openSUSE Recommended Update: Recommended update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-RU-2017:2906-1
Rating: moderate
References: #1064298
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for chromium fixes the following issues:
- Chromium sandbox may crash with a black screen, Chrome apps failed
(boo#1064298)
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1225=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1225=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
chromedriver-62.0.3202.75-121.1
chromedriver-debuginfo-62.0.3202.75-121.1
chromium-62.0.3202.75-121.1
chromium-debuginfo-62.0.3202.75-121.1
chromium-debugsource-62.0.3202.75-121.1
- openSUSE Leap 42.2 (x86_64):
chromedriver-62.0.3202.75-104.35.1
chromedriver-debuginfo-62.0.3202.75-104.35.1
chromium-62.0.3202.75-104.35.1
chromium-debuginfo-62.0.3202.75-104.35.1
chromium-debugsource-62.0.3202.75-104.35.1
References:
https://bugzilla.suse.com/1064298
openSUSE Recommended Update: Recommended update for permissions
______________________________________________________________________________
Announcement ID: openSUSE-RU-2017:2903-1
Rating: moderate
References: #1028304 #1048645 #1060738
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that has three recommended fixes can now be
installed.
Description:
This update for permissions fixes the following issues:
- Allows users to install the HPC "singularity" toolkit for managing
singularity containers in setuid root mode. (bsc#1028304)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1220=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1220=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
permissions-2015.09.28.1626-16.1
permissions-debuginfo-2015.09.28.1626-16.1
permissions-debugsource-2015.09.28.1626-16.1
- openSUSE Leap 42.2 (i586 x86_64):
permissions-2015.09.28.1626-13.3.1
permissions-debuginfo-2015.09.28.1626-13.3.1
permissions-debugsource-2015.09.28.1626-13.3.1
References:
https://bugzilla.suse.com/1028304https://bugzilla.suse.com/1048645https://bugzilla.suse.com/1060738
openSUSE Recommended Update: Recommended update for timezone
______________________________________________________________________________
Announcement ID: openSUSE-RU-2017:2900-1
Rating: low
References: #1064571
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update provides the latest timezone information (2017c) for your
system, including following changes:
- Northern Cyprus switches from +03 to +02/+03 on 2017-10-29
- Fiji ends DST 2018-01-14, not 2018-01-21
- Namibia switches from +01/+02 to +02 on 2018-04-01
- Sudan switches from +03 to +02 on 2017-11-01
- Tonga likely switches from +13/+14 to +13 on 2017-11-05
- Turks and Caicos switches from -04 to -05/-04 on 2018-11-04
- Corrections to past DST transitions
- Move oversized Canada/East-Saskatchewan to 'backward' file
- zic(8) and the reference runtime now reject multiple leap seconds within
28 days
of each other, or leap seconds before the Epoch.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1219=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
timezone-2017c-39.7.2
timezone-debuginfo-2017c-39.7.2
timezone-debugsource-2017c-39.7.2
- openSUSE Leap 42.2 (noarch):
timezone-java-2017c-0.39.7.2
References:
https://bugzilla.suse.com/1064571
openSUSE Security Update: Security update for libjpeg-turbo
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2899-1
Rating: moderate
References: #1062937
Cross-References: CVE-2017-15232
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libjpeg-turbo to version 1.5.2 fixes the following issues:
* CVE-2017-15232: NULL pointer dereference in jdpostct.c and jquant1.c
(boo#1062937)
This compatible version update contains the following improvements:
* Improved and updated upsampling support and sampling factors
* Memory handling correctness fixes
* Improved robustness when decoding images
This version is a dependency of Chromium 62.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1218=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1218=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
libjpeg-turbo-1.5.2-38.1
libjpeg-turbo-debuginfo-1.5.2-38.1
libjpeg-turbo-debugsource-1.5.2-38.1
libjpeg62-62.2.0-38.1
libjpeg62-debuginfo-62.2.0-38.1
libjpeg62-devel-62.2.0-38.1
libjpeg62-turbo-1.5.2-38.1
