Описание
Security update for csync2
This update for csync2 fixes the following issues:
- CVE-2019-15522: Fixed an issue where daemon fails to enforce TLS (bsc#1147137)
- CVE-2019-15523: Fixed an incorrect TLS handshake error handling (bsc#1147139)
Список пакетов
Image SLES12-SP4-SAP-Azure
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-EC2-HVM
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-EC2-HVM-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-GCE
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-GCE-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-Azure-SAP-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-Azure-SAP-On-Demand
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-EC2-SAP-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-EC2-SAP-On-Demand
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-GCE-SAP-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-GCE-SAP-On-Demand
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
csync2-2.0+git.1368794815.cf835a7-3.9.5
SUSE Linux Enterprise High Availability Extension 12 SP3
csync2-2.0+git.1368794815.cf835a7-3.9.5
SUSE Linux Enterprise High Availability Extension 12 SP4
csync2-2.0+git.1368794815.cf835a7-3.9.5
SUSE Linux Enterprise High Availability Extension 12 SP5
csync2-2.0+git.1368794815.cf835a7-3.9.5
Ссылки
- Link for SUSE-SU-2021:1952-1
- E-Mail link for SUSE-SU-2021:1952-1
- SUSE Security Ratings
- SUSE Bug 1147137
- SUSE Bug 1147139
- SUSE CVE CVE-2019-15522 page
- SUSE CVE CVE-2019-15523 page
Описание
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
Затронутые продукты
Image SLES12-SP4-SAP-Azure-BYOS:csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production:csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure:csync2-2.0+git.1368794815.cf835a7-3.9.5
Ссылки
- CVE-2019-15522
- SUSE Bug 1147137
Описание
An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.
Затронутые продукты
Image SLES12-SP4-SAP-Azure-BYOS:csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production:csync2-2.0+git.1368794815.cf835a7-3.9.5
Image SLES12-SP4-SAP-Azure:csync2-2.0+git.1368794815.cf835a7-3.9.5
Ссылки
- CVE-2019-15523
- SUSE Bug 1147139