The following updates has been released for openSUSE:
openSUSE-SU-2019:0084-1: important: Security update for virtualbox
openSUSE-SU-2019:0085-1: important: Security update for krb5
openSUSE-SU-2019:0086-1: moderate: Security update for soundtouch
openSUSE-SU-2019:0087-1: important: Security update for zeromq
openSUSE-SU-2019:0088-1: important: Security update for nodejs4
openSUSE-SU-2019:0084-1: important: Security update for virtualbox
openSUSE-SU-2019:0085-1: important: Security update for krb5
openSUSE-SU-2019:0086-1: moderate: Security update for soundtouch
openSUSE-SU-2019:0087-1: important: Security update for zeromq
openSUSE-SU-2019:0088-1: important: Security update for nodejs4
openSUSE-SU-2019:0084-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0084-1
Rating: important
References: #1122212
Cross-References: CVE-2018-0734 CVE-2018-11763 CVE-2018-11784
CVE-2018-3309 CVE-2019-2446 CVE-2019-2448
CVE-2019-2450 CVE-2019-2451 CVE-2019-2500
CVE-2019-2501 CVE-2019-2504 CVE-2019-2505
CVE-2019-2506 CVE-2019-2508 CVE-2019-2509
CVE-2019-2511 CVE-2019-2520 CVE-2019-2521
CVE-2019-2522 CVE-2019-2523 CVE-2019-2524
CVE-2019-2525 CVE-2019-2526 CVE-2019-2527
CVE-2019-2548 CVE-2019-2552 CVE-2019-2553
CVE-2019-2554 CVE-2019-2555 CVE-2019-2556
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 30 vulnerabilities is now available.
Description:
This update for virtualbox version 5.2.24 fixes the following issues:
Update fixes multiple vulnerabilities:
CVE-2019-2500, CVE-2019-2524, CVE-2019-2552, CVE-2018-3309,
CVE-2019-2520 CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2526,
CVE-2019-2548 CVE-2018-11763, CVE-2019-2511, CVE-2019-2508, CVE-2019-2509,
CVE-2019-2527 CVE-2019-2450, CVE-2019-2451, CVE-2019-2555, CVE-2019-2554,
CVE-2019-2556 CVE-2018-11784, CVE-2018-0734, CVE-2019-2525, CVE-2019-2446,
CVE-2019-2448 CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506,
and CVE-2019-2553 (boo#1122212).
Non-security issues fixed:
- Linux Additions: fix for building vboxvideo on EL 7.6 standard kernel,
contributed by Robert Conde
- USB: fixed a problem causing failures attaching SuperSpeed devices which
report USB version 3.1 (rather than 3.0) on Windows hosts
- Audio: added support for surround speaker setups used by Windows 10
Build 1809
- Linux hosts: fixed conflict between Debian and Oracle build desktop files
- Linux guests: fixed building drivers on SLES 12.4
- Linux guests: fixed building shared folder driver with older kernels
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-84=1
Package List:
- openSUSE Leap 42.3 (noarch):
virtualbox-guest-desktop-icons-5.2.24-66.1
virtualbox-guest-source-5.2.24-66.1
virtualbox-host-source-5.2.24-66.1
- openSUSE Leap 42.3 (x86_64):
python-virtualbox-5.2.24-66.1
python-virtualbox-debuginfo-5.2.24-66.1
virtualbox-5.2.24-66.1
virtualbox-debuginfo-5.2.24-66.1
virtualbox-debugsource-5.2.24-66.1
virtualbox-devel-5.2.24-66.1
virtualbox-guest-kmp-default-5.2.24_k4.4.165_81-66.1
virtualbox-guest-kmp-default-debuginfo-5.2.24_k4.4.165_81-66.1
virtualbox-guest-tools-5.2.24-66.1
virtualbox-guest-tools-debuginfo-5.2.24-66.1
virtualbox-guest-x11-5.2.24-66.1
virtualbox-guest-x11-debuginfo-5.2.24-66.1
virtualbox-host-kmp-default-5.2.24_k4.4.165_81-66.1
virtualbox-host-kmp-default-debuginfo-5.2.24_k4.4.165_81-66.1
virtualbox-qt-5.2.24-66.1
virtualbox-qt-debuginfo-5.2.24-66.1
virtualbox-vnc-5.2.24-66.1
virtualbox-websrv-5.2.24-66.1
virtualbox-websrv-debuginfo-5.2.24-66.1
References:
https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-11763.html
https://www.suse.com/security/cve/CVE-2018-11784.html
