SUSE 5007 Published by

The following openSUSE updates has been released:

openSUSE-SU-2018:2431-1: moderate: Security update for curl
openSUSE-SU-2018:2433-1: moderate: Security update for apache2
openSUSE-SU-2018:2434-1: important: Security update for xen
openSUSE-SU-2018:2436-1: important: Security update for xen
openSUSE-SU-2018:2438-1: moderate: Security update for perl-Archive-Zip
openSUSE-SU-2018:2439-1: Security update for GraphicsMagick



openSUSE-SU-2018:2431-1: moderate: Security update for curl

openSUSE Security Update: Security update for curl
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2431-1
Rating: moderate
References: #1099793
Cross-References: CVE-2018-0500
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-0500: Fix a SMTP send heap buffer overflow (bsc#1099793).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-908=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

curl-7.60.0-lp150.2.9.1
curl-debuginfo-7.60.0-lp150.2.9.1
curl-debugsource-7.60.0-lp150.2.9.1
curl-mini-7.60.0-lp150.2.9.1
curl-mini-debuginfo-7.60.0-lp150.2.9.1
curl-mini-debugsource-7.60.0-lp150.2.9.1
libcurl-devel-7.60.0-lp150.2.9.1
libcurl-mini-devel-7.60.0-lp150.2.9.1
libcurl4-7.60.0-lp150.2.9.1
libcurl4-debuginfo-7.60.0-lp150.2.9.1
libcurl4-mini-7.60.0-lp150.2.9.1
libcurl4-mini-debuginfo-7.60.0-lp150.2.9.1

- openSUSE Leap 15.0 (x86_64):

libcurl-devel-32bit-7.60.0-lp150.2.9.1
libcurl4-32bit-7.60.0-lp150.2.9.1
libcurl4-32bit-debuginfo-7.60.0-lp150.2.9.1


References:

https://www.suse.com/security/cve/CVE-2018-0500.html
https://bugzilla.suse.com/1099793

--


openSUSE-SU-2018:2433-1: moderate: Security update for apache2

openSUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2433-1
Rating: moderate
References: #1101688 #1101689
Cross-References: CVE-2018-1333 CVE-2018-8011
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for apache2 fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial
of service via specially crafted HTTP/2 requests (bsc#1101689).
- CVE-2018-8011: Fixed a null pointer dereference in mod_md, which could
have lead to a denial of service via specially crafted HTTP requests
(bsc#1101688). Note: We are currently not shipping this modules, since
it is still considered experimental, but we might start to ship it with
future releases.

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-907=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

apache2-2.4.33-lp150.2.3.1
apache2-debuginfo-2.4.33-lp150.2.3.1
apache2-debugsource-2.4.33-lp150.2.3.1
apache2-devel-2.4.33-lp150.2.3.1
apache2-event-2.4.33-lp150.2.3.1
apache2-event-debuginfo-2.4.33-lp150.2.3.1
apache2-example-pages-2.4.33-lp150.2.3.1
apache2-prefork-2.4.33-lp150.2.3.1
apache2-prefork-debuginfo-2.4.33-lp150.2.3.1
apache2-utils-2.4.33-lp150.2.3.1
apache2-utils-debuginfo-2.4.33-lp150.2.3.1
apache2-worker-2.4.33-lp150.2.3.1
apache2-worker-debuginfo-2.4.33-lp150.2.3.1

- openSUSE Leap 15.0 (noarch):

apache2-doc-2.4.33-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-1333.html
https://www.suse.com/security/cve/CVE-2018-8011.html
https://bugzilla.suse.com/1101688
https://bugzilla.suse.com/1101689

--


openSUSE-SU-2018:2434-1: important: Security update for xen

openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2434-1
Rating: important
References: #1027519 #1091107 #1103276
Cross-References: CVE-2018-3646
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available.

