SUSE 5153 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:1689-1: moderate: Security update for phpMyAdmin
openSUSE-SU-2019:1690-1: moderate: Security update for irssi



openSUSE-SU-2019:1689-1: moderate: Security update for phpMyAdmin

openSUSE Security Update: Security update for phpMyAdmin
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1689-1
Rating: moderate
References: #1137496 #1137497
Cross-References: CVE-2019-11768 CVE-2019-12616
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.1
openSUSE Leap 15.0
openSUSE Backports SLE-15
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for phpMyAdmin fixes the following issues:

phpMyAdmin was updated to 4.9.0.1:

* Several issues with SYSTEM VERSIONING tables
* Fixed json encode error in export
* Fixed JavaScript events not activating on input (sql bookmark issue)
* Show Designer combo boxes when adding a constraint
* Fix edit view
* Fixed invalid default value for bit field
* Fix several errors relating to GIS data types
* Fixed javascript error PMA_messages is not defined
* Fixed import XML data with leading zeros
* Fixed php notice, added support for 'DELETE HISTORY' table privilege
(MariaDB >= 10.3.4)
* Fixed MySQL 8.0.0 issues with GIS display
* Fixed "Server charset" in "Database server" tab showing wrong information
* Fixed can not copy user on Percona Server 5.7
* Updated sql-parser to version 4.3.2, which fixes several parsing and
linting problems

- boo#1137497 / PMASA-2019-4 / CVE-2019-12616 / CWE-661: Fixed CSRF
vulnerability in login form
https://www.phpmyadmin.net/security/PMASA-2019-4/

- boo#1137496 / PMASA-2019-3 / CVE-2019-11768 / CWE-661: Fixed SQL
injection in Designer feature
https://www.phpmyadmin.net/security/PMASA-2019-3/


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1689=1

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1689=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1689=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-1689=1

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2019-1689=1



Package List:

- openSUSE Leap 42.3 (noarch):

phpMyAdmin-4.9.0.1-31.1

- openSUSE Leap 15.1 (noarch):

phpMyAdmin-4.9.0.1-lp151.2.3.1

- openSUSE Leap 15.0 (noarch):

phpMyAdmin-4.9.0.1-lp150.31.1

- openSUSE Backports SLE-15 (noarch):

phpMyAdmin-4.9.0.1-bp150.31.1

- SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):

phpMyAdmin-4.9.0.1-31.1


References:

https://www.suse.com/security/cve/CVE-2019-11768.html
https://www.suse.com/security/cve/CVE-2019-12616.html
https://bugzilla.suse.com/1137496
https://bugzilla.suse.com/1137497

--


openSUSE-SU-2019:1690-1: moderate: Security update for irssi

openSUSE Security Update: Security update for irssi
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1690-1
Rating: moderate
References: #1139802
Cross-References: CVE-2019-13045
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.1
openSUSE Leap 15.0
openSUSE Backports SLE-15
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for irssi fixes the following issues:

irssi was updated to 1.1.3:

- CVE-2019-13045: Fix a use after free issue when sending the SASL login
on (automatic and manual) reconnects (#1055, #1058) (boo#1139802)
- Fix regression of #779 where autolog_ignore_targets would not matching
itemless windows anymore (#1012, #1013)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1690=1

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1690=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1690=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-1690=1

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2019-1690=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

irssi-1.1.3-33.1
irssi-debuginfo-1.1.3-33.1
irssi-debugsource-1.1.3-33.1
irssi-devel-1.1.3-33.1

- openSUSE Leap 15.1 (x86_64):

irssi-1.1.3-lp151.2.3.1
irssi-debuginfo-1.1.3-lp151.2.3.1
irssi-debugsource-1.1.3-lp151.2.3.1
irssi-devel-1.1.3-lp151.2.3.1

- openSUSE Leap 15.0 (x86_64):

irssi-1.1.3-lp150.33.1
irssi-debuginfo-1.1.3-lp150.33.1
irssi-debugsource-1.1.3-lp150.33.1
irssi-devel-1.1.3-lp150.33.1

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

irssi-1.1.3-bp150.33.1
irssi-devel-1.1.3-bp150.33.1

- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

irssi-1.1.3-33.1
irssi-devel-1.1.3-33.1


References:

https://www.suse.com/security/cve/CVE-2019-13045.html
https://bugzilla.suse.com/1139802

--