OPENSUSE-SU-2019:2654-1
Vulnerability from csaf_opensuse - Published: 2019-12-09 11:20 - Updated: 2019-12-09 11:20Summary
Security update for calamares
Notes
Title of the patch
Security update for calamares
Description of the patch
This update for calamares fixes the following issues:
- Launch with 'pkexec calamares' in openSUSE Tumbleweed, but
launch with 'xdg-su -c calamares' in openSUSE Leap 15.
Update to Calamares 3.2.15:
- 'displaymanager' module now treats 'sysconfig' as a regular
entry in the 'displaymanagers' list, and the 'sysconfigSetup'
key is used as a shorthand to force only that entry in the
list.
- 'machineid' module has been re-written in C++ and extended
with a new configuration key to generate urandom pool data.
- 'unpackfs' now supports a special 'sourcefs' value of file
for copying single files (optionally with renaming) or
directory trees to the target system.
- 'unpackfs' now support an 'exclude' and 'excludeFile' setting
for excluding particular files or patters from unpacking.
Update to Calamares 3.2.14:
- 'locale' module no longer recognizes the legacy GeoIP
configuration. This has been deprecated since Calamares 3.2.8
and is now removed.
- 'packagechooser' module can now be custom-labeled in the overall
progress (left-hand column).
- 'displaymanager' module now recognizes KDE Plasma 5.17.
- 'displaymanager' module now can handle Wayland sessions and can
detect sessions from their .desktop files.
- 'unpackfs' now has special handling for sourcefs setting “file”.
Update to Calamares 3.2.13.
More about upstream changes:
https://calamares.io/calamares-3.2.13-is-out/ and
https://calamares.io/calamares-3.2.12-is-out/
Update to Calamares 3.2.11:
- Fix race condition in modules/luksbootkeyfile/main.py
(boo#1140256, CVE-2019-13178)
- more about upstream changes in 3.2 versions can be found in
https://calamares.io/ and
https://github.com/calamares/calamares/releases
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames
openSUSE-2019-2654
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for calamares",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for calamares fixes the following issues:\n\n- Launch with \u0027pkexec calamares\u0027 in openSUSE Tumbleweed, but\n launch with \u0027xdg-su -c calamares\u0027 in openSUSE Leap 15.\n\nUpdate to Calamares 3.2.15:\n\n- \u0027displaymanager\u0027 module now treats \u0027sysconfig\u0027 as a regular \n entry in the \u0027displaymanagers\u0027 list, and the \u0027sysconfigSetup\u0027 \n key is used as a shorthand to force only that entry in the \n list.\n- \u0027machineid\u0027 module has been re-written in C++ and extended \n with a new configuration key to generate urandom pool data.\n- \u0027unpackfs\u0027 now supports a special \u0027sourcefs\u0027 value of file \n for copying single files (optionally with renaming) or \n directory trees to the target system.\n- \u0027unpackfs\u0027 now support an \u0027exclude\u0027 and \u0027excludeFile\u0027 setting \n for excluding particular files or patters from unpacking.\n\nUpdate to Calamares 3.2.14:\n- \u0027locale\u0027 module no longer recognizes the legacy GeoIP \n configuration. This has been deprecated since Calamares 3.2.8 \n and is now removed.\n- \u0027packagechooser\u0027 module can now be custom-labeled in the overall\n progress (left-hand column).\n- \u0027displaymanager\u0027 module now recognizes KDE Plasma 5.17.\n- \u0027displaymanager\u0027 module now can handle Wayland sessions and can\n detect sessions from their .desktop files.\n- \u0027unpackfs\u0027 now has special handling for sourcefs setting \u201cfile\u201d. \n\nUpdate to Calamares 3.2.13.\n\nMore about upstream changes:\n\n https://calamares.io/calamares-3.2.13-is-out/ and\n https://calamares.io/calamares-3.2.12-is-out/\n\nUpdate to Calamares 3.2.11:\n\n- Fix race condition in modules/luksbootkeyfile/main.py \n (boo#1140256, CVE-2019-13178)\n- more about upstream changes in 3.2 versions can be found in \n https://calamares.io/ and \n https://github.com/calamares/calamares/releases\n\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2654",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2654-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2654-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OU7DMCEKVGL42QYWSNT6IENE4JIKRXYA/#OU7DMCEKVGL42QYWSNT6IENE4JIKRXYA"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2654-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OU7DMCEKVGL42QYWSNT6IENE4JIKRXYA/#OU7DMCEKVGL42QYWSNT6IENE4JIKRXYA"
},
{
"category": "self",
"summary": "SUSE Bug 1140256",
"url": "https://bugzilla.suse.com/1140256"
},
{
"category": "self",
"summary": "SUSE Bug 1152377",
"url": "https://bugzilla.suse.com/1152377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13178 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13178/"
}
],
"title": "Security update for calamares",
"tracking": {
"current_release_date": "2019-12-09T11:20:27Z",
"generator": {
"date": "2019-12-09T11:20:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2654-1",
"initial_release_date": "2019-12-09T11:20:27Z",
"revision_history": [
{
"date": "2019-12-09T11:20:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch",
"product": {
"name": "calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch",
"product_id": "calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "calamares-3.2.15-bp150.2.6.1.x86_64",
"product": {
"name": "calamares-3.2.15-bp150.2.6.1.x86_64",
"product_id": "calamares-3.2.15-bp150.2.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "calamares-webview-3.2.15-bp150.2.6.1.x86_64",
"product": {
"name": "calamares-webview-3.2.15-bp150.2.6.1.x86_64",
"product_id": "calamares-webview-3.2.15-bp150.2.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "calamares-3.2.15-bp150.2.6.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:calamares-3.2.15-bp150.2.6.1.x86_64"
},
"product_reference": "calamares-3.2.15-bp150.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch"
},
"product_reference": "calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "calamares-webview-3.2.15-bp150.2.6.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:calamares-webview-3.2.15-bp150.2.6.1.x86_64"
},
"product_reference": "calamares-webview-3.2.15-bp150.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13178"
}
],
"notes": [
{
"category": "general",
"text": "modules/luksbootkeyfile/main.py in Calamares versions 3.1 through 3.2.10 has a race condition between the time when the LUKS encryption keyfile is created and when secure permissions are set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:calamares-3.2.15-bp150.2.6.1.x86_64",
"SUSE Package Hub 15:calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch",
"SUSE Package Hub 15:calamares-webview-3.2.15-bp150.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13178",
"url": "https://www.suse.com/security/cve/CVE-2019-13178"
},
{
"category": "external",
"summary": "SUSE Bug 1140256 for CVE-2019-13178",
"url": "https://bugzilla.suse.com/1140256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:calamares-3.2.15-bp150.2.6.1.x86_64",
"SUSE Package Hub 15:calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch",
"SUSE Package Hub 15:calamares-webview-3.2.15-bp150.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:calamares-3.2.15-bp150.2.6.1.x86_64",
"SUSE Package Hub 15:calamares-branding-upstream-3.2.15-bp150.2.6.1.noarch",
"SUSE Package Hub 15:calamares-webview-3.2.15-bp150.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-09T11:20:27Z",
"details": "moderate"
}
],
"title": "CVE-2019-13178"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…