Summary: The remote host is missing an update for the 'gvfs'
Linux Distribution Package(s) announced via the openSUSE-SU-2019:1699_1 advisory.
Detection Method: Checks if a vulnerable Linux Distribution Package version is present on the target host.
Technical Details: This update for gvfs fixes the following issues:
Security issues fixed:
- CVE-2019-12795: Fixed a vulnerability which could have allowed attacks
via local D-Bus method calls (bsc#1137930).
- CVE-2019-12447: Fixed an improper handling of file ownership in
daemon/gvfsbackendadmin.c due to no use of setfsuid (bsc#1136986).
- CVE-2019-12449: Fixed an improper handling of file's user and group
ownership in daemon/gvfsbackendadmin.c (bsc#1136992).
- CVE-2019-12448: Fixed race conditions in daemon/gvfsbackendadmin.c due
of query_info_on_read/write at admin backend (bsc#1136981).
Other issue addressed:
- Drop polkit rules files that are only relevant for wheel group
This update was imported from the SUSE:SLE-15:Update update project.
To install this openSUSE Security Update use the SUSE recommended
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1699=1
Affected Versions: 'gvfs' Linux Distribution Package(s) on openSUSE Leap 15.0.
Recommendations: Please install the updated Linux Distribution Package(s).
Solution Type: Vendor Patch
Detection Type: Linux Distribution Package
SuSE Local Security Checks
Find and Fix this Vulnerability:
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition