SUSE 5009 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:0084-1: important: Security update for virtualbox
openSUSE-SU-2019:0085-1: important: Security update for krb5
openSUSE-SU-2019:0086-1: moderate: Security update for soundtouch
openSUSE-SU-2019:0087-1: important: Security update for zeromq
openSUSE-SU-2019:0088-1: important: Security update for nodejs4



openSUSE-SU-2019:0084-1: important: Security update for virtualbox

openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0084-1
Rating: important
References: #1122212
Cross-References: CVE-2018-0734 CVE-2018-11763 CVE-2018-11784
CVE-2018-3309 CVE-2019-2446 CVE-2019-2448
CVE-2019-2450 CVE-2019-2451 CVE-2019-2500
CVE-2019-2501 CVE-2019-2504 CVE-2019-2505
CVE-2019-2506 CVE-2019-2508 CVE-2019-2509
CVE-2019-2511 CVE-2019-2520 CVE-2019-2521
CVE-2019-2522 CVE-2019-2523 CVE-2019-2524
CVE-2019-2525 CVE-2019-2526 CVE-2019-2527
CVE-2019-2548 CVE-2019-2552 CVE-2019-2553
CVE-2019-2554 CVE-2019-2555 CVE-2019-2556

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 30 vulnerabilities is now available.

Description:

This update for virtualbox version 5.2.24 fixes the following issues:

Update fixes multiple vulnerabilities:

CVE-2019-2500, CVE-2019-2524, CVE-2019-2552, CVE-2018-3309,
CVE-2019-2520 CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2526,
CVE-2019-2548 CVE-2018-11763, CVE-2019-2511, CVE-2019-2508, CVE-2019-2509,
CVE-2019-2527 CVE-2019-2450, CVE-2019-2451, CVE-2019-2555, CVE-2019-2554,
CVE-2019-2556 CVE-2018-11784, CVE-2018-0734, CVE-2019-2525, CVE-2019-2446,
CVE-2019-2448 CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506,
and CVE-2019-2553 (boo#1122212).

Non-security issues fixed:

- Linux Additions: fix for building vboxvideo on EL 7.6 standard kernel,
contributed by Robert Conde
- USB: fixed a problem causing failures attaching SuperSpeed devices which
report USB version 3.1 (rather than 3.0) on Windows hosts
- Audio: added support for surround speaker setups used by Windows 10
Build 1809
- Linux hosts: fixed conflict between Debian and Oracle build desktop files
- Linux guests: fixed building drivers on SLES 12.4
- Linux guests: fixed building shared folder driver with older kernels


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-84=1



Package List:

- openSUSE Leap 42.3 (noarch):

virtualbox-guest-desktop-icons-5.2.24-66.1
virtualbox-guest-source-5.2.24-66.1
virtualbox-host-source-5.2.24-66.1

- openSUSE Leap 42.3 (x86_64):

python-virtualbox-5.2.24-66.1
python-virtualbox-debuginfo-5.2.24-66.1
virtualbox-5.2.24-66.1
virtualbox-debuginfo-5.2.24-66.1
virtualbox-debugsource-5.2.24-66.1
virtualbox-devel-5.2.24-66.1
virtualbox-guest-kmp-default-5.2.24_k4.4.165_81-66.1
virtualbox-guest-kmp-default-debuginfo-5.2.24_k4.4.165_81-66.1
virtualbox-guest-tools-5.2.24-66.1
virtualbox-guest-tools-debuginfo-5.2.24-66.1
virtualbox-guest-x11-5.2.24-66.1
virtualbox-guest-x11-debuginfo-5.2.24-66.1
virtualbox-host-kmp-default-5.2.24_k4.4.165_81-66.1
virtualbox-host-kmp-default-debuginfo-5.2.24_k4.4.165_81-66.1
virtualbox-qt-5.2.24-66.1
virtualbox-qt-debuginfo-5.2.24-66.1
virtualbox-vnc-5.2.24-66.1
virtualbox-websrv-5.2.24-66.1
virtualbox-websrv-debuginfo-5.2.24-66.1


