SUSE 5181 Published by

The following openSUSE security updates has been released:

openSUSE-SU-2019:0093-1: important: Security update for openssh
openSUSE-SU-2019:0094-1: moderate: Security update for libraw
openSUSE-SU-2019:0095-1: moderate: Security update for singularity
openSUSE-SU-2019:0096-1: important: Security update for freerdp
openSUSE-SU-2019:0097-1: moderate: Security update for systemd
openSUSE-SU-2019:0098-1: important: Security update for systemd
openSUSE-SU-2019:0100-1: important: Security update for pdns-recursor



openSUSE-SU-2019:0093-1: important: Security update for openssh

openSUSE Security Update: Security update for openssh
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0093-1
Rating: important
References: #1121571 #1121816 #1121818 #1121821
Cross-References: CVE-2018-20685 CVE-2019-6109 CVE-2019-6110
CVE-2019-6111
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH
servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious
remote SSH servers to manipulate terminal output via the object name,
e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious
remote SSH servers to manipulate stderr output, e.g. by inserting ANSI
escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious
remote SSH servers to execute directory traversal attacks and overwrite
files (bsc#1121821)

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-93=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

openssh-7.2p2-29.1
openssh-askpass-gnome-7.2p2-29.1
openssh-askpass-gnome-debuginfo-7.2p2-29.1
openssh-cavs-7.2p2-29.1
openssh-cavs-debuginfo-7.2p2-29.1
openssh-debuginfo-7.2p2-29.1
openssh-debugsource-7.2p2-29.1
openssh-fips-7.2p2-29.1
openssh-helpers-7.2p2-29.1
openssh-helpers-debuginfo-7.2p2-29.1


References:

https://www.suse.com/security/cve/CVE-2018-20685.html
https://www.suse.com/security/cve/CVE-2019-6109.html
https://www.suse.com/security/cve/CVE-2019-6110.html
https://www.suse.com/security/cve/CVE-2019-6111.html
https://bugzilla.suse.com/1121571
https://bugzilla.suse.com/1121816
https://bugzilla.suse.com/1121818
https://bugzilla.suse.com/1121821

--


openSUSE-SU-2019:0094-1: moderate: Security update for libraw

openSUSE Security Update: Security update for libraw
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0094-1
Rating: moderate
References: #1120498 #1120499 #1120500 #1120515 #1120516
#1120517 #1120519
Cross-References: CVE-2018-20337 CVE-2018-20363 CVE-2018-20364
CVE-2018-20365 CVE-2018-5817 CVE-2018-5818
CVE-2018-5819
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 7 vulnerabilities is now available.

Description:

This update for libraw fixes the following issues:

Security issues fixed:

- CVE-2018-20337: Fixed a stack-based buffer overflow in the
parse_makernote function of dcraw_common.cpp (bsc#1120519)
- CVE-2018-20365: Fixed a heap-based buffer overflow in the raw2image
function of libraw_cxx.cpp (bsc#1120500)
- CVE-2018-20364: Fixed a NULL pointer dereference in the copy_bayer
function of libraw_cxx.cpp (bsc#1120499)
- CVE-2018-20363: Fixed a NULL pointer dereference in the raw2image
function of libraw_cxx.cpp (bsc#1120498)
- CVE-2018-5817: Fixed an infinite loop in the unpacked_load_raw function
of dcraw_common.cpp (bsc#1120515)
- CVE-2018-5818: Fixed an infinite loop in the parse_rollei function of
dcraw_common.cpp (bsc#1120516)
- CVE-2018-5819: Fixed a denial of service in the parse_sinar_ia function
of dcraw_common.cpp (bsc#1120517)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-94=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

libraw-debuginfo-0.18.9-lp150.2.6.1
libraw-debugsource-0.18.9-lp150.2.6.1
libraw-devel-0.18.9-lp150.2.6.1
libraw-devel-static-0.18.9-lp150.2.6.1
libraw-tools-0.18.9-lp150.2.6.1
libraw-tools-debuginfo-0.18.9-lp150.2.6.1
libraw16-0.18.9-lp150.2.6.1
libraw16-debuginfo-0.18.9-lp150.2.6.1


