openSUSE Security Update: Security update for python-azure-agent
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0261-1
Rating: moderate
References: #1127838
Cross-References: CVE-2019-0804
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-azure-agent fixes the following issues:
python-azure-agent was updated to version 2.2.45 (jsc#ECO-80)
+ Add support for Gen2 VM resource disks
+ Use alternate systemd detection
+ Fix /proc/net/route requirement that causes errors on FreeBSD
+ Add cloud-init auto-detect to prevent multiple provisioning mechanisms
from relying on configuration for coordination
+ Disable cgroups when daemon is setup incorrectly
+ Remove upgrade extension loop for the same goal state
+ Add container id for extension telemetry events
+ Be more exact when detecting IMDS service health
+ Changing add_event to start sending missing fields
From 2.2.44 update:
+ Remove outdated extension ZIP packages
+ Improved error handling when starting extensions using systemd
+ Reduce provisioning time of some custom images
+ Improve the handling of extension download errors
+ New API for extension authors to handle errors during extension update
+ Fix handling of errors in calls to openssl
+ Improve logic to determine current distro
+ Reduce verbosity of several logging statements
From 2.2.42 update:
+ Poll for artifact blob, addresses goal state procesing issue
From 2.2.41 update:
+ Rewriting the mechanism to start the extension using systemd-run for
systems using systemd for managing
+ Refactoring of resource monitoring framework using cgroup for both
systemd and non-systemd approaches [#1530, #1534]
+ Telemetry pipeline for resource monitoring data
From 2.2.40 update:
+ Fixed tracking of memory/cpu usage
+ Do not prevent extensions from running if setting up cgroups fails
+ Enable systemd-aware deprovisioning on all versions >= 18.04
+ Add systemd support for Debian Jessie, Stretch, and Buster
+ Support for Linux Openwrt
From 2.2.38 update:
Security issue fixed:
+ CVE-2019-0804: An issue with swapfile handling in the agent creates a
data leak situation that exposes system memory data. (bsc#1127838)
+ Add fixes for handling swap file and other nit fixes
From 2.2.37 update:
+ Improves re-try logic to handle errors while downloading extensions
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-261=1
Package List:
- openSUSE Leap 15.1 (noarch):
python-azure-agent-2.2.45-lp151.2.3.1
python-azure-agent-test-2.2.45-lp151.2.3.1
References:
https://www.suse.com/security/cve/CVE-2019-0804.htmlhttps://bugzilla.suse.com/1127838
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for libsolv, libzypp, zypper
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0255-1
Rating: moderate
References: #1135114 #1154804 #1154805 #1155198 #1155205
#1155298 #1155678 #1155819 #1156158 #1157377
#1158763
Cross-References: CVE-2019-18900
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves one vulnerability and has 10 fixes is
now available.
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
Security issue fixed:
- CVE-2019-18900: Fixed assert cookie file that was world readable
(bsc#1158763).
Bug fixes
- Fixed removing orphaned packages dropped by to-be-installed products
(bsc#1155819).
- Adds libzypp API to mark all obsolete kernels according to the existing
purge-kernel script rules (bsc#1155198).
- Do not enforce 'en' being in RequestedLocales If the user decides to
have a system without explicit language support he may do so
(bsc#1155678).
- Load only target resolvables for zypper rm (bsc#1157377).
- Fix broken search by filelist (bsc#1135114).
- Replace python by a bash script in zypper-log (fixes#304, fixes#306,
bsc#1156158).
- Do not sort out requested locales which are not available (bsc#1155678).
- Prevent listing duplicate matches in tables. XML result is provided
within the new list-patches-byissue element (bsc#1154805).
- XML add patch issue-date and issue-list (bsc#1154805).
- Fix zypper lp --cve/bugzilla/issue options (bsc#1155298).
- Always execute commit when adding/removing locales (fixes bsc#1155205).
