SUSE 5019 Published by

The following openSUSE updates has been released:

openSUSE-SU-2019:1920-1: important: Security update for dosbox
openSUSE-SU-2019:1921-1: important: Security update for pdns



openSUSE-SU-2019:1920-1: important: Security update for dosbox

openSUSE Security Update: Security update for dosbox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1920-1
Rating: important
References: #1140254
Cross-References: CVE-2019-12594 CVE-2019-7165
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for dosbox fixes the following issues:

Security issues fixed:

- CVE-2019-7165: Fixed that a very long line inside a bat file would
overflow the parsing buffer (bnc#1140254).
- CVE-2019-12594: Added a basic permission system so that a program
running inside DOSBox can't access the contents of /proc (e.g.
/proc/self/mem) when / or /proc were (to be) mounted (bnc#1140254).
- Several other fixes for out of bounds access and buffer overflows.

This update was imported from the openSUSE:Leap:15.0:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2019-1920=1



Package List:

- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

dosbox-0.74.3-bp151.4.3.1


References:

https://www.suse.com/security/cve/CVE-2019-12594.html
https://www.suse.com/security/cve/CVE-2019-7165.html
https://bugzilla.suse.com/1140254

--


openSUSE-SU-2019:1921-1: important: Security update for pdns

openSUSE Security Update: Security update for pdns
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1921-1
Rating: important
References: #1138582 #1142810
Cross-References: CVE-2019-10162 CVE-2019-10163 CVE-2019-10203

Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for pdns fixes the following issues:

Security issues fixed:

- CVE-2019-10203: Updated PostgreSQL schema to address a possible denial
of service by an authorized user by inserting a crafted record in a
MASTER type zone under their control. (boo#1142810)
- CVE-2019-10162: Fixed a denial of service but when authorized user to
cause the server to exit by inserting a crafted record in a MASTER type
zone under their control. (boo#1138582)
- CVE-2019-10163: Fixed a denial of service of slave server when an
authorized master server sends large number of NOTIFY messages.
(boo#1138582)

Non-security issues fixed:

- Enabled the option to disable superslave support.
- Fixed `pdnsutil b2b-migrate` to not lose NSEC3 settings.

This update was imported from the openSUSE:Leap:15.1:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2019-1921=1



Package List:

- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

pdns-4.1.8-bp151.3.3.1
pdns-backend-geoip-4.1.8-bp151.3.3.1
pdns-backend-godbc-4.1.8-bp151.3.3.1
pdns-backend-ldap-4.1.8-bp151.3.3.1
pdns-backend-lua-4.1.8-bp151.3.3.1
pdns-backend-mydns-4.1.8-bp151.3.3.1
pdns-backend-mysql-4.1.8-bp151.3.3.1
pdns-backend-postgresql-4.1.8-bp151.3.3.1
pdns-backend-remote-4.1.8-bp151.3.3.1
pdns-backend-sqlite3-4.1.8-bp151.3.3.1


References:

https://www.suse.com/security/cve/CVE-2019-10162.html
https://www.suse.com/security/cve/CVE-2019-10163.html
https://www.suse.com/security/cve/CVE-2019-10203.html
https://bugzilla.suse.com/1138582
https://bugzilla.suse.com/1142810

--