The following updates has been released for openSUSE:
openSUSE-SU-2019:1049-1: moderate: Security update for aubio
openSUSE-SU-2019:1050-1: moderate: Security update for blueman
openSUSE-SU-2019:1051-1: moderate: Security update for kauth
openSUSE-SU-2019:1049-1: moderate: Security update for aubio
openSUSE-SU-2019:1050-1: moderate: Security update for blueman
openSUSE-SU-2019:1051-1: moderate: Security update for kauth
openSUSE-SU-2019:1049-1: moderate: Security update for aubio
openSUSE Security Update: Security update for aubio
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1049-1
Rating: moderate
References: #1102359 #1102364
Cross-References: CVE-2018-14522 CVE-2018-14523
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for aubio fixes the following issues:
- CVE-2018-14522: Fixed a crash in aubio_pitch_set_unit (bsc#1102359)
- CVE-2018-14523: Fixed a buffer overrread resulting in crash or
information leakage in new_aubio_pitchyinfft (bsc#1102364)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1049=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
aubio-debugsource-0.4.1-bp150.3.6.1
aubio-tools-0.4.1-bp150.3.6.1
aubio-tools-debuginfo-0.4.1-bp150.3.6.1
libaubio-devel-0.4.1-bp150.3.6.1
libaubio4-0.4.1-bp150.3.6.1
libaubio4-debuginfo-0.4.1-bp150.3.6.1
- openSUSE Backports SLE-15 (aarch64_ilp32):
libaubio4-64bit-0.4.1-bp150.3.6.1
libaubio4-64bit-debuginfo-0.4.1-bp150.3.6.1
References:
https://www.suse.com/security/cve/CVE-2018-14522.html
https://www.suse.com/security/cve/CVE-2018-14523.html
https://bugzilla.suse.com/1102359
https://bugzilla.suse.com/1102364
--
openSUSE-SU-2019:1050-1: moderate: Security update for blueman
openSUSE Security Update: Security update for blueman
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1050-1
Rating: moderate
References: #1083066
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for blueman fixes the following issues:
The following security issue was addressed:
- Fixed the polkit authorization checks in blueman, which previously
allowed any user with access to the D-Bus system bus to trigger certain
network configuration logic in blueman without authentication
(boo#1083066).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1050=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
blueman-2.0.6-bp150.2.3.1
- openSUSE Backports SLE-15 (noarch):
blueman-lang-2.0.6-bp150.2.3.1
thunar-sendto-blueman-2.0.6-bp150.2.3.1
References:
https://bugzilla.suse.com/1083066
--
openSUSE-SU-2019:1051-1: moderate: Security update for kauth
openSUSE Security Update: Security update for kauth
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1051-1
Rating: moderate
References: #1124863
Cross-References: CVE-2019-7443
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for kauth fixes the following issues:
Security issue fixed:
- CVE-2019-7443: Fixed an insecure handling of arguments in helpers by
removing the support of passing gui variants (bsc#1124863).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1051=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
kauth-debugsource-5.32.0-bp150.3.10.1
kauth-devel-5.32.0-bp150.3.10.1
kcoreaddons-5.32.0-bp150.3.3.1
kcoreaddons-debugsource-5.32.0-bp150.3.3.1
kcoreaddons-devel-5.32.0-bp150.3.3.1
kcoreaddons-devel-debuginfo-5.32.0-bp150.3.3.1
libKF5Auth5-5.32.0-bp150.3.10.1
libKF5Auth5-debuginfo-5.32.0-bp150.3.10.1
libKF5CoreAddons5-5.32.0-bp150.3.3.1
libKF5CoreAddons5-debuginfo-5.32.0-bp150.3.3.1
libpolkit-qt5-1-1-0.112.0-bp150.3.3.1
libpolkit-qt5-1-devel-0.112.0-bp150.3.3.1
- openSUSE Backports SLE-15 (aarch64_ilp32):
kauth-devel-64bit-5.32.0-bp150.3.10.1
kcoreaddons-devel-64bit-5.32.0-bp150.3.3.1
kcoreaddons-devel-64bit-debuginfo-5.32.0-bp150.3.3.1
libKF5Auth5-64bit-5.32.0-bp150.3.10.1
libKF5Auth5-64bit-debuginfo-5.32.0-bp150.3.10.1
libKF5CoreAddons5-64bit-5.32.0-bp150.3.3.1
libKF5CoreAddons5-64bit-debuginfo-5.32.0-bp150.3.3.1
libpolkit-qt5-1-1-64bit-0.112.0-bp150.3.3.1
libpolkit-qt5-1-devel-64bit-0.112.0-bp150.3.3.1
- openSUSE Backports SLE-15 (noarch):
kcoreaddons-lang-5.32.0-bp150.3.3.1
libKF5Auth5-lang-5.32.0-bp150.3.10.1
References:
https://www.suse.com/security/cve/CVE-2019-7443.html
https://bugzilla.suse.com/1124863
--