openSUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3539-1
Rating: moderate
References: #1080798 #1098854 #1099835 #1104205 #1109209
#1111873
Cross-References: CVE-2018-14526
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that solves one vulnerability and has 5 fixes is
now available.
Description:
This update for wpa_supplicant provides the following fixes:
This security issues was fixe:
- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key
messages was not checked, leading to a decryption oracle. An attacker
within range of the Access Point and client could have abused the
vulnerability to recover sensitive information (bsc#1104205)
These non-security issues were fixed:
- Fix reading private key passwords from the configuration file.
(bsc#1099835)
- Enable PWD as EAP method. This allows for password-based authentication,
which is easier to setup than most of the other methods, and is used by
the Eduroam network. (bsc#1109209)
- compile eapol_test binary to allow testing via radius proxy and server
(note: this does not match CONFIG_EAPOL_TEST which sets -Werror and
activates an assert call inside the code of wpa_supplicant)
(bsc#1111873), (fate#326725)
- Enabled timestamps in log file when being invoked by systemd service
file (bsc#1080798).
- Fixes the default file permissions of the debug log file to more sane
values, i.e. it is no longer world-readable (bsc#1098854).
- Open the debug log file with O_CLOEXEC, which will prevent file
descriptor leaking to child processes (bsc#1098854).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1316=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
wpa_supplicant-2.6-lp150.3.6.1
wpa_supplicant-debuginfo-2.6-lp150.3.6.1
wpa_supplicant-debugsource-2.6-lp150.3.6.1
wpa_supplicant-gui-2.6-lp150.3.6.1
wpa_supplicant-gui-debuginfo-2.6-lp150.3.6.1
References:
https://www.suse.com/security/cve/CVE-2018-14526.htmlhttps://bugzilla.suse.com/1080798https://bugzilla.suse.com/1098854https://bugzilla.suse.com/1099835https://bugzilla.suse.com/1104205https://bugzilla.suse.com/1109209https://bugzilla.suse.com/1111873
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for audiofile
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3537-1
Rating: moderate
References: #1111586
Cross-References: CVE-2018-17095
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for audiofile fixes the following issues:
- CVE-2018-17095: A heap-based buffer overflow in Expand3To4Module::run
could occurred when running sfconvert leading to crashes or code
execution when handling untrusted soundfiles (bsc#1111586).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1325=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
audiofile-0.3.6-lp150.2.3.1
audiofile-debuginfo-0.3.6-lp150.2.3.1
audiofile-debugsource-0.3.6-lp150.2.3.1
audiofile-devel-0.3.6-lp150.2.3.1
audiofile-doc-0.3.6-lp150.2.3.1
libaudiofile1-0.3.6-lp150.2.3.1
libaudiofile1-debuginfo-0.3.6-lp150.2.3.1
- openSUSE Leap 15.0 (x86_64):
audiofile-devel-32bit-0.3.6-lp150.2.3.1
libaudiofile1-32bit-0.3.6-lp150.2.3.1
libaudiofile1-32bit-debuginfo-0.3.6-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-17095.htmlhttps://bugzilla.suse.com/1111586
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for lcms2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3529-1
Rating: moderate
References: #1108813
Cross-References: CVE-2018-16435
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for lcms2 fixes the following issues:
- CVE-2018-16435: Heap-based buffer overflow via a crafted file in the
second argument to cmsIT8LoadFromFile (bsc#1108813)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1327=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
lcms2-2.9-lp150.2.3.1
lcms2-debuginfo-2.9-lp150.2.3.1
lcms2-debugsource-2.9-lp150.2.3.1
liblcms2-2-2.9-lp150.2.3.1
liblcms2-2-debuginfo-2.9-lp150.2.3.1
liblcms2-devel-2.9-lp150.2.3.1
- openSUSE Leap 15.0 (noarch):
liblcms2-doc-2.9-lp150.2.3.1
- openSUSE Leap 15.0 (x86_64):
liblcms2-2-32bit-2.9-lp150.2.3.1
liblcms2-2-32bit-debuginfo-2.9-lp150.2.3.1
liblcms2-devel-32bit-2.9-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-16435.htmlhttps://bugzilla.suse.com/1108813
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3524-1
Rating: moderate
References: #1107609 #1112399
Cross-References: CVE-2017-14997 CVE-2018-16644
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2017-14997: GraphicsMagick allowed remote attackers to cause a
denial of service (excessive memory allocation) because of an integer
underflow in ReadPICTImage in coders/pict.c. [bsc#1112399]
