SUSE 5149 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:1216-1: moderate: Security update for gnuplot
openSUSE-SU-2019:1217-1: important: Security update for openwsman



openSUSE-SU-2019:1216-1: moderate: Security update for gnuplot

openSUSE Security Update: Security update for gnuplot
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1216-1
Rating: moderate
References: #1117463 #1117464 #1117465
Cross-References: CVE-2018-19490 CVE-2018-19491 CVE-2018-19492

Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for gnuplot fixes the following issues:

Security issues fixed:

- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function
(bsc#1117463)
- CVE-2018-19491: Fixed a buffer overlow in the PS_options function
(bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the
df_generate_ascii_array_entry function (bsc#1117465)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1216=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

gnuplot-5.2.2-lp150.3.3.1
gnuplot-debuginfo-5.2.2-lp150.3.3.1
gnuplot-debugsource-5.2.2-lp150.3.3.1

- openSUSE Leap 15.0 (noarch):

gnuplot-doc-5.2.2-lp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-19490.html
https://www.suse.com/security/cve/CVE-2018-19491.html
https://www.suse.com/security/cve/CVE-2018-19492.html
https://bugzilla.suse.com/1117463
https://bugzilla.suse.com/1117464
https://bugzilla.suse.com/1117465

--


openSUSE-SU-2019:1217-1: important: Security update for openwsman

openSUSE Security Update: Security update for openwsman
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1217-1
Rating: important
References: #1092206 #1122623
Cross-References: CVE-2019-3816 CVE-2019-3833
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could
lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could
allow an attacker to trigger an infinite loop which leads to Denial of
Service (bsc#1122623).

Other issues addressed:

- Directory listing without authentication fixed (bsc#1092206).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1217=1



Package List:

- openSUSE Leap 42.3 (x86_64):

libwsman-devel-2.6.7-4.3.1
libwsman3-2.6.7-4.3.1
libwsman3-debuginfo-2.6.7-4.3.1
libwsman_clientpp-devel-2.6.7-4.3.1
libwsman_clientpp1-2.6.7-4.3.1
libwsman_clientpp1-debuginfo-2.6.7-4.3.1
openwsman-debugsource-2.6.7-4.3.1
openwsman-java-2.6.7-4.3.1
openwsman-perl-2.6.7-4.3.1
openwsman-perl-debuginfo-2.6.7-4.3.1
openwsman-python-2.6.7-4.3.1
openwsman-python-debuginfo-2.6.7-4.3.1
openwsman-ruby-2.6.7-4.3.1
openwsman-ruby-debuginfo-2.6.7-4.3.1
openwsman-ruby-docs-2.6.7-4.3.1
openwsman-server-2.6.7-4.3.1
openwsman-server-debuginfo-2.6.7-4.3.1
openwsman-server-plugin-ruby-2.6.7-4.3.1
openwsman-server-plugin-ruby-debuginfo-2.6.7-4.3.1
winrs-2.6.7-4.3.1


References:

https://www.suse.com/security/cve/CVE-2019-3816.html
https://www.suse.com/security/cve/CVE-2019-3833.html
https://bugzilla.suse.com/1092206
https://bugzilla.suse.com/1122623

--