References:

https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-11763.html
https://www.suse.com/security/cve/CVE-2018-11784.html
https://www.suse.com/security/cve/CVE-2018-3309.html
https://www.suse.com/security/cve/CVE-2019-2446.html
https://www.suse.com/security/cve/CVE-2019-2448.html
https://www.suse.com/security/cve/CVE-2019-2450.html
https://www.suse.com/security/cve/CVE-2019-2451.html
https://www.suse.com/security/cve/CVE-2019-2500.html
https://www.suse.com/security/cve/CVE-2019-2501.html
https://www.suse.com/security/cve/CVE-2019-2504.html
https://www.suse.com/security/cve/CVE-2019-2505.html
https://www.suse.com/security/cve/CVE-2019-2506.html
https://www.suse.com/security/cve/CVE-2019-2508.html
https://www.suse.com/security/cve/CVE-2019-2509.html
https://www.suse.com/security/cve/CVE-2019-2511.html
https://www.suse.com/security/cve/CVE-2019-2520.html
https://www.suse.com/security/cve/CVE-2019-2521.html
https://www.suse.com/security/cve/CVE-2019-2522.html
https://www.suse.com/security/cve/CVE-2019-2523.html
https://www.suse.com/security/cve/CVE-2019-2524.html
https://www.suse.com/security/cve/CVE-2019-2525.html
https://www.suse.com/security/cve/CVE-2019-2526.html
https://www.suse.com/security/cve/CVE-2019-2527.html
https://www.suse.com/security/cve/CVE-2019-2548.html
https://www.suse.com/security/cve/CVE-2019-2552.html
https://www.suse.com/security/cve/CVE-2019-2553.html
https://www.suse.com/security/cve/CVE-2019-2554.html
https://www.suse.com/security/cve/CVE-2019-2555.html
https://www.suse.com/security/cve/CVE-2019-2556.html
https://bugzilla.suse.com/1122212

--


openSUSE-SU-2019:0085-1: important: Security update for krb5

openSUSE Security Update: Security update for krb5
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0085-1
Rating: important
References: #1120489
Cross-References: CVE-2018-20217
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for krb5 fixes the following security issue:

- CVE-2018-20217: Fixed an assertion issue with older encryption types
(bsc#1120489)

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-85=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

krb5-1.12.5-22.1
krb5-client-1.12.5-22.1
krb5-client-debuginfo-1.12.5-22.1
krb5-debuginfo-1.12.5-22.1
krb5-debugsource-1.12.5-22.1
krb5-devel-1.12.5-22.1
krb5-doc-1.12.5-22.1
krb5-mini-1.12.5-22.1
krb5-mini-debuginfo-1.12.5-22.1
krb5-mini-debugsource-1.12.5-22.1
krb5-mini-devel-1.12.5-22.1
krb5-plugin-kdb-ldap-1.12.5-22.1
krb5-plugin-kdb-ldap-debuginfo-1.12.5-22.1
krb5-plugin-preauth-otp-1.12.5-22.1
krb5-plugin-preauth-otp-debuginfo-1.12.5-22.1
krb5-plugin-preauth-pkinit-1.12.5-22.1
krb5-plugin-preauth-pkinit-debuginfo-1.12.5-22.1
krb5-server-1.12.5-22.1
krb5-server-debuginfo-1.12.5-22.1

- openSUSE Leap 42.3 (x86_64):

krb5-32bit-1.12.5-22.1
krb5-debuginfo-32bit-1.12.5-22.1
krb5-devel-32bit-1.12.5-22.1


References:

https://www.suse.com/security/cve/CVE-2018-20217.html
https://bugzilla.suse.com/1120489

--


openSUSE-SU-2019:0086-1: moderate: Security update for soundtouch

openSUSE Security Update: Security update for soundtouch
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0086-1
Rating: moderate
References: #1108631 #1108632
Cross-References: CVE-2018-17097 CVE-2018-17098
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for soundtouch fixes the following issues:

Security issues fixed:

- CVE-2018-17098: Fixed a heap corruption from size inconsistency, which
allowed remote attackers to cause a denial of service or possibly have
other unspecified impact (bsc#1108632)
- CVE-2018-17097: Fixed a double free, which allowed remote attackers to
cause a denial of service or possibly have other unspecified impact
(bsc#1108631)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-86=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

libSoundTouch0-1.8.0-lp150.2.9.1
libSoundTouch0-debuginfo-1.8.0-lp150.2.9.1
soundtouch-1.8.0-lp150.2.9.1
soundtouch-debuginfo-1.8.0-lp150.2.9.1
soundtouch-debugsource-1.8.0-lp150.2.9.1
soundtouch-devel-1.8.0-lp150.2.9.1

- openSUSE Leap 15.0 (x86_64):

libSoundTouch0-32bit-1.8.0-lp150.2.9.1
libSoundTouch0-32bit-debuginfo-1.8.0-lp150.2.9.1


References:

https://www.suse.com/security/cve/CVE-2018-17097.html
https://www.suse.com/security/cve/CVE-2018-17098.html
https://bugzilla.suse.com/1108631
https://bugzilla.suse.com/1108632

--


openSUSE-SU-2019:0087-1: important: Security update for zeromq

openSUSE Security Update: Security update for zeromq
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0087-1
Rating: important
References: #1082318 #1121717
Cross-References: CVE-2019-6250
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for zeromq fixes the following issues:

Security issue fixed:

- CVE-2019-6250: fix a remote execution vulnerability due to pointer
arithmetic overflow (bsc#1121717)

The following tracked packaging change is included:

- boo1082318: correctly mark license files as licence instead of
documentation.

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-87=1



Package List:

- openSUSE Leap 15.0 (x86_64):

libzmq5-4.2.3-lp150.2.10.1
libzmq5-debuginfo-4.2.3-lp150.2.10.1
zeromq-debugsource-4.2.3-lp150.2.10.1
zeromq-devel-4.2.3-lp150.2.10.1
zeromq-tools-4.2.3-lp150.2.10.1
zeromq-tools-debuginfo-4.2.3-lp150.2.10.1


References:

https://www.suse.com/security/cve/CVE-2019-6250.html
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1121717

--


openSUSE-SU-2019:0088-1: important: Security update for nodejs4

openSUSE Security Update: Security update for nodejs4
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0088-1
Rating: important
References: #1113534 #1113652 #1117625 #1117626 #1117627
#1117629 #1117630
Cross-References: CVE-2018-0734 CVE-2018-12116 CVE-2018-12120
CVE-2018-12121 CVE-2018-12122 CVE-2018-12123
CVE-2018-5407
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 7 vulnerabilities is now available.

Description:

This update for nodejs4 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed a timing vulnerability in the DSA signature
generation (bsc#1113652)
- CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka
"PortSmash") (bsc#1113534)
- CVE-2018-12120: Fixed that the debugger listens on any interface by
default (bsc#1117625)
- CVE-2018-12121: Fixed a denial of Service with large HTTP headers
(bsc#1117626)
- CVE-2018-12122: Fixed the "Slowloris" HTTP Denial of Service
(bsc#1117627)
- CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630)
- CVE-2018-12123: Fixed hostname spoofing in URL parser for javascript
protocol (bsc#1117629)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-88=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

nodejs4-4.9.1-20.1
nodejs4-debuginfo-4.9.1-20.1
nodejs4-debugsource-4.9.1-20.1
nodejs4-devel-4.9.1-20.1
npm4-4.9.1-20.1

- openSUSE Leap 42.3 (noarch):

nodejs4-docs-4.9.1-20.1


References:

https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-12116.html
https://www.suse.com/security/cve/CVE-2018-12120.html
https://www.suse.com/security/cve/CVE-2018-12121.html
https://www.suse.com/security/cve/CVE-2018-12122.html
https://www.suse.com/security/cve/CVE-2018-12123.html
https://www.suse.com/security/cve/CVE-2018-5407.html
https://bugzilla.suse.com/1113534
https://bugzilla.suse.com/1113652
https://bugzilla.suse.com/1117625
https://bugzilla.suse.com/1117626
https://bugzilla.suse.com/1117627
https://bugzilla.suse.com/1117629
https://bugzilla.suse.com/1117630

--