SUSE 5008 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:1813-1: important: Security update for MozillaThunderbird
openSUSE-SU-2019:1814-1: important: Security update for virtualbox
openSUSE-SU-2019:1815-1: important: Security update for chromium
openSUSE-SU-2019:1816-1: moderate: Security update for openexr



openSUSE-SU-2019:1813-1: important: Security update for MozillaThunderbird

openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1813-1
Rating: important
References: #1140868
Cross-References: CVE-2019-11709 CVE-2019-11711 CVE-2019-11712
CVE-2019-11713 CVE-2019-11715 CVE-2019-11717
CVE-2019-11719 CVE-2019-11729 CVE-2019-11730
CVE-2019-9811
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 10 vulnerabilities is now available.

Description:

This update for MozillaThunderbird version 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language
pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window
reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI
plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a
segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS
(bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins
(bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key
(bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as
having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

Non-security issued fixed:

- Calendar: Problems when editing event times, some related to AM/PM
setting in non-English locales

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1813=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1813=1



Package List:

- openSUSE Leap 15.1 (x86_64):

MozillaThunderbird-60.8.0-lp151.2.10.1
MozillaThunderbird-buildsymbols-60.8.0-lp151.2.10.1
MozillaThunderbird-debuginfo-60.8.0-lp151.2.10.1
MozillaThunderbird-debugsource-60.8.0-lp151.2.10.1
MozillaThunderbird-translations-common-60.8.0-lp151.2.10.1
MozillaThunderbird-translations-other-60.8.0-lp151.2.10.1

- openSUSE Leap 15.0 (x86_64):

MozillaThunderbird-60.8.0-lp150.3.48.1
MozillaThunderbird-buildsymbols-60.8.0-lp150.3.48.1
MozillaThunderbird-debuginfo-60.8.0-lp150.3.48.1
MozillaThunderbird-debugsource-60.8.0-lp150.3.48.1
MozillaThunderbird-translations-common-60.8.0-lp150.3.48.1
MozillaThunderbird-translations-other-60.8.0-lp150.3.48.1


References:

https://www.suse.com/security/cve/CVE-2019-11709.html
https://www.suse.com/security/cve/CVE-2019-11711.html
https://www.suse.com/security/cve/CVE-2019-11712.html
https://www.suse.com/security/cve/CVE-2019-11713.html
https://www.suse.com/security/cve/CVE-2019-11715.html
https://www.suse.com/security/cve/CVE-2019-11717.html
https://www.suse.com/security/cve/CVE-2019-11719.html
https://www.suse.com/security/cve/CVE-2019-11729.html
https://www.suse.com/security/cve/CVE-2019-11730.html
https://www.suse.com/security/cve/CVE-2019-9811.html
https://bugzilla.suse.com/1140868

--


openSUSE-SU-2019:1814-1: important: Security update for virtualbox

openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1814-1
Rating: important
References: #1097248 #1098050 #1112097 #1113894 #1115041
#1116050 #1130503 #1130588 #1132379 #1132439
#1132827 #1133289 #1133492 #1141801
Cross-References: CVE-2018-0734 CVE-2018-11763 CVE-2018-11784
CVE-2018-3288 CVE-2018-3289 CVE-2018-3290
CVE-2018-3291 CVE-2018-3292 CVE-2018-3293
CVE-2018-3294 CVE-2018-3295 CVE-2018-3296
CVE-2018-3297 CVE-2018-3298 CVE-2019-1543
CVE-2019-2446 CVE-2019-2448 CVE-2019-2450
CVE-2019-2451 CVE-2019-2508 CVE-2019-2509
CVE-2019-2511 CVE-2019-2525 CVE-2019-2527
CVE-2019-2554 CVE-2019-2555 CVE-2019-2556
CVE-2019-2574 CVE-2019-2656 CVE-2019-2657
CVE-2019-2678 CVE-2019-2679 CVE-2019-2680
CVE-2019-2690 CVE-2019-2696 CVE-2019-2703
CVE-2019-2721 CVE-2019-2722 CVE-2019-2723
CVE-2019-2848 CVE-2019-2850 CVE-2019-2859
CVE-2019-2863 CVE-2019-2864 CVE-2019-2865
CVE-2019-2866 CVE-2019-2867 CVE-2019-2873
CVE-2019-2874 CVE-2019-2875 CVE-2019-2876
CVE-2019-2877
Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 52 vulnerabilities is now available.

