This update for libreoffice and libraries fixes the following issues :
LibreOffice was updated to 6.2.5.2 (fate#327121 bsc#1128845 bsc#1123455), bringing lots of bug and stability fixes.
Additional bugfixes :
If there is no firebird engine we still need java to run hsqldb (bsc#1135189)
PPTX: Rectangle turns from green to blue and loses transparency when transparency is set (bsc#1135228)
Slide deck compression doesn’t, hmm, compress too much (bsc#1127760)
Psychedelic graphics in LibreOffice (but not PowerPoint) (bsc#1124869)
Image from PPTX shown in a square, not a circle (bsc#1121874)
libixion was updated to 0.14.1: Updated for new orcus
liborcus was updated to 0.14.1: Boost 1.67 support
Various cell handling issues fixed
libwps was updated to 0.4.10: QuattroPro: add parser of .qwp files
all: support complex encoding
mdds was updated to 1.4.3: Api change to 1.4
More multivector operations and tweaks
Various multi vector fixes
flat_segment_tree: add segment iterator and functions
fix to handle out-of-range insertions on flat_segment_tree
Another api version -> rename to mdds-1_2
myspell-dictionaries was updated to 20190423: Serbian dictionary updated
Update af_ZA hunspell
Update Spanish dictionary
Update Slovenian dictionary
Update Breton dictionary
Update Galician dictionary
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2019:1894-1.
# The text itself is copyright (C) SUSE.
#
include("compat.inc");
if (description)
{
script_id(126813);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/13");
script_cve_id("CVE-2018-16858");
script_name(english:"SUSE SLED15 / SLES15 Security Update : LibreOffice (SUSE-SU-2019:1894-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"This update for libreoffice and libraries fixes the following issues :
LibreOffice was updated to 6.2.5.2 (fate#327121 bsc#1128845
bsc#1123455), bringing lots of bug and stability fixes.
Additional bugfixes :
If there is no firebird engine we still need java to run hsqldb
(bsc#1135189)
PPTX: Rectangle turns from green to blue and loses transparency when
transparency is set (bsc#1135228)
Slide deck compression doesn't, hmm, compress too much (bsc#1127760)
Psychedelic graphics in LibreOffice (but not PowerPoint) (bsc#1124869)
Image from PPTX shown in a square, not a circle (bsc#1121874)
libixion was updated to 0.14.1: Updated for new orcus
liborcus was updated to 0.14.1: Boost 1.67 support
Various cell handling issues fixed
libwps was updated to 0.4.10: QuattroPro: add parser of .qwp files
all: support complex encoding
mdds was updated to 1.4.3: Api change to 1.4
More multivector operations and tweaks
Various multi vector fixes
flat_segment_tree: add segment iterator and functions
fix to handle out-of-range insertions on flat_segment_tree
Another api version -> rename to mdds-1_2
myspell-dictionaries was updated to 20190423: Serbian dictionary
updated
Update af_ZA hunspell
Update Spanish dictionary
Update Slovenian dictionary
Update Breton dictionary
Update Galician dictionary
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1089811"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1116451"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1121874"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1123131"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1123455"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1124062"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1124869"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1127760"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1127857"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1128845"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1135189"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1135228"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-16858/"
);
# https://www.suse.com/support/update/announcement/2019/suse-su-20191894-1/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?36467a0a"
);
script_set_attribute(
attribute:"solution",
value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Workstation Extension 15-SP1:zypper in -t patch
SUSE-SLE-Product-WE-15-SP1-2019-1894=1
SUSE Linux Enterprise Workstation Extension 15:zypper in -t patch
SUSE-SLE-Product-WE-15-2019-1894=1
SUSE Linux Enterprise Module for Open Buildservice Development Tools
15-SP1:zypper in -t patch
SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1894=1
SUSE Linux Enterprise Module for Open Buildservice Development Tools
15:zypper in -t patch
SUSE-SLE-Module-Development-Tools-OBS-15-2019-1894=1
SUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch
SUSE-SLE-Module-Basesystem-15-SP1-2019-1894=1
SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch
SUSE-SLE-Module-Basesystem-15-2019-1894=1"
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'LibreOffice Macro Code Execution');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libixion-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libixion-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libixion-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libixion-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libixion-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liborcus-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liborcus-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liborcus-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liborcus-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwps-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwps-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwps-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwps-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:myspell-dictionaries");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:myspell-lightproof-en");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:myspell-lightproof-hu_HU");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:myspell-lightproof-pt_BR");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:myspell-lightproof-ru_RU");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-libixion");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-libixion-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-liborcus");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-liborcus-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/03/25");
script_set_attribute(attribute:"patch_publication_date", value:"2019/07/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/19");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0/1", os_ver + " SP" + sp);
