SUSE Security Update: Security update for libzypp
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2264-1
Rating: important
References: #1009745 #1036659 #1038984 #1043218 #1045735
#1046417 #1047785 #1048315
Cross-References: CVE-2017-7435 CVE-2017-7436 CVE-2017-9269
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________
An update that solves three vulnerabilities and has 5 fixes
is now available.
Description:
The Software Update Stack was updated to receive fixes and enhancements.
libzypp:
– CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows,
mainly for unsigned repositories and packages. (bsc#1045735, bsc#1038984)
– Fix gpg-pubkey release (creation time) computation. (bsc#1036659)
– Update lsof blacklist. (bsc#1046417)
– Re-probe on refresh if the repository type changes. (bsc#1048315)
– Propagate proper error code to DownloadProgressReport. (bsc#1047785)
– Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
– Support custom repo variables defined in /etc/zypp/vars.d.
yast2-pkg-bindings:
– Do not crash when the repository URL is not defined. (bsc#1043218)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1390=1
– SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1390=1
– SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1390=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
libzypp-debuginfo-16.15.3-2.3.1
libzypp-debugsource-16.15.3-2.3.1
libzypp-devel-16.15.3-2.3.1
libzypp-devel-doc-16.15.3-2.3.1
– SUSE Linux Enterprise Software Development Kit 12-SP3 (noarch):
yast2-pkg-bindings-devel-doc-3.2.4-2.3.1
– SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
libzypp-16.15.3-2.3.1
libzypp-debuginfo-16.15.3-2.3.1
libzypp-debugsource-16.15.3-2.3.1
yast2-pkg-bindings-3.2.4-2.3.1
yast2-pkg-bindings-debuginfo-3.2.4-2.3.1
yast2-pkg-bindings-debugsource-3.2.4-2.3.1
– SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
libzypp-16.15.3-2.3.1
libzypp-debuginfo-16.15.3-2.3.1
libzypp-debugsource-16.15.3-2.3.1
yast2-pkg-bindings-3.2.4-2.3.1
yast2-pkg-bindings-debuginfo-3.2.4-2.3.1
yast2-pkg-bindings-debugsource-3.2.4-2.3.1
References:
https://www.suse.com/security/cve/CVE-2017-7435.html
https://www.suse.com/security/cve/CVE-2017-7436.html
https://www.suse.com/security/cve/CVE-2017-9269.html
https://bugzilla.suse.com/1009745
https://bugzilla.suse.com/1036659
https://bugzilla.suse.com/1038984
https://bugzilla.suse.com/1043218
https://bugzilla.suse.com/1045735
https://bugzilla.suse.com/1046417
https://bugzilla.suse.com/1047785
https://bugzilla.suse.com/1048315
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org