openSUSE Security Update: Security update for cups
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4105-1
Rating: important
References: #1115750
Cross-References: CVE-2018-4700
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for cups fixes the following issues:
Security issue fixed:
- CVE-2018-4700: Fixed extremely predictable cookie generation that is
effectively breaking the CSRF protection of the CUPS web interface
(bsc#1115750).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1539=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
cups-2.2.7-lp150.2.6.1
cups-client-2.2.7-lp150.2.6.1
cups-client-debuginfo-2.2.7-lp150.2.6.1
cups-config-2.2.7-lp150.2.6.1
cups-ddk-2.2.7-lp150.2.6.1
cups-ddk-debuginfo-2.2.7-lp150.2.6.1
cups-debuginfo-2.2.7-lp150.2.6.1
cups-debugsource-2.2.7-lp150.2.6.1
cups-devel-2.2.7-lp150.2.6.1
libcups2-2.2.7-lp150.2.6.1
libcups2-debuginfo-2.2.7-lp150.2.6.1
libcupscgi1-2.2.7-lp150.2.6.1
libcupscgi1-debuginfo-2.2.7-lp150.2.6.1
libcupsimage2-2.2.7-lp150.2.6.1
libcupsimage2-debuginfo-2.2.7-lp150.2.6.1
libcupsmime1-2.2.7-lp150.2.6.1
libcupsmime1-debuginfo-2.2.7-lp150.2.6.1
libcupsppdc1-2.2.7-lp150.2.6.1
libcupsppdc1-debuginfo-2.2.7-lp150.2.6.1
- openSUSE Leap 15.0 (x86_64):
cups-devel-32bit-2.2.7-lp150.2.6.1
libcups2-32bit-2.2.7-lp150.2.6.1
libcups2-32bit-debuginfo-2.2.7-lp150.2.6.1
libcupscgi1-32bit-2.2.7-lp150.2.6.1
libcupscgi1-32bit-debuginfo-2.2.7-lp150.2.6.1
libcupsimage2-32bit-2.2.7-lp150.2.6.1
libcupsimage2-32bit-debuginfo-2.2.7-lp150.2.6.1
libcupsmime1-32bit-2.2.7-lp150.2.6.1
libcupsmime1-32bit-debuginfo-2.2.7-lp150.2.6.1
libcupsppdc1-32bit-2.2.7-lp150.2.6.1
libcupsppdc1-32bit-debuginfo-2.2.7-lp150.2.6.1
References:
https://www.suse.com/security/cve/CVE-2018-4700.htmlhttps://bugzilla.suse.com/1115750
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for compat-openssl098
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4104-1
Rating: moderate
References: #1104789 #1110018 #1113534 #1113652
Cross-References: CVE-2016-8610 CVE-2018-0734 CVE-2018-5407
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for compat-openssl098 fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation
(bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack
defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string
(bsc#1110018).
- Fixed the "One and Done" side-channel attack on RSA (bsc#1104789).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1529=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
compat-openssl098-debugsource-0.9.8j-27.1
libopenssl0_9_8-0.9.8j-27.1
libopenssl0_9_8-debuginfo-0.9.8j-27.1
- openSUSE Leap 42.3 (x86_64):
libopenssl0_9_8-32bit-0.9.8j-27.1
libopenssl0_9_8-debuginfo-32bit-0.9.8j-27.1
References:
https://www.suse.com/security/cve/CVE-2016-8610.htmlhttps://www.suse.com/security/cve/CVE-2018-0734.htmlhttps://www.suse.com/security/cve/CVE-2018-5407.htmlhttps://bugzilla.suse.com/1104789https://bugzilla.suse.com/1110018https://bugzilla.suse.com/1113534https://bugzilla.suse.com/1113652
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for pdns
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4073-1
Rating: moderate
References: #1114157 #1114169
Cross-References: CVE-2018-10851 CVE-2018-14626
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for pdns fixes the following issues:
Security issues fixed:
- CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
- CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-1525=1
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):
pdns-4.1.5-14.1
pdns-backend-godbc-4.1.5-14.1
pdns-backend-godbc-debuginfo-4.1.5-14.1
pdns-backend-ldap-4.1.5-14.1
pdns-backend-ldap-debuginfo-4.1.5-14.1
pdns-backend-lua-4.1.5-14.1
pdns-backend-lua-debuginfo-4.1.5-14.1
pdns-backend-mydns-4.1.5-14.1
pdns-backend-mydns-debuginfo-4.1.5-14.1
pdns-backend-mysql-4.1.5-14.1
pdns-backend-mysql-debuginfo-4.1.5-14.1
pdns-backend-postgresql-4.1.5-14.1
pdns-backend-postgresql-debuginfo-4.1.5-14.1
