openSUSE Security Update: Security update for claws-mail
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1116-1
Rating: moderate
References: #1174457
Cross-References: CVE-2020-15917
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for claws-mail fixes the following issues:
- CVE-2020-15917: Fixed an improper handling of suffix data after STARTTLS
is mishandled (boo#1174457).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-1116=1
Package List:
- openSUSE Leap 15.1 (noarch):
claws-mail-lang-3.17.3-lp151.2.3.1
- openSUSE Leap 15.1 (x86_64):
claws-mail-3.17.3-lp151.2.3.1
claws-mail-debuginfo-3.17.3-lp151.2.3.1
claws-mail-debugsource-3.17.3-lp151.2.3.1
claws-mail-devel-3.17.3-lp151.2.3.1
References:
https://www.suse.com/security/cve/CVE-2020-15917.htmlhttps://bugzilla.suse.com/1174457
openSUSE Recommended Update: Recommended update for go1.12
______________________________________________________________________________
Announcement ID: openSUSE-RU-2020:1114-1
Rating: low
References: #1169832
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for go1.12 fixes the following issues:
- Fix for an issue when installing on Raspberry Pi causes illegal
instruction due to unproper ARM arch set. (bsc#1169832)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-1114=1
Package List:
- openSUSE Leap 15.1 (x86_64):
go1.12-1.12.17-lp151.2.37.1
go1.12-doc-1.12.17-lp151.2.37.1
go1.12-race-1.12.17-lp151.2.37.1
References:
https://bugzilla.suse.com/1169832
openSUSE Recommended Update: Recommended update for nodejs12
______________________________________________________________________________
Announcement ID: openSUSE-RU-2020:1115-1
Rating: moderate
References: #1173653
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for nodejs12 fixes the following issues:
- Fixes reported memory leak. (bsc#1173653)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-1115=1
Package List:
- openSUSE Leap 15.2 (x86_64):
nodejs12-12.18.2-lp152.3.3.1
nodejs12-debuginfo-12.18.2-lp152.3.3.1
nodejs12-debugsource-12.18.2-lp152.3.3.1
nodejs12-devel-12.18.2-lp152.3.3.1
npm12-12.18.2-lp152.3.3.1
- openSUSE Leap 15.2 (noarch):
nodejs12-docs-12.18.2-lp152.3.3.1
References:
https://bugzilla.suse.com/1173653
openSUSE Recommended Update: Recommended update for go1.12
______________________________________________________________________________
Announcement ID: openSUSE-RU-2020:1113-1
Rating: moderate
References: #1170826
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for go1.12 fixes the following issues:
- Add 'binutils-gold' as a dependency for arm and aarch64 architectures.
(bsc#1170826)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-1113=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
go1.12-1.12.17-lp152.3.3.1
go1.12-doc-1.12.17-lp152.3.3.1
- openSUSE Leap 15.2 (x86_64):
go1.12-race-1.12.17-lp152.3.3.1
References:
https://bugzilla.suse.com/1170826
openSUSE Security Update: Security update for knot
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1112-1
Rating: moderate
References: #1047841
Cross-References: CVE-2017-11104
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for knot fixes the following issues:
- CVE-2017-11104: Fixed an improper implementation of TSIG protocol which
could have allowed an attacker with a valid key name and algorithm to
bypass TSIG authentication (boo#1047841).
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-1112=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
knot-1.6.8-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2017-11104.htmlhttps://bugzilla.suse.com/1047841
openSUSE Security Update: Security update for tomcat
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1111-1
Rating: important
References: #1174117 #1174121
Cross-References: CVE-2020-13934 CVE-2020-13935
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for tomcat fixes the following issues:
- Fixed CVEs:
* CVE-2020-13934 (bsc#1174121)
* CVE-2020-13935 (bsc#1174117)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-1111=1
Package List:
- openSUSE Leap 15.2 (noarch):
tomcat-9.0.36-lp152.2.4.1
tomcat-admin-webapps-9.0.36-lp152.2.4.1
tomcat-docs-webapp-9.0.36-lp152.2.4.1
tomcat-el-3_0-api-9.0.36-lp152.2.4.1
tomcat-embed-9.0.36-lp152.2.4.1
tomcat-javadoc-9.0.36-lp152.2.4.1
tomcat-jsp-2_3-api-9.0.36-lp152.2.4.1
tomcat-jsvc-9.0.36-lp152.2.4.1
tomcat-lib-9.0.36-lp152.2.4.1
tomcat-servlet-4_0-api-9.0.36-lp152.2.4.1
tomcat-webapps-9.0.36-lp152.2.4.1
References:
https://www.suse.com/security/cve/CVE-2020-13934.htmlhttps://www.suse.com/security/cve/CVE-2020-13935.htmlhttps://bugzilla.suse.com/1174117https://bugzilla.suse.com/1174121
openSUSE Recommended Update: Recommended update for libsolv, libzypp
______________________________________________________________________________
Announcement ID: openSUSE-RU-2020:1109-1
Rating: moderate
References: #1170801 #1171224 #1172135 #1173106 #1174011
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that has 5 recommended fixes can now be installed.
