openSUSE Security Update: Security update for tryton
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4248-1
Rating: moderate
References: #1107771 #1117105
Cross-References: CVE-2018-19443
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for tryton to version 4.2.19 fixes the following issues
(boo#1107771):
Security issue fixed:
- CVE-2018-19443: Fixed an information leakage by attemping to initiate an
unencrypted connection, which would fail eventually, but might leak
session information of the user (boo#1117105)
This update also contains newer versions of tryton related packages with
general bug fixes and updates:
- trytond 4.2.17
- trytond_account 4.2.10
- trytond_account_invoice 4.2.7
- trytond_currency 4.2.2
- trytond_purchase 4.2.6
- trytond_purchase_request 4.2.4
- trytond_stock 4.2.8
- trytond_stock_supply 4.2.3
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1587=1
Package List:
- openSUSE Leap 42.3 (noarch):
tryton-4.2.19-28.1
trytond-4.2.17-33.1
trytond_account-4.2.10-12.1
trytond_account_invoice-4.2.7-2.3.1
trytond_currency-4.2.2-6.1
trytond_purchase-4.2.6-9.1
trytond_purchase_request-4.2.4-9.1
trytond_stock-4.2.8-12.1
trytond_stock_supply-4.2.3-2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-19443.htmlhttps://bugzilla.suse.com/1107771https://bugzilla.suse.com/1117105
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for tryton
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4242-1
Rating: moderate
References: #1117105
Cross-References: CVE-2018-19443
Affected Products:
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for tryton to version 4.2.19 fixes the following issues:
Security issue fixed:
- CVE-2018-19443: Fixed an information leakage by attemping to initiate an
unencrypted connection, which would fail eventually, but might leak
session information of the user (boo#1117105)
This update also contains newer versions of tryton related packages with
general bug fixes and updates:
- trytond 4.2.17
- trytond_account 4.2.10
- trytond_account_invoice 4.2.7
- trytond_purchase_request 4.2.4
- trytond_stock 4.2.8
- trytond_stock_supply 4.2.3
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1588=1
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1588=1
Package List:
- openSUSE Leap 15.0 (noarch):
tryton-4.2.19-lp150.2.10.1
trytond-4.2.17-lp150.2.15.1
trytond_account-4.2.10-lp150.2.3.1
trytond_account_invoice-4.2.7-lp150.2.3.1
trytond_purchase_request-4.2.4-lp150.2.3.1
trytond_stock-4.2.8-lp150.2.3.1
trytond_stock_supply-4.2.3-lp150.2.7.1
- openSUSE Backports SLE-15 (noarch):
tryton-4.2.19-bp150.2.6.1
trytond-4.2.17-bp150.2.6.1
trytond_account-4.2.10-bp150.3.3.1
trytond_account_invoice-4.2.7-bp150.3.3.1
trytond_purchase_request-4.2.4-bp150.3.3.1
trytond_stock-4.2.8-bp150.3.3.1
trytond_stock_supply-4.2.3-bp150.3.6.1
References:
https://www.suse.com/security/cve/CVE-2018-19443.htmlhttps://bugzilla.suse.com/1117105
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ovmf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4240-1
Rating: moderate
References: #1115916 #1115917 #1117998
Cross-References: CVE-2017-5731 CVE-2017-5732 CVE-2017-5733
CVE-2017-5734 CVE-2017-5735 CVE-2018-3613
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for ovmf fixes the following issues:
Security issues fixed:
- CVE-2018-3613: Fixed AuthVariable Timestamp zeroing issue on
APPEND_WRITE (bsc#1115916).
- CVE-2017-5731: Fixed privilege escalation via processing of malformed
files in TianoCompress.c (bsc#1115917).
- CVE-2017-5732: Fixed privilege escalation via processing of malformed
files in BaseUefiDecompressLib.c (bsc#1115917).
- CVE-2017-5733: Fixed privilege escalation via heap-based buffer overflow
in MakeTable() function (bsc#1115917).
- CVE-2017-5734: Fixed privilege escalation via stack-based buffer
overflow in MakeTable() function (bsc#1115917).
- CVE-2017-5735: Fixed privilege escalation via heap-based buffer overflow
in Decode() function (bsc#1115917).