Description:

This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative
execution and address translations may have allowed unauthorized
disclosure of information residing in the L1 data cache to an attacker
with local user access with guest OS privilege via a terminal page fault
and a side-channel analysis (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a
malicious or buggy guest administrator can lock up the entire host
(bsc#1103276)

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-910=1



Package List:

- openSUSE Leap 42.3 (x86_64):

xen-4.9.2_10-28.1
xen-debugsource-4.9.2_10-28.1
xen-devel-4.9.2_10-28.1
xen-doc-html-4.9.2_10-28.1
xen-libs-4.9.2_10-28.1
xen-libs-debuginfo-4.9.2_10-28.1
xen-tools-4.9.2_10-28.1
xen-tools-debuginfo-4.9.2_10-28.1
xen-tools-domU-4.9.2_10-28.1
xen-tools-domU-debuginfo-4.9.2_10-28.1


References:

https://www.suse.com/security/cve/CVE-2018-3646.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1091107
https://bugzilla.suse.com/1103276

--


openSUSE-SU-2018:2436-1: important: Security update for xen

openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2436-1
Rating: important
References: #1027519 #1091107 #1103276
Cross-References: CVE-2018-3646
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available.

Description:

This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative
execution and address translations may have allowed unauthorized
disclosure of information residing in the L1 data cache to an attacker
with local user access with guest OS privilege via a terminal page fault
and a side-channel analysis (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a
malicious or buggy guest administrator can lock up the entire host
(bsc#1103276)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-911=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

xen-debugsource-4.10.1_08-lp150.2.9.1
xen-devel-4.10.1_08-lp150.2.9.1
xen-libs-4.10.1_08-lp150.2.9.1
xen-libs-debuginfo-4.10.1_08-lp150.2.9.1
xen-tools-domU-4.10.1_08-lp150.2.9.1
xen-tools-domU-debuginfo-4.10.1_08-lp150.2.9.1

- openSUSE Leap 15.0 (x86_64):

xen-4.10.1_08-lp150.2.9.1
xen-doc-html-4.10.1_08-lp150.2.9.1
xen-libs-32bit-4.10.1_08-lp150.2.9.1
xen-libs-32bit-debuginfo-4.10.1_08-lp150.2.9.1
xen-tools-4.10.1_08-lp150.2.9.1
xen-tools-debuginfo-4.10.1_08-lp150.2.9.1


References:

https://www.suse.com/security/cve/CVE-2018-3646.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1091107
https://bugzilla.suse.com/1103276

--


openSUSE-SU-2018:2438-1: moderate: Security update for perl-Archive-Zip

openSUSE Security Update: Security update for perl-Archive-Zip
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2438-1
Rating: moderate
References: #1099497
Cross-References: CVE-2018-10860
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly
sanitizing paths while extracting zip files. An attacker able to provide
a specially crafted archive for processing could have used this flaw to
write or overwrite arbitrary files in the context of the perl
interpreter (bsc#1099497)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-904=1



Package List:

- openSUSE Leap 15.0 (noarch):

perl-Archive-Zip-1.60-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-10860.html
https://bugzilla.suse.com/1099497

--


openSUSE-SU-2018:2439-1: Security update for GraphicsMagick

openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2439-1
Rating: low
References: #1102007
Cross-References: CVE-2018-14435
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for GraphicsMagick fixes the following issues:

The following security issue was fixed:

- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c
(boo#1102007)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-906=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

GraphicsMagick-1.3.25-96.2
GraphicsMagick-debuginfo-1.3.25-96.2
GraphicsMagick-debugsource-1.3.25-96.2
GraphicsMagick-devel-1.3.25-96.2
libGraphicsMagick++-Q16-12-1.3.25-96.2
libGraphicsMagick++-Q16-12-debuginfo-1.3.25-96.2
libGraphicsMagick++-devel-1.3.25-96.2
libGraphicsMagick-Q16-3-1.3.25-96.2
libGraphicsMagick-Q16-3-debuginfo-1.3.25-96.2
libGraphicsMagick3-config-1.3.25-96.2
libGraphicsMagickWand-Q16-2-1.3.25-96.2
libGraphicsMagickWand-Q16-2-debuginfo-1.3.25-96.2
perl-GraphicsMagick-1.3.25-96.2
perl-GraphicsMagick-debuginfo-1.3.25-96.2


References:

https://www.suse.com/security/cve/CVE-2018-14435.html
https://bugzilla.suse.com/1102007

--