pdns-backend-remote-4.1.5-14.1
pdns-backend-remote-debuginfo-4.1.5-14.1
pdns-backend-sqlite3-4.1.5-14.1
pdns-backend-sqlite3-debuginfo-4.1.5-14.1
pdns-debuginfo-4.1.5-14.1
pdns-debugsource-4.1.5-14.1
References:
https://www.suse.com/security/cve/CVE-2018-10851.htmlhttps://www.suse.com/security/cve/CVE-2018-14626.htmlhttps://bugzilla.suse.com/1114157https://bugzilla.suse.com/1114169
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4062-1
Rating: moderate
References: #1089814 #1114157 #1114169 #1114170 #1116592
Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644
CVE-2018-16855
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for pdns-recursor to version 4.1.8 fixes the following issues:
Security issues fixed:
- CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
- CVE-2018-14644: Fixed denial of service via crafted query for meta-types
(bsc#1114170).
- CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
- CVE-2018-16855: Fixed case where a crafted query could cause a denial of
service (bsc#1116592)
Non-security issues fixed:
- Fixed build failure with Boost 1.67.0 (bsc#1089814).
- Revert ‘Keep the EDNS status of a server on FormErr with EDNS’
- Refuse queries for all meta-types
For more details about this update, refer to:
https://blog.powerdns.com/2018/11/26/powerdns-recursor-4-1-8-released/
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-1524=1
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):
pdns-recursor-4.1.8-13.1
pdns-recursor-debuginfo-4.1.8-13.1
pdns-recursor-debugsource-4.1.8-13.1
References:
https://www.suse.com/security/cve/CVE-2018-10851.htmlhttps://www.suse.com/security/cve/CVE-2018-14626.htmlhttps://www.suse.com/security/cve/CVE-2018-14644.htmlhttps://www.suse.com/security/cve/CVE-2018-16855.htmlhttps://bugzilla.suse.com/1089814https://bugzilla.suse.com/1114157https://bugzilla.suse.com/1114169https://bugzilla.suse.com/1114170https://bugzilla.suse.com/1116592
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ncurses
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4055-1
Rating: important
References: #1103320 #1115929
Cross-References: CVE-2018-19211
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for ncurses fixes the following issues:
Security issue fixed:
- CVE-2018-19211: Fixed denial of service issue that was triggered by a
NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
Non-security issue fixed:
- Remove scree.xterm from terminfo data base as with this screen uses
fallback TERM=screen (bsc#1103320).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1516=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libncurses5-6.1-lp150.4.3.1
libncurses5-debuginfo-6.1-lp150.4.3.1
libncurses6-6.1-lp150.4.3.1
libncurses6-debuginfo-6.1-lp150.4.3.1
ncurses-debugsource-6.1-lp150.4.3.1
ncurses-devel-6.1-lp150.4.3.1
ncurses-devel-debuginfo-6.1-lp150.4.3.1
ncurses-utils-6.1-lp150.4.3.1
ncurses-utils-debuginfo-6.1-lp150.4.3.1
ncurses5-devel-6.1-lp150.4.3.1
tack-6.1-lp150.4.3.1
tack-debuginfo-6.1-lp150.4.3.1
terminfo-6.1-lp150.4.3.1
terminfo-base-6.1-lp150.4.3.1
terminfo-iterm-6.1-lp150.4.3.1
terminfo-screen-6.1-lp150.4.3.1
- openSUSE Leap 15.0 (x86_64):
libncurses5-32bit-6.1-lp150.4.3.1
libncurses5-32bit-debuginfo-6.1-lp150.4.3.1
libncurses6-32bit-6.1-lp150.4.3.1
libncurses6-32bit-debuginfo-6.1-lp150.4.3.1
ncurses-devel-32bit-6.1-lp150.4.3.1
ncurses-devel-32bit-debuginfo-6.1-lp150.4.3.1
ncurses5-devel-32bit-6.1-lp150.4.3.1
References:
https://www.suse.com/security/cve/CVE-2018-19211.htmlhttps://bugzilla.suse.com/1103320https://bugzilla.suse.com/1115929
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4054-1
Rating: moderate
References: #1057246 #1113064 #1117463
Cross-References: CVE-2018-18544
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for ImageMagick fixes the following issues:
Security issues fixed:
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage
(bsc#1113064).
