SUSE 5009 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:1272-1: moderate: Security update for GraphicsMagick
openSUSE-SU-2019:1273-1: important: Security update for python
openSUSE-SU-2019:1274-1: important: Security update for qemu
openSUSE-SU-2019:1275-1: important: Security update for lxc, lxcfs
openSUSE-SU-2019:1276-1: moderate: Security update for xmltooling



openSUSE-SU-2019:1272-1: moderate: Security update for GraphicsMagick

openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1272-1
Rating: moderate
References: #1132053 #1132054 #1132055 #1132058 #1132060
#1132061
Cross-References: CVE-2019-11005 CVE-2019-11006 CVE-2019-11007
CVE-2019-11008 CVE-2019-11009 CVE-2019-11010

Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for GraphicsMagick fixes the following issues:

- CVE-2019-11005: Fixed a stack-based buffer overflow in SVGStartElement
of coders/svg.c that allowed attackers to cause DOS or an unspecified
impact (boo#1132058)
- CVE-2019-11006: Fixed a heap-based buffer over-read in the function
ReadMIFFImage of coders/miff.c that allowed attackers to cause DOS or
information disclosure (boo#1132061)
- CVE-2019-11010: Fixed a memory leak in ReadMPCImage of coders/mpc.c that
which allowed attackers to cause DOS via a crafted image file
(boo#1132055)
- CVE-2019-11007: Fixed a heap-based buffer over-read in the ReadMNGImage
function of coders/png.c that which allowed attackers to cause a denial
of service or information disclosure (boo#1132060)
- CVE-2019-11008: Fixed a heap-based buffer overflow in the function
WriteXWDImage of coders/xwd.c that which allowed remote attackers to
cause DOS or other unspecified impact (boo#1132054)
- CVE-2019-11009: Fixed a heap-based buffer over-read in the function
ReadXWDImage of coders/xwd.c that which allowed attackers to cause DOS
or information disclosure (boo#1132053)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1272=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1272=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

GraphicsMagick-1.3.25-132.1
GraphicsMagick-debuginfo-1.3.25-132.1
GraphicsMagick-debugsource-1.3.25-132.1
GraphicsMagick-devel-1.3.25-132.1
libGraphicsMagick++-Q16-12-1.3.25-132.1
libGraphicsMagick++-Q16-12-debuginfo-1.3.25-132.1
libGraphicsMagick++-devel-1.3.25-132.1
libGraphicsMagick-Q16-3-1.3.25-132.1
libGraphicsMagick-Q16-3-debuginfo-1.3.25-132.1
libGraphicsMagick3-config-1.3.25-132.1
libGraphicsMagickWand-Q16-2-1.3.25-132.1
libGraphicsMagickWand-Q16-2-debuginfo-1.3.25-132.1
perl-GraphicsMagick-1.3.25-132.1
perl-GraphicsMagick-debuginfo-1.3.25-132.1

- openSUSE Leap 15.0 (x86_64):

GraphicsMagick-1.3.29-lp150.3.25.1
GraphicsMagick-debuginfo-1.3.29-lp150.3.25.1
GraphicsMagick-debugsource-1.3.29-lp150.3.25.1
GraphicsMagick-devel-1.3.29-lp150.3.25.1
libGraphicsMagick++-Q16-12-1.3.29-lp150.3.25.1
libGraphicsMagick++-Q16-12-debuginfo-1.3.29-lp150.3.25.1
libGraphicsMagick++-devel-1.3.29-lp150.3.25.1
libGraphicsMagick-Q16-3-1.3.29-lp150.3.25.1
libGraphicsMagick-Q16-3-debuginfo-1.3.29-lp150.3.25.1
libGraphicsMagick3-config-1.3.29-lp150.3.25.1
libGraphicsMagickWand-Q16-2-1.3.29-lp150.3.25.1
libGraphicsMagickWand-Q16-2-debuginfo-1.3.29-lp150.3.25.1
perl-GraphicsMagick-1.3.29-lp150.3.25.1
perl-GraphicsMagick-debuginfo-1.3.29-lp150.3.25.1


