36 updates has been released for openSUSE. The is part 2:
openSUSE-SU-2019:1851-2: important: Security update for kconfig, kdelibs4
openSUSE-SU-2019:1854-1: moderate: Security update for GraphicsMagick
openSUSE-SU-2019:1855-1: important: Security update for kconfig, kdelibs4
openSUSE-SU-2019:1858-1: moderate: Security update for ansible
openSUSE-SU-2019:1859-1: important: Security update for znc
openSUSE-SU-2019:1861-1: moderate: Security update for phpMyAdmin
openSUSE-SU-2019:1870-1: important: Security update for proftpd
openSUSE-SU-2019:1872-1: moderate: Security update for python-Django
openSUSE-SU-2019:1876-1: moderate: Security update for mumble
openSUSE-SU-2019:1880-1: moderate: Security update for live555
openSUSE-SU-2019:1891-1: moderate: Security update for libqb
openSUSE-SU-2019:1851-2: important: Security update for kconfig, kdelibs4
openSUSE-SU-2019:1854-1: moderate: Security update for GraphicsMagick
openSUSE-SU-2019:1855-1: important: Security update for kconfig, kdelibs4
openSUSE-SU-2019:1858-1: moderate: Security update for ansible
openSUSE-SU-2019:1859-1: important: Security update for znc
openSUSE-SU-2019:1861-1: moderate: Security update for phpMyAdmin
openSUSE-SU-2019:1870-1: important: Security update for proftpd
openSUSE-SU-2019:1872-1: moderate: Security update for python-Django
openSUSE-SU-2019:1876-1: moderate: Security update for mumble
openSUSE-SU-2019:1880-1: moderate: Security update for live555
openSUSE-SU-2019:1891-1: moderate: Security update for libqb
openSUSE-SU-2019:1851-2: important: Security update for kconfig, kdelibs4
openSUSE Security Update: Security update for kconfig, kdelibs4
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1851-2
Rating: important
References: #1144600
Cross-References: CVE-2019-14744
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for kconfig, kdelibs4 fixes the following issues:
- CVE-2019-14744: Fixed a command execution by an shell expansion
(boo#1144600).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1851=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
kconf_update5-5.55.0-bp151.3.5.1
kconf_update5-debuginfo-5.55.0-bp151.3.5.1
kconfig-debugsource-5.55.0-bp151.3.5.1
kconfig-devel-5.55.0-bp151.3.5.1
kconfig-devel-debuginfo-5.55.0-bp151.3.5.1
kdelibs4-4.14.38-bp151.9.5.1
kdelibs4-branding-upstream-4.14.38-bp151.9.5.1
kdelibs4-core-4.14.38-bp151.9.5.1
kdelibs4-core-debuginfo-4.14.38-bp151.9.5.1
kdelibs4-debuginfo-4.14.38-bp151.9.5.1
kdelibs4-debugsource-4.14.38-bp151.9.5.1
kdelibs4-doc-4.14.38-bp151.9.5.1
kdelibs4-doc-debuginfo-4.14.38-bp151.9.5.1
libKF5ConfigCore5-5.55.0-bp151.3.5.1
libKF5ConfigCore5-debuginfo-5.55.0-bp151.3.5.1
libKF5ConfigGui5-5.55.0-bp151.3.5.1
libKF5ConfigGui5-debuginfo-5.55.0-bp151.3.5.1
libkde4-4.14.38-bp151.9.5.1
libkde4-debuginfo-4.14.38-bp151.9.5.1
libkde4-devel-4.14.38-bp151.9.5.1
libkde4-devel-debuginfo-4.14.38-bp151.9.5.1
libkdecore4-4.14.38-bp151.9.5.1
libkdecore4-debuginfo-4.14.38-bp151.9.5.1
libkdecore4-devel-4.14.38-bp151.9.5.1
libkdecore4-devel-debuginfo-4.14.38-bp151.9.5.1
libksuseinstall-devel-4.14.38-bp151.9.5.1
libksuseinstall1-4.14.38-bp151.9.5.1
libksuseinstall1-debuginfo-4.14.38-bp151.9.5.1
- openSUSE Backports SLE-15-SP1 (aarch64_ilp32):
kconfig-devel-64bit-5.55.0-bp151.3.5.1
kconfig-devel-64bit-debuginfo-5.55.0-bp151.3.5.1
libKF5ConfigCore5-64bit-5.55.0-bp151.3.5.1
libKF5ConfigCore5-64bit-debuginfo-5.55.0-bp151.3.5.1
libKF5ConfigGui5-64bit-5.55.0-bp151.3.5.1
libKF5ConfigGui5-64bit-debuginfo-5.55.0-bp151.3.5.1
libkde4-64bit-4.14.38-bp151.9.5.1
libkde4-64bit-debuginfo-4.14.38-bp151.9.5.1
libkdecore4-64bit-4.14.38-bp151.9.5.1
libkdecore4-64bit-debuginfo-4.14.38-bp151.9.5.1
libksuseinstall1-64bit-4.14.38-bp151.9.5.1
libksuseinstall1-64bit-debuginfo-4.14.38-bp151.9.5.1
- openSUSE Backports SLE-15-SP1 (noarch):
kdelibs4-apidocs-4.14.38-bp151.9.5.1