References:

https://www.suse.com/security/cve/CVE-2018-20337.html
https://www.suse.com/security/cve/CVE-2018-20363.html
https://www.suse.com/security/cve/CVE-2018-20364.html
https://www.suse.com/security/cve/CVE-2018-20365.html
https://www.suse.com/security/cve/CVE-2018-5817.html
https://www.suse.com/security/cve/CVE-2018-5818.html
https://www.suse.com/security/cve/CVE-2018-5819.html
https://bugzilla.suse.com/1120498
https://bugzilla.suse.com/1120499
https://bugzilla.suse.com/1120500
https://bugzilla.suse.com/1120515
https://bugzilla.suse.com/1120516
https://bugzilla.suse.com/1120517
https://bugzilla.suse.com/1120519

--


openSUSE-SU-2019:0095-1: moderate: Security update for singularity

openSUSE Security Update: Security update for singularity
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0095-1
Rating: moderate
References: #1100333 #1111411
Cross-References: CVE-2018-12021 CVE-2018-19295
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for singularity to version 2.6.1 fixes the following issues:

Security issues fixed:

- CVE-2018-19295: Mount points are not mounted with shared mount
propagation by default anymore, as this may result in privilege
escalation (boo#1111411).
- CVE-2018-12021: Fixed a incorrect access control issues on systems
supporting overlay file system (boo#1100333).


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2019-95=1



Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

libsingularity1-2.6.1-14.1
singularity-2.6.1-14.1
singularity-devel-2.6.1-14.1


References:

https://www.suse.com/security/cve/CVE-2018-12021.html
https://www.suse.com/security/cve/CVE-2018-19295.html
https://bugzilla.suse.com/1100333
https://bugzilla.suse.com/1111411

--


openSUSE-SU-2019:0096-1: important: Security update for freerdp

openSUSE Security Update: Security update for freerdp
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0096-1
Rating: important
References: #1085416 #1087240 #1104918 #1116708 #1117963
#1117964 #1117965 #1117966 #1117967 #1120507

Cross-References: CVE-2018-0886 CVE-2018-1000852 CVE-2018-8784
CVE-2018-8785 CVE-2018-8786 CVE-2018-8787
CVE-2018-8788 CVE-2018-8789
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves 8 vulnerabilities and has two fixes
is now available.

Description:

This update for freerdp fixes the following issues:

Security issues fixed:

- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP)
(bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in
the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in
the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in
the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in
the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in
the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in
the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the
drdynvc_process_capability_request function (bsc#1120507)

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-96=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

freerdp-2.0.0~git.1463131968.4e66df7-13.1
freerdp-debuginfo-2.0.0~git.1463131968.4e66df7-13.1
freerdp-debugsource-2.0.0~git.1463131968.4e66df7-13.1
freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1
libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1
libfreerdp2-debuginfo-2.0.0~git.1463131968.4e66df7-13.1


References:

https://www.suse.com/security/cve/CVE-2018-0886.html
https://www.suse.com/security/cve/CVE-2018-1000852.html
https://www.suse.com/security/cve/CVE-2018-8784.html
https://www.suse.com/security/cve/CVE-2018-8785.html
https://www.suse.com/security/cve/CVE-2018-8786.html
https://www.suse.com/security/cve/CVE-2018-8787.html
https://www.suse.com/security/cve/CVE-2018-8788.html
https://www.suse.com/security/cve/CVE-2018-8789.html
https://bugzilla.suse.com/1085416
https://bugzilla.suse.com/1087240
https://bugzilla.suse.com/1104918
https://bugzilla.suse.com/1116708
https://bugzilla.suse.com/1117963
https://bugzilla.suse.com/1117964
https://bugzilla.suse.com/1117965
https://bugzilla.suse.com/1117966
https://bugzilla.suse.com/1117967
https://bugzilla.suse.com/1120507

--


openSUSE-SU-2019:0097-1: moderate: Security update for systemd

openSUSE Security Update: Security update for systemd
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0097-1
Rating: moderate
References: #1005023 #1076696 #1101591 #1114981 #1115518
#1119971 #1120323
Cross-References: CVE-2018-16864 CVE-2018-16865 CVE-2018-16866

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves three vulnerabilities and has four
fixes is now available.