- Fix description of --table-style,-s in man page (bsc#1154804).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-255=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
libsolv-debuginfo-0.7.10-lp151.2.10.1
libsolv-debugsource-0.7.10-lp151.2.10.1
libsolv-demo-0.7.10-lp151.2.10.1
libsolv-demo-debuginfo-0.7.10-lp151.2.10.1
libsolv-devel-0.7.10-lp151.2.10.1
libsolv-devel-debuginfo-0.7.10-lp151.2.10.1
libsolv-tools-0.7.10-lp151.2.10.1
libsolv-tools-debuginfo-0.7.10-lp151.2.10.1
libzypp-17.19.0-lp151.2.10.1
libzypp-debuginfo-17.19.0-lp151.2.10.1
libzypp-debugsource-17.19.0-lp151.2.10.1
libzypp-devel-17.19.0-lp151.2.10.1
libzypp-devel-doc-17.19.0-lp151.2.10.1
perl-solv-0.7.10-lp151.2.10.1
perl-solv-debuginfo-0.7.10-lp151.2.10.1
python-solv-0.7.10-lp151.2.10.1
python-solv-debuginfo-0.7.10-lp151.2.10.1
python3-solv-0.7.10-lp151.2.10.1
python3-solv-debuginfo-0.7.10-lp151.2.10.1
ruby-solv-0.7.10-lp151.2.10.1
ruby-solv-debuginfo-0.7.10-lp151.2.10.1
zypper-1.14.33-lp151.2.10.1
zypper-debuginfo-1.14.33-lp151.2.10.1
zypper-debugsource-1.14.33-lp151.2.10.1
- openSUSE Leap 15.1 (noarch):
zypper-aptitude-1.14.33-lp151.2.10.1
zypper-log-1.14.33-lp151.2.10.1
zypper-needs-restarting-1.14.33-lp151.2.10.1
References:
https://www.suse.com/security/cve/CVE-2019-18900.htmlhttps://bugzilla.suse.com/1135114https://bugzilla.suse.com/1154804https://bugzilla.suse.com/1154805https://bugzilla.suse.com/1155198https://bugzilla.suse.com/1155205https://bugzilla.suse.com/1155298https://bugzilla.suse.com/1155678https://bugzilla.suse.com/1155819https://bugzilla.suse.com/1156158https://bugzilla.suse.com/1157377https://bugzilla.suse.com/1158763
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for yast2-rmt
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0253-1
Rating: moderate
References: #1119835
Cross-References: CVE-2018-20105
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for yast2-rmt fixes the following issues:
yast2-rmt was updated to release version 1.2.2:
- CVE-2018-20105: Pass SSL password to Cheetah CLI interface securely
(boo#1119835)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-253=1
Package List:
- openSUSE Leap 15.1 (noarch):
yast2-rmt-1.2.2-lp151.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-20105.htmlhttps://bugzilla.suse.com/1119835
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for enigmail
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0250-1
Rating: moderate
References: #1159973
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for enigmail fixes the following issues:
enigmail was updated to 2.1.5:
* Security issue: unsigned MIME parts displayed as signed (bsc#1159973)
* Ensure that upgrading GnuPG 2.0.x to 2.2.x upgrade converts keyring
format
* Make Enigmail Compatible with Protected-Headers spec, draft 2
enigmail 2.1.4:
* Fixes for UI glitches
* Option to "Attach public key to messages" was not restored properly
enigmail 2.1.3:
* fix a bug in the setup wizard that could lead the wizard to never
complete scanning the inbox
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-250=1
Package List:
- openSUSE Leap 15.1 (x86_64):
enigmail-2.1.5-lp151.2.9.1
References:
https://bugzilla.suse.com/1159973
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0259-1
Rating: important
References: #1163484 #1163588 #1164828
Cross-References: CVE-2020-6407 CVE-2020-6418
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for chromium fixes the following issues:
Chromium was updated to version 80.0.3987.122 (bsc#1164828).
Security issues fixed:
- CVE-2020-6418: Fixed a type confusion in V8 (bsc#1164828).
