openSUSE-SU-2021:3804-1: important: Security update for netcdf

openSUSE Security Update: Security update for netcdf______________________________________________________________________________Announcement ID: openSUSE-SU-2021:3804-1Rating: importantReferences: #1191856 Cross-References: CVE-2019-20005 CVE-2019-20006 CVE-2019-20007 CVE-2019-20198 CVE-2019-20199 CVE-2019-20200 CVE-2019-20201 CVE-2019-20202 CVE-2021-26220 CVE-2021-26221 CVE-2021-26222 CVE-2021-30485 CVE-2021-31229 CVE-2021-31347 CVE-2021-31348 CVE-2021-31598CVSS scores: CVE-2019-20005 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20005 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20006 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2019-20006 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20007 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20007 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20198 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20198 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20199 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20199 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20200 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20200 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20201 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20201 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20202 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-20202 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-26220 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-26221 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-26222 (SUSE): 6 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H CVE-2021-30485 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-30485 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-31229 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-31347 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-31348 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-31348 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-31598 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2021-31598 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HAffected Products: openSUSE Leap 15.3______________________________________________________________________________ An update that fixes 16 vulnerabilities is now available.Description: This update for netcdf fixes the following issues: - Fixed multiple vulnerabilities in ezXML: CVE-2019-20007, CVE-2019-20006, CVE-2019-20201, CVE-2019-20202, CVE-2019-20199, CVE-2019-20200, CVE-2019-20198, CVE-2021-26221, CVE-2021-26222, CVE-2021-30485, CVE-2021-31229, CVE-2021-31347, CVE-2021-31348, CVE-2021-31598 (bsc#1191856) Note: * CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23 not relevant for netcdf: code isn’t used. * CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14 Issue cannot be reproduced and no patch is available upstream.Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or “zypper patch”. Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2021-3804=1Package List: - openSUSE Leap 15.3 (aarch64 ppc64le x86_64): libnetcdf13-4.6.1-5.7.1 libnetcdf13-debuginfo-4.6.1-5.7.1 libnetcdf13-openmpi-4.6.1-5.7.1 libnetcdf13-openmpi-debuginfo-4.6.1-5.7.1 netcdf-openmpi-4.6.1-5.7.1 netcdf-openmpi-debuginfo-4.6.1-5.7.1 netcdf-openmpi-devel-4.6.1-5.7.1 netcdf-openmpi-devel-data-4.6.1-5.7.1 netcdf-openmpi-devel-debuginfo-4.6.1-5.7.1 netcdf-openmpi-devel-static-4.6.1-5.7.1 - openSUSE Leap 15.3 (x86_64): libnetcdf13-32bit-4.6.1-5.7.1 libnetcdf13-32bit-debuginfo-4.6.1-5.7.1 libnetcdf13-openmpi-32bit-4.6.1-5.7.1 libnetcdf13-openmpi-32bit-debuginfo-4.6.1-5.7.1References: https://www.suse.com/security/cve/CVE-2019-20005.html https://www.suse.com/security/cve/CVE-2019-20006.html https://www.suse.com/security/cve/CVE-2019-20007.html https://www.suse.com/security/cve/CVE-2019-20198.html https://www.suse.com/security/cve/CVE-2019-20199.html https://www.suse.com/security/cve/CVE-2019-20200.html https://www.suse.com/security/cve/CVE-2019-20201.html https://www.suse.com/security/cve/CVE-2019-20202.html https://www.suse.com/security/cve/CVE-2021-26220.html https://www.suse.com/security/cve/CVE-2021-26221.html https://www.suse.com/security/cve/CVE-2021-26222.html https://www.suse.com/security/cve/CVE-2021-30485.html https://www.suse.com/security/cve/CVE-2021-31229.html https://www.suse.com/security/cve/CVE-2021-31347.html https://www.suse.com/security/cve/CVE-2021-31348.html https://www.suse.com/security/cve/CVE-2021-31598.html https://bugzilla.suse.com/1191856

More…