libKF5ConfigCore5-lang-5.55.0-bp151.3.5.1
References:
https://www.suse.com/security/cve/CVE-2019-14744.html
https://bugzilla.suse.com/1144600
--
openSUSE-SU-2019:1854-1: moderate: Security update for GraphicsMagick
openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1854-1
Rating: moderate
References: #1138425
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for GraphicsMagick fixes the following issues:
- disable indirect reads that disclosed file contents from the local
system (boo#1138425)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1854=1
Package List:
- openSUSE Backports SLE-15-SP1 (x86_64):
GraphicsMagick-1.3.29-bp151.5.3.1
GraphicsMagick-devel-1.3.29-bp151.5.3.1
libGraphicsMagick++-Q16-12-1.3.29-bp151.5.3.1
libGraphicsMagick++-devel-1.3.29-bp151.5.3.1
libGraphicsMagick-Q16-3-1.3.29-bp151.5.3.1
libGraphicsMagick3-config-1.3.29-bp151.5.3.1
libGraphicsMagickWand-Q16-2-1.3.29-bp151.5.3.1
perl-GraphicsMagick-1.3.29-bp151.5.3.1
References:
https://bugzilla.suse.com/1138425
--
openSUSE-SU-2019:1855-1: important: Security update for kconfig, kdelibs4
openSUSE Security Update: Security update for kconfig, kdelibs4
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1855-1
Rating: important
References: #1144600
Cross-References: CVE-2019-14744
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for kconfig, kdelibs4 fixes the following issues:
- CVE-2019-14744: Fixed a command execution by an shell expansion
(boo#1144600).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1855=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
kconf_update5-5.45.0-bp150.3.8.2
kconf_update5-debuginfo-5.45.0-bp150.3.8.2
kconfig-debugsource-5.45.0-bp150.3.8.2
kconfig-devel-5.45.0-bp150.3.8.2
kconfig-devel-debuginfo-5.45.0-bp150.3.8.2
kdelibs4-4.14.38-bp150.3.8.1
kdelibs4-branding-upstream-4.14.38-bp150.3.8.1
kdelibs4-core-4.14.38-bp150.3.8.1
kdelibs4-doc-4.14.38-bp150.3.8.1
libKF5ConfigCore5-5.45.0-bp150.3.8.2
libKF5ConfigCore5-debuginfo-5.45.0-bp150.3.8.2
libKF5ConfigGui5-5.45.0-bp150.3.8.2
libKF5ConfigGui5-debuginfo-5.45.0-bp150.3.8.2
libkde4-4.14.38-bp150.3.8.1
libkde4-devel-4.14.38-bp150.3.8.1
libkdecore4-4.14.38-bp150.3.8.1
libkdecore4-devel-4.14.38-bp150.3.8.1
libksuseinstall-devel-4.14.38-bp150.3.8.1
libksuseinstall1-4.14.38-bp150.3.8.1
- openSUSE Backports SLE-15 (aarch64_ilp32):
kconfig-devel-64bit-5.45.0-bp150.3.8.2
kconfig-devel-64bit-debuginfo-5.45.0-bp150.3.8.2
libKF5ConfigCore5-64bit-5.45.0-bp150.3.8.2
libKF5ConfigCore5-64bit-debuginfo-5.45.0-bp150.3.8.2
libKF5ConfigGui5-64bit-5.45.0-bp150.3.8.2
libKF5ConfigGui5-64bit-debuginfo-5.45.0-bp150.3.8.2
libkde4-64bit-4.14.38-bp150.3.8.1
libkdecore4-64bit-4.14.38-bp150.3.8.1
libksuseinstall1-64bit-4.14.38-bp150.3.8.1
- openSUSE Backports SLE-15 (noarch):
kdelibs4-apidocs-4.14.38-bp150.3.8.1
libKF5ConfigCore5-lang-5.45.0-bp150.3.8.2
References:
https://www.suse.com/security/cve/CVE-2019-14744.html
https://bugzilla.suse.com/1144600
--
openSUSE-SU-2019:1858-1: moderate: Security update for ansible
openSUSE Security Update: Security update for ansible
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1858-1
Rating: moderate
References: #1109957 #1112959 #1118896 #1126503
Cross-References: CVE-2018-16837 CVE-2018-16859 CVE-2018-16876
CVE-2019-3828
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for ansible fixes the following issues:
Ansible was updated to version 2.8.1:
Full changelog is at /usr/share/doc/packages/ansible/changelogs/
- Bugfixes
- ACI - DO not encode query_string
- ACI modules - Fix non-signature authentication
- Add missing directory provided via ``--playbook-dir`` to adjacent
collection loading
- Fix "Interface not found" errors when using eos_l2_interface with
nonexistant interfaces configured
- Fix cannot get credential when `source_auth` set to `credential_file`.