- CVE-2018-16644: An regression in the security fix for the pict coder was
fixed (bsc#1107609)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1312=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
ImageMagick-6.8.8.1-76.1
ImageMagick-debuginfo-6.8.8.1-76.1
ImageMagick-debugsource-6.8.8.1-76.1
ImageMagick-devel-6.8.8.1-76.1
ImageMagick-extra-6.8.8.1-76.1
ImageMagick-extra-debuginfo-6.8.8.1-76.1
libMagick++-6_Q16-3-6.8.8.1-76.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-76.1
libMagick++-devel-6.8.8.1-76.1
libMagickCore-6_Q16-1-6.8.8.1-76.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-76.1
libMagickWand-6_Q16-1-6.8.8.1-76.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-76.1
perl-PerlMagick-6.8.8.1-76.1
perl-PerlMagick-debuginfo-6.8.8.1-76.1
- openSUSE Leap 42.3 (x86_64):
ImageMagick-devel-32bit-6.8.8.1-76.1
libMagick++-6_Q16-3-32bit-6.8.8.1-76.1
libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-76.1
libMagick++-devel-32bit-6.8.8.1-76.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-76.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-76.1
libMagickWand-6_Q16-1-32bit-6.8.8.1-76.1
libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-76.1
- openSUSE Leap 42.3 (noarch):
ImageMagick-doc-6.8.8.1-76.1
References:
https://www.suse.com/security/cve/CVE-2017-14997.htmlhttps://www.suse.com/security/cve/CVE-2018-16644.htmlhttps://bugzilla.suse.com/1107609https://bugzilla.suse.com/1112399
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for libgit2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3519-1
Rating: moderate
References: #1085256 #1095219 #1100612 #1100613 #1104641
Cross-References: CVE-2018-10887 CVE-2018-10888 CVE-2018-11235
CVE-2018-15501 CVE-2018-8099
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for libgit2 fixes the following issues:
- CVE-2018-8099: Fixed possible denial of service attack via different
vectors by not being able to differentiate between these status codes
(bsc#1085256).
- CVE-2018-11235: With a crafted .gitmodules file, a malicious project can
execute an arbitrary script on a machine that runs "git clone
--recurse-submodules" because submodule "names" are obtained from this
file, and then appended to $GIT_DIR/modules, leading to directory
traversal with "../" in a name. Finally, post-checkout hooks from a
submodule are executed, bypassing the intended design in which hooks are
not obtained from a remote server. (bsc#1095219)
- CVE-2018-10887: It has been discovered that an unexpected sign extension
in git_delta_apply function in delta.c file may have lead to an integer
overflow which in turn leads to an out of bound read, allowing to read
before the base object. An attacker could have used this flaw to leak
memory addresses or cause a Denial of Service. (bsc#1100613)
- CVE-2018-10888: A missing check in git_delta_apply function in delta.c
file, may lead to an out-of-bound read while reading a binary delta
file. An attacker may use this flaw to cause a Denial of Service.
(bsc#1100612)
- CVE-2018-15501: A remote attacker can send a crafted smart-protocol "ng"
packet that lacks a '\0' byte to trigger an out-of-bounds read that
leads to DoS. (bsc#1104641)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1314=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libgit2-24-0.24.1-10.3.1
libgit2-24-debuginfo-0.24.1-10.3.1
libgit2-debugsource-0.24.1-10.3.1
libgit2-devel-0.24.1-10.3.1
- openSUSE Leap 42.3 (x86_64):
libgit2-24-32bit-0.24.1-10.3.1
libgit2-24-debuginfo-32bit-0.24.1-10.3.1
References:
https://www.suse.com/security/cve/CVE-2018-10887.htmlhttps://www.suse.com/security/cve/CVE-2018-10888.htmlhttps://www.suse.com/security/cve/CVE-2018-11235.htmlhttps://www.suse.com/security/cve/CVE-2018-15501.htmlhttps://www.suse.com/security/cve/CVE-2018-8099.htmlhttps://bugzilla.suse.com/1085256https://bugzilla.suse.com/1095219https://bugzilla.suse.com/1100612https://bugzilla.suse.com/1100613https://bugzilla.suse.com/1104641
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for mercurial
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3517-1
Rating: moderate
References: #1110899
Cross-References: CVE-2018-17983
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mercurial fixes the following issues:
- CVE-2018-17983: Fix an out-of-bounds read during parsing of a malformed
manifest entry (bsc#1110899).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1297=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
mercurial-4.5.2-lp150.2.6.1
mercurial-debuginfo-4.5.2-lp150.2.6.1
mercurial-debugsource-4.5.2-lp150.2.6.1
- openSUSE Leap 15.0 (noarch):
mercurial-lang-4.5.2-lp150.2.6.1
