openSUSE Security Update: Security update for otrs
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4046-1
Rating: moderate
References: #1115416
Cross-References: CVE-2018-19141 CVE-2018-19143
Affected Products:
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for otrs fixes the following issues:
Update to version 4.0.33.
Security issues fixed:
- CVE-2018-19141: Fixed privilege escalation, that an attacker who is
logged into OTRS as an admin user cannot manipulate the URL to cause
execution of JavaScript in the context of OTRS.
- CVE-2018-19143: Fixed remote file deletion, that an attacker who is
logged into OTRS as a user cannot manipulate the submission form to
cause deletion of arbitrary files that the OTRS web server user has
write access to.
Non-security issues fixed:
- Full release notes can be found at:
* https://community.otrs.com/release-notes-otrs-4-patch-level-33/
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1503=1
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1503=1
Package List:
- openSUSE Leap 15.0 (noarch):
otrs-4.0.33-lp150.2.6.1
otrs-doc-4.0.33-lp150.2.6.1
otrs-itsm-4.0.33-lp150.2.6.1
- openSUSE Backports SLE-15 (noarch):
otrs-4.0.33-bp150.3.6.1
otrs-doc-4.0.33-bp150.3.6.1
otrs-itsm-4.0.33-bp150.3.6.1
References:
https://www.suse.com/security/cve/CVE-2018-19141.htmlhttps://www.suse.com/security/cve/CVE-2018-19143.htmlhttps://bugzilla.suse.com/1115416
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for dom4j
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4045-1
Rating: moderate
References: #1105443
Cross-References: CVE-2018-1000632
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for dom4j fixes the following issues:
- CVE-2018-1000632: Prevent XML injection that could have resulted in an
attacker tampering with XML documents (bsc#1105443).
This update was imported from the SUSE:SLE-15:Update update project. This
update was imported from the openSUSE:Leap:15.0:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1492=1
Package List:
- openSUSE Backports SLE-15 (noarch):
dom4j-1.6.1-bp150.2.3.1
dom4j-demo-1.6.1-bp150.2.3.1
dom4j-javadoc-1.6.1-bp150.2.3.1
dom4j-manual-1.6.1-bp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-1000632.htmlhttps://bugzilla.suse.com/1105443
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for pam
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4043-1
Rating: important
References: #1115640
Cross-References: CVE-2018-17953
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pam fixes the following issue:
Security issue fixed:
- CVE-2018-17953: Fixed IP address and subnet handling of pam_access.so
that was not honoured correctly when a single host was specified
(bsc#1115640).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1511=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
pam-1.3.0-lp150.5.6.1
pam-debuginfo-1.3.0-lp150.5.6.1
pam-debugsource-1.3.0-lp150.5.6.1
pam-devel-1.3.0-lp150.5.6.1
- openSUSE Leap 15.0 (x86_64):
pam-32bit-1.3.0-lp150.5.6.1
pam-32bit-debuginfo-1.3.0-lp150.5.6.1
pam-devel-32bit-1.3.0-lp150.5.6.1
- openSUSE Leap 15.0 (noarch):
pam-doc-1.3.0-lp150.5.6.1
References:
https://www.suse.com/security/cve/CVE-2018-17953.htmlhttps://bugzilla.suse.com/1115640
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for tomcat
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4042-1
Rating: moderate
References: #1110850
Cross-References: CVE-2018-11784
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for tomcat to 9.0.12 fixes the following issues:
See the full changelog at:
http://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat_9.0.12_(markt
)
Security issues fixed:
- CVE-2018-11784: When the default servlet in Apache Tomcat returned a
redirect to a directory (e.g. redirecting to '/foo/' when the user
requested '/foo') a specially crafted URL could be used to cause the
redirect to be generated to any URI of the attackers choice.
(bsc#1110850)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1504=1
Package List:
- openSUSE Leap 15.0 (noarch):
tomcat-9.0.12-lp150.2.6.1
tomcat-admin-webapps-9.0.12-lp150.2.6.1
tomcat-docs-webapp-9.0.12-lp150.2.6.1
tomcat-el-3_0-api-9.0.12-lp150.2.6.1
tomcat-embed-9.0.12-lp150.2.6.1
tomcat-javadoc-9.0.12-lp150.2.6.1
tomcat-jsp-2_3-api-9.0.12-lp150.2.6.1
tomcat-jsvc-9.0.12-lp150.2.6.1
tomcat-lib-9.0.12-lp150.2.6.1
tomcat-servlet-4_0-api-9.0.12-lp150.2.6.1
tomcat-webapps-9.0.12-lp150.2.6.1
References:
https://www.suse.com/security/cve/CVE-2018-11784.htmlhttps://bugzilla.suse.com/1110850
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for rubygem-activejob-5_1
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4041-1
Rating: low
References: #1117632
Cross-References: CVE-2018-16476
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for rubygem-activejob-5_1 fixes the following issues:
Security issue fixed:
- CVE-2018-16476: Fixed broken access control vulnerability (bsc#1117632).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1502=1
Package List:
- openSUSE Leap 15.0 (x86_64):
ruby2.5-rubygem-activejob-5_1-5.1.4-lp150.2.3.1
ruby2.5-rubygem-activejob-doc-5_1-5.1.4-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-16476.htmlhttps://bugzilla.suse.com/1117632
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ncurses
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4034-1
Rating: important
References: #1115929
Cross-References: CVE-2018-19211
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for ncurses fixes the following issue:
Security issue fixed:
- CVE-2018-19211: Fixed denial of service issue that was triggered by a
NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1509=1
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libncurses5-5.9-66.1
libncurses5-debuginfo-5.9-66.1
libncurses6-5.9-66.1
libncurses6-debuginfo-5.9-66.1
ncurses-debugsource-5.9-66.1
ncurses-devel-5.9-66.1
ncurses-devel-debuginfo-5.9-66.1
ncurses-utils-5.9-66.1
ncurses-utils-debuginfo-5.9-66.1
tack-5.9-66.1
tack-debuginfo-5.9-66.1
terminfo-5.9-66.1
terminfo-base-5.9-66.1
- openSUSE Leap 42.3 (x86_64):
libncurses5-32bit-5.9-66.1
libncurses5-debuginfo-32bit-5.9-66.1
libncurses6-32bit-5.9-66.1
libncurses6-debuginfo-32bit-5.9-66.1
ncurses-devel-32bit-5.9-66.1
ncurses-devel-debuginfo-32bit-5.9-66.1
References:
https://www.suse.com/security/cve/CVE-2018-19211.htmlhttps://bugzilla.suse.com/1115929
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for apache2-mod_jk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4032-1
Rating: important
References: #1114612
Cross-References: CVE-2018-11759
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for apache2-mod_jk fixes the following issue:
Security issue fixed:
- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP
requests in httpd (bsc#1114612).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1510=1
Package List:
- openSUSE Leap 15.0 (x86_64):
apache2-mod_jk-1.2.43-lp150.2.3.1
apache2-mod_jk-debuginfo-1.2.43-lp150.2.3.1
apache2-mod_jk-debugsource-1.2.43-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-11759.htmlhttps://bugzilla.suse.com/1114612
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org