Security update for libsolv, libzypp, zypper
Announcement ID: | SUSE-SU-2020:0432-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has 10 security fixes can now be installed.
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
Security issue fixed:
- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
Bug fixes
- Fixed removing orphaned packages dropped by to-be-installed products (bsc#1155819).
- Adds libzypp API to mark all obsolete kernels according to the existing purge-kernel script rules (bsc#1155198).
- Do not enforce 'en' being in RequestedLocales If the user decides to have a system without explicit language support he may do so (bsc#1155678).
- Load only target resolvables for zypper rm (bsc#1157377).
- Fix broken search by filelist (bsc#1135114).
- Replace python by a bash script in zypper-log (fixes#304, fixes#306, bsc#1156158).
- Do not sort out requested locales which are not available (bsc#1155678).
- Prevent listing duplicate matches in tables. XML result is provided within the new list-patches-byissue element (bsc#1154805).
- XML add patch issue-date and issue-list (bsc#1154805).
- Fix zypper lp --cve/bugzilla/issue options (bsc#1155298).
- Always execute commit when adding/removing locales (fixes bsc#1155205).
- Fix description of --table-style,-s in man page (bsc#1154804).
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-432=1
-
Development Tools Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP1-2020-432=1
-
SUSE Package Hub 15 15-SP1
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-432=1
Package List:
-
Basesystem Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- libsolv-debugsource-0.7.10-3.13.4
- libzypp-devel-17.19.0-3.14.5
- libsolv-tools-0.7.10-3.13.4
- zypper-debuginfo-1.14.33-3.13.5
- libsolv-tools-debuginfo-0.7.10-3.13.4
- zypper-1.14.33-3.13.5
- libsolv-devel-0.7.10-3.13.4
- libzypp-debugsource-17.19.0-3.14.5
- python3-solv-0.7.10-3.13.4
- libzypp-debuginfo-17.19.0-3.14.5
- zypper-debugsource-1.14.33-3.13.5
- python3-solv-debuginfo-0.7.10-3.13.4
- libsolv-debuginfo-0.7.10-3.13.4
- libzypp-17.19.0-3.14.5
- libsolv-devel-debuginfo-0.7.10-3.13.4
-
Basesystem Module 15-SP1 (noarch)
- zypper-log-1.14.33-3.13.5
- zypper-needs-restarting-1.14.33-3.13.5
-
Development Tools Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- libsolv-debugsource-0.7.10-3.13.4
- ruby-solv-debuginfo-0.7.10-3.13.4
- perl-solv-0.7.10-3.13.4
- ruby-solv-0.7.10-3.13.4
- libsolv-debuginfo-0.7.10-3.13.4
- perl-solv-debuginfo-0.7.10-3.13.4
-
SUSE Package Hub 15 15-SP1 (aarch64 ppc64le s390x x86_64)
- libsolv-debugsource-0.7.10-3.13.4
- libsolv-debuginfo-0.7.10-3.13.4
- python-solv-0.7.10-3.13.4
- python-solv-debuginfo-0.7.10-3.13.4
References:
- https://www.suse.com/security/cve/CVE-2019-18900.html
- https://bugzilla.suse.com/show_bug.cgi?id=1135114
- https://bugzilla.suse.com/show_bug.cgi?id=1154804
- https://bugzilla.suse.com/show_bug.cgi?id=1154805
- https://bugzilla.suse.com/show_bug.cgi?id=1155198
- https://bugzilla.suse.com/show_bug.cgi?id=1155205
- https://bugzilla.suse.com/show_bug.cgi?id=1155298
- https://bugzilla.suse.com/show_bug.cgi?id=1155678
- https://bugzilla.suse.com/show_bug.cgi?id=1155819
- https://bugzilla.suse.com/show_bug.cgi?id=1156158
- https://bugzilla.suse.com/show_bug.cgi?id=1157377
- https://bugzilla.suse.com/show_bug.cgi?id=1158763