References:

https://www.suse.com/security/cve/CVE-2019-11005.html
https://www.suse.com/security/cve/CVE-2019-11006.html
https://www.suse.com/security/cve/CVE-2019-11007.html
https://www.suse.com/security/cve/CVE-2019-11008.html
https://www.suse.com/security/cve/CVE-2019-11009.html
https://www.suse.com/security/cve/CVE-2019-11010.html
https://bugzilla.suse.com/1132053
https://bugzilla.suse.com/1132054
https://bugzilla.suse.com/1132055
https://bugzilla.suse.com/1132058
https://bugzilla.suse.com/1132060
https://bugzilla.suse.com/1132061

--


openSUSE-SU-2019:1273-1: important: Security update for python

openSUSE Security Update: Security update for python
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1273-1
Rating: important
References: #1129346 #1130847
Cross-References: CVE-2019-9636 CVE-2019-9948
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the
'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect
handling of Unicode encoding during NFKC normalization (bsc#1129346).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1273=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

python-2.7.14-lp150.6.10.1
python-curses-2.7.14-lp150.6.10.1
python-curses-debuginfo-2.7.14-lp150.6.10.1
python-debuginfo-2.7.14-lp150.6.10.1
python-debugsource-2.7.14-lp150.6.10.1
python-demo-2.7.14-lp150.6.10.1
python-gdbm-2.7.14-lp150.6.10.1
python-gdbm-debuginfo-2.7.14-lp150.6.10.1
python-idle-2.7.14-lp150.6.10.1
python-tk-2.7.14-lp150.6.10.1
python-tk-debuginfo-2.7.14-lp150.6.10.1

- openSUSE Leap 15.0 (x86_64):

python-32bit-2.7.14-lp150.6.10.1
python-32bit-debuginfo-2.7.14-lp150.6.10.1


References:

https://www.suse.com/security/cve/CVE-2019-9636.html
https://www.suse.com/security/cve/CVE-2019-9948.html
https://bugzilla.suse.com/1129346
https://bugzilla.suse.com/1130847

--


openSUSE-SU-2019:1274-1: important: Security update for qemu

openSUSE Security Update: Security update for qemu
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1274-1
Rating: important
References: #1118900 #1125721 #1126455 #1129622 #1130675
#1131955
Cross-References: CVE-2018-20815 CVE-2019-3812 CVE-2019-8934
CVE-2019-9824
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves four vulnerabilities and has two
fixes is now available.

Description:

This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-9824: Fixed information leak in slirp (bsc#1129622).
- CVE-2019-8934: Added method to specify whether or not to expose certain
ppc64 hostinformation (bsc#1126455).
- CVE-2019-3812: Fixed Out-of-bounds memory access and information leak in
virtual monitor interface (bsc#1125721).
- CVE-2018-20815: Fixed a denial of service possibility in device tree
processing (bsc#1130675).

Non-security issue fixed:

- Backported Skylake-Server vcpu model support from qemu v2.11
(FATE#327261 bsc#1131955).
- Added ability to set virtqueue size using virtqueue_size parameter
(FATE#327255 bsc#1118900).

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1274=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

qemu-linux-user-2.9.1-59.1
qemu-linux-user-debuginfo-2.9.1-59.1
qemu-linux-user-debugsource-2.9.1-59.1

- openSUSE Leap 42.3 (noarch):

qemu-ipxe-1.0.0+-59.1
qemu-seabios-1.10.2-59.1
qemu-sgabios-8-59.1
qemu-vgabios-1.10.2-59.1

- openSUSE Leap 42.3 (x86_64):

