Hello community,

here is the log from the commit of package otrs for openSUSE:Factory checked in 
at 2019-07-02 15:18:17
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/otrs (Old)
 and      /work/SRC/openSUSE:Factory/.otrs.new.4615 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "otrs"

Tue Jul  2 15:18:17 2019 rev:64 rq:712523 version:6.0.19

Changes:
--------
--- /work/SRC/openSUSE:Factory/otrs/otrs.changes        2019-03-26 
15:40:51.668290233 +0100
+++ /work/SRC/openSUSE:Factory/.otrs.new.4615/otrs.changes      2019-07-02 
15:18:23.886740556 +0200
@@ -1,0 +2,63 @@
+Sat Jun 29 10:55:31 UTC 2019 - ch...@computersalat.de
+
+- Update to 6.0.19
+  https://community.otrs.com/release-notes-otrs-6-patch-level-19/
+- fix for boo#1137614
+  * (CVE-2019-12497, OSA-2019-09)
+    Information Disclosure
+    In the customer or external frontend, personal information of agents
+    can be disclosed like Name and mail address in external notes.
+- fix for boo#1137615
+  * (CVE-2019-12248, OSA-2019-08)
+    Loading External Image Resources
+    An attacker could send a malicious email to an OTRS system. If a
+    logged in agent user quotes it, the email could cause the browser
+    to load external image resources.
+- Update to 6.0.18
+  https://community.otrs.com/release-notes-otrs-6-patch-level-18/
+- fix for boo#1139406
+  * (CVE-2019-10066, OSA-2019-06)
+    Stored XSS
+    An attacker who is logged into OTRS as an agent with appropriate
+    permissions may create a carefully crafted calendar appointment
+    in order to cause execution of JavaScript in the context of OTRS.
+- fix for boo#1139406
+  * (CVE-2019-10067, OSA-2019-05)
+    Reflected and Stored XSS
+    An attacker who is logged into OTRS as an agent user with appropriate
+    permissions may manipulate the URL to cause execution of JavaScript
+    in the context of OTRS.
+- fix for boo#1139406
+  * (CVE-2019-9892, OSA-2019-04)
+    XXE Processing
+    An attacker who is logged into OTRS as an agent user with appropriate
+    permissions may try to import carefully crafted Report Statistics XML
+    that will result in reading of arbitrary files of OTRS filesystem.
+- Update to 6.0.17
+  https://community.otrs.com/release-notes-otrs-6-patch-level-17/
+- fix for boo#1129755
+  * (CVE-2019-9751, OSA-2019-02)
+    XSS
+    An attacker who is logged into OTRS as an admin user may manipulate
+    the URL to cause execution of JavaScript in the context of OTRS.
+- rebase otrs-perm_test.patch
+
+-------------------------------------------------------------------
+Sat Jun 22 22:33:42 UTC 2019 - ch...@computersalat.de
+
+- fix changes file (chronological order)
+- update missing CVE for OSA-2018-10, OSA-2019-01
+
+-------------------------------------------------------------------
+Fri Feb 22 07:29:57 UTC 2019 - Franck Bui <f...@suse.com>
+
+- Drop use of $FIRST_ARG in .spec
+
+  The use of $FIRST_ARG was probably required because of the
+  %service_* rpm macros were playing tricks with the shell positional
+  parameters. This is bad practice and error prones so let's assume
+  that no macros should do that anymore and hence it's safe to assume
+  that positional parameters remains unchanged after any rpm macro
+  call.
+
+-------------------------------------------------------------------
@@ -24 +87 @@
-  * (CVE-n/a, OSA-2019-01)
+  * (CVE-2019-9752, OSA-2019-01)
@@ -62 +125 @@
-  * (CVE-n/a, OSA-2018-10)
+  * (CVE-2018-20800, OSA-2018-10)

Old:
----
  itsm-6.0.16.tar.bz2
  otrs-6.0.16.tar.bz2

New:
----
  itsm-6.0.19.tar.bz2
  otrs-6.0.19.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ otrs.spec ++++++
--- /var/tmp/diff_new_pack.hJmjPs/_old  2019-07-02 15:18:26.354744345 +0200
+++ /var/tmp/diff_new_pack.hJmjPs/_new  2019-07-02 15:18:26.358744352 +0200
@@ -23,8 +23,8 @@
 
 Name:           otrs
 
-%define otrs_ver 6.0.16
-%define itsm_ver 6.0.16
+%define otrs_ver 6.0.19
+%define itsm_ver 6.0.19
 %define itsm_min 6
 %define otrs_root /srv/%{name}
 %define otrsdoc_dir_files AUTHORS* CHANGES* COPYING* CREDITS README* 
UPGRADING.SUSE doc
@@ -343,7 +343,7 @@
   /usr/sbin/a2enmod version >/dev/null
 %endif
 # Update ?
-if [ ${FIRST_ARG:-0} -gt 1 ]; then
+if [ $1 -gt 1 ]; then
   # OTRS_ROOT changed from /opt to /srv
   if [ -f /opt/%{name}/Kernel/Config.pm.rpmsave ]; then
     mv /opt/%{name}/Kernel/Config.pm.rpmsave %{otrs_root}/Kernel/
@@ -355,7 +355,7 @@
   fi
 fi
 # if rpm is not in update mode
-if ! [ ${FIRST_ARG:-0} -gt 1 ]; then
+if ! [ $1 -gt 1 ]; then
        if [ -z "${YAST_IS_RUNNING}" ]; then
                if [ -n "$LC_ALL" ]; then
                        lang="$LC_ALL"

++++++ itsm-6.0.16.tar.bz2 -> itsm-6.0.19.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/otrs/itsm-6.0.16.tar.bz2 
/work/SRC/openSUSE:Factory/.otrs.new.4615/itsm-6.0.19.tar.bz2 differ: char 11, 
line 1

++++++ otrs-6.0.16.tar.bz2 -> otrs-6.0.19.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/otrs/otrs-6.0.16.tar.bz2 
/work/SRC/openSUSE:Factory/.otrs.new.4615/otrs-6.0.19.tar.bz2 differ: char 11, 
line 1

++++++ otrs-perm_test.patch ++++++
--- /var/tmp/diff_new_pack.hJmjPs/_old  2019-07-02 15:18:26.518744597 +0200
+++ /var/tmp/diff_new_pack.hJmjPs/_new  2019-07-02 15:18:26.518744597 +0200
@@ -2,7 +2,7 @@
 ===================================================================
 --- Kernel/System/Package.pm.orig
 +++ Kernel/System/Package.pm
-@@ -4319,7 +4319,6 @@ sub _FileSystemCheck {
+@@ -4321,7 +4321,6 @@ sub _FileSystemCheck {
      }
  
      my @Filepaths = (


Reply via email to