Description:

This update for virtualbox to version 6.0.10 fixes the following issues:

Security issues fixed:

- CVE-2019-2859 CVE-2019-2867 CVE-2019-2866 CVE-2019-2864 CVE-2019-2865
CVE-2019-1543 CVE-2019-2863 CVE-2019-2848 CVE-2019-2877 CVE-2019-2873
CVE-2019-2874 CVE-2019-2875 CVE-2019-2876 CVE-2019-2850 (boo#1141801)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1814=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1814=1



Package List:

- openSUSE Leap 15.1 (x86_64):

python3-virtualbox-6.0.10-lp151.2.6.1
python3-virtualbox-debuginfo-6.0.10-lp151.2.6.1
virtualbox-6.0.10-lp151.2.6.1
virtualbox-debuginfo-6.0.10-lp151.2.6.1
virtualbox-debugsource-6.0.10-lp151.2.6.1
virtualbox-devel-6.0.10-lp151.2.6.1
virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1
virtualbox-guest-kmp-default-debuginfo-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1
virtualbox-guest-tools-6.0.10-lp151.2.6.1
virtualbox-guest-tools-debuginfo-6.0.10-lp151.2.6.1
virtualbox-guest-x11-6.0.10-lp151.2.6.1
virtualbox-guest-x11-debuginfo-6.0.10-lp151.2.6.1
virtualbox-host-kmp-default-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1
virtualbox-host-kmp-default-debuginfo-6.0.10_k4.12.14_lp151.28.10-lp151.2.6.1
virtualbox-qt-6.0.10-lp151.2.6.1
virtualbox-qt-debuginfo-6.0.10-lp151.2.6.1
virtualbox-vnc-6.0.10-lp151.2.6.1
virtualbox-websrv-6.0.10-lp151.2.6.1
virtualbox-websrv-debuginfo-6.0.10-lp151.2.6.1

- openSUSE Leap 15.1 (noarch):

virtualbox-guest-desktop-icons-6.0.10-lp151.2.6.1
virtualbox-guest-source-6.0.10-lp151.2.6.1
virtualbox-host-source-6.0.10-lp151.2.6.1

- openSUSE Leap 15.0 (noarch):

virtualbox-guest-desktop-icons-6.0.10-lp150.4.36.1
virtualbox-guest-source-6.0.10-lp150.4.36.1
virtualbox-host-source-6.0.10-lp150.4.36.1

- openSUSE Leap 15.0 (x86_64):

python3-virtualbox-6.0.10-lp150.4.36.1
python3-virtualbox-debuginfo-6.0.10-lp150.4.36.1
virtualbox-6.0.10-lp150.4.36.1
virtualbox-debuginfo-6.0.10-lp150.4.36.1
virtualbox-debugsource-6.0.10-lp150.4.36.1
virtualbox-devel-6.0.10-lp150.4.36.1
virtualbox-guest-kmp-default-6.0.10_k4.12.14_lp150.12.67-lp150.4.36.1
virtualbox-guest-kmp-default-debuginfo-6.0.10_k4.12.14_lp150.12.67-lp150.4.36.1
virtualbox-guest-tools-6.0.10-lp150.4.36.1
virtualbox-guest-tools-debuginfo-6.0.10-lp150.4.36.1
virtualbox-guest-x11-6.0.10-lp150.4.36.1
virtualbox-guest-x11-debuginfo-6.0.10-lp150.4.36.1
virtualbox-host-kmp-default-6.0.10_k4.12.14_lp150.12.67-lp150.4.36.1
virtualbox-host-kmp-default-debuginfo-6.0.10_k4.12.14_lp150.12.67-lp150.4.36.1
virtualbox-qt-6.0.10-lp150.4.36.1
virtualbox-qt-debuginfo-6.0.10-lp150.4.36.1
virtualbox-vnc-6.0.10-lp150.4.36.1
virtualbox-websrv-6.0.10-lp150.4.36.1
virtualbox-websrv-debuginfo-6.0.10-lp150.4.36.1