Non-security issues fixed:
- Improve import documentation (bsc#1057246).
- Allow override system security policy (bsc#1117463).
- asan_build: build ASAN included
- debug_build: build more suitable for debugging
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1520=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
ImageMagick-6.8.8.1-79.1
ImageMagick-debuginfo-6.8.8.1-79.1
ImageMagick-debugsource-6.8.8.1-79.1
ImageMagick-devel-6.8.8.1-79.1
ImageMagick-extra-6.8.8.1-79.1
ImageMagick-extra-debuginfo-6.8.8.1-79.1
libMagick++-6_Q16-3-6.8.8.1-79.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-79.1
libMagick++-devel-6.8.8.1-79.1
libMagickCore-6_Q16-1-6.8.8.1-79.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-79.1
libMagickWand-6_Q16-1-6.8.8.1-79.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-79.1
perl-PerlMagick-6.8.8.1-79.1
perl-PerlMagick-debuginfo-6.8.8.1-79.1
- openSUSE Leap 42.3 (noarch):
ImageMagick-doc-6.8.8.1-79.1
- openSUSE Leap 42.3 (x86_64):
ImageMagick-devel-32bit-6.8.8.1-79.1
libMagick++-6_Q16-3-32bit-6.8.8.1-79.1
libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-79.1
libMagick++-devel-32bit-6.8.8.1-79.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-79.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-79.1
libMagickWand-6_Q16-1-32bit-6.8.8.1-79.1
libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-79.1
References:
https://www.suse.com/security/cve/CVE-2018-18544.htmlhttps://bugzilla.suse.com/1057246https://bugzilla.suse.com/1113064https://bugzilla.suse.com/1117463
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for tiff
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4053-1
Rating: moderate
References: #1017693 #1054594 #1115717 #990460
Cross-References: CVE-2016-10092 CVE-2016-10093 CVE-2016-10094
CVE-2016-6223 CVE-2017-12944 CVE-2018-19210
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for tiff fixes the following issues:
Security issues fixed:
- CVE-2018-19210: Fixed NULL pointer dereference in the
TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2017-12944: Fixed denial of service issue in the
TIFFReadDirEntryArray function (bsc#1054594).
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc
function (bsc#1017693).
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy
function (bsc#1017693).
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits
function (bsc#1017693).
- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in
TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1522=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libtiff-devel-4.0.9-lp150.4.12.1
libtiff5-4.0.9-lp150.4.12.1
libtiff5-debuginfo-4.0.9-lp150.4.12.1
tiff-4.0.9-lp150.4.12.1
tiff-debuginfo-4.0.9-lp150.4.12.1
tiff-debugsource-4.0.9-lp150.4.12.1
- openSUSE Leap 15.0 (x86_64):
libtiff-devel-32bit-4.0.9-lp150.4.12.1
libtiff5-32bit-4.0.9-lp150.4.12.1
libtiff5-32bit-debuginfo-4.0.9-lp150.4.12.1
References:
https://www.suse.com/security/cve/CVE-2016-10092.htmlhttps://www.suse.com/security/cve/CVE-2016-10093.htmlhttps://www.suse.com/security/cve/CVE-2016-10094.htmlhttps://www.suse.com/security/cve/CVE-2016-6223.htmlhttps://www.suse.com/security/cve/CVE-2017-12944.htmlhttps://www.suse.com/security/cve/CVE-2018-19210.htmlhttps://bugzilla.suse.com/1017693https://bugzilla.suse.com/1054594https://bugzilla.suse.com/1115717https://bugzilla.suse.com/990460
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for libgit2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4051-1
Rating: important
References: #1110949 #1114729
Cross-References: CVE-2018-17456
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for libgit2 fixes the following issues:
Security issue fixed:
- CVE-2018-17456: Submodule URLs and paths with a leading "-" are now
ignored to avoid injecting options into library consumers that perform
recursive clones (bsc#1110949).