References:
https://www.suse.com/security/cve/CVE-2018-17983.htmlhttps://bugzilla.suse.com/1110899
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for net-snmp
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3508-1
Rating: important
References: #1027353 #1081164 #1102775 #1111122
Cross-References: CVE-2018-18065
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for net-snmp fixes the following issues:
Security issues fixed:
- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL
Pointer Exception bug that can be used by an authenticated attacker to
remotely cause the instance to crash via a crafted UDP packet, resulting
in Denial of Service. (bsc#1111122)
Non-security issues fixed:
- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1313=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libsnmp30-5.7.3-7.3.1
libsnmp30-debuginfo-5.7.3-7.3.1
net-snmp-5.7.3-7.3.1
net-snmp-debuginfo-5.7.3-7.3.1
net-snmp-debugsource-5.7.3-7.3.1
net-snmp-devel-5.7.3-7.3.1
net-snmp-python-5.7.3-7.3.1
net-snmp-python-debuginfo-5.7.3-7.3.1
perl-SNMP-5.7.3-7.3.1
perl-SNMP-debuginfo-5.7.3-7.3.1
snmp-mibs-5.7.3-7.3.1
- openSUSE Leap 42.3 (x86_64):
libsnmp30-32bit-5.7.3-7.3.1
libsnmp30-debuginfo-32bit-5.7.3-7.3.1
net-snmp-devel-32bit-5.7.3-7.3.1
References:
https://www.suse.com/security/cve/CVE-2018-18065.htmlhttps://bugzilla.suse.com/1027353https://bugzilla.suse.com/1081164https://bugzilla.suse.com/1102775https://bugzilla.suse.com/1111122
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for clamav
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3505-1
Rating: moderate
References: #1103040 #1104457 #1110723
Cross-References: CVE-2018-14680 CVE-2018-14681 CVE-2018-14682
CVE-2018-15378
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for clamav fixes the following issues:
clamav was updated to version 0.100.2:
- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
libmspack. (bsc#1103040)
- Make freshclam more robust against lagging signature mirrors.
- On-Access "Extra Scanning", an opt-in minor feature of OnAccess scanning
on Linux systems, has been disabled due to a known issue with resource
cleanup OnAccessExtraScanning will be re-enabled in a future release
when the issue is resolved. In the mean-time, users who enabled the
feature in clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date (bsc#1104457).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1310=1
Package List:
- openSUSE Leap 42.3 (x86_64):
clamav-0.100.2-32.1
clamav-debuginfo-0.100.2-32.1
clamav-debugsource-0.100.2-32.1
References:
https://www.suse.com/security/cve/CVE-2018-14680.htmlhttps://www.suse.com/security/cve/CVE-2018-14681.htmlhttps://www.suse.com/security/cve/CVE-2018-14682.htmlhttps://www.suse.com/security/cve/CVE-2018-15378.htmlhttps://bugzilla.suse.com/1103040https://bugzilla.suse.com/1104457https://bugzilla.suse.com/1110723
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for jhead
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3481-1
Rating: moderate
References: #1108480 #1108672
Cross-References: CVE-2018-16554 CVE-2018-17088
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for jhead fixes the following issues:
Security issues fixed:
- CVE-2018-17088: The ProcessGpsInfo function may have allowed a remote
attacker to cause a denial-of-service attack or unspecified other impact
via a malicious JPEG file, because there is an integer overflow during a
check for whether a location exceeds the EXIF data length. This is
analogous to the CVE-2016-3822 integer overflow in exif.c. (boo#1108672)
- CVE-2018-16554: The ProcessGpsInfo function may have allowed a remote
attacker to cause a denial-of-service attack or unspecified other impact
via a malicious JPEG file, because of inconsistency between float and
double in a sprintf format string during TAG_GPS_ALT handling.
(boo#1108480)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1292=1
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1292=1
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1292=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
jhead-3.00-14.1
jhead-debuginfo-3.00-14.1
jhead-debugsource-3.00-14.1
- openSUSE Leap 15.0 (x86_64):
jhead-3.00-lp150.3.6.1
jhead-debuginfo-3.00-lp150.3.6.1
jhead-debugsource-3.00-lp150.3.6.1
- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):
jhead-3.00-bp150.3.7.1
References:
https://www.suse.com/security/cve/CVE-2018-16554.htmlhttps://www.suse.com/security/cve/CVE-2018-17088.htmlhttps://bugzilla.suse.com/1108480https://bugzilla.suse.com/1108672
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org