libjpeg62-turbo-debugsource-1.5.2-38.1
libjpeg8-8.1.2-38.1
libjpeg8-debuginfo-8.1.2-38.1
libjpeg8-devel-8.1.2-38.1
libturbojpeg0-8.1.2-38.1
libturbojpeg0-debuginfo-8.1.2-38.1
- openSUSE Leap 42.3 (x86_64):
libjpeg62-32bit-62.2.0-38.1
libjpeg62-debuginfo-32bit-62.2.0-38.1
libjpeg62-devel-32bit-62.2.0-38.1
libjpeg8-32bit-8.1.2-38.1
libjpeg8-debuginfo-32bit-8.1.2-38.1
libjpeg8-devel-32bit-8.1.2-38.1
libturbojpeg0-32bit-8.1.2-38.1
libturbojpeg0-debuginfo-32bit-8.1.2-38.1
- openSUSE Leap 42.2 (i586 x86_64):
libjpeg-turbo-1.5.2-35.3.1
libjpeg-turbo-debuginfo-1.5.2-35.3.1
libjpeg-turbo-debugsource-1.5.2-35.3.1
libjpeg62-62.2.0-35.3.1
libjpeg62-debuginfo-62.2.0-35.3.1
libjpeg62-devel-62.2.0-35.3.1
libjpeg62-turbo-1.5.2-35.3.1
libjpeg62-turbo-debugsource-1.5.2-35.3.1
libjpeg8-8.1.2-35.3.1
libjpeg8-debuginfo-8.1.2-35.3.1
libjpeg8-devel-8.1.2-35.3.1
libturbojpeg0-8.1.2-35.3.1
libturbojpeg0-debuginfo-8.1.2-35.3.1
- openSUSE Leap 42.2 (x86_64):
libjpeg62-32bit-62.2.0-35.3.1
libjpeg62-debuginfo-32bit-62.2.0-35.3.1
libjpeg62-devel-32bit-62.2.0-35.3.1
libjpeg8-32bit-8.1.2-35.3.1
libjpeg8-debuginfo-32bit-8.1.2-35.3.1
libjpeg8-devel-32bit-8.1.2-35.3.1
libturbojpeg0-32bit-8.1.2-35.3.1
libturbojpeg0-debuginfo-32bit-8.1.2-35.3.1
References:
https://www.suse.com/security/cve/CVE-2017-15232.htmlhttps://bugzilla.suse.com/1062937
openSUSE Security Update: Security update for hostapd
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2896-1
Rating: important
References: #1063479 #930077 #930078 #930079
Cross-References: CVE-2015-1863 CVE-2015-4141 CVE-2015-4142
CVE-2015-4143 CVE-2015-4144 CVE-2015-4145
CVE-2015-5314 CVE-2016-4476 CVE-2017-13078
CVE-2017-13079 CVE-2017-13080 CVE-2017-13081
CVE-2017-13087 CVE-2017-13088
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for hostapd fixes the following issues:
- Fix KRACK attacks on the AP side (boo#1063479, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088):
Hostap was updated to upstream release 2.6
* fixed EAP-pwd last fragment validation [http://w1.fi/security/2015-7/]
(CVE-2015-5314)
* fixed WPS configuration update vulnerability with malformed passphrase
[http://w1.fi/security/2016-1/] (CVE-2016-4476)
* extended channel switch support for VHT bandwidth changes
* added support for configuring new ANQP-elements with
anqp_elem=<InfoID>:<hexdump of payload>
* fixed Suite B 192-bit AKM to use proper PMK length (note: this makes old
releases incompatible with the fixed behavior)
* added no_probe_resp_if_max_sta=1 parameter to disable Probe Response
frame sending for not-associated STAs if max_num_sta limit has been
reached
* added option (-S as command line argument) to request all interfaces to
be started at the same time
* modified rts_threshold and fragm_threshold configuration parameters to
allow -1 to be used to disable RTS/fragmentation
* EAP-pwd: added support for Brainpool Elliptic Curves (with OpenSSL 1.0.2
and newer)
* fixed EAPOL reauthentication after FT protocol run
* fixed FTIE generation for 4-way handshake after FT protocol run
* fixed and improved various FST operations
* TLS server
- support SHA384 and SHA512 hashes
- support TLS v1.2 signature algorithm with SHA384 and SHA512
- support PKCS #5 v2.0 PBES2
- support PKCS #5 with PKCS #12 style key decryption
- minimal support for PKCS #12
- support OCSP stapling (including ocsp_multi)
* added support for OpenSSL 1.1 API changes
- drop support for OpenSSL 0.9.8
- drop support for OpenSSL 1.0.0
* EAP-PEAP: support fast-connect crypto binding
* RADIUS
- fix Called-Station-Id to not escape SSID
- add Event-Timestamp to all Accounting-Request packets
- add Acct-Session-Id to Accounting-On/Off
- add Acct-Multi-Session-Id ton Access-Request packets
- add Service-Type (= Frames)
- allow server to provide PSK instead of passphrase for WPA-PSK
Tunnel_password case
- update full message for interim accounting updates
- add Acct-Delay-Time into Accounting messages
- add require_message_authenticator configuration option to require
CoA/Disconnect-Request packets to be authenticated
* started to postpone WNM-Notification frame sending by 100 ms so that the
STA has some more time to configure the key before this frame is
received after the 4-way handshake
* VHT: added interoperability workaround for 80+80 and 160 MHz channels
* extended VLAN support (per-STA vif, etc.)
