The following updates has been released for openSUSE:
openSUSE-SU-2019:1216-1: moderate: Security update for gnuplot
openSUSE-SU-2019:1217-1: important: Security update for openwsman
openSUSE-SU-2019:1216-1: moderate: Security update for gnuplot
openSUSE-SU-2019:1217-1: important: Security update for openwsman
openSUSE-SU-2019:1216-1: moderate: Security update for gnuplot
openSUSE Security Update: Security update for gnuplot
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1216-1
Rating: moderate
References: #1117463 #1117464 #1117465
Cross-References: CVE-2018-19490 CVE-2018-19491 CVE-2018-19492
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for gnuplot fixes the following issues:
Security issues fixed:
- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function
(bsc#1117463)
- CVE-2018-19491: Fixed a buffer overlow in the PS_options function
(bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the
df_generate_ascii_array_entry function (bsc#1117465)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1216=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
gnuplot-5.2.2-lp150.3.3.1
gnuplot-debuginfo-5.2.2-lp150.3.3.1
gnuplot-debugsource-5.2.2-lp150.3.3.1
- openSUSE Leap 15.0 (noarch):
gnuplot-doc-5.2.2-lp150.3.3.1
References:
https://www.suse.com/security/cve/CVE-2018-19490.html
https://www.suse.com/security/cve/CVE-2018-19491.html
https://www.suse.com/security/cve/CVE-2018-19492.html
https://bugzilla.suse.com/1117463
https://bugzilla.suse.com/1117464
https://bugzilla.suse.com/1117465
--
openSUSE-SU-2019:1217-1: important: Security update for openwsman
openSUSE Security Update: Security update for openwsman
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1217-1
Rating: important
References: #1092206 #1122623
Cross-References: CVE-2019-3816 CVE-2019-3833
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for openwsman fixes the following issues:
Security issues fixed:
- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could
lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could
allow an attacker to trigger an infinite loop which leads to Denial of
Service (bsc#1122623).
Other issues addressed:
- Directory listing without authentication fixed (bsc#1092206).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1217=1
Package List:
- openSUSE Leap 42.3 (x86_64):
libwsman-devel-2.6.7-4.3.1
libwsman3-2.6.7-4.3.1
libwsman3-debuginfo-2.6.7-4.3.1
libwsman_clientpp-devel-2.6.7-4.3.1
libwsman_clientpp1-2.6.7-4.3.1
libwsman_clientpp1-debuginfo-2.6.7-4.3.1
openwsman-debugsource-2.6.7-4.3.1
openwsman-java-2.6.7-4.3.1
openwsman-perl-2.6.7-4.3.1
openwsman-perl-debuginfo-2.6.7-4.3.1
openwsman-python-2.6.7-4.3.1
openwsman-python-debuginfo-2.6.7-4.3.1
openwsman-ruby-2.6.7-4.3.1
openwsman-ruby-debuginfo-2.6.7-4.3.1
openwsman-ruby-docs-2.6.7-4.3.1
openwsman-server-2.6.7-4.3.1
openwsman-server-debuginfo-2.6.7-4.3.1
openwsman-server-plugin-ruby-2.6.7-4.3.1
openwsman-server-plugin-ruby-debuginfo-2.6.7-4.3.1
winrs-2.6.7-4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-3816.html
https://www.suse.com/security/cve/CVE-2019-3833.html
https://bugzilla.suse.com/1092206
https://bugzilla.suse.com/1122623
--