- Fix netconf_config backup string issue
- Fix privilege escalation support for the docker connection plugin when
credentials need to be supplied (e.g. sudo with password).
- Fix vyos cli prompt inspection
- Fixed loading namespaced documentation fragments from collections.
- Fixing bug came up after running cnos_vrf module against coverity.
- Properly handle data importer failures on PVC creation, instead of
timing out.
- To fix the ios static route TC failure in CI
- To fix the nios member module params
- To fix the nios_zone module idempotency failure
- add terminal initial prompt for initial connection
- allow include_role to work with ansible command
- allow python_requirements_facts to report on dependencies containing
dashes
- asa_config fix
- azure_rm_roledefinition - fix a small error in build scope.
- azure_rm_virtualnetworkpeering - fix cross subscriptions virtual
network peering.
- cgroup_perf_recap - When not using file_per_task, make sure we don't
prematurely close the perf files
- display underlying error when reporting an invalid ``tasks:`` block.
- dnf - fix wildcard matching for state: absent
- docker connection plugin - accept version ``dev`` as 'newest version'
and print warning.
- docker_container - ``oom_killer`` and ``oom_score_adj`` options are
available since docker-py 1.8.0, not 2.0.0 as assumed by the version
check.
- docker_container - fix network creation when
``networks_cli_compatible`` is enabled.
- docker_container - use docker API's ``restart`` instead of
``stop``/``start`` to restart a container.
- docker_image - if ``build`` was not specified, the wrong default for
``build.rm`` is used.
- docker_image - if ``nocache`` set to ``yes`` but not
``build.nocache``, the module failed.
- docker_image - module failed when ``source: build`` was set but
``build.path`` options not specified.
- docker_network module - fix idempotency when using ``aux_addresses``
in ``ipam_config``.
- ec2_instance - make Name tag idempotent
- eos: don't fail modules without become set, instead show message and
continue
- eos_config: check for session support when asked to 'diff_against:
session'
- eos_eapi: fix idempotency issues when vrf was unspecified.
- fix bugs for ce - more info see
- fix incorrect uses of to_native that should be to_text instead.
- hcloud_volume - Fix idempotency when attaching a server to a volume.
- ibm_storage - Added a check for null fields in ibm_storage utils
module.
- include_tasks - whitelist ``listen`` as a valid keyword
- k8s - resource updates applied with force work correctly now
- keep results subset also when not no_log.
- meraki_switchport - improve reliability with native VLAN functionality.
- netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and
clearing functionality
- netapp_e_volumes - fix workload profileId indexing when no previous
workload tags exist on the storage array.
- nxos_acl some platforms/versions raise when no ACLs are present
- nxos_facts fix https://github.com/ansible/ansible/pull/57009
- nxos_file_copy fix passwordless workflow
- nxos_interface Fix admin_state check for n6k
- nxos_snmp_traps fix group all for N35 platforms
- nxos_snmp_user fix platform fixes for get_snmp_user
- nxos_vlan mode idempotence bug
- nxos_vlan vlan names containing regex ctl chars should be escaped
- nxos_vtp_* modules fix n6k issues
- openssl_certificate - fix private key passphrase handling for
``cryptography`` backend.
- openssl_pkcs12 - fixes crash when private key has a passphrase and the
module is run a second time.