* fixed PMKID derivation with SAE
* nl80211
- added support for full station state operations
- fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
unencrypted EAPOL frames
* added initial MBO support; number of extensions to WNM BSS Transition
Management
* added initial functionality for location related operations
* added assocresp_elements parameter to allow vendor specific elements to
be added into (Re)Association Response frames
* improved Public Action frame addressing
- use Address 3 = wildcard BSSID in GAS response if a query from an
unassociated STA used that address
- fix TX status processing for Address 3 = wildcard BSSID
- add gas_address3 configuration parameter to control Address 3 behavior
* added command line parameter -i to override interface parameter in
hostapd.conf
* added command completion support to hostapd_cli
* added passive client taxonomy determination (CONFIG_TAXONOMY=y compile
option and "SIGNATURE <addr>" control interface command)
* number of small fixes
hostapd was updated to upstream release 2.5
* (CVE-2015-1863) is fixed in upstream release 2.5
* fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
[http://w1.fi/security/2015-2/] (CVE-2015-4141 boo#930077)
* fixed WMM Action frame parser [http://w1.fi/security/2015-3/]
(CVE-2015-4142 boo#930078)
* fixed EAP-pwd server missing payload length validation
[http://w1.fi/security/2015-4/] (CVE-2015-4143, CVE-2015-4144,
CVE-2015-4145, boo#930079)
* fixed validation of WPS and P2P NFC NDEF record payload length
[http://w1.fi/security/2015-5/]
* nl80211:
- fixed vendor command handling to check OUI properly
* fixed hlr_auc_gw build with OpenSSL
* hlr_auc_gw: allow Milenage RES length to be reduced
* disable HT for a station that does not support WMM/QoS
* added support for hashed password (NtHash) in EAP-pwd server
* fixed and extended dynamic VLAN cases
* added EAP-EKE server support for deriving Session-Id
* set Acct-Session-Id to a random value to make it more likely to be
unique even if the device does not have a proper clock
* added more 2.4 GHz channels for 20/40 MHz HT co-ex scan
* modified SAE routines to be more robust and PWE generation to be
stronger against timing attacks
* added support for Brainpool Elliptic Curves with SAE
* increases maximum value accepted for cwmin/cwmax
* added support for CCMP-256 and GCMP-256 as group ciphers with FT
* added Fast Session Transfer (FST) module
* removed optional fields from RSNE when using FT with PMF (workaround for
interoperability issues with iOS 8.4)
* added EAP server support for TLS session resumption
* fixed key derivation for Suite B 192-bit AKM (this breaks compatibility
with the earlier version)
* added mechanism to track unconnected stations and do minimal band
steering
* number of small fixes
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1201=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1201=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
hostapd-2.6-8.1
hostapd-debuginfo-2.6-8.1
hostapd-debugsource-2.6-8.1
- openSUSE Leap 42.2 (i586 x86_64):
hostapd-2.6-5.3.1
hostapd-debuginfo-2.6-5.3.1
hostapd-debugsource-2.6-5.3.1
References:
https://www.suse.com/security/cve/CVE-2015-1863.htmlhttps://www.suse.com/security/cve/CVE-2015-4141.htmlhttps://www.suse.com/security/cve/CVE-2015-4142.htmlhttps://www.suse.com/security/cve/CVE-2015-4143.htmlhttps://www.suse.com/security/cve/CVE-2015-4144.htmlhttps://www.suse.com/security/cve/CVE-2015-4145.htmlhttps://www.suse.com/security/cve/CVE-2015-5314.htmlhttps://www.suse.com/security/cve/CVE-2016-4476.htmlhttps://www.suse.com/security/cve/CVE-2017-13078.htmlhttps://www.suse.com/security/cve/CVE-2017-13079.htmlhttps://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-13081.htmlhttps://www.suse.com/security/cve/CVE-2017-13087.htmlhttps://www.suse.com/security/cve/CVE-2017-13088.htmlhttps://bugzilla.suse.com/1063479https://bugzilla.suse.com/930077https://bugzilla.suse.com/930078https://bugzilla.suse.com/930079
openSUSE Security Update: Security update for SDL2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2895-1
Rating: moderate
References: #1062784
Cross-References: CVE-2017-2888
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for SDL2 fixes the following issues:
- CVE-2017-2888: An exploitable integer overflow vulnerability exists when
creating a new RGB Surface in SDL. A specially crafted file can cause an
integer overflow resulting in too little memory being allocated which
can lead to a buffer overflow and potential code execution. An attacker
can provide a specially crafted image file to trigger this
vulnerability. (bsc#1062784)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1217=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1217=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
SDL2-debugsource-2.0.3-14.1
libSDL2-2_0-0-2.0.3-14.1
libSDL2-2_0-0-debuginfo-2.0.3-14.1
libSDL2-devel-2.0.3-14.1
- openSUSE Leap 42.3 (x86_64):
libSDL2-2_0-0-32bit-2.0.3-14.1
libSDL2-2_0-0-debuginfo-32bit-2.0.3-14.1
libSDL2-devel-32bit-2.0.3-14.1
- openSUSE Leap 42.2 (i586 x86_64):
SDL2-debugsource-2.0.3-9.5.1
libSDL2-2_0-0-2.0.3-9.5.1
libSDL2-2_0-0-debuginfo-2.0.3-9.5.1
libSDL2-devel-2.0.3-9.5.1
- openSUSE Leap 42.2 (x86_64):
libSDL2-2_0-0-32bit-2.0.3-9.5.1
libSDL2-2_0-0-debuginfo-32bit-2.0.3-9.5.1
libSDL2-devel-32bit-2.0.3-9.5.1
References:
https://www.suse.com/security/cve/CVE-2017-2888.htmlhttps://bugzilla.suse.com/1062784