- CVE-2020-6407: Fixed an OOB memory access in streams (bsc#1164828).
- Fixed an integer overflow in ICU (bsc#1164828).
Non-security issues fixed:
- Dropped the sandbox binary as it should not be needed anymore
(bsc#1163588).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-259=1
Package List:
- openSUSE Leap 15.1 (x86_64):
chromedriver-80.0.3987.122-lp151.2.66.1
chromedriver-debuginfo-80.0.3987.122-lp151.2.66.1
chromium-80.0.3987.122-lp151.2.66.1
chromium-debuginfo-80.0.3987.122-lp151.2.66.1
chromium-debugsource-80.0.3987.122-lp151.2.66.1
References:
https://www.suse.com/security/cve/CVE-2020-6407.htmlhttps://www.suse.com/security/cve/CVE-2020-6418.htmlhttps://bugzilla.suse.com/1163484https://bugzilla.suse.com/1163588https://bugzilla.suse.com/1164828
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ipmitool
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0247-1
Rating: important
References: #1163026
Cross-References: CVE-2020-5208
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for ipmitool fixes the following security issue:
- CVE-2020-5208: Fixed several buffer overflows (bsc#1163026).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-247=1
Package List:
- openSUSE Leap 15.1 (x86_64):
ipmitool-1.8.18-lp151.4.3.1
ipmitool-debuginfo-1.8.18-lp151.4.3.1
ipmitool-debugsource-1.8.18-lp151.4.3.1
- openSUSE Leap 15.1 (noarch):
ipmitool-bmc-snmp-proxy-1.8.18-lp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2020-5208.htmlhttps://bugzilla.suse.com/1163026
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0245-1
Rating: important
References: #1163484 #1163588 #1164828
Cross-References: CVE-2020-6407 CVE-2020-6418
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for chromium fixes the following issues:
Chromium was updated to version 80.0.3987.122 (bsc#1164828).
Security issues fixed:
- CVE-2020-6418: Fixed a type confusion in V8 (bsc#1164828).
- CVE-2020-6407: Fixed an OOB memory access in streams (bsc#1164828).
- Fixed an integer overflow in ICU (bsc#1164828).
Non-security issues fixed:
- Dropped the sandbox binary as it should not be needed anymore
(bsc#1163588).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2020-245=1
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 x86_64):
chromedriver-80.0.3987.122-34.1
chromium-80.0.3987.122-34.1
References:
https://www.suse.com/security/cve/CVE-2020-6407.htmlhttps://www.suse.com/security/cve/CVE-2020-6418.htmlhttps://bugzilla.suse.com/1163484https://bugzilla.suse.com/1163588https://bugzilla.suse.com/1164828
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for sudo
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0244-1
Rating: important
References: #1162202 #1162675
Cross-References: CVE-2019-18634
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for sudo fixes the following issues:
Security issue fixed:
- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that
could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).
Non-security issue fixed:
- Fixed an issue where sudo -l would ask for a password even though
`listpw` was set to `never` (bsc#1162675).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-244=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
sudo-1.8.22-lp151.5.6.1
sudo-debuginfo-1.8.22-lp151.5.6.1
sudo-debugsource-1.8.22-lp151.5.6.1
sudo-devel-1.8.22-lp151.5.6.1
sudo-test-1.8.22-lp151.5.6.1
References:
https://www.suse.com/security/cve/CVE-2019-18634.htmlhttps://bugzilla.suse.com/1162202https://bugzilla.suse.com/1162675
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for inn
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0242-1
Rating: moderate
References: #1154302
Cross-References: CVE-2019-3692
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for inn fixes the following issues:
- CVE-2019-3692: Fixed a local privilage escalation from user to 'news'
(bsc#1154302).
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-242=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
inn-2.5.4-bp151.4.3.1
inn-devel-2.5.4-bp151.4.3.1
mininews-2.5.4-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-3692.htmlhttps://bugzilla.suse.com/1154302
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org