https://www.suse.com/security/cve/CVE-2018-3309.html
https://www.suse.com/security/cve/CVE-2019-2446.html
https://www.suse.com/security/cve/CVE-2019-2448.html
https://www.suse.com/security/cve/CVE-2019-2450.html
https://www.suse.com/security/cve/CVE-2019-2451.html
https://www.suse.com/security/cve/CVE-2019-2500.html
https://www.suse.com/security/cve/CVE-2019-2501.html
https://www.suse.com/security/cve/CVE-2019-2504.html
https://www.suse.com/security/cve/CVE-2019-2505.html
https://www.suse.com/security/cve/CVE-2019-2506.html
https://www.suse.com/security/cve/CVE-2019-2508.html
https://www.suse.com/security/cve/CVE-2019-2509.html
https://www.suse.com/security/cve/CVE-2019-2511.html
https://www.suse.com/security/cve/CVE-2019-2520.html
https://www.suse.com/security/cve/CVE-2019-2521.html
https://www.suse.com/security/cve/CVE-2019-2522.html
https://www.suse.com/security/cve/CVE-2019-2523.html
https://www.suse.com/security/cve/CVE-2019-2524.html
https://www.suse.com/security/cve/CVE-2019-2525.html
https://www.suse.com/security/cve/CVE-2019-2526.html
https://www.suse.com/security/cve/CVE-2019-2527.html
https://www.suse.com/security/cve/CVE-2019-2548.html
https://www.suse.com/security/cve/CVE-2019-2552.html
https://www.suse.com/security/cve/CVE-2019-2553.html
https://www.suse.com/security/cve/CVE-2019-2554.html
https://www.suse.com/security/cve/CVE-2019-2555.html
https://www.suse.com/security/cve/CVE-2019-2556.html
https://bugzilla.suse.com/1122212
--
openSUSE-SU-2019:0085-1: important: Security update for krb5
openSUSE Security Update: Security update for krb5
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0085-1
Rating: important
References: #1120489
Cross-References: CVE-2018-20217
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for krb5 fixes the following security issue:
- CVE-2018-20217: Fixed an assertion issue with older encryption types
(bsc#1120489)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-85=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
krb5-1.12.5-22.1
krb5-client-1.12.5-22.1
krb5-client-debuginfo-1.12.5-22.1
krb5-debuginfo-1.12.5-22.1
krb5-debugsource-1.12.5-22.1
krb5-devel-1.12.5-22.1
krb5-doc-1.12.5-22.1
krb5-mini-1.12.5-22.1
krb5-mini-debuginfo-1.12.5-22.1
krb5-mini-debugsource-1.12.5-22.1
krb5-mini-devel-1.12.5-22.1
krb5-plugin-kdb-ldap-1.12.5-22.1
krb5-plugin-kdb-ldap-debuginfo-1.12.5-22.1
krb5-plugin-preauth-otp-1.12.5-22.1
krb5-plugin-preauth-otp-debuginfo-1.12.5-22.1
krb5-plugin-preauth-pkinit-1.12.5-22.1
krb5-plugin-preauth-pkinit-debuginfo-1.12.5-22.1
krb5-server-1.12.5-22.1
krb5-server-debuginfo-1.12.5-22.1
- openSUSE Leap 42.3 (x86_64):
krb5-32bit-1.12.5-22.1
krb5-debuginfo-32bit-1.12.5-22.1
krb5-devel-32bit-1.12.5-22.1
References:
https://www.suse.com/security/cve/CVE-2018-20217.html
https://bugzilla.suse.com/1120489
--
openSUSE-SU-2019:0086-1: moderate: Security update for soundtouch
openSUSE Security Update: Security update for soundtouch
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0086-1
Rating: moderate
References: #1108631 #1108632
Cross-References: CVE-2018-17097 CVE-2018-17098
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for soundtouch fixes the following issues:
Security issues fixed:
- CVE-2018-17098: Fixed a heap corruption from size inconsistency, which
allowed remote attackers to cause a denial of service or possibly have
other unspecified impact (bsc#1108632)
- CVE-2018-17097: Fixed a double free, which allowed remote attackers to
cause a denial of service or possibly have other unspecified impact