if (os_ver == "SLED15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0/1", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES15", sp:"1", reference:"libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"libixion-debugsource-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"libixion-devel-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"libixion-tools-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"libixion-tools-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"liborcus-debugsource-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"liborcus-tools-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"liborcus-tools-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"myspell-dictionaries-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"myspell-lightproof-en-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"myspell-lightproof-hu_HU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"myspell-lightproof-pt_BR-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"myspell-lightproof-ru_RU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"python3-libixion-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"python3-libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"python3-liborcus-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"1", reference:"python3-liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libixion-debugsource-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libixion-devel-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libixion-tools-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libixion-tools-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"liborcus-debugsource-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"liborcus-tools-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"liborcus-tools-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libwps-debuginfo-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libwps-debugsource-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libwps-tools-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libwps-tools-debuginfo-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"myspell-dictionaries-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"myspell-lightproof-en-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"myspell-lightproof-hu_HU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"myspell-lightproof-pt_BR-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"myspell-lightproof-ru_RU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"python3-libixion-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"python3-libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"python3-liborcus-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"python3-liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"libixion-debugsource-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"libixion-devel-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"libixion-tools-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"libixion-tools-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"liborcus-debugsource-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"liborcus-tools-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"liborcus-tools-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"myspell-dictionaries-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"myspell-lightproof-en-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"myspell-lightproof-hu_HU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"myspell-lightproof-pt_BR-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"myspell-lightproof-ru_RU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"python3-libixion-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"python3-libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"python3-liborcus-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"1", reference:"python3-liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libixion-debugsource-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libixion-devel-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libixion-tools-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libixion-tools-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"liborcus-debugsource-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"liborcus-tools-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"liborcus-tools-debuginfo-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libwps-debuginfo-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libwps-debugsource-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libwps-tools-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libwps-tools-debuginfo-0.4.10-3.6.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"myspell-dictionaries-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"myspell-lightproof-en-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"myspell-lightproof-hu_HU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"myspell-lightproof-pt_BR-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"myspell-lightproof-ru_RU-20190423-3.9.7")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"python3-libixion-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"python3-libixion-debuginfo-0.14.1-4.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"python3-liborcus-0.14.1-3.3.8")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"python3-liborcus-debuginfo-0.14.1-3.3.8")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "LibreOffice");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | libixion-debuginfo | p-cpe:/a:novell:suse_linux:libixion-debuginfo |
novell | suse_linux | libixion-debugsource | p-cpe:/a:novell:suse_linux:libixion-debugsource |
novell | suse_linux | libixion-devel | p-cpe:/a:novell:suse_linux:libixion-devel |
novell | suse_linux | libixion-tools | p-cpe:/a:novell:suse_linux:libixion-tools |
novell | suse_linux | libixion-tools-debuginfo | p-cpe:/a:novell:suse_linux:libixion-tools-debuginfo |
novell | suse_linux | liborcus-debuginfo | p-cpe:/a:novell:suse_linux:liborcus-debuginfo |
novell | suse_linux | liborcus-debugsource | p-cpe:/a:novell:suse_linux:liborcus-debugsource |
novell | suse_linux | liborcus-tools | p-cpe:/a:novell:suse_linux:liborcus-tools |
novell | suse_linux | liborcus-tools-debuginfo | p-cpe:/a:novell:suse_linux:liborcus-tools-debuginfo |
novell | suse_linux | libwps-debuginfo | p-cpe:/a:novell:suse_linux:libwps-debuginfo |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858
www.nessus.org/u?36467a0a
bugzilla.suse.com/show_bug.cgi?id=1089811
bugzilla.suse.com/show_bug.cgi?id=1116451
bugzilla.suse.com/show_bug.cgi?id=1121874
bugzilla.suse.com/show_bug.cgi?id=1123131
bugzilla.suse.com/show_bug.cgi?id=1123455
bugzilla.suse.com/show_bug.cgi?id=1124062
bugzilla.suse.com/show_bug.cgi?id=1124869
bugzilla.suse.com/show_bug.cgi?id=1127760
bugzilla.suse.com/show_bug.cgi?id=1127857
bugzilla.suse.com/show_bug.cgi?id=1128845
bugzilla.suse.com/show_bug.cgi?id=1135189
bugzilla.suse.com/show_bug.cgi?id=1135228
www.suse.com/security/cve/CVE-2018-16858/