The following updates has been released for openSUSE:
openSUSE-SU-2019:1526-1: moderate: Security update for axis
openSUSE-SU-2019:1527-1: important: Security update for rmt-server
openSUSE-SU-2019:1528-1: moderate: Security update for evolution
openSUSE-SU-2019:1529-1: moderate: Security update for gnome-shell
openSUSE-SU-2019:1530-1: Security update for libpng16
openSUSE-SU-2019:1526-1: moderate: Security update for axis
openSUSE-SU-2019:1527-1: important: Security update for rmt-server
openSUSE-SU-2019:1528-1: moderate: Security update for evolution
openSUSE-SU-2019:1529-1: moderate: Security update for gnome-shell
openSUSE-SU-2019:1530-1: Security update for libpng16
openSUSE-SU-2019:1526-1: moderate: Security update for axis
openSUSE Security Update: Security update for axis
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1526-1
Rating: moderate
References: #1134598
Cross-References: CVE-2012-5784 CVE-2014-3596
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for axis fixes the following issues:
Security issue fixed:
- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check
against X.509 certificate name (bsc#1134598).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1526=1
Package List:
- openSUSE Leap 42.3 (noarch):
axis-1.4-300.1
axis-javadoc-1.4-300.1
axis-manual-1.4-300.1
References:
https://www.suse.com/security/cve/CVE-2012-5784.html
https://www.suse.com/security/cve/CVE-2014-3596.html
https://bugzilla.suse.com/1134598
--
openSUSE-SU-2019:1527-1: important: Security update for rmt-server
openSUSE Security Update: Security update for rmt-server
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1527-1
Rating: important
References: #1107806 #1117722 #1118745 #1125770 #1128858
#1129271 #1129392 #1132160 #1132690 #1134190
#1134428 #1135222
Cross-References: CVE-2019-11068 CVE-2019-5419
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves two vulnerabilities and has 10 fixes
is now available.
Description:
This update for rmt-server to version 2.1.4 fixes the following issues:
- Fix duplicate nginx location in rmt-server-pubcloud (bsc#1135222)
- Mirror additional repos that were enabled during mirroring (bsc#1132690)
- Make service IDs consistent across different RMT instances (bsc#1134428)
- Make SMT data import scripts faster (bsc#1134190)
- Fix incorrect triggering of registration sharing (bsc#1129392)
- Fix license mirroring issue in some non-SUSE repositories (bsc#1128858)
- Set CURLOPT_LOW_SPEED_LIMIT to prevent downloads from getting stuck
(bsc#1107806)
- Truncate the RMT lockfile when writing a new PID (bsc#1125770)
- Fix missing trailing slashes on custom repository import from SMT
(bsc#1118745)
- Zypper authentication plugin (fate#326629)
- Instance verification plugin in rmt-server-pubcloud (fate#326629)
- Update dependencies to fix vulnerabilities in rails (CVE-2019-5419,
bsc#1129271) and nokogiri (CVE-2019-11068, bsc#1132160)
- Allow RMT registration to work under HTTP as well as HTTPS.
- Offline migration from SLE 15 to SLE 15 SP1 will add Python2 module
- Online migrations will automatically add additional modules to the
client systems depending on the base product
- Supply log severity to journald
- Breaking Change: Added headers to generated CSV files
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1527=1
Package List:
- openSUSE Leap 15.0 (x86_64):
rmt-server-2.1.4-lp150.2.16.1
rmt-server-debuginfo-2.1.4-lp150.2.16.1
rmt-server-pubcloud-2.1.4-lp150.2.16.1
References:
https://www.suse.com/security/cve/CVE-2019-11068.html
https://www.suse.com/security/cve/CVE-2019-5419.html
https://bugzilla.suse.com/1107806
https://bugzilla.suse.com/1117722
https://bugzilla.suse.com/1118745
https://bugzilla.suse.com/1125770
https://bugzilla.suse.com/1128858
https://bugzilla.suse.com/1129271
https://bugzilla.suse.com/1129392
https://bugzilla.suse.com/1132160
https://bugzilla.suse.com/1132690
https://bugzilla.suse.com/1134190
https://bugzilla.suse.com/1134428
https://bugzilla.suse.com/1135222
--
openSUSE-SU-2019:1528-1: moderate: Security update for evolution
openSUSE Security Update: Security update for evolution
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1528-1
Rating: moderate
References: #1125230
Cross-References: CVE-2018-15587
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for evolution fixes the following issue:
Security issue fixed:
- CVE-2018-15587: Fixed OpenPGP signatures spoofing via specially crafted
email that contains a valid signature (bsc#1125230).
