The following updates has been released for openSUSE:
openSUSE-SU-2019:1621-1: moderate: Security update for docker
openSUSE-SU-2019:1623-1: moderate: Security update for GraphicsMagick
openSUSE-SU-2019:1624-1: moderate: Security update for aubio
openSUSE-SU-2019:1621-1: moderate: Security update for docker
openSUSE-SU-2019:1623-1: moderate: Security update for GraphicsMagick
openSUSE-SU-2019:1624-1: moderate: Security update for aubio
openSUSE-SU-2019:1621-1: moderate: Security update for docker
openSUSE Security Update: Security update for docker
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1621-1
Rating: moderate
References: #1096726
Cross-References: CVE-2018-15664
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for docker fixes the following issues:
Security issue fixed:
- CVE-2018-15664: Fixed an issue which could make docker cp vulnerable to
symlink-exchange race attacks (bsc#1096726).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1621=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1621=1
Package List:
- openSUSE Leap 15.1 (x86_64):
docker-18.09.6_ce-lp151.2.6.1
docker-debuginfo-18.09.6_ce-lp151.2.6.1
docker-debugsource-18.09.6_ce-lp151.2.6.1
docker-test-18.09.6_ce-lp151.2.6.1
docker-test-debuginfo-18.09.6_ce-lp151.2.6.1
- openSUSE Leap 15.1 (noarch):
docker-bash-completion-18.09.6_ce-lp151.2.6.1
docker-zsh-completion-18.09.6_ce-lp151.2.6.1
- openSUSE Leap 15.0 (x86_64):
docker-18.09.6_ce-lp150.5.20.1
docker-debuginfo-18.09.6_ce-lp150.5.20.1
docker-debugsource-18.09.6_ce-lp150.5.20.1
docker-test-18.09.6_ce-lp150.5.20.1
docker-test-debuginfo-18.09.6_ce-lp150.5.20.1
- openSUSE Leap 15.0 (noarch):
docker-bash-completion-18.09.6_ce-lp150.5.20.1
docker-zsh-completion-18.09.6_ce-lp150.5.20.1
References:
https://www.suse.com/security/cve/CVE-2018-15664.html
https://bugzilla.suse.com/1096726
--
openSUSE-SU-2019:1623-1: moderate: Security update for GraphicsMagick
openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1623-1
Rating: moderate
References: #1138425
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for GraphicsMagick fixes the following issues:
- disable indirect reads that disclosed file contents from the local
system (boo#1138425)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1623=1
Package List:
- openSUSE Backports SLE-15 (x86_64):
GraphicsMagick-1.3.29-bp150.2.27.1
GraphicsMagick-devel-1.3.29-bp150.2.27.1
libGraphicsMagick++-Q16-12-1.3.29-bp150.2.27.1
libGraphicsMagick++-devel-1.3.29-bp150.2.27.1
libGraphicsMagick-Q16-3-1.3.29-bp150.2.27.1
libGraphicsMagick3-config-1.3.29-bp150.2.27.1
libGraphicsMagickWand-Q16-2-1.3.29-bp150.2.27.1
perl-GraphicsMagick-1.3.29-bp150.2.27.1
References:
https://bugzilla.suse.com/1138425
--
openSUSE-SU-2019:1624-1: moderate: Security update for aubio
openSUSE Security Update: Security update for aubio
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1624-1
Rating: moderate
References: #1137822 #1137823 #1137828
Cross-References: CVE-2018-19800 CVE-2018-19801 CVE-2018-19802
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for aubio fixes the following issues:
Fixed security issues leading to buffer overflows or segfaults
(CVE-2018-19800, boo#1137828, CVE-2018-19801, boo#1137822, CVE-2018-19802,
boo#1137823):
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1624=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
python-aubio-debugsource-0.4.6-bp150.3.12.1
python2-aubio-0.4.6-bp150.3.12.1
python2-aubio-debuginfo-0.4.6-bp150.3.12.1
python3-aubio-0.4.6-bp150.3.12.1
python3-aubio-debuginfo-0.4.6-bp150.3.12.1
- openSUSE Backports SLE-15 (x86_64):
aubio-tools-0.4.6-bp150.3.12.1
libaubio-devel-0.4.6-bp150.3.12.1
libaubio5-0.4.6-bp150.3.12.1
References:
https://www.suse.com/security/cve/CVE-2018-19800.html
https://www.suse.com/security/cve/CVE-2018-19801.html
https://www.suse.com/security/cve/CVE-2018-19802.html
https://bugzilla.suse.com/1137822
https://bugzilla.suse.com/1137823
https://bugzilla.suse.com/1137828
--