openSUSE Security Update : libzypp / zypper (openSUSE-2017-893)

High Nessus Plugin ID 102334


The remote openSUSE host is missing a security update.


The Software Update Stack was updated to receive fixes and enhancements.

libzypp :

Security issues fixed :

- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned repositories and packages. (bsc#1045735, bsc#1038984)

Bug fixes :

- Re-probe on refresh if the repository type changes.

- Propagate proper error code to DownloadProgressReport.

- Allow to trigger an appdata refresh unconditionally.

- Support custom repo variables defined in /etc/zypp/vars.d.

- Adapt loop mounting of ISO images. (bsc#1038132, bsc#1033236)

- Fix potential crash if repository has no baseurl.

zypper :

- Adapt download callback to report and handle unsigned packages. (bsc#1038984)

- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)

- Document support for custom repository variables defined in /etc/zypp/vars.d.

- Emphasize that it depends on how fast PackageKit will respond to a 'quit' request sent if PK blocks package management.

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Update the affected libzypp / zypper packages.

See Also

Plugin Details

Severity: High

ID: 102334

File Name: openSUSE-2017-893.nasl

Version: $Revision: 3.1 $

Type: local

Agent: unix

Published: 2017/08/10

Modified: 2017/08/10

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libzypp, p-cpe:/a:novell:opensuse:libzypp-debuginfo, p-cpe:/a:novell:opensuse:libzypp-debugsource, p-cpe:/a:novell:opensuse:libzypp-devel, p-cpe:/a:novell:opensuse:zypper, p-cpe:/a:novell:opensuse:zypper-aptitude, p-cpe:/a:novell:opensuse:zypper-debuginfo, p-cpe:/a:novell:opensuse:zypper-debugsource, p-cpe:/a:novell:opensuse:zypper-log, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2017/08/09

Reference Information

CVE: CVE-2017-7435, CVE-2017-7436, CVE-2017-9269