Lucene search

K
suseSuseOPENSUSE-SU-2021:0145-1
HistoryJan 23, 2021 - 12:00 a.m.

Security update for viewvc (moderate)

2021-01-2300:00:00
lists.opensuse.org
6

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N

2.1 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

An update that fixes one vulnerability is now available.

Description:

This update for viewvc fixes the following issues:

  • update to 1.1.28 (boo#1167974, CVE-2020-5283):
    • security fix: escape subdir lastmod file name (#211)
    • fix standalone.py first request failure (#195)
    • suppress stack traces (with option to show) (#140)
    • distinguish text/binary/image files by icons (#166, #175)
    • colorize alternating file content lines (#167)
    • link to the instance root from the ViewVC logo (#168)
    • display directory and root counts, too (#169)
    • fix double fault error in standalone.py (#157)
    • support timezone offsets with minutes piece (#176)

This update was imported from the openSUSE:Leap:15.1:Update update
project. This update was imported from the openSUSE:Leap:15.2:Update
update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Backports SLE-15-SP2:

    zypper in -t patch openSUSE-2021-145=1

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N

2.1 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N