Description:

This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through
attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks
(bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties.
(bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that
VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails.
(bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children.
(bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.
In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that
uses systemd-detect-virt to detect non-zvm environment. The
systemd-detect-virt returns exit failure code when it detected _none_
state. The exit failure code causes that the hot-add memory block can
not be set to online. (bsc#1076696)

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-97=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libsystemd0-228-65.1
libsystemd0-debuginfo-228-65.1
libsystemd0-mini-228-65.1
libsystemd0-mini-debuginfo-228-65.1
libudev-devel-228-65.1
libudev-mini-devel-228-65.1
libudev-mini1-228-65.1
libudev-mini1-debuginfo-228-65.1
libudev1-228-65.1
libudev1-debuginfo-228-65.1
nss-myhostname-228-65.1
nss-myhostname-debuginfo-228-65.1
nss-mymachines-228-65.1
nss-mymachines-debuginfo-228-65.1
systemd-228-65.1
systemd-debuginfo-228-65.1
systemd-debugsource-228-65.1
systemd-devel-228-65.1
systemd-logger-228-65.1
systemd-mini-228-65.1
systemd-mini-debuginfo-228-65.1
systemd-mini-debugsource-228-65.1
systemd-mini-devel-228-65.1
systemd-mini-sysvinit-228-65.1
systemd-sysvinit-228-65.1
udev-228-65.1
udev-debuginfo-228-65.1
udev-mini-228-65.1
udev-mini-debuginfo-228-65.1

- openSUSE Leap 42.3 (noarch):

systemd-bash-completion-228-65.1
systemd-mini-bash-completion-228-65.1

- openSUSE Leap 42.3 (x86_64):

libsystemd0-32bit-228-65.1
libsystemd0-debuginfo-32bit-228-65.1
libudev1-32bit-228-65.1
libudev1-debuginfo-32bit-228-65.1
nss-myhostname-32bit-228-65.1
nss-myhostname-debuginfo-32bit-228-65.1
systemd-32bit-228-65.1
systemd-debuginfo-32bit-228-65.1


References:

https://www.suse.com/security/cve/CVE-2018-16864.html
https://www.suse.com/security/cve/CVE-2018-16865.html
https://www.suse.com/security/cve/CVE-2018-16866.html
https://bugzilla.suse.com/1005023
https://bugzilla.suse.com/1076696
https://bugzilla.suse.com/1101591
https://bugzilla.suse.com/1114981
https://bugzilla.suse.com/1115518
https://bugzilla.suse.com/1119971
https://bugzilla.suse.com/1120323

--


openSUSE-SU-2019:0098-1: important: Security update for systemd

openSUSE Security Update: Security update for systemd
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0098-1
Rating: important
References: #1005023 #1045723 #1076696 #1080919 #1093753
#1101591 #1111498 #1114933 #1117063 #1119971
#1120323
Cross-References: CVE-2018-16864 CVE-2018-16865 CVE-2018-16866
CVE-2018-6954
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves four vulnerabilities and has 7 fixes
is now available.

Description:

This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through
attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- CVE-2018-6954: Fix mishandling of symlinks present in non-terminal path
components (bsc#1080919)
- Fixed an issue during system startup in relation to encrypted swap disks
(bsc#1119971)

Non-security issues fixed:

- pam_systemd: Fix 'Cannot create session: Already running in a session'
(bsc#1111498)
- systemd-vconsole-setup: vconsole setup fails, fonts will not be copied
to tty (bsc#1114933)
- systemd-tmpfiles-setup: symlinked /tmp to /var/tmp breaking multiple
units (bsc#1045723)
- Fixed installation issue with /etc/machine-id during update (bsc#1117063)
- btrfs: qgroups are assigned to parent qgroups after reboot (bsc#1093753)
- logind: Stop managing VT switches if no sessions are registered on that
VT. (bsc#1101591)
- udev: Downgrade message when settting inotify watch up fails.
(bsc#1005023)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.
In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that
uses systemd-detect-virt to detect non-zvm environment. The
systemd-detect-virt returns exit failure code when it detected _none_
state. The exit failure code causes that the hot-add memory block can
not be set to online. (bsc#1076696)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-98=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