References:

https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-11763.html
https://www.suse.com/security/cve/CVE-2018-11784.html
https://www.suse.com/security/cve/CVE-2018-3288.html
https://www.suse.com/security/cve/CVE-2018-3289.html
https://www.suse.com/security/cve/CVE-2018-3290.html
https://www.suse.com/security/cve/CVE-2018-3291.html
https://www.suse.com/security/cve/CVE-2018-3292.html
https://www.suse.com/security/cve/CVE-2018-3293.html
https://www.suse.com/security/cve/CVE-2018-3294.html
https://www.suse.com/security/cve/CVE-2018-3295.html
https://www.suse.com/security/cve/CVE-2018-3296.html
https://www.suse.com/security/cve/CVE-2018-3297.html
https://www.suse.com/security/cve/CVE-2018-3298.html
https://www.suse.com/security/cve/CVE-2019-1543.html
https://www.suse.com/security/cve/CVE-2019-2446.html
https://www.suse.com/security/cve/CVE-2019-2448.html
https://www.suse.com/security/cve/CVE-2019-2450.html
https://www.suse.com/security/cve/CVE-2019-2451.html
https://www.suse.com/security/cve/CVE-2019-2508.html
https://www.suse.com/security/cve/CVE-2019-2509.html
https://www.suse.com/security/cve/CVE-2019-2511.html
https://www.suse.com/security/cve/CVE-2019-2525.html
https://www.suse.com/security/cve/CVE-2019-2527.html
https://www.suse.com/security/cve/CVE-2019-2554.html
https://www.suse.com/security/cve/CVE-2019-2555.html
https://www.suse.com/security/cve/CVE-2019-2556.html
https://www.suse.com/security/cve/CVE-2019-2574.html
https://www.suse.com/security/cve/CVE-2019-2656.html
https://www.suse.com/security/cve/CVE-2019-2657.html
https://www.suse.com/security/cve/CVE-2019-2678.html
https://www.suse.com/security/cve/CVE-2019-2679.html
https://www.suse.com/security/cve/CVE-2019-2680.html
https://www.suse.com/security/cve/CVE-2019-2690.html
https://www.suse.com/security/cve/CVE-2019-2696.html
https://www.suse.com/security/cve/CVE-2019-2703.html
https://www.suse.com/security/cve/CVE-2019-2721.html
https://www.suse.com/security/cve/CVE-2019-2722.html
https://www.suse.com/security/cve/CVE-2019-2723.html
https://www.suse.com/security/cve/CVE-2019-2848.html
https://www.suse.com/security/cve/CVE-2019-2850.html
https://www.suse.com/security/cve/CVE-2019-2859.html
https://www.suse.com/security/cve/CVE-2019-2863.html
https://www.suse.com/security/cve/CVE-2019-2864.html
https://www.suse.com/security/cve/CVE-2019-2865.html
https://www.suse.com/security/cve/CVE-2019-2866.html
https://www.suse.com/security/cve/CVE-2019-2867.html
https://www.suse.com/security/cve/CVE-2019-2873.html
https://www.suse.com/security/cve/CVE-2019-2874.html
https://www.suse.com/security/cve/CVE-2019-2875.html
https://www.suse.com/security/cve/CVE-2019-2876.html
https://www.suse.com/security/cve/CVE-2019-2877.html
https://bugzilla.suse.com/1097248
https://bugzilla.suse.com/1098050
https://bugzilla.suse.com/1112097
https://bugzilla.suse.com/1113894
https://bugzilla.suse.com/1115041
https://bugzilla.suse.com/1116050
https://bugzilla.suse.com/1130503
https://bugzilla.suse.com/1130588
https://bugzilla.suse.com/1132379
https://bugzilla.suse.com/1132439
https://bugzilla.suse.com/1132827
https://bugzilla.suse.com/1133289
https://bugzilla.suse.com/1133492
https://bugzilla.suse.com/1141801

--


openSUSE-SU-2019:1815-1: important: Security update for chromium

openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1815-1
Rating: important
References: #1120892 #1141102 #1141649
Cross-References: CVE-2018-20073 CVE-2019-5847 CVE-2019-5848

Affected Products:
openSUSE Leap 15.1
openSUSE Leap 15.0
openSUSE Backports SLE-15
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for chromium to version 75.0.3770.142 fixes the following
issues:

Security issue fixed:

- CVE-2019-5847: V8 sealed/frozen elements cause crash (boo#1141649).
- CVE-2019-5848: Font sizes may expose sensitive information (boo#1141649).
- CVE-2018-20073: Fixed information leaks of URL metadata nad passwords
via extended filesystem attributes (boo#1120892).

