SUSE 5020 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:1056-1: important: Security update for MozillaFirefox
openSUSE-SU-2019:1058-1: Security update for GraphicsMagick
openSUSE-SU-2019:1059-1: moderate: Security update for lftp



openSUSE-SU-2019:1056-1: important: Security update for MozillaFirefox

openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1056-1
Rating: important
References: #1129821 #1130262
Cross-References: CVE-2018-18506 CVE-2019-9788 CVE-2019-9790
CVE-2019-9791 CVE-2019-9792 CVE-2019-9793
CVE-2019-9794 CVE-2019-9795 CVE-2019-9796
CVE-2019-9810 CVE-2019-9813
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 11 vulnerabilities is now available.

Description:

This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 60.6.1esr (MFSA 2019-10 boo#1130262)

* CVE-2019-9810: IonMonkey MArraySlice has incorrect alias information
* CVE-2019-9813: Ionmonkey type confusion with __proto__ mutations

Mozilla Firefox was updated to 60.6.0esr (MFSA 2019-08 boo#1129821)

* CVE-2019-9790: Use-after-free when removing in-use DOM elements
* CVE-2019-9791: Type inference is incorrect for constructors entered
through on-stack replacement with IonMonkey
* CVE-2019-9792: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
* CVE-2019-9793: Improper bounds checks when Spectre mitigations are
disabled
* CVE-2019-9794: Command line arguments not discarded during execution
* CVE-2019-9795: Type-confusion in IonMonkey JIT compiler
* CVE-2019-9796: Use-after-free with SMIL animation controller
* CVE-2018-18506: Proxy Auto-Configuration file can define localhost
access to be proxied
* CVE-2019-9788: Memory safety bugs fixed in Firefox 66 and Firefox ESR
60.6

Mozilla Firefox was updated to 60.5.2esr:

* Fix a frequent crash when reading various Reuters news articles


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1056=1



Package List:

- openSUSE Leap 42.3 (x86_64):

MozillaFirefox-60.6.1-135.1
MozillaFirefox-branding-upstream-60.6.1-135.1
MozillaFirefox-buildsymbols-60.6.1-135.1
MozillaFirefox-debuginfo-60.6.1-135.1
MozillaFirefox-debugsource-60.6.1-135.1
MozillaFirefox-devel-60.6.1-135.1
MozillaFirefox-translations-common-60.6.1-135.1
MozillaFirefox-translations-other-60.6.1-135.1


References:

https://www.suse.com/security/cve/CVE-2018-18506.html
https://www.suse.com/security/cve/CVE-2019-9788.html
https://www.suse.com/security/cve/CVE-2019-9790.html
https://www.suse.com/security/cve/CVE-2019-9791.html
https://www.suse.com/security/cve/CVE-2019-9792.html
https://www.suse.com/security/cve/CVE-2019-9793.html
https://www.suse.com/security/cve/CVE-2019-9794.html
https://www.suse.com/security/cve/CVE-2019-9795.html
https://www.suse.com/security/cve/CVE-2019-9796.html
https://www.suse.com/security/cve/CVE-2019-9810.html
https://www.suse.com/security/cve/CVE-2019-9813.html
https://bugzilla.suse.com/1129821
https://bugzilla.suse.com/1130262

--


openSUSE-SU-2019:1058-1: Security update for GraphicsMagick

openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1058-1
Rating: low
References: #1128649
Cross-References: CVE-2019-7175
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for GraphicsMagick fixes the following issue:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function
(bsc#1128649).


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1058=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

GraphicsMagick-1.3.25-129.1
GraphicsMagick-debuginfo-1.3.25-129.1
GraphicsMagick-debugsource-1.3.25-129.1
GraphicsMagick-devel-1.3.25-129.1
libGraphicsMagick++-Q16-12-1.3.25-129.1
libGraphicsMagick++-Q16-12-debuginfo-1.3.25-129.1
libGraphicsMagick++-devel-1.3.25-129.1
libGraphicsMagick-Q16-3-1.3.25-129.1
libGraphicsMagick-Q16-3-debuginfo-1.3.25-129.1
libGraphicsMagick3-config-1.3.25-129.1
libGraphicsMagickWand-Q16-2-1.3.25-129.1
libGraphicsMagickWand-Q16-2-debuginfo-1.3.25-129.1
perl-GraphicsMagick-1.3.25-129.1
perl-GraphicsMagick-debuginfo-1.3.25-129.1


References:

https://www.suse.com/security/cve/CVE-2019-7175.html
https://bugzilla.suse.com/1128649

--


openSUSE-SU-2019:1059-1: moderate: Security update for lftp

openSUSE Security Update: Security update for lftp
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1059-1
Rating: moderate
References: #1103367 #1120946
Cross-References: CVE-2018-10916
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for lftp fixes the following issues:

Security issue fixed:

- CVE-2018-10916: Fixed an improper file name sanitization which could
lead to loss of integrity of the local system (bsc#1103367).

Other issue addressed:

- The SSH login handling code detects password prompts more reliably
(bsc#1120946).

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1059=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

lftp-4.7.4-2.6.1
lftp-debuginfo-4.7.4-2.6.1
lftp-debugsource-4.7.4-2.6.1


References:

https://www.suse.com/security/cve/CVE-2018-10916.html
https://bugzilla.suse.com/1103367
https://bugzilla.suse.com/1120946

--