SUSE Security Update: Security update for webyast ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:1894-1 Rating: important References: #851116 Cross-References: CVE-2013-3709 Affected Products: WebYaST 1.3 SUSE Studio Onsite 1.3 SUSE Lifecycle Management Server 1.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: The following security issue has been fixed: * CVE-2013-3709: webyast: local privilege escalation via secret rails tokens execution. This vulnerability was reported by joernchen of Phenoelit. Security Issue reference: * CVE-2013-3709 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3709
Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.3: zypper in -t patch slewyst13-webyast-base-8608 - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-webyast-base-8608 - SUSE Lifecycle Management Server 1.3: zypper in -t patch sleslms13-webyast-base-8608 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.3 (noarch) [New Version: 0.3.43.1]: webyast-base-0.3.43.1-0.5.1 webyast-base-branding-default-0.3.43.1-0.5.1 - SUSE Studio Onsite 1.3 (noarch) [New Version: 0.3.43.1]: webyast-base-0.3.43.1-0.5.1 webyast-base-branding-default-0.3.43.1-0.5.1 - SUSE Lifecycle Management Server 1.3 (noarch) [New Version: 0.3.43.1]: webyast-base-0.3.43.1-0.5.1 webyast-base-branding-default-0.3.43.1-0.5.1 References: http://support.novell.com/security/cve/CVE-2013-3709.html https://bugzilla.novell.com/851116 http://download.novell.com/patch/finder/?keywords=e33808e1f7a924a2aecffd6c2c... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org