The following updates has been released for openSUSE:
openSUSE-SU-2019:0232-1: moderate: Security update for build
openSUSE-SU-2019:0233-1: Security update for mosquitto
openSUSE-SU-2019:0234-1: important: Security update for nodejs6
openSUSE-SU-2019:0235-1: Security update for GraphicsMagick
openSUSE-SU-2019:0232-1: moderate: Security update for build
openSUSE-SU-2019:0233-1: Security update for mosquitto
openSUSE-SU-2019:0234-1: important: Security update for nodejs6
openSUSE-SU-2019:0235-1: Security update for GraphicsMagick
openSUSE-SU-2019:0232-1: moderate: Security update for build
openSUSE Security Update: Security update for build
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0232-1
Rating: moderate
References: #1069904 #1122895
Cross-References: CVE-2017-14804
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for build version 20190128 fixes the following issues:
Security issue fixed:
- CVE-2017-14804: Improve file name check extractbuild (bsc#1069904)
Non-security issue fixed:
- Add initial SLE 15 SP1 config (bsc#1122895)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-232=1
Package List:
- openSUSE Leap 15.0 (noarch):
build-20190128-lp150.2.3.1
build-initvm-i586-20190128-lp150.2.3.1
build-initvm-x86_64-20190128-lp150.2.3.1
build-mkbaselibs-20190128-lp150.2.3.1
build-mkdrpms-20190128-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2017-14804.html
https://bugzilla.suse.com/1069904
https://bugzilla.suse.com/1122895
--
openSUSE-SU-2019:0233-1: Security update for mosquitto
openSUSE Security Update: Security update for mosquitto
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0233-1
Rating: low
References: #1125019 #1125020 #1125021
Cross-References: CVE-2018-12546 CVE-2018-12550 CVE-2018-12551
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for mosquitto fixes the following issues:
Security issues fixed:
- CVE-2018-12546: Fixed an issue with revoked access to topics
(bsc#1125019).
- CVE-2018-12551: Fixed an issue which allowed malformed data in the
password file to be treated as valid (bsc#1125020).
- CVE-2018-12550: Fixed an an issue which treats an empty ACL file
wrongly (bsc#1125021).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-233=1
Package List:
- openSUSE Leap 15.0 (x86_64):
libmosquitto1-1.4.15-lp150.2.3.1
libmosquitto1-debuginfo-1.4.15-lp150.2.3.1
libmosquittopp1-1.4.15-lp150.2.3.1
libmosquittopp1-debuginfo-1.4.15-lp150.2.3.1
mosquitto-1.4.15-lp150.2.3.1
mosquitto-clients-1.4.15-lp150.2.3.1
mosquitto-clients-debuginfo-1.4.15-lp150.2.3.1
mosquitto-debuginfo-1.4.15-lp150.2.3.1
mosquitto-debugsource-1.4.15-lp150.2.3.1
mosquitto-devel-1.4.15-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-12546.html
https://www.suse.com/security/cve/CVE-2018-12550.html
https://www.suse.com/security/cve/CVE-2018-12551.html
https://bugzilla.suse.com/1125019
https://bugzilla.suse.com/1125020
https://bugzilla.suse.com/1125021
--
openSUSE-SU-2019:0234-1: important: Security update for nodejs6
openSUSE Security Update: Security update for nodejs6
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0234-1
Rating: important
References: #1113534 #1113652 #1117625 #1117626 #1117627
#1117629 #1117630
Cross-References: CVE-2018-0734 CVE-2018-12116 CVE-2018-12120
CVE-2018-12121 CVE-2018-12122 CVE-2018-12123
CVE-2018-5407
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for nodejs6 to version 6.16.0 fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed a timing vulnerability in the DSA signature
generation (bsc#1113652)
- CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka
"PortSmash") (bsc#1113534)
- CVE-2018-12120: Fixed that the debugger listens on any interface by
default (bsc#1117625)
- CVE-2018-12121: Fixed a denial of Service with large HTTP headers
(bsc#1117626)
- CVE-2018-12122: Fixed the "Slowloris" HTTP Denial of Service
(bsc#1117627)
- CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630)
- CVE-2018-12123: Fixed hostname spoofing in URL parser for javascript
protocol (bsc#1117629)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-234=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
nodejs6-6.16.0-18.1
nodejs6-debuginfo-6.16.0-18.1
nodejs6-debugsource-6.16.0-18.1
nodejs6-devel-6.16.0-18.1
npm6-6.16.0-18.1
- openSUSE Leap 42.3 (noarch):
nodejs6-docs-6.16.0-18.1
References:
https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-12116.html
https://www.suse.com/security/cve/CVE-2018-12120.html
https://www.suse.com/security/cve/CVE-2018-12121.html
https://www.suse.com/security/cve/CVE-2018-12122.html
https://www.suse.com/security/cve/CVE-2018-12123.html
https://www.suse.com/security/cve/CVE-2018-5407.html
https://bugzilla.suse.com/1113534
https://bugzilla.suse.com/1113652
https://bugzilla.suse.com/1117625
https://bugzilla.suse.com/1117626
https://bugzilla.suse.com/1117627
https://bugzilla.suse.com/1117629
https://bugzilla.suse.com/1117630
--
openSUSE-SU-2019:0235-1: Security update for GraphicsMagick
openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0235-1
Rating: low
References: #1124366
Cross-References: CVE-2019-7397
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for GraphicsMagick fixes the following issues:
Security issue fixed:
- CVE-2019-7397: Fixed a Memory leak in function WritePDFImage in pdf.c
(bsc#1124366)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-235=1
Package List:
- openSUSE Backports SLE-15 (x86_64):
GraphicsMagick-1.3.29-bp150.2.15.1
GraphicsMagick-devel-1.3.29-bp150.2.15.1
libGraphicsMagick++-Q16-12-1.3.29-bp150.2.15.1
libGraphicsMagick++-devel-1.3.29-bp150.2.15.1
libGraphicsMagick-Q16-3-1.3.29-bp150.2.15.1
libGraphicsMagick3-config-1.3.29-bp150.2.15.1
libGraphicsMagickWand-Q16-2-1.3.29-bp150.2.15.1
perl-GraphicsMagick-1.3.29-bp150.2.15.1
References:
https://www.suse.com/security/cve/CVE-2019-7397.html
https://bugzilla.suse.com/1124366
--