QID 750699

Date Published: 2021-06-28

QID 750699: SUSE Enterprise Linux Security Update for cryptctl (SUSE-SU-2021:2136-1)

This update for cryptctl fixes the following issues: update to version 2.4: - cve-2019-18906: client side password hashing was equivalent to clear text password storage (bsc#1186226) - first step to use plain text password instead of hashed password.
- move repository into the suse github organization - in rpc server, if client comes from localhost, remember its ipv4 localhost address instead of ipv6 address - tell a record to clear expired pending commands upon saving a command result; introduce pending commands rpc test case - avoid hard coding 127.0.0.1 in host id of alive message test; let system administrator mount and unmount disks by issuing these two commands on key server.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2136-1 to address this issue and obtain further details.

    CVEs related to QID 750699

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2136-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-June/009076.html