(bsc#1108631)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-86=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libSoundTouch0-1.8.0-lp150.2.9.1
libSoundTouch0-debuginfo-1.8.0-lp150.2.9.1
soundtouch-1.8.0-lp150.2.9.1
soundtouch-debuginfo-1.8.0-lp150.2.9.1
soundtouch-debugsource-1.8.0-lp150.2.9.1
soundtouch-devel-1.8.0-lp150.2.9.1
- openSUSE Leap 15.0 (x86_64):
libSoundTouch0-32bit-1.8.0-lp150.2.9.1
libSoundTouch0-32bit-debuginfo-1.8.0-lp150.2.9.1
References:
https://www.suse.com/security/cve/CVE-2018-17097.html
https://www.suse.com/security/cve/CVE-2018-17098.html
https://bugzilla.suse.com/1108631
https://bugzilla.suse.com/1108632
--
openSUSE-SU-2019:0087-1: important: Security update for zeromq
openSUSE Security Update: Security update for zeromq
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0087-1
Rating: important
References: #1082318 #1121717
Cross-References: CVE-2019-6250
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for zeromq fixes the following issues:
Security issue fixed:
- CVE-2019-6250: fix a remote execution vulnerability due to pointer
arithmetic overflow (bsc#1121717)
The following tracked packaging change is included:
- boo1082318: correctly mark license files as licence instead of
documentation.
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-87=1
Package List:
- openSUSE Leap 15.0 (x86_64):
libzmq5-4.2.3-lp150.2.10.1
libzmq5-debuginfo-4.2.3-lp150.2.10.1
zeromq-debugsource-4.2.3-lp150.2.10.1
zeromq-devel-4.2.3-lp150.2.10.1
zeromq-tools-4.2.3-lp150.2.10.1
zeromq-tools-debuginfo-4.2.3-lp150.2.10.1
References:
https://www.suse.com/security/cve/CVE-2019-6250.html
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1121717
--
openSUSE-SU-2019:0088-1: important: Security update for nodejs4
openSUSE Security Update: Security update for nodejs4
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0088-1
Rating: important
References: #1113534 #1113652 #1117625 #1117626 #1117627
#1117629 #1117630
Cross-References: CVE-2018-0734 CVE-2018-12116 CVE-2018-12120
CVE-2018-12121 CVE-2018-12122 CVE-2018-12123
CVE-2018-5407
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for nodejs4 fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed a timing vulnerability in the DSA signature
generation (bsc#1113652)
- CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka
"PortSmash") (bsc#1113534)
- CVE-2018-12120: Fixed that the debugger listens on any interface by
default (bsc#1117625)
- CVE-2018-12121: Fixed a denial of Service with large HTTP headers
(bsc#1117626)
- CVE-2018-12122: Fixed the "Slowloris" HTTP Denial of Service
(bsc#1117627)
- CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630)
- CVE-2018-12123: Fixed hostname spoofing in URL parser for javascript
protocol (bsc#1117629)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-88=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
nodejs4-4.9.1-20.1
nodejs4-debuginfo-4.9.1-20.1
nodejs4-debugsource-4.9.1-20.1
nodejs4-devel-4.9.1-20.1
npm4-4.9.1-20.1
- openSUSE Leap 42.3 (noarch):
nodejs4-docs-4.9.1-20.1
References:
https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-12116.html
https://www.suse.com/security/cve/CVE-2018-12120.html
https://www.suse.com/security/cve/CVE-2018-12121.html
https://www.suse.com/security/cve/CVE-2018-12122.html
https://www.suse.com/security/cve/CVE-2018-12123.html
https://www.suse.com/security/cve/CVE-2018-5407.html
https://bugzilla.suse.com/1113534
https://bugzilla.suse.com/1113652
https://bugzilla.suse.com/1117625
https://bugzilla.suse.com/1117626
https://bugzilla.suse.com/1117627
https://bugzilla.suse.com/1117629
https://bugzilla.suse.com/1117630
--