Non security issues fixed:
- Fixed an issue with the default owner of PK/KEK/db/dbx and make the
auto-enrollment only happen at the very first time. (bsc#1117998)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1590=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
ovmf-2017+git1510945757.b2662641d5-lp150.4.9.1
ovmf-tools-2017+git1510945757.b2662641d5-lp150.4.9.1
- openSUSE Leap 15.0 (x86_64):
qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp150.4.9.1
- openSUSE Leap 15.0 (noarch):
qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp150.4.9.1
qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp150.4.9.1
References:
https://www.suse.com/security/cve/CVE-2017-5731.htmlhttps://www.suse.com/security/cve/CVE-2017-5732.htmlhttps://www.suse.com/security/cve/CVE-2017-5733.htmlhttps://www.suse.com/security/cve/CVE-2017-5734.htmlhttps://www.suse.com/security/cve/CVE-2017-5735.htmlhttps://www.suse.com/security/cve/CVE-2018-3613.htmlhttps://bugzilla.suse.com/1115916https://bugzilla.suse.com/1115917https://bugzilla.suse.com/1117998
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for keepalived
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4213-1
Rating: moderate
References: #1015141 #1069468 #949238
Cross-References: CVE-2018-19044 CVE-2018-19045 CVE-2018-19046
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for keepalived to version 2.0.10 fixes the following issues:
Security issues fixed (bsc#1015141):
- CVE-2018-19044: Fixed a check for pathnames with symlinks when writing
data to a temporary file upon a call to PrintData or PrintStats
- CVE-2018-19045: Fixed mode when creating new temporary files upon a call
to PrintData or PrintStats
- CVE-2018-19046: Fixed a check for existing plain files when writing data
to a temporary file upon a call to PrintData or PrintStats
Non-security issues fixed:
- Replace references to /var/adm/fillup-templates with new %_fillupdir
macro (boo#1069468)
- Use getaddrinfo instead of gethostbyname to workaround glibc
gethostbyname function buffer overflow (bsc#949238)
For the full list of changes refer to:
http://www.keepalived.org/changelog.html
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-1575=1
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):
keepalived-2.0.10-6.1
References:
https://www.suse.com/security/cve/CVE-2018-19044.htmlhttps://www.suse.com/security/cve/CVE-2018-19045.htmlhttps://www.suse.com/security/cve/CVE-2018-19046.htmlhttps://bugzilla.suse.com/1015141https://bugzilla.suse.com/1069468https://bugzilla.suse.com/949238
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for keepalived
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4212-1
Rating: moderate
References: #1015141 #1069468 #949238
Cross-References: CVE-2018-19044 CVE-2018-19045 CVE-2018-19046
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for keepalived to version 2.0.10 fixes the following issues:
Security issues fixed (bsc#1015141):
- CVE-2018-19044: Fixed a check for pathnames with symlinks when writing
data to a temporary file upon a call to PrintData or PrintStats
- CVE-2018-19045: Fixed mode when creating new temporary files upon a call
to PrintData or PrintStats
- CVE-2018-19046: Fixed a check for existing plain files when writing data
to a temporary file upon a call to PrintData or PrintStats
Non-security issues fixed:
- Replace references to /var/adm/fillup-templates with new %_fillupdir
macro (boo#1069468)
- Use getaddrinfo instead of gethostbyname to workaround glibc
gethostbyname function buffer overflow (bsc#949238)
For the full list of changes refer to:
http://www.keepalived.org/changelog.html
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1575=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1575=1
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1575=1
Package List:
- openSUSE Leap 42.3 (x86_64):
keepalived-2.0.10-7.3.1
keepalived-debuginfo-2.0.10-7.3.1
keepalived-debugsource-2.0.10-7.3.1
- openSUSE Leap 15.0 (x86_64):
keepalived-2.0.10-lp150.3.4.1
keepalived-debuginfo-2.0.10-lp150.3.4.1
keepalived-debugsource-2.0.10-lp150.3.4.1
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
keepalived-2.0.10-bp150.3.4.1
References:
https://www.suse.com/security/cve/CVE-2018-19044.htmlhttps://www.suse.com/security/cve/CVE-2018-19045.htmlhttps://www.suse.com/security/cve/CVE-2018-19046.htmlhttps://bugzilla.suse.com/1015141https://bugzilla.suse.com/1069468https://bugzilla.suse.com/949238
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for salt
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4197-1
Rating: moderate
References: #1104491 #1107333 #1108557 #1108834 #1108995
#1109893 #1110938 #1112874 #1113698 #1113699
#1113784 #1114197 #1114824
Cross-References: CVE-2018-15750 CVE-2018-15751
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves two vulnerabilities and has 11 fixes
is now available.
Description:
This update for salt fixes the following issues:
- Crontab module fix: file attributes option missing (boo#1114824)
- Fix git_pillar merging across multiple __env__ repositories (boo#1112874)
- Bugfix: unable to detect os arch when RPM is not installed (boo#1114197)
- Fix LDAP authentication issue when a valid token is generated by the
salt-api even when invalid user credentials are passed. (U#48901)
- Improved handling of LDAP group id. gid is no longer treated as a
string, which could have lead to faulty group creations. (boo#1113784)
- Fix remote command execution and incorrect access control when using
salt-api. (boo#1113699) (CVE-2018-15751)
- Fix Directory traversal vulnerability when using salt-api. Allows an
attacker to determine what files exist on a server when querying /run or
/events. (boo#1113698) (CVE-2018-15750)
- Add multi-file support and globbing to the filetree (U#50018)
- Bugfix: supportconfig non-root permission issues (U#50095)
- Open profiles permissions to everyone for read-only
- Preserving signature in "module.run" state (U#50049)
- Install default salt-support profiles
- Remove unit test, came from a wrong branch. Fix merging failure.
- Add CPE_NAME for osversion* grain parsing
- Get os_family for RPM distros from the RPM macros
- Install support profiles
- Fix async call to process manager (boo#1110938)
- Salt-based supportconfig implementation (technology preview)
- Bugfix: any unicode string of length 16 will raise TypeError
- Fix IPv6 scope (boo#1108557)
- Handle zypper ZYPPER_EXIT_NO_REPOS exit code (boo#1108834, boo#1109893)
- Bugfix for pkg_resources crash (boo#1104491)
- Fix loosen azure sdk dependencies in azurearm cloud driver (boo#1107333)
- Fix broken "resolve_capabilities" on Python 3 (boo#1108995)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1574=1
Package List:
- openSUSE Leap 42.3 (noarch):
salt-bash-completion-2018.3.0-23.1
salt-fish-completion-2018.3.0-23.1
salt-zsh-completion-2018.3.0-23.1
- openSUSE Leap 42.3 (x86_64):
python2-salt-2018.3.0-23.1
python3-salt-2018.3.0-23.1
salt-2018.3.0-23.1
salt-api-2018.3.0-23.1
salt-cloud-2018.3.0-23.1
salt-doc-2018.3.0-23.1
salt-master-2018.3.0-23.1
salt-minion-2018.3.0-23.1
salt-proxy-2018.3.0-23.1
salt-ssh-2018.3.0-23.1
salt-syndic-2018.3.0-23.1
References:
https://www.suse.com/security/cve/CVE-2018-15750.htmlhttps://www.suse.com/security/cve/CVE-2018-15751.htmlhttps://bugzilla.suse.com/1104491https://bugzilla.suse.com/1107333https://bugzilla.suse.com/1108557https://bugzilla.suse.com/1108834https://bugzilla.suse.com/1108995https://bugzilla.suse.com/1109893https://bugzilla.suse.com/1110938https://bugzilla.suse.com/1112874https://bugzilla.suse.com/1113698https://bugzilla.suse.com/1113699https://bugzilla.suse.com/1113784https://bugzilla.suse.com/1114197https://bugzilla.suse.com/1114824
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for go1.11
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4181-1
Rating: important
References: #1098017 #1113978 #1118897 #1118898 #1118899
#1119634 #1119706
Cross-References: CVE-2018-16873 CVE-2018-16874 CVE-2018-16875
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves three vulnerabilities and has four
fixes is now available.
Description:
This new package for go1.11 fixes the following issues:
Security issues fixed:
- CVE-2018-16873: Fixed a remote code execution in go get, when executed
with the -u flag (bsc#1118897)
- CVE-2018-16874: Fixed an arbitrary filesystem write in go get, which
could lead to code execution (bsc#1118898)
- CVE-2018-16875: Fixed a Denial of Service in the crypto/x509 package
during certificate chain validation(bsc#1118899)
Non-security issues fixed:
- Fixed build error with PIE linker flags on ppc64le (bsc#1113978
bsc#1098017)
- Make profile.d/go.sh no longer set GOROOT=, in order to make switching
between versions no longer break. This ends up removing the need for
go.sh entirely (because GOPATH is also set automatically) (bsc#1119634)
The following tracked regression fix is included:
- Fix a regression that broke go get for import path patterns containing
"..." (bsc#1119706)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1572=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1572=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
go1.11-1.11.4-2.1
go1.11-doc-1.11.4-2.1
- openSUSE Leap 42.3 (x86_64):
go1.11-race-1.11.4-2.1
- openSUSE Leap 15.0 (x86_64):
go1.11-1.11.4-lp150.2.1
go1.11-doc-1.11.4-lp150.2.1
go1.11-race-1.11.4-lp150.2.1
References:
https://www.suse.com/security/cve/CVE-2018-16873.htmlhttps://www.suse.com/security/cve/CVE-2018-16874.htmlhttps://www.suse.com/security/cve/CVE-2018-16875.htmlhttps://bugzilla.suse.com/1098017https://bugzilla.suse.com/1113978https://bugzilla.suse.com/1118897https://bugzilla.suse.com/1118898https://bugzilla.suse.com/1118899https://bugzilla.suse.com/1119634https://bugzilla.suse.com/1119706
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4177-1
Rating: moderate
References: #1114157 #1114169 #1114170 #1116592
Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644
CVE-2018-16855
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for pdns-recursor fixes the following issues:
Security issues fixed:
- CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
- CVE-2018-14644: Fixed denial of service via crafted query for meta-types
(bsc#1114170).
- CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
- CVE-2018-16855: Fixed case where a crafted query could cause a denial of
service (bsc#1116592)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1570=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
pdns-recursor-4.1.2-bp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-10851.htmlhttps://www.suse.com/security/cve/CVE-2018-14626.htmlhttps://www.suse.com/security/cve/CVE-2018-14644.htmlhttps://www.suse.com/security/cve/CVE-2018-16855.htmlhttps://bugzilla.suse.com/1114157https://bugzilla.suse.com/1114169https://bugzilla.suse.com/1114170https://bugzilla.suse.com/1116592
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for pdns
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4175-1
Rating: moderate
References: #1114157 #1114169
Cross-References: CVE-2018-10851 CVE-2018-14626
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for pdns fixes the following issues:
Security issues fixed:
- CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
- CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1571=1
Package List:
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
pdns-4.1.2-bp150.2.3.1
pdns-backend-geoip-4.1.2-bp150.2.3.1
pdns-backend-godbc-4.1.2-bp150.2.3.1
pdns-backend-ldap-4.1.2-bp150.2.3.1
pdns-backend-lua-4.1.2-bp150.2.3.1
pdns-backend-mydns-4.1.2-bp150.2.3.1
pdns-backend-mysql-4.1.2-bp150.2.3.1
pdns-backend-postgresql-4.1.2-bp150.2.3.1
pdns-backend-remote-4.1.2-bp150.2.3.1
pdns-backend-sqlite3-4.1.2-bp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-10851.htmlhttps://www.suse.com/security/cve/CVE-2018-14626.htmlhttps://bugzilla.suse.com/1114157https://bugzilla.suse.com/1114169
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for salt
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4174-1
Rating: important
References: #1110938 #1112874 #1113698 #1113699 #1113784
#1114197 #1114824
Cross-References: CVE-2018-15750 CVE-2018-15751
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves two vulnerabilities and has 5 fixes
is now available.
Description:
This update for salt fixes the following issues:
Security issues fixed:
- CVE-2018-15750: Fixed directory traversal vulnerability in salt-api
(bsc#1113698).
- CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi)
that allows to execute arbitrary commands (bsc#1113699).
Non-security issues fixed:
- Improved handling of LDAP group id. gid is no longer treated as a
string, which could have lead to faulty group creations (bsc#1113784).
- Fixed async call to process manager (bsc#1110938)
- Fixed OS arch detection when RPM is not installed (bsc#1114197)
- Crontab module fix: file attributes option missing (bsc#1114824)
- Fix git_pillar merging across multiple __env__ repositories (bsc#1112874)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1569=1
Package List:
- openSUSE Leap 15.0 (x86_64):
python2-salt-2018.3.0-lp150.3.17.1
python3-salt-2018.3.0-lp150.3.17.1
salt-2018.3.0-lp150.3.17.1
salt-api-2018.3.0-lp150.3.17.1
salt-cloud-2018.3.0-lp150.3.17.1
salt-doc-2018.3.0-lp150.3.17.1
salt-master-2018.3.0-lp150.3.17.1
salt-minion-2018.3.0-lp150.3.17.1
salt-proxy-2018.3.0-lp150.3.17.1
salt-ssh-2018.3.0-lp150.3.17.1
salt-syndic-2018.3.0-lp150.3.17.1
- openSUSE Leap 15.0 (noarch):
salt-bash-completion-2018.3.0-lp150.3.17.1
salt-fish-completion-2018.3.0-lp150.3.17.1
salt-zsh-completion-2018.3.0-lp150.3.17.1
References:
https://www.suse.com/security/cve/CVE-2018-15750.htmlhttps://www.suse.com/security/cve/CVE-2018-15751.htmlhttps://bugzilla.suse.com/1110938https://bugzilla.suse.com/1112874https://bugzilla.suse.com/1113698https://bugzilla.suse.com/1113699https://bugzilla.suse.com/1113784https://bugzilla.suse.com/1114197https://bugzilla.suse.com/1114824
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org