This update was imported from the SUSE:SLE-12-SP3:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1528=1
Package List:
- openSUSE Leap 42.3 (x86_64):
evolution-3.22.6-5.9.1
evolution-debuginfo-3.22.6-5.9.1
evolution-debugsource-3.22.6-5.9.1
evolution-devel-3.22.6-5.9.1
evolution-plugin-bogofilter-3.22.6-5.9.1
evolution-plugin-bogofilter-debuginfo-3.22.6-5.9.1
evolution-plugin-pst-import-3.22.6-5.9.1
evolution-plugin-pst-import-debuginfo-3.22.6-5.9.1
evolution-plugin-spamassassin-3.22.6-5.9.1
evolution-plugin-spamassassin-debuginfo-3.22.6-5.9.1
glade-catalog-evolution-3.22.6-5.9.1
glade-catalog-evolution-debuginfo-3.22.6-5.9.1
- openSUSE Leap 42.3 (noarch):
evolution-lang-3.22.6-5.9.1
References:
https://www.suse.com/security/cve/CVE-2018-15587.html
https://bugzilla.suse.com/1125230
--
openSUSE-SU-2019:1529-1: moderate: Security update for gnome-shell
openSUSE Security Update: Security update for gnome-shell
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1529-1
Rating: moderate
References: #1124493
Cross-References: CVE-2019-3820
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for gnome-shell fixes the following issues:
Security issue fixed:
- CVE-2019-3820: Fixed a partial lock screen bypass (bsc#1124493).
Fixed bugs:
- Remove sessionList of endSessionDialog for security reasons
(jsc#SLE-6660).
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1529=1
Package List:
- openSUSE Leap 42.3 (x86_64):
gnome-shell-3.20.4-22.1
gnome-shell-browser-plugin-3.20.4-22.1
gnome-shell-browser-plugin-debuginfo-3.20.4-22.1
gnome-shell-calendar-3.20.4-22.1
gnome-shell-calendar-debuginfo-3.20.4-22.1
gnome-shell-debuginfo-3.20.4-22.1
gnome-shell-debugsource-3.20.4-22.1
gnome-shell-devel-3.20.4-22.1
- openSUSE Leap 42.3 (noarch):
gnome-shell-lang-3.20.4-22.1
References:
https://www.suse.com/security/cve/CVE-2019-3820.html
https://bugzilla.suse.com/1124493
--
openSUSE-SU-2019:1530-1: Security update for libpng16
openSUSE Security Update: Security update for libpng16
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1530-1
Rating: low
References: #1100687 #1121624 #1124211
Cross-References: CVE-2018-13785 CVE-2019-7317
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for libpng16 fixes the following issues:
Security issues fixed:
- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2018-13785: Fixed a wrong calculation of row_factor in the
png_check_chunk_length function in pngrutil.c, which could haved
triggered and integer overflow and result in an divide-by-zero while
processing a crafted PNG file, leading to a denial of service
(bsc#1100687)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1530=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1530=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
libpng16-16-1.6.34-lp151.3.3.1
libpng16-16-debuginfo-1.6.34-lp151.3.3.1
libpng16-compat-devel-1.6.34-lp151.3.3.1
libpng16-debugsource-1.6.34-lp151.3.3.1
libpng16-devel-1.6.34-lp151.3.3.1
libpng16-tools-1.6.34-lp151.3.3.1
libpng16-tools-debuginfo-1.6.34-lp151.3.3.1
- openSUSE Leap 15.1 (x86_64):
libpng16-16-32bit-1.6.34-lp151.3.3.1
libpng16-16-32bit-debuginfo-1.6.34-lp151.3.3.1
libpng16-compat-devel-32bit-1.6.34-lp151.3.3.1
libpng16-devel-32bit-1.6.34-lp151.3.3.1
- openSUSE Leap 15.0 (i586 x86_64):
libpng16-16-1.6.34-lp150.2.3.1
libpng16-16-debuginfo-1.6.34-lp150.2.3.1
libpng16-compat-devel-1.6.34-lp150.2.3.1
libpng16-debugsource-1.6.34-lp150.2.3.1
libpng16-devel-1.6.34-lp150.2.3.1
libpng16-tools-1.6.34-lp150.2.3.1
libpng16-tools-debuginfo-1.6.34-lp150.2.3.1
- openSUSE Leap 15.0 (x86_64):
libpng16-16-32bit-1.6.34-lp150.2.3.1
libpng16-16-32bit-debuginfo-1.6.34-lp150.2.3.1
libpng16-compat-devel-32bit-1.6.34-lp150.2.3.1
libpng16-devel-32bit-1.6.34-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-13785.html
https://www.suse.com/security/cve/CVE-2019-7317.html
https://bugzilla.suse.com/1100687
https://bugzilla.suse.com/1121624
https://bugzilla.suse.com/1124211
--