qemu-2.9.1-59.1
qemu-arm-2.9.1-59.1
qemu-arm-debuginfo-2.9.1-59.1
qemu-block-curl-2.9.1-59.1
qemu-block-curl-debuginfo-2.9.1-59.1
qemu-block-dmg-2.9.1-59.1
qemu-block-dmg-debuginfo-2.9.1-59.1
qemu-block-iscsi-2.9.1-59.1
qemu-block-iscsi-debuginfo-2.9.1-59.1
qemu-block-rbd-2.9.1-59.1
qemu-block-rbd-debuginfo-2.9.1-59.1
qemu-block-ssh-2.9.1-59.1
qemu-block-ssh-debuginfo-2.9.1-59.1
qemu-debugsource-2.9.1-59.1
qemu-extra-2.9.1-59.1
qemu-extra-debuginfo-2.9.1-59.1
qemu-guest-agent-2.9.1-59.1
qemu-guest-agent-debuginfo-2.9.1-59.1
qemu-ksm-2.9.1-59.1
qemu-kvm-2.9.1-59.1
qemu-lang-2.9.1-59.1
qemu-ppc-2.9.1-59.1
qemu-ppc-debuginfo-2.9.1-59.1
qemu-s390-2.9.1-59.1
qemu-s390-debuginfo-2.9.1-59.1
qemu-testsuite-2.9.1-59.2
qemu-tools-2.9.1-59.1
qemu-tools-debuginfo-2.9.1-59.1
qemu-x86-2.9.1-59.1
qemu-x86-debuginfo-2.9.1-59.1


References:

https://www.suse.com/security/cve/CVE-2018-20815.html
https://www.suse.com/security/cve/CVE-2019-3812.html
https://www.suse.com/security/cve/CVE-2019-8934.html
https://www.suse.com/security/cve/CVE-2019-9824.html
https://bugzilla.suse.com/1118900
https://bugzilla.suse.com/1125721
https://bugzilla.suse.com/1126455
https://bugzilla.suse.com/1129622
https://bugzilla.suse.com/1130675
https://bugzilla.suse.com/1131955

--


openSUSE-SU-2019:1275-1: important: Security update for lxc, lxcfs

openSUSE Security Update: Security update for lxc, lxcfs
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1275-1
Rating: important
References: #1122185 #1131762 #988348
Cross-References: CVE-2018-6556 CVE-2019-5736
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for lxc, lxcfs to version 3.1.0 fixes the following issues:

Security issues fixed:

- CVE-2019-5736: Fixed a container breakout vulnerability (boo#1122185).
- CVE-2018-6556: Enable setuid bit on lxc-user-nic (boo#988348).

Non-security issues fixed:

- Update to LXC 3.1.0. The changelog is far too long to include here,
please look at https://linuxcontainers.org/. (boo#1131762)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-1275=1



Package List:

- openSUSE Leap 15.0 (x86_64):

liblxc-devel-3.1.0-lp150.2.10.1
liblxc1-3.1.0-lp150.2.10.1
liblxc1-debuginfo-3.1.0-lp150.2.10.1
lxc-3.1.0-lp150.2.10.1
lxc-debuginfo-3.1.0-lp150.2.10.1
lxc-debugsource-3.1.0-lp150.2.10.1
lxcfs-3.0.3-lp150.2.3.1
lxcfs-debuginfo-3.0.3-lp150.2.3.1
lxcfs-debugsource-3.0.3-lp150.2.3.1
pam_cgfs-3.1.0-lp150.2.10.1
pam_cgfs-debuginfo-3.1.0-lp150.2.10.1

- openSUSE Leap 15.0 (noarch):

lxc-bash-completion-3.1.0-lp150.2.10.1
lxcfs-hooks-lxc-3.0.3-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-6556.html
https://www.suse.com/security/cve/CVE-2019-5736.html
https://bugzilla.suse.com/1122185
https://bugzilla.suse.com/1131762
https://bugzilla.suse.com/988348

--


openSUSE-SU-2019:1276-1: moderate: Security update for xmltooling

openSUSE Security Update: Security update for xmltooling
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1276-1
Rating: moderate
References: #1129537
Cross-References: CVE-2019-9628
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for xmltooling fixes the following issue:

Security issue fixed:

- CVE-2019-9628: Fixed an improper handling of exception in XMLTooling
library which could result in denial of service against the application
using XMLTooling (bsc#1129537).

This update was imported from the SUSE:SLE-12-SP1:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1276=1



Package List:

- openSUSE Leap 42.3 (x86_64):

libxmltooling-devel-1.5.6-12.1
libxmltooling6-1.5.6-12.1
libxmltooling6-debuginfo-1.5.6-12.1
xmltooling-debugsource-1.5.6-12.1
xmltooling-schemas-1.5.6-12.1


References:

https://www.suse.com/security/cve/CVE-2019-9628.html
https://bugzilla.suse.com/1129537

--