SUSE: 2019:1785-1 important: zeromq
Summary
This update for zeromq fixes the following issues: - CVE-2019-13132: An unauthenticated remote attacker could have exploited a stack overflow vulnerability on a server that is supposed to be protected by encryption and authentication to potentially gain a remote code execution. (bsc#1140255) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Manager Tools 12: zypper in -t patch SUSE-SLE-Manager-Tools-12-2019-1785=1 - SUSE Manager Server 3.2: zypper in -t patch SUSE-SUSE-Manager-Server-3.2-2019-1785=1 - SUSE Manager Proxy 3.2: zypper in -t patch SUSE-SUSE-Manager-Proxy-3.2-2019-1785=1 - SUSE Linux Enterprise Workstation Extension 12-SP4: zypper in -t patch SUSE-SLE-WE-12-SP4-2019-1785=1 - SUSE Linux Enterprise Software Development...
Read the Full AdvisoryReferences
#1140255
Cross- CVE-2019-13132
Affected Products:
SUSE Manager Tools 12
SUSE Manager Server 3.2
SUSE Manager Proxy 3.2
SUSE Linux Enterprise Workstation Extension 12-SP4
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Point of Sale 12-SP2
SUSE Linux Enterprise Module for Advanced Systems Management 12
SUSE Linux Enterprise Desktop 12-SP4
SUSE Enterprise Storage 5
SUSE Enterprise Storage 4
SUSE CaaS Platform 3.0
https://www.suse.com/security/cve/CVE-2019-13132.html
https://bugzilla.suse.com/1140255