- os_stack - Apply tags conditionally so that the module does not throw
up an error when using an older distro of openstacksdk
- pass correct loading context to persistent connections other than local
- pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux
- postgresql - added initial SSL related tests
- postgresql - added missing_required_libs, removed excess param mapping
- postgresql - move connect_to_db and get_pg_version into
module_utils/postgres.py
(https://github.com/ansible/ansible/pull/55514)
- postgresql_db - add note to the documentation about state dump and the
incorrect rc (https://github.com/ansible/ansible/pull/57297)
- postgresql_db - fix for postgresql_db fails if stderr contains output
- postgresql_ping - fixed a typo in the module documentation
- preserve actual ssh error when we cannot connect.
- route53_facts - the module did not advertise check mode support,
causing it not to be run in check mode.
- sysctl: the module now also checks the output of STDERR to report if
values are correctly set
(https://github.com/ansible/ansible/pull/55695)
- ufw - correctly check status when logging is off
- uri - always return a value for status even during failure
- urls - Handle redirects properly for IPv6 address by not splitting on
``:`` and rely on already parsed hostname and port values
- vmware_vm_facts - fix the support with regular ESXi
- vyos_interface fix https://github.com/ansible/ansible/pull/57169
- we don't really need to template vars on definition as we do this on
demand in templating.
- win_acl - Fix qualifier parser when using UNC paths -
- win_hostname - Fix non netbios compliant name handling
- winrm - Fix issue when attempting to parse CLIXML on send input failure
- xenserver_guest - fixed an issue where VM whould be powered off even
though check mode is used if reconfiguration requires VM to be powered
off.
- xenserver_guest - proper error message is shown when maximum number of
network interfaces is reached and multiple network interfaces are
added at
once.
- yum - Fix false error message about autoremove not being supported
- yum - fix failure when using ``update_cache`` standalone
- yum - handle special "_none_" value for proxy in yum.conf and .repo
files
Update to version 2.8.0
Major changes:
* Experimental support for Ansible Collections and content namespacing -
Ansible content can now be packaged in a collection and addressed via
namespaces. This allows for easier sharing, distribution, and
installation
of bundled modules/roles/plugins, and consistent rules for accessing
specific content via namespaces.
* Python interpreter discovery - The first time a Python module runs on
a target, Ansible will attempt to discover the proper default Python
interpreter to use for the target platform/version (instead of
immediately defaulting to /usr/bin/python). You can override this
behavior by setting ansible_python_interpreter or via config. (see
https://github.com/ansible/ansible/pull/50163)
* become - The deprecated CLI arguments for --sudo, --sudo-user,
--ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed,
in favor of the more generic --become, --become-user,
--become-method, and
--ask-become-pass.
* become - become functionality has been migrated to a plugin
architecture, to allow customization of become functionality and 3rd
party become methods (https://github.com/ansible/ansible/pull/50991)
- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837
For the full changelog see /usr/share/doc/packages/ansible/changelogs or
online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.
8.rst
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1858=1
Package List:
- openSUSE Backports SLE-15-SP1 (noarch):
ansible-2.8.1-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2018-16837.html
https://www.suse.com/security/cve/CVE-2018-16859.html
https://www.suse.com/security/cve/CVE-2018-16876.html
https://www.suse.com/security/cve/CVE-2019-3828.html
https://bugzilla.suse.com/1109957
https://bugzilla.suse.com/1112959
https://bugzilla.suse.com/1118896
https://bugzilla.suse.com/1126503
--
openSUSE-SU-2019:1859-1: important: Security update for znc
openSUSE Security Update: Security update for znc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1859-1
Rating: important
References: #1130360 #1138572
Cross-References: CVE-2019-12816 CVE-2019-9917
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for znc to version 1.7.4 fixes the following issues:
Security issues fixed:
- CVE-2019-12816: Fixed a remote code execution in Modules.cpp
(boo#1138572).
