Mailinglist Archive: opensuse-security-announce (51 mails)
< Previous | Next > |
[security-announce] openSUSE-SU-2019:0087-1: important: Security update for zeromq
- From: opensuse-security@xxxxxxxxxxxx
- Date: Fri, 25 Jan 2019 15:08:57 +0100 (CET)
- Message-id: <20190125140857.246F4FFD6@maintenance.suse.de>
openSUSE Security Update: Security update for zeromq
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0087-1
Rating: important
References: #1082318 #1121717
Cross-References: CVE-2019-6250
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for zeromq fixes the following issues:
Security issue fixed:
- CVE-2019-6250: fix a remote execution vulnerability due to pointer
arithmetic overflow (bsc#1121717)
The following tracked packaging change is included:
- boo1082318: correctly mark license files as licence instead of
documentation.
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-87=1
Package List:
- openSUSE Leap 15.0 (x86_64):
libzmq5-4.2.3-lp150.2.10.1
libzmq5-debuginfo-4.2.3-lp150.2.10.1
zeromq-debugsource-4.2.3-lp150.2.10.1
zeromq-devel-4.2.3-lp150.2.10.1
zeromq-tools-4.2.3-lp150.2.10.1
zeromq-tools-debuginfo-4.2.3-lp150.2.10.1
References:
https://www.suse.com/security/cve/CVE-2019-6250.html
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1121717
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0087-1
Rating: important
References: #1082318 #1121717
Cross-References: CVE-2019-6250
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for zeromq fixes the following issues:
Security issue fixed:
- CVE-2019-6250: fix a remote execution vulnerability due to pointer
arithmetic overflow (bsc#1121717)
The following tracked packaging change is included:
- boo1082318: correctly mark license files as licence instead of
documentation.
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-87=1
Package List:
- openSUSE Leap 15.0 (x86_64):
libzmq5-4.2.3-lp150.2.10.1
libzmq5-debuginfo-4.2.3-lp150.2.10.1
zeromq-debugsource-4.2.3-lp150.2.10.1
zeromq-devel-4.2.3-lp150.2.10.1
zeromq-tools-4.2.3-lp150.2.10.1
zeromq-tools-debuginfo-4.2.3-lp150.2.10.1
References:
https://www.suse.com/security/cve/CVE-2019-6250.html
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1121717
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
< Previous | Next > |