openSUSE Security Update: Security update for monit ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2877-1 Rating: moderate References: #1007455 #971647 #974763 Cross-References: CVE-2014-3566 CVE-2016-7067 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: This update for monit fixes the following issues: - CVE-2016-7067: A malicious attacker could have used a cross-site request forgery vulnerability to trick an authenticated user to perform monit actions. Monit was updated to 5.20, containing all upstream improvements and bug fixes. The following tracked packaging bugs were fixed: - disable sslv3 according to RFC7568 (boo#974763) - fixed pid file directory (boo#971647) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2016-1339=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1339=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-1339=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): monit-5.20.0-13.1 monit-debuginfo-5.20.0-13.1 monit-debugsource-5.20.0-13.1 - openSUSE Leap 42.2 (noarch): monit-doc-5.20.0-13.1 - openSUSE Leap 42.1 (i586 x86_64): monit-5.20.0-13.1 monit-debuginfo-5.20.0-13.1 monit-debugsource-5.20.0-13.1 - openSUSE Leap 42.1 (noarch): monit-doc-5.20.0-13.1 - openSUSE 13.2 (i586 x86_64): monit-5.20.0-2.3.1 monit-debuginfo-5.20.0-2.3.1 monit-debugsource-5.20.0-2.3.1 - openSUSE 13.2 (noarch): monit-doc-5.20.0-2.3.1 References: https://www.suse.com/security/cve/CVE-2014-3566.html https://www.suse.com/security/cve/CVE-2016-7067.html https://bugzilla.suse.com/1007455 https://bugzilla.suse.com/971647 https://bugzilla.suse.com/974763