SUSE 5181 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:1595-1: important: Security update for MozillaFirefox
openSUSE-SU-2019:1602-1: moderate: Security update for openssh
openSUSE-SU-2019:1603-1: moderate: Security update for ImageMagick
openSUSE-SU-2019:1604-1: important: Security update for dbus-1
openSUSE-SU-2019:1605-1: moderate: Security update for netpbm
openSUSE-SU-2019:1606-1: important: Security update for MozillaThunderbird



openSUSE-SU-2019:1595-1: important: Security update for MozillaFirefox

openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1595-1
Rating: important
References: #1138872
Cross-References: CVE-2019-11708
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2 MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
* Insufficient vetting of parameters passed with the Prompt:Open IPC
message between child and parent processes could result in the
non-sandboxed parent process opening web content chosen by a
compromised child process. When combined with additional
vulnerabilities this could result in executing arbitrary code on the
user's computer.

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1595=1



Package List:

- openSUSE Leap 15.1 (x86_64):

MozillaFirefox-60.7.2-lp151.2.7.1
MozillaFirefox-branding-upstream-60.7.2-lp151.2.7.1
MozillaFirefox-buildsymbols-60.7.2-lp151.2.7.1
MozillaFirefox-debuginfo-60.7.2-lp151.2.7.1
MozillaFirefox-debugsource-60.7.2-lp151.2.7.1
MozillaFirefox-devel-60.7.2-lp151.2.7.1
MozillaFirefox-translations-common-60.7.2-lp151.2.7.1
MozillaFirefox-translations-other-60.7.2-lp151.2.7.1


References:

https://www.suse.com/security/cve/CVE-2019-11708.html
https://bugzilla.suse.com/1138872

--


openSUSE-SU-2019:1602-1: moderate: Security update for openssh

openSUSE Security Update: Security update for openssh
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1602-1
Rating: moderate
References: #1065237 #1090671 #1119183 #1121816 #1121821
#1131709
Cross-References: CVE-2019-6109 CVE-2019-6111
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves two vulnerabilities and has four
fixes is now available.

Description:

This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display
of the scp client that could be used to manipulate client output,
allowing for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client
to prevent arbitrary file overwrites when interacting with a malicious
SSH server (bsc#1121821).

Other issues fixed:

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1602=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

openssh-7.2p2-35.1
openssh-askpass-gnome-7.2p2-35.1
openssh-askpass-gnome-debuginfo-7.2p2-35.1
openssh-cavs-7.2p2-35.1
openssh-cavs-debuginfo-7.2p2-35.1
openssh-debuginfo-7.2p2-35.1
openssh-debugsource-7.2p2-35.1
openssh-fips-7.2p2-35.1
openssh-helpers-7.2p2-35.1
openssh-helpers-debuginfo-7.2p2-35.1


References:

https://www.suse.com/security/cve/CVE-2019-6109.html
https://www.suse.com/security/cve/CVE-2019-6111.html
https://bugzilla.suse.com/1065237
https://bugzilla.suse.com/1090671
https://bugzilla.suse.com/1119183
https://bugzilla.suse.com/1121816
https://bugzilla.suse.com/1121821
https://bugzilla.suse.com/1131709

--


openSUSE-SU-2019:1603-1: moderate: Security update for ImageMagick

openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1603-1
Rating: moderate
References: #1133204 #1133205 #1133498 #1133501 #1136183
#1136732
Cross-References: CVE-2019-11470 CVE-2019-11472 CVE-2019-11505
CVE-2019-11506 CVE-2019-11598
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves 5 vulnerabilities and has one errata
is now available.

Description:

This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11472: Fixed a denial-of-service in ReadXWDImage()
(bsc#1133204).
- CVE-2019-11470: Fixed a denial-of-service in ReadCINImage()
(bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the
WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the
WritePDBImage() (bsc#1133501).
- CVE-2019-11598: Fixed a heap-based buffer overread in WritePNMImage()
(bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses
ghostscript for decoding (bsc#1136183)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1603=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1603=1



Package List:

- openSUSE Leap 15.1 (i586 x86_64):

ImageMagick-7.0.7.34-lp151.7.3.1
ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.3.1
ImageMagick-config-7-upstream-7.0.7.34-lp151.7.3.1
ImageMagick-debuginfo-7.0.7.34-lp151.7.3.1
ImageMagick-debugsource-7.0.7.34-lp151.7.3.1
ImageMagick-devel-7.0.7.34-lp151.7.3.1
ImageMagick-extra-7.0.7.34-lp151.7.3.1
ImageMagick-extra-debuginfo-7.0.7.34-lp151.7.3.1
libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.3.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp151.7.3.1
libMagick++-devel-7.0.7.34-lp151.7.3.1
libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.3.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp151.7.3.1
libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.3.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp151.7.3.1
perl-PerlMagick-7.0.7.34-lp151.7.3.1
perl-PerlMagick-debuginfo-7.0.7.34-lp151.7.3.1