- CVE-2019-9917: Fixed a denial of service on invalid encoding
(boo#1130360).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1859=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
znc-1.7.4-bp151.4.3.1
znc-devel-1.7.4-bp151.4.3.1
znc-perl-1.7.4-bp151.4.3.1
znc-python3-1.7.4-bp151.4.3.1
znc-tcl-1.7.4-bp151.4.3.1
- openSUSE Backports SLE-15-SP1 (noarch):
znc-lang-1.7.4-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-12816.html
https://www.suse.com/security/cve/CVE-2019-9917.html
https://bugzilla.suse.com/1130360
https://bugzilla.suse.com/1138572
--
openSUSE-SU-2019:1861-1: moderate: Security update for phpMyAdmin
openSUSE Security Update: Security update for phpMyAdmin
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1861-1
Rating: moderate
References: #1137496 #1137497
Cross-References: CVE-2019-11768 CVE-2019-12616
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for phpMyAdmin fixes the following issues:
phpMyAdmin was updated to 4.9.0.1:
* Several issues with SYSTEM VERSIONING tables
* Fixed json encode error in export
* Fixed JavaScript events not activating on input (sql bookmark issue)
* Show Designer combo boxes when adding a constraint
* Fix edit view
* Fixed invalid default value for bit field
* Fix several errors relating to GIS data types
* Fixed javascript error PMA_messages is not defined
* Fixed import XML data with leading zeros
* Fixed php notice, added support for 'DELETE HISTORY' table privilege
(MariaDB >= 10.3.4)
* Fixed MySQL 8.0.0 issues with GIS display
* Fixed "Server charset" in "Database server" tab showing wrong information
* Fixed can not copy user on Percona Server 5.7
* Updated sql-parser to version 4.3.2, which fixes several parsing and
linting problems
- boo#1137497 / PMASA-2019-4 / CVE-2019-12616 / CWE-661: Fixed CSRF
vulnerability in login form
https://www.phpmyadmin.net/security/PMASA-2019-4/
- boo#1137496 / PMASA-2019-3 / CVE-2019-11768 / CWE-661: Fixed SQL
injection in Designer feature
https://www.phpmyadmin.net/security/PMASA-2019-3/
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1861=1
Package List:
- openSUSE Backports SLE-15-SP1 (noarch):
phpMyAdmin-4.9.0.1-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-11768.html
https://www.suse.com/security/cve/CVE-2019-12616.html
https://bugzilla.suse.com/1137496
https://bugzilla.suse.com/1137497
--
openSUSE-SU-2019:1870-1: important: Security update for proftpd
openSUSE Security Update: Security update for proftpd
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1870-1
Rating: important
References: #1142281
Cross-References: CVE-2017-7418 CVE-2019-12815
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for proftpd fixes the following issues:
Security issues fixed:
- CVE-2019-12815: Fixed arbitrary file copy in mod_copy that allowed for
remote code execution and information disclosure without authentication
(bnc#1142281).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1870=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
proftpd-1.3.5e-bp151.4.3.1
proftpd-devel-1.3.5e-bp151.4.3.1
proftpd-doc-1.3.5e-bp151.4.3.1
proftpd-ldap-1.3.5e-bp151.4.3.1
proftpd-mysql-1.3.5e-bp151.4.3.1
proftpd-pgsql-1.3.5e-bp151.4.3.1
proftpd-radius-1.3.5e-bp151.4.3.1
proftpd-sqlite-1.3.5e-bp151.4.3.1
- openSUSE Backports SLE-15-SP1 (noarch):
proftpd-lang-1.3.5e-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2017-7418.html
https://www.suse.com/security/cve/CVE-2019-12815.html
https://bugzilla.suse.com/1142281
--
openSUSE-SU-2019:1872-1: moderate: Security update for python-Django
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1872-1
Rating: moderate
References: #1136468 #1139945 #1142880 #1142882 #1142883
#1142885
Cross-References: CVE-2019-11358 CVE-2019-12308 CVE-2019-12781
CVE-2019-14232 CVE-2019-14233 CVE-2019-14234
CVE-2019-14235
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for python-Django fixes the following issues:
Security issues fixed:
- CVE-2019-11358: Fixed prototype pollution.
- CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468)
- CVE-2019-12781: Fixed incorrect HTTP detection with reverse-proxy
connecting via HTTPS (bsc#1139945).
- CVE-2019-14232: Fixed denial-of-service possibility in
``django.utils.text.Truncator`` (bsc#1142880).
- CVE-2019-14233: Fixed denial-of-service possibility in ``strip_tags()``
(bsc#1142882).
- CVE-2019-14234: Fixed SQL injection possibility in key and index lookups
for ``JSONField``/``HStoreField`` (bsc#1142883).
- CVE-2019-14235: Fixed potential memory exhaustion in
``django.utils.encoding.uri_to_iri()`` (bsc#1142885).