libsystemd0-234-lp150.20.12.1
libsystemd0-debuginfo-234-lp150.20.12.1
libsystemd0-mini-234-lp150.20.12.1
libsystemd0-mini-debuginfo-234-lp150.20.12.1
libudev-devel-234-lp150.20.12.1
libudev-mini-devel-234-lp150.20.12.1
libudev-mini1-234-lp150.20.12.1
libudev-mini1-debuginfo-234-lp150.20.12.1
libudev1-234-lp150.20.12.1
libudev1-debuginfo-234-lp150.20.12.1
nss-myhostname-234-lp150.20.12.1
nss-myhostname-debuginfo-234-lp150.20.12.1
nss-mymachines-234-lp150.20.12.1
nss-mymachines-debuginfo-234-lp150.20.12.1
nss-systemd-234-lp150.20.12.1
nss-systemd-debuginfo-234-lp150.20.12.1
systemd-234-lp150.20.12.1
systemd-container-234-lp150.20.12.1
systemd-container-debuginfo-234-lp150.20.12.1
systemd-coredump-234-lp150.20.12.1
systemd-coredump-debuginfo-234-lp150.20.12.1
systemd-debuginfo-234-lp150.20.12.1
systemd-debugsource-234-lp150.20.12.1
systemd-devel-234-lp150.20.12.1
systemd-logger-234-lp150.20.12.1
systemd-mini-234-lp150.20.12.1
systemd-mini-container-mini-234-lp150.20.12.1
systemd-mini-container-mini-debuginfo-234-lp150.20.12.1
systemd-mini-coredump-mini-234-lp150.20.12.1
systemd-mini-coredump-mini-debuginfo-234-lp150.20.12.1
systemd-mini-debuginfo-234-lp150.20.12.1
systemd-mini-debugsource-234-lp150.20.12.1
systemd-mini-devel-234-lp150.20.12.1
systemd-mini-sysvinit-234-lp150.20.12.1
systemd-sysvinit-234-lp150.20.12.1
udev-234-lp150.20.12.1
udev-debuginfo-234-lp150.20.12.1
udev-mini-234-lp150.20.12.1
udev-mini-debuginfo-234-lp150.20.12.1

- openSUSE Leap 15.0 (x86_64):

libsystemd0-32bit-234-lp150.20.12.1
libsystemd0-32bit-debuginfo-234-lp150.20.12.1
libudev-devel-32bit-234-lp150.20.12.1
libudev1-32bit-234-lp150.20.12.1
libudev1-32bit-debuginfo-234-lp150.20.12.1
nss-myhostname-32bit-234-lp150.20.12.1
nss-myhostname-32bit-debuginfo-234-lp150.20.12.1
nss-mymachines-32bit-234-lp150.20.12.1
nss-mymachines-32bit-debuginfo-234-lp150.20.12.1
systemd-32bit-234-lp150.20.12.1
systemd-32bit-debuginfo-234-lp150.20.12.1

- openSUSE Leap 15.0 (noarch):

systemd-bash-completion-234-lp150.20.12.1
systemd-mini-bash-completion-234-lp150.20.12.1


References:

https://www.suse.com/security/cve/CVE-2018-16864.html
https://www.suse.com/security/cve/CVE-2018-16865.html
https://www.suse.com/security/cve/CVE-2018-16866.html
https://www.suse.com/security/cve/CVE-2018-6954.html
https://bugzilla.suse.com/1005023
https://bugzilla.suse.com/1045723
https://bugzilla.suse.com/1076696
https://bugzilla.suse.com/1080919
https://bugzilla.suse.com/1093753
https://bugzilla.suse.com/1101591
https://bugzilla.suse.com/1111498
https://bugzilla.suse.com/1114933
https://bugzilla.suse.com/1117063
https://bugzilla.suse.com/1119971
https://bugzilla.suse.com/1120323

--


openSUSE-SU-2019:0100-1: important: Security update for pdns-recursor

openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0100-1
Rating: important
References: #1121889
Cross-References: CVE-2019-3807
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for pdns-recursor fixes the following issues:

- CVE-2019-3807: Fixed insufficient validation of DNSSEC signatures
(boo#1121889)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-100=1



Package List:

- openSUSE Leap 15.0 (x86_64):

pdns-recursor-4.1.2-lp150.2.6.1
pdns-recursor-debuginfo-4.1.2-lp150.2.6.1
pdns-recursor-debugsource-4.1.2-lp150.2.6.1


References:

https://www.suse.com/security/cve/CVE-2019-3807.html
https://bugzilla.suse.com/1121889

--