- openSUSE Leap 15.1 (noarch):

ImageMagick-doc-7.0.7.34-lp151.7.3.1

- openSUSE Leap 15.1 (x86_64):

ImageMagick-devel-32bit-7.0.7.34-lp151.7.3.1
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.3.1
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-lp151.7.3.1
libMagick++-devel-32bit-7.0.7.34-lp151.7.3.1
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp151.7.3.1
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.3.1
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp151.7.3.1

- openSUSE Leap 15.0 (i586 x86_64):

ImageMagick-7.0.7.34-lp150.2.32.1
ImageMagick-config-7-SUSE-7.0.7.34-lp150.2.32.1
ImageMagick-config-7-upstream-7.0.7.34-lp150.2.32.1
ImageMagick-debuginfo-7.0.7.34-lp150.2.32.1
ImageMagick-debugsource-7.0.7.34-lp150.2.32.1
ImageMagick-devel-7.0.7.34-lp150.2.32.1
ImageMagick-extra-7.0.7.34-lp150.2.32.1
ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.32.1
libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.32.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.32.1
libMagick++-devel-7.0.7.34-lp150.2.32.1
libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.32.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.32.1
libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.32.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.32.1
perl-PerlMagick-7.0.7.34-lp150.2.32.1
perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.32.1

- openSUSE Leap 15.0 (x86_64):

ImageMagick-devel-32bit-7.0.7.34-lp150.2.32.1
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp150.2.32.1
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-lp150.2.32.1
libMagick++-devel-32bit-7.0.7.34-lp150.2.32.1
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.32.1
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.32.1
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.32.1
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.32.1

- openSUSE Leap 15.0 (noarch):

ImageMagick-doc-7.0.7.34-lp150.2.32.1


References:

https://www.suse.com/security/cve/CVE-2019-11470.html
https://www.suse.com/security/cve/CVE-2019-11472.html
https://www.suse.com/security/cve/CVE-2019-11505.html
https://www.suse.com/security/cve/CVE-2019-11506.html
https://www.suse.com/security/cve/CVE-2019-11598.html
https://bugzilla.suse.com/1133204
https://bugzilla.suse.com/1133205
https://bugzilla.suse.com/1133498
https://bugzilla.suse.com/1133501
https://bugzilla.suse.com/1136183
https://bugzilla.suse.com/1136732

--


openSUSE-SU-2019:1604-1: important: Security update for dbus-1

openSUSE Security Update: Security update for dbus-1
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1604-1
Rating: important
References: #1082318 #1137832
Cross-References: CVE-2019-12749
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for dbus-1 fixes the following issues:

Security issue fixed:

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
could have allowed local attackers to bypass authentication
(bsc#1137832).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1604=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

dbus-1-1.12.2-lp150.2.3.1
dbus-1-debuginfo-1.12.2-lp150.2.3.1
dbus-1-debugsource-1.12.2-lp150.2.3.1
dbus-1-devel-1.12.2-lp150.2.3.1
dbus-1-x11-1.12.2-lp150.2.3.1
dbus-1-x11-debuginfo-1.12.2-lp150.2.3.1
dbus-1-x11-debugsource-1.12.2-lp150.2.3.1
libdbus-1-3-1.12.2-lp150.2.3.1
libdbus-1-3-debuginfo-1.12.2-lp150.2.3.1

- openSUSE Leap 15.0 (noarch):

dbus-1-devel-doc-1.12.2-lp150.2.3.1

- openSUSE Leap 15.0 (x86_64):

dbus-1-32bit-debuginfo-1.12.2-lp150.2.3.1
dbus-1-devel-32bit-1.12.2-lp150.2.3.1
libdbus-1-3-32bit-1.12.2-lp150.2.3.1
libdbus-1-3-32bit-debuginfo-1.12.2-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2019-12749.html
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1137832

--


openSUSE-SU-2019:1605-1: moderate: Security update for netpbm

openSUSE Security Update: Security update for netpbm
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1605-1
Rating: moderate
References: #1024288 #1024291 #1136936
Cross-References: CVE-2017-2579 CVE-2017-2580
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack()
(bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in
addPixelToRaster() function (bsc#1024291).
- create netpbm-vulnerable subpackage and move pstopnm there, as
ghostscript is used to convert (bsc#1136936)


This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1605=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1605=1



Package List:

- openSUSE Leap 15.1 (i586 x86_64):

libnetpbm-devel-10.80.1-lp151.4.3.1
libnetpbm11-10.80.1-lp151.4.3.1
libnetpbm11-debuginfo-10.80.1-lp151.4.3.1
netpbm-10.80.1-lp151.4.3.1
netpbm-debuginfo-10.80.1-lp151.4.3.1
netpbm-debugsource-10.80.1-lp151.4.3.1
netpbm-vulnerable-10.80.1-lp151.4.3.1
netpbm-vulnerable-debuginfo-10.80.1-lp151.4.3.1

- openSUSE Leap 15.1 (x86_64):

libnetpbm11-32bit-10.80.1-lp151.4.3.1
libnetpbm11-32bit-debuginfo-10.80.1-lp151.4.3.1

- openSUSE Leap 15.0 (i586 x86_64):

libnetpbm-devel-10.80.1-lp150.2.6.1
libnetpbm11-10.80.1-lp150.2.6.1
libnetpbm11-debuginfo-10.80.1-lp150.2.6.1
netpbm-10.80.1-lp150.2.6.1
netpbm-debuginfo-10.80.1-lp150.2.6.1
netpbm-debugsource-10.80.1-lp150.2.6.1
netpbm-vulnerable-10.80.1-lp150.2.6.1
netpbm-vulnerable-debuginfo-10.80.1-lp150.2.6.1

- openSUSE Leap 15.0 (x86_64):

libnetpbm11-32bit-10.80.1-lp150.2.6.1
libnetpbm11-32bit-debuginfo-10.80.1-lp150.2.6.1


References:

https://www.suse.com/security/cve/CVE-2017-2579.html
https://www.suse.com/security/cve/CVE-2017-2580.html
https://bugzilla.suse.com/1024288
https://bugzilla.suse.com/1024291
https://bugzilla.suse.com/1136936

--


openSUSE-SU-2019:1606-1: important: Security update for MozillaThunderbird

openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1606-1
Rating: important
References: #1137595 #1138872
Cross-References: CVE-2019-11703 CVE-2019-11704 CVE-2019-11705
CVE-2019-11706 CVE-2019-11707 CVE-2019-11708

Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for MozillaThunderbird fixes the following issues:

Security issues fixed:

- CVE-2019-11703: Fixed a heap-based buffer overflow in
icalmemorystrdupanddequote() (bsc#1137595).
- CVE-2019-11704: Fixed a heap-based buffer overflow in
parser_get_next_char() (bsc#1137595).
- CVE-2019-11705: Fixed a stack-based buffer overflow in
icalrecur_add_bydayrules() (bsc#1137595).
- CVE-2019-11706: Fixed a type confusion in
icaltimezone_get_vtimezone_properties() (bsc#1137595).
- CVE-2019-11707: Fixed a type confusion in Array.pop (bsc#1138872).
- CVE-2019-11708: Fixed a sandbox escape using Prompt:Open (bsc#1138872).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1606=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1606=1



Package List:

- openSUSE Leap 15.1 (x86_64):

MozillaThunderbird-60.7.2-lp151.2.7.1
MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1
MozillaThunderbird-debuginfo-60.7.2-lp151.2.7.1
MozillaThunderbird-debugsource-60.7.2-lp151.2.7.1
MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1
MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1

- openSUSE Leap 15.0 (x86_64):

MozillaThunderbird-60.7.2-lp150.3.45.1
MozillaThunderbird-buildsymbols-60.7.2-lp150.3.45.1
MozillaThunderbird-debuginfo-60.7.2-lp150.3.45.1
MozillaThunderbird-debugsource-60.7.2-lp150.3.45.1
MozillaThunderbird-translations-common-60.7.2-lp150.3.45.1
MozillaThunderbird-translations-other-60.7.2-lp150.3.45.1


References:

https://www.suse.com/security/cve/CVE-2019-11703.html
https://www.suse.com/security/cve/CVE-2019-11704.html
https://www.suse.com/security/cve/CVE-2019-11705.html
https://www.suse.com/security/cve/CVE-2019-11706.html
https://www.suse.com/security/cve/CVE-2019-11707.html
https://www.suse.com/security/cve/CVE-2019-11708.html
https://bugzilla.suse.com/1137595
https://bugzilla.suse.com/1138872

--