Non-security issues fixed:
- Version update to version 0.26.8 (bsc#1114729).
- Full changelog can be found at:
* https://github.com/libgit2/libgit2/releases/tag/v0.26.8
* https://github.com/libgit2/libgit2/releases/tag/v0.26.7
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1517=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libgit2-26-0.26.8-lp150.2.6.1
libgit2-26-debuginfo-0.26.8-lp150.2.6.1
libgit2-debugsource-0.26.8-lp150.2.6.1
libgit2-devel-0.26.8-lp150.2.6.1
- openSUSE Leap 15.0 (x86_64):
libgit2-26-32bit-0.26.8-lp150.2.6.1
libgit2-26-32bit-debuginfo-0.26.8-lp150.2.6.1
References:
https://www.suse.com/security/cve/CVE-2018-17456.htmlhttps://bugzilla.suse.com/1110949https://bugzilla.suse.com/1114729
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for openssl-1_0_0
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4050-1
Rating: moderate
References: #1100078 #1112209 #1113534 #1113652 #1113742
Cross-References: CVE-2018-0734 CVE-2018-5407
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves two vulnerabilities and has three
fixes is now available.
Description:
This update for openssl-1_0_0 fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation
(bsc#1113652).
- CVE-2018-5407: Added elliptic curve scalar multiplication timing attack
defenses that fixes "PortSmash" (bsc#1113534).
Non-security issues fixed:
- Added missing timing side channel patch for DSA signature generation
(bsc#1113742).
- Set TLS version to 0 in msg_callback for record messages to avoid
confusing applications (bsc#1100078).
- Fixed infinite loop in DSA generation with incorrect parameters
(bsc#1112209)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1518=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libopenssl-1_0_0-devel-1.0.2p-lp150.2.9.1
libopenssl1_0_0-1.0.2p-lp150.2.9.1
libopenssl1_0_0-debuginfo-1.0.2p-lp150.2.9.1
libopenssl1_0_0-hmac-1.0.2p-lp150.2.9.1
libopenssl1_0_0-steam-1.0.2p-lp150.2.9.1
libopenssl1_0_0-steam-debuginfo-1.0.2p-lp150.2.9.1
openssl-1_0_0-1.0.2p-lp150.2.9.1
openssl-1_0_0-cavs-1.0.2p-lp150.2.9.1
openssl-1_0_0-cavs-debuginfo-1.0.2p-lp150.2.9.1
openssl-1_0_0-debuginfo-1.0.2p-lp150.2.9.1
openssl-1_0_0-debugsource-1.0.2p-lp150.2.9.1
- openSUSE Leap 15.0 (noarch):
openssl-1_0_0-doc-1.0.2p-lp150.2.9.1
- openSUSE Leap 15.0 (x86_64):
libopenssl-1_0_0-devel-32bit-1.0.2p-lp150.2.9.1
libopenssl1_0_0-32bit-1.0.2p-lp150.2.9.1
libopenssl1_0_0-32bit-debuginfo-1.0.2p-lp150.2.9.1
libopenssl1_0_0-hmac-32bit-1.0.2p-lp150.2.9.1
libopenssl1_0_0-steam-32bit-1.0.2p-lp150.2.9.1
libopenssl1_0_0-steam-32bit-debuginfo-1.0.2p-lp150.2.9.1
References:
https://www.suse.com/security/cve/CVE-2018-0734.htmlhttps://www.suse.com/security/cve/CVE-2018-5407.htmlhttps://bugzilla.suse.com/1100078https://bugzilla.suse.com/1112209https://bugzilla.suse.com/1113534https://bugzilla.suse.com/1113652https://bugzilla.suse.com/1113742
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org