openSUSE alert openSUSE-SU-2020:1998-1 (moinmoin-wiki)
From: | opensuse-security@opensuse.org | |
To: | opensuse-updates@opensuse.org | |
Subject: | [opensuse-updates] openSUSE-SU-2020:1998-1: important: Security update for moinmoin-wiki | |
Date: | Mon, 23 Nov 2020 12:16:34 +0100 | |
Message-ID: | <20201123111634.6BDD7F7B4@maintenance.suse.de> | |
Archive-link: | Article |
openSUSE Security Update: Security update for moinmoin-wiki ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:1998-1 Rating: important References: #1178744 #1178745 Cross-References: CVE-2020-15275 CVE-2020-25074 Affected Products: openSUSE Backports SLE-15-SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for moinmoin-wiki fixes the following issues: - update to version 1.9.11: CVE-2020-25074 (boo#1178744): fix remote code execution via cache action CVE-2020-15275 (boo#1178745): fix malicious SVG attachment causing stored XSS vulnerability This update was imported from the openSUSE:Leap:15.2:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2020-1998=1 Package List: - openSUSE Backports SLE-15-SP2 (noarch): moinmoin-wiki-1.9.11-bp152.4.3.1 References: https://www.suse.com/security/cve/CVE-2020-15275.html https://www.suse.com/security/cve/CVE-2020-25074.html https://bugzilla.suse.com/1178744 https://bugzilla.suse.com/1178745 _______________________________________________ openSUSE Updates mailing list -- updates@lists.opensuse.org To unsubscribe, email updates-leave@lists.opensuse.org List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette List Archives: https://lists.opensuse.org/archives/list/updates@lists.op...