Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 ______________________________________________________________________________
An update that solves three vulnerabilities and has 5 fixes is now available.
Description:
This OBS toolchain update fixes the following issues:
- CVE-2017-9274: Don't use rpmbuild to extract sources, patches etc. from a spec (bnc#938556). - CVE-2016-4007: Several maintained source services are vulnerable to code/paramter injection (bsc#967265) - Update to version 0.7. - Use spec_query instead of output_versions using the specfile parser from the build package (boo#1059858) - obs-service-source_validator: several occurrences of uninitialized value (bsc#967610) - hack for util-linux specfiles (bnc#891829) - fix dependency to gnupg2 for Fedora (bnc#827480) - exit if tmpdir creation fails (bnc#796918)
Package 'osc':
- Update to version 0.162.0.
Patch Instructions:
To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-build-13404=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
osc-0.162.1-7.4.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch):