SUSE 5181 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:0103-1: important: Security update for ghostscript
openSUSE-SU-2019:0104-1: important: Security update for ghostscript
openSUSE-SU-2019:0107-1: important: Security update for pdns-recursor
openSUSE-SU-2019:0108-1: important: Security update for webkit2gtk3



openSUSE-SU-2019:0103-1: important: Security update for ghostscript

openSUSE Security Update: Security update for ghostscript
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0103-1
Rating: important
References: #1122319
Cross-References: CVE-2019-6116
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be
pseudo-operators (bsc#1122319)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-103=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

ghostscript-9.26a-14.15.1
ghostscript-debuginfo-9.26a-14.15.1
ghostscript-debugsource-9.26a-14.15.1
ghostscript-devel-9.26a-14.15.1
ghostscript-mini-9.26a-14.15.1
ghostscript-mini-debuginfo-9.26a-14.15.1
ghostscript-mini-debugsource-9.26a-14.15.1
ghostscript-mini-devel-9.26a-14.15.1
ghostscript-x11-9.26a-14.15.1
ghostscript-x11-debuginfo-9.26a-14.15.1
libspectre-debugsource-0.2.7-17.7.1
libspectre-devel-0.2.7-17.7.1
libspectre1-0.2.7-17.7.1
libspectre1-debuginfo-0.2.7-17.7.1


References:

https://www.suse.com/security/cve/CVE-2019-6116.html
https://bugzilla.suse.com/1122319

--


openSUSE-SU-2019:0104-1: important: Security update for ghostscript

openSUSE Security Update: Security update for ghostscript
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0104-1
Rating: important
References: #1122319
Cross-References: CVE-2019-6116
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for ghostscript version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be
pseudo-operators (bsc#1122319)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-104=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

ghostscript-9.26a-lp150.2.12.1
ghostscript-debuginfo-9.26a-lp150.2.12.1
ghostscript-debugsource-9.26a-lp150.2.12.1
ghostscript-devel-9.26a-lp150.2.12.1
ghostscript-mini-9.26a-lp150.2.12.1
ghostscript-mini-debuginfo-9.26a-lp150.2.12.1
ghostscript-mini-debugsource-9.26a-lp150.2.12.1
ghostscript-mini-devel-9.26a-lp150.2.12.1
ghostscript-x11-9.26a-lp150.2.12.1
ghostscript-x11-debuginfo-9.26a-lp150.2.12.1

- openSUSE Leap 15.0 (x86_64):

libspectre-debugsource-0.2.8-lp150.2.9.2
libspectre-devel-0.2.8-lp150.2.9.2
libspectre1-0.2.8-lp150.2.9.2
libspectre1-debuginfo-0.2.8-lp150.2.9.2


References:

https://www.suse.com/security/cve/CVE-2019-6116.html
https://bugzilla.suse.com/1122319

--


openSUSE-SU-2019:0107-1: important: Security update for pdns-recursor

openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0107-1
Rating: important
References: #1121889
Cross-References: CVE-2019-3807
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for pdns-recursor fixes the following issues:

- CVE-2019-3807: Fixed insufficient validation of DNSSEC signatures
(boo#1121889)

This update was imported from the openSUSE:Leap:15.0:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-107=1



Package List:

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

pdns-recursor-4.1.2-bp150.2.6.1


References:

https://www.suse.com/security/cve/CVE-2019-3807.html
https://bugzilla.suse.com/1121889

--


openSUSE-SU-2019:0108-1: important: Security update for webkit2gtk3

openSUSE Security Update: Security update for webkit2gtk3
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0108-1
Rating: important
References: #1119553 #1119554 #1119555 #1119556 #1119557
#1119558
Cross-References: CVE-2018-4437 CVE-2018-4438 CVE-2018-4441
CVE-2018-4442 CVE-2018-4443 CVE-2018-4464

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption
(bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443,
CVE-2018-4464: Fixed multiple memory corruption issues with improved
memory handling (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557,
bsc#1119558)

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-108=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libjavascriptcoregtk-4_0-18-2.22.5-18.1
libjavascriptcoregtk-4_0-18-debuginfo-2.22.5-18.1
libwebkit2gtk-4_0-37-2.22.5-18.1
libwebkit2gtk-4_0-37-debuginfo-2.22.5-18.1
typelib-1_0-JavaScriptCore-4_0-2.22.5-18.1
typelib-1_0-WebKit2-4_0-2.22.5-18.1
typelib-1_0-WebKit2WebExtension-4_0-2.22.5-18.1
webkit-jsc-4-2.22.5-18.1
webkit-jsc-4-debuginfo-2.22.5-18.1
webkit2gtk-4_0-injected-bundles-2.22.5-18.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.22.5-18.1
webkit2gtk3-debugsource-2.22.5-18.1
webkit2gtk3-devel-2.22.5-18.1
webkit2gtk3-minibrowser-2.22.5-18.1
webkit2gtk3-minibrowser-debuginfo-2.22.5-18.1
webkit2gtk3-plugin-process-gtk2-2.22.5-18.1
webkit2gtk3-plugin-process-gtk2-debuginfo-2.22.5-18.1

- openSUSE Leap 42.3 (noarch):

libwebkit2gtk3-lang-2.22.5-18.1

- openSUSE Leap 42.3 (x86_64):

libjavascriptcoregtk-4_0-18-32bit-2.22.5-18.1
libjavascriptcoregtk-4_0-18-debuginfo-32bit-2.22.5-18.1
libwebkit2gtk-4_0-37-32bit-2.22.5-18.1
libwebkit2gtk-4_0-37-debuginfo-32bit-2.22.5-18.1


References:

https://www.suse.com/security/cve/CVE-2018-4437.html
https://www.suse.com/security/cve/CVE-2018-4438.html
https://www.suse.com/security/cve/CVE-2018-4441.html
https://www.suse.com/security/cve/CVE-2018-4442.html
https://www.suse.com/security/cve/CVE-2018-4443.html
https://www.suse.com/security/cve/CVE-2018-4464.html
https://bugzilla.suse.com/1119553
https://bugzilla.suse.com/1119554
https://bugzilla.suse.com/1119555
https://bugzilla.suse.com/1119556
https://bugzilla.suse.com/1119557
https://bugzilla.suse.com/1119558

--