Non-security issues fixed:
- Fixed a migration crash on PostgreSQL when adding a check constraint
with a contains lookup on DateRangeField or DateTimeRangeField, if the
right hand side of an expression is the same type.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1872=1
Package List:
- openSUSE Backports SLE-15-SP1 (noarch):
python3-Django-2.2.4-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-11358.html
https://www.suse.com/security/cve/CVE-2019-12308.html
https://www.suse.com/security/cve/CVE-2019-12781.html
https://www.suse.com/security/cve/CVE-2019-14232.html
https://www.suse.com/security/cve/CVE-2019-14233.html
https://www.suse.com/security/cve/CVE-2019-14234.html
https://www.suse.com/security/cve/CVE-2019-14235.html
https://bugzilla.suse.com/1136468
https://bugzilla.suse.com/1139945
https://bugzilla.suse.com/1142880
https://bugzilla.suse.com/1142882
https://bugzilla.suse.com/1142883
https://bugzilla.suse.com/1142885
--
openSUSE-SU-2019:1876-1: moderate: Security update for mumble
openSUSE Security Update: Security update for mumble
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1876-1
Rating: moderate
References: #1123334
Cross-References: CVE-2018-20743
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mumble fixes the following issues:
CVE-2018-20743: murmur mishandled multiple concurrent requests that were
persisted in the database, which allowed remote attackers to cause a
denial of service (daemon hang or crash) via a message flood. (boo#1123334)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1876=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
mumble-1.2.19-bp151.6.3.1
mumble-server-1.2.19-bp151.6.3.1
- openSUSE Backports SLE-15-SP1 (aarch64_ilp32):
mumble-64bit-1.2.19-bp151.6.3.1
References:
https://www.suse.com/security/cve/CVE-2018-20743.html
https://bugzilla.suse.com/1123334
--
openSUSE-SU-2019:1880-1: moderate: Security update for live555
openSUSE Security Update: Security update for live555
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1880-1
Rating: moderate
References: #1121995 #1124159 #1127341
Cross-References: CVE-2019-7314 CVE-2019-9215
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for live555 fixes the following issues:
- CVE-2019-9215: Malformed headers could have lead to invalid memory
access in the parseAuthorizationHeader function. (boo#1127341)
- CVE-2019-7314: Mishandled termination of an RTSP stream after
RTP/RTCP-over-RTSP has been set up could have lead to a Use-After-Free
error causing the RTSP server to crash or possibly have unspecified
other impact. (boo#1124159)
- Update to version 2019.06.28,
- Convert to dynamic libraries (boo#1121995):
+ Use make ilinux-with-shared-libraries: build the dynamic libs instead
of the static one.
+ Use make install instead of a manual file copy script: this also
reveals that we missed quite a bit of code to be installed before.
+ Split out shared library packages according the SLPP.
- Use FAT LTO objects in order to provide proper static library.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1880=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
libBasicUsageEnvironment1-2019.06.28-bp151.3.3.1
libUsageEnvironment3-2019.06.28-bp151.3.3.1
libgroupsock8-2019.06.28-bp151.3.3.1
libliveMedia66-2019.06.28-bp151.3.3.1
live555-2019.06.28-bp151.3.3.1
live555-devel-2019.06.28-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-7314.html
https://www.suse.com/security/cve/CVE-2019-9215.html
https://bugzilla.suse.com/1121995
https://bugzilla.suse.com/1124159
https://bugzilla.suse.com/1127341
--
openSUSE-SU-2019:1891-1: moderate: Security update for libqb
openSUSE Security Update: Security update for libqb
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1891-1
Rating: moderate
References: #1137835
Cross-References: CVE-2019-12779
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libqb fixes the following issue:
Security issue fixed:
- CVE-2019-12779: Fixed an insecure treatment of IPC temporary files which
could have allowed a local attacker to overwrite privileged system files
(bsc#1137835).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1891=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
libqb-devel-1.0.3+20190326.a521604-bp151.2.3.1
libqb-tests-1.0.3+20190326.a521604-bp151.2.3.1
libqb-tools-1.0.3+20190326.a521604-bp151.2.3.1
libqb20-1.0.3+20190326.a521604-bp151.2.3.1
- openSUSE Backports SLE-15-SP1 (aarch64_ilp32):
libqb-devel-64bit-1.0.3+20190326.a521604-bp151.2.3.1
libqb20-64bit-1.0.3+20190326.a521604-bp151.2.3.1
References:
https://www.suse.com/security/cve/CVE-2019-12779.html
https://bugzilla.suse.com/1137835
--