Non-security fix:

- Fixed a segfault on startup (boo#1141102).


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-1815=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1815=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-1815=1

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2019-1815=1



Package List:

- openSUSE Leap 15.1 (x86_64):

chromedriver-75.0.3770.142-lp151.2.12.4
chromedriver-debuginfo-75.0.3770.142-lp151.2.12.4
chromium-75.0.3770.142-lp151.2.12.4
chromium-debuginfo-75.0.3770.142-lp151.2.12.4
chromium-debugsource-75.0.3770.142-lp151.2.12.4

- openSUSE Leap 15.0 (x86_64):

chromedriver-75.0.3770.142-lp150.221.4
chromedriver-debuginfo-75.0.3770.142-lp150.221.4
chromium-75.0.3770.142-lp150.221.4
chromium-debuginfo-75.0.3770.142-lp150.221.4
chromium-debugsource-75.0.3770.142-lp150.221.4

- openSUSE Backports SLE-15 (aarch64 x86_64):

chromedriver-75.0.3770.142-bp150.217.1
chromedriver-debuginfo-75.0.3770.142-bp150.217.1
chromium-75.0.3770.142-bp150.217.1
chromium-debuginfo-75.0.3770.142-bp150.217.1
chromium-debugsource-75.0.3770.142-bp150.217.1

- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):

chromedriver-75.0.3770.142-7.1
chromedriver-debuginfo-75.0.3770.142-7.1
chromium-75.0.3770.142-7.1
chromium-debuginfo-75.0.3770.142-7.1
chromium-debugsource-75.0.3770.142-7.1


References:

https://www.suse.com/security/cve/CVE-2018-20073.html
https://www.suse.com/security/cve/CVE-2019-5847.html
https://www.suse.com/security/cve/CVE-2019-5848.html
https://bugzilla.suse.com/1120892
https://bugzilla.suse.com/1141102
https://bugzilla.suse.com/1141649

--


openSUSE-SU-2019:1816-1: moderate: Security update for openexr

openSUSE Security Update: Security update for openexr
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1816-1
Rating: moderate
References: #1040109 #1040113 #1040115
Cross-References: CVE-2017-9111 CVE-2017-9113 CVE-2017-9115

Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for openexr fixes the following issues:

Security issues fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function
in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the
bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator
function inhalf.h (bsc#1040115).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1816=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

libIlmImf-2_2-23-2.2.1-lp150.2.6.1
libIlmImf-2_2-23-debuginfo-2.2.1-lp150.2.6.1
libIlmImfUtil-2_2-23-2.2.1-lp150.2.6.1
libIlmImfUtil-2_2-23-debuginfo-2.2.1-lp150.2.6.1
openexr-2.2.1-lp150.2.6.1
openexr-debuginfo-2.2.1-lp150.2.6.1
openexr-debugsource-2.2.1-lp150.2.6.1
openexr-devel-2.2.1-lp150.2.6.1
openexr-doc-2.2.1-lp150.2.6.1

- openSUSE Leap 15.0 (x86_64):

libIlmImf-2_2-23-32bit-2.2.1-lp150.2.6.1
libIlmImf-2_2-23-32bit-debuginfo-2.2.1-lp150.2.6.1
libIlmImfUtil-2_2-23-32bit-2.2.1-lp150.2.6.1
libIlmImfUtil-2_2-23-32bit-debuginfo-2.2.1-lp150.2.6.1


References:

https://www.suse.com/security/cve/CVE-2017-9111.html
https://www.suse.com/security/cve/CVE-2017-9113.html
https://www.suse.com/security/cve/CVE-2017-9115.html
https://bugzilla.suse.com/1040109
https://bugzilla.suse.com/1040113
https://bugzilla.suse.com/1040115

--