The following openSUSE updates has been released:
openSUSE-SU-2019:1920-1: important: Security update for dosbox
openSUSE-SU-2019:1921-1: important: Security update for pdns
openSUSE-SU-2019:1920-1: important: Security update for dosbox
openSUSE-SU-2019:1921-1: important: Security update for pdns
openSUSE-SU-2019:1920-1: important: Security update for dosbox
openSUSE Security Update: Security update for dosbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1920-1
Rating: important
References: #1140254
Cross-References: CVE-2019-12594 CVE-2019-7165
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for dosbox fixes the following issues:
Security issues fixed:
- CVE-2019-7165: Fixed that a very long line inside a bat file would
overflow the parsing buffer (bnc#1140254).
- CVE-2019-12594: Added a basic permission system so that a program
running inside DOSBox can't access the contents of /proc (e.g.
/proc/self/mem) when / or /proc were (to be) mounted (bnc#1140254).
- Several other fixes for out of bounds access and buffer overflows.
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1920=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
dosbox-0.74.3-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-12594.html
https://www.suse.com/security/cve/CVE-2019-7165.html
https://bugzilla.suse.com/1140254
--
openSUSE-SU-2019:1921-1: important: Security update for pdns
openSUSE Security Update: Security update for pdns
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:1921-1
Rating: important
References: #1138582 #1142810
Cross-References: CVE-2019-10162 CVE-2019-10163 CVE-2019-10203
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for pdns fixes the following issues:
Security issues fixed:
- CVE-2019-10203: Updated PostgreSQL schema to address a possible denial
of service by an authorized user by inserting a crafted record in a
MASTER type zone under their control. (boo#1142810)
- CVE-2019-10162: Fixed a denial of service but when authorized user to
cause the server to exit by inserting a crafted record in a MASTER type
zone under their control. (boo#1138582)
- CVE-2019-10163: Fixed a denial of service of slave server when an
authorized master server sends large number of NOTIFY messages.
(boo#1138582)
Non-security issues fixed:
- Enabled the option to disable superslave support.
- Fixed `pdnsutil b2b-migrate` to not lose NSEC3 settings.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1921=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
pdns-4.1.8-bp151.3.3.1
pdns-backend-geoip-4.1.8-bp151.3.3.1
pdns-backend-godbc-4.1.8-bp151.3.3.1
pdns-backend-ldap-4.1.8-bp151.3.3.1
pdns-backend-lua-4.1.8-bp151.3.3.1
pdns-backend-mydns-4.1.8-bp151.3.3.1
pdns-backend-mysql-4.1.8-bp151.3.3.1
pdns-backend-postgresql-4.1.8-bp151.3.3.1
pdns-backend-remote-4.1.8-bp151.3.3.1
pdns-backend-sqlite3-4.1.8-bp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-10162.html
https://www.suse.com/security/cve/CVE-2019-10163.html
https://www.suse.com/security/cve/CVE-2019-10203.html
https://bugzilla.suse.com/1138582
https://bugzilla.suse.com/1142810
--