Description:
This update for libsolv, libzypp fixes the following issues:
libsolv was updated to version 0.7.14:
- Enable zstd compression support for sle15
- Support blacklisted packages in solver_findproblemrule() (bsc#1172135)
- Support rules with multiple negative literals in choice rule generation
libzypp was updated to version 17.24.0:
- Enable zchunk metadata download if libsolv supports it.
- Older kernel-devel packages are not properly purged (bsc#1171224)
- doc: enhance service plugin example.
- Fix core dump with corrupted history file (bsc#1170801)
- Better handling of the purge-kernels algorithm. (bsc#1173106)
- Proactively send credentials if the URL specifes '?auth=basic' and a
username. (bsc#1174011)
- ZYPP_MEDIA_CURL_DEBUG: Strip credentials in header log. (bsc#1174011)
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-1109=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
libsolv-debuginfo-0.7.14-lp151.2.19.1
libsolv-debugsource-0.7.14-lp151.2.19.1
libsolv-demo-0.7.14-lp151.2.19.1
libsolv-demo-debuginfo-0.7.14-lp151.2.19.1
libsolv-devel-0.7.14-lp151.2.19.1
libsolv-devel-debuginfo-0.7.14-lp151.2.19.1
libsolv-tools-0.7.14-lp151.2.19.1
libsolv-tools-debuginfo-0.7.14-lp151.2.19.1
perl-solv-0.7.14-lp151.2.19.1
perl-solv-debuginfo-0.7.14-lp151.2.19.1
python-solv-0.7.14-lp151.2.19.1
python-solv-debuginfo-0.7.14-lp151.2.19.1
python3-solv-0.7.14-lp151.2.19.1
python3-solv-debuginfo-0.7.14-lp151.2.19.1
ruby-solv-0.7.14-lp151.2.19.1
ruby-solv-debuginfo-0.7.14-lp151.2.19.1
- openSUSE Leap 15.1 (x86_64):
libzypp-17.24.1-lp151.2.19.1
libzypp-debuginfo-17.24.1-lp151.2.19.1
libzypp-debugsource-17.24.1-lp151.2.19.1
libzypp-devel-17.24.1-lp151.2.19.1
libzypp-devel-doc-17.24.1-lp151.2.19.1
References:
https://bugzilla.suse.com/1170801https://bugzilla.suse.com/1171224https://bugzilla.suse.com/1172135https://bugzilla.suse.com/1173106https://bugzilla.suse.com/1174011
openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1106-1
Rating: moderate
References: #1115436 #1154087 #1173090
Cross-References: CVE-2020-11022 CVE-2020-11023 CVE-2020-13625
CVE-2020-14295
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
- cacti 1.2.13:
* Query XSS vulnerabilities require vendor package update
(CVE-2020-11022 / CVE-2020-11023)
* Lack of escaping on some pages can lead to XSS exposure
* Update PHPMailer to 6.1.6 (CVE-2020-13625)
* SQL Injection vulnerability due to input validation failure when
editing colors (CVE-2020-14295, boo#1173090)
* Lack of escaping on template import can lead to XSS exposure
- switch from cron to systemd timers (boo#1115436):
+ cacti-cron.timer
+ cacti-cron.service
- avoid potential root escalation on systems with fs.protected_hardlinks=0
(boo#1154087): handle directory permissions in file section instead
of using chown during post installation
- rewrote apache configuration to get rid of .htaccess files and
explicitely disable directory permissions per default (only allow a
limited, well-known set of directories)
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-1106=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
cacti-spine-1.2.13-bp151.4.12.1
cacti-spine-debuginfo-1.2.13-bp151.4.12.1
cacti-spine-debugsource-1.2.13-bp151.4.12.1
- openSUSE Backports SLE-15-SP1 (noarch):
cacti-1.2.13-bp151.4.12.1
References:
https://www.suse.com/security/cve/CVE-2020-11022.htmlhttps://www.suse.com/security/cve/CVE-2020-11023.htmlhttps://www.suse.com/security/cve/CVE-2020-13625.htmlhttps://www.suse.com/security/cve/CVE-2020-14295.htmlhttps://bugzilla.suse.com/1115436https://bugzilla.suse.com/1154087https://bugzilla.suse.com/1173090
openSUSE Recommended Update: Recommended update for putty
______________________________________________________________________________
Announcement ID: openSUSE-RU-2020:1107-1
Rating: moderate
References: #1173442
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for putty fixes the following issues:
putty was updated to release 0.74:
* security fix: if an SSH server accepted an offer of a public key and
then rejected the signature, PuTTY could access freed memory, if the key
had come from an SSH agent. (boo#1173442)
* Added a new configuration option to mitigate a minor information leak in
SSH host key policy.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-1107=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
putty-0.74-bp151.4.9.1
References:
https://bugzilla.suse.com/1173442