The following security updates has been released for openSUSE:
openSUSE-SU-2018:1360-1: moderate: Security update for lilypond
openSUSE-SU-2018:1361-1: important: Security update for Mozilla Thunderbird
openSUSE-SU-2018:1360-1: moderate: Security update for lilypond
openSUSE-SU-2018:1361-1: important: Security update for Mozilla Thunderbird
openSUSE-SU-2018:1360-1: moderate: Security update for lilypond
openSUSE Security Update: Security update for lilypond
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1360-1
Rating: moderate
References: #1041090 #1093056
Cross-References: CVE-2018-10992
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for lilypond fixes the following issues:
- CVE-2018-10992: lilypond: Does not validate strings before launching
the program specified by the BROWSER environment variable, which
allows remote attackers to conduct argument-injection attacks
(bsc#1093056)
- packages do not build reproducibly from unsorted input (bsc#1041090)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-487=1
Package List:
- openSUSE Leap 42.3 (x86_64):
lilypond-2.18.2-7.3.1
lilypond-debuginfo-2.18.2-7.3.1
lilypond-debugsource-2.18.2-7.3.1
- openSUSE Leap 42.3 (noarch):
lilypond-century-schoolbook-l-fonts-2.18.2-7.3.1
lilypond-doc-2.18.2-7.3.1
lilypond-doc-cs-2.18.2-7.3.1
lilypond-doc-de-2.18.2-7.3.1
lilypond-doc-es-2.18.2-7.3.1
lilypond-doc-fr-2.18.2-7.3.1
lilypond-doc-hu-2.18.2-7.3.1
lilypond-doc-it-2.18.2-7.3.1
lilypond-doc-ja-2.18.2-7.3.1
lilypond-doc-nl-2.18.2-7.3.1
lilypond-doc-zh-2.18.2-7.3.1
lilypond-emmentaler-fonts-2.18.2-7.3.1
lilypond-fonts-common-2.18.2-7.3.1
References:
https://www.suse.com/security/cve/CVE-2018-10992.html
https://bugzilla.suse.com/1041090
https://bugzilla.suse.com/1093056
--
openSUSE-SU-2018:1361-1: important: Security update for Mozilla Thunderbird
openSUSE Security Update: Security update for Mozilla Thunderbird
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1361-1
Rating: important
References: #1092548 #1093152
Cross-References: CVE-2018-5150 CVE-2018-5154 CVE-2018-5155
CVE-2018-5159 CVE-2018-5161 CVE-2018-5162
CVE-2018-5168 CVE-2018-5170 CVE-2018-5174
CVE-2018-5178 CVE-2018-5183 CVE-2018-5184
CVE-2018-5185
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
This update for Mozilla Thunderbird to version 52.8 fixes the following
issues:
Security issues fixed (MFSA 2018-13, boo#1092548):
- CVE-2018-5183: Backport critical security fixes in Skia
- CVE-2018-5154: Use-after-free with SVG animations and clip paths
- CVE-2018-5155: Use-after-free with SVG animations and text paths
- CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- CVE-2018-5168: Lightweight themes can be installed without user
interaction
- CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion
through legacy extension
- CVE-2018-5150: Memory safety bugs fixed in Firefox 60, Firefox ESR 52.8,
and Thunderbird 52.8
- CVE-2018-5161: Hang via malformed headers (bsc#1093970)
- CVE-2018-5162: Encrypted mail leaks plaintext through src attribute
(bsc#1093971)
- CVE-2018-5170: Filename spoofing for external attachments (bsc#1093972)
- CVE-2018-5184: Full plaintext recovery in S/MIME via chosen-ciphertext
attack (bsc#1093969)
- CVE-2018-5185: Leaking plaintext through HTML forms (bsc#1093973)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-486=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-486=1
Package List:
- openSUSE Leap 42.3 (x86_64):
MozillaThunderbird-52.8-63.1
MozillaThunderbird-buildsymbols-52.8-63.1
MozillaThunderbird-debuginfo-52.8-63.1
MozillaThunderbird-debugsource-52.8-63.1
MozillaThunderbird-devel-52.8-63.1
MozillaThunderbird-translations-common-52.8-63.1
MozillaThunderbird-translations-other-52.8-63.1
- openSUSE Leap 15.0 (x86_64):
MozillaThunderbird-52.8-lp150.3.3.2
MozillaThunderbird-buildsymbols-52.8-lp150.3.3.2
MozillaThunderbird-debuginfo-52.8-lp150.3.3.2
MozillaThunderbird-debugsource-52.8-lp150.3.3.2
MozillaThunderbird-devel-52.8-lp150.3.3.2
MozillaThunderbird-translations-common-52.8-lp150.3.3.2
MozillaThunderbird-translations-other-52.8-lp150.3.3.2
References:
https://www.suse.com/security/cve/CVE-2018-5150.html
https://www.suse.com/security/cve/CVE-2018-5154.html
https://www.suse.com/security/cve/CVE-2018-5155.html
https://www.suse.com/security/cve/CVE-2018-5159.html
https://www.suse.com/security/cve/CVE-2018-5161.html
https://www.suse.com/security/cve/CVE-2018-5162.html
https://www.suse.com/security/cve/CVE-2018-5168.html
https://www.suse.com/security/cve/CVE-2018-5170.html
https://www.suse.com/security/cve/CVE-2018-5174.html
https://www.suse.com/security/cve/CVE-2018-5178.html
https://www.suse.com/security/cve/CVE-2018-5183.html
https://www.suse.com/security/cve/CVE-2018-5184.html
https://www.suse.com/security/cve/CVE-2018-5185.html
https://bugzilla.suse.com/1092548
https://bugzilla.suse.com/1093152
--