SUSE 5009 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2018:0223-1: important: Security update for mysql-community-server
openSUSE-SU-2018:0229-1: important: Security update for newsbeuter



openSUSE-SU-2018:0223-1: important: Security update for mysql-community-server

openSUSE Security Update: Security update for mysql-community-server
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:0223-1
Rating: important
References: #1076369
Cross-References: CVE-2017-3737 CVE-2018-2562 CVE-2018-2573
CVE-2018-2583 CVE-2018-2590 CVE-2018-2591
CVE-2018-2612 CVE-2018-2622 CVE-2018-2640
CVE-2018-2645 CVE-2018-2647 CVE-2018-2665
CVE-2018-2668 CVE-2018-2696 CVE-2018-2703

Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 15 vulnerabilities is now available.

Description:

This update for mysql-community-server to version 5.6.39 fixes several
issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
exploitable vulnerability allowed low privileged attacker with network
access via multiple protocols to compromise MySQL Server. Successful
attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL
Server (bsc#1076369).
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition.
Easily exploitable vulnerability allowed low privileged attacker with
network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MySQL Server as well as unauthorized update, insert or delete access to
some of MySQL Server accessible data (bsc#1076369).
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer.
Easily exploitable vulnerability allowed low privileged attacker with
network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MySQL Server (bsc#1076369).
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer).
Supported versions that are affected are 5.5.58 and prior, 5.6.38 and
prior and 5.7.20 and prior. Easily exploitable vulnerability allowed low
privileged attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can
result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer.
Easily exploitable vulnerability allowed low privileged attacker with
network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MySQL Server (bsc#1076369).
- CVE-2018-2696: Vulnerability in the subcomponent: Server : Security :
Privileges). Supported versions that are affected are 5.6.38 and prior
and 5.7.20 and prior. Easily exploitable vulnerability allowed
unauthenticated attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can
result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2583: Vulnerability in the subcomponent: Stored Procedure.
Easily exploitable vulnerability allowed high privileged attacker with
network access via multiple protocols to compromise MySQL Server. While
the vulnerability is in MySQL Server, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result
in unauthorized ability to cause a hang or frequently repeatable crash
(complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2612: Vulnerability in the subcomponent: InnoDB. Easily
exploitable vulnerability allowed high privileged attacker with network
access via multiple protocols to compromise MySQL Server. Successful
attacks of this vulnerability can result in unauthorized creation,
deletion or modification access to critical data or all MySQL Server
accessible data and unauthorized ability to cause a hang or frequently
repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2703: Vulnerability in the subcomponent: Server : Security :
Privileges. Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL
Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash
(complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2573: Vulnerability in the subcomponent: Server: GIS. Easily
exploitable vulnerability allowed low privileged attacker with network
access via multiple protocols to compromise MySQL Server. Successful
attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL
Server (bsc#1076369).
- CVE-2017-3737: OpenSSL introduced an "error state" mechanism. The intent
was that if a fatal error occurred during a handshake then OpenSSL would
move into the error state and would immediately fail if you attempted to
continue the handshake. This works as designed for the explicit
handshake functions (SSL_do_handshake(), SSL_accept() and
SSL_connect()), however due to a bug it did not work correctly if
SSL_read() or SSL_write() is called directly. In that scenario, if the
handshake fails then a fatal error will be returned in the initial
function call. If SSL_read()/SSL_write() is subsequently called by the
application for the same SSL object then it will succeed and the data is
passed without being decrypted/encrypted directly from the SSL/TLS
record layer. In
order to exploit this issue an application bug would have to be present
that resulted in a call to SSL_read()/SSL_write() being issued after
having already received a fatal error
- CVE-2018-2647: Vulnerability in the subcomponent: Server: Replication.
Easily exploitable vulnerability allowed high privileged attacker with
network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MySQL Server as well as unauthorized update, insert or delete access to
some of MySQL Server accessible data (bsc#1076369).
- CVE-2018-2591: Vulnerability in the subcomponent: Server : Partition.
Easily exploitable vulnerability allowed high privileged attacker with
network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized
ability to cause a hang or frequently repeatable crash (complete DOS) of
MySQL Server (bsc#1076369).
- CVE-2018-2590: Vulnerability in the subcomponent: Server: Performance
Schema. Easily exploitable vulnerability allowed high privileged
attacker with network access via multiple protocols to compromise MySQL
Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash
(complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2645: Vulnerability in the subcomponent: Server: Performance
Schema. Easily exploitable vulnerability allowed high privileged
attacker with network access via multiple protocols to compromise MySQL
Server. Successful attacks of this vulnerability can result in
unauthorized access to critical data or complete access to all MySQL
Server accessible data (bsc#1076369).

For additional details please see
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-39.html


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-90=1

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2018-90=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libmysql56client18-5.6.39-33.1
libmysql56client18-debuginfo-5.6.39-33.1
libmysql56client_r18-5.6.39-33.1
mysql-community-server-5.6.39-33.1
mysql-community-server-bench-5.6.39-33.1
mysql-community-server-bench-debuginfo-5.6.39-33.1
mysql-community-server-client-5.6.39-33.1
mysql-community-server-client-debuginfo-5.6.39-33.1
mysql-community-server-debuginfo-5.6.39-33.1
mysql-community-server-debugsource-5.6.39-33.1
mysql-community-server-test-5.6.39-33.1
mysql-community-server-test-debuginfo-5.6.39-33.1
mysql-community-server-tools-5.6.39-33.1
mysql-community-server-tools-debuginfo-5.6.39-33.1

- openSUSE Leap 42.3 (x86_64):

libmysql56client18-32bit-5.6.39-33.1
libmysql56client18-debuginfo-32bit-5.6.39-33.1
libmysql56client_r18-32bit-5.6.39-33.1

- openSUSE Leap 42.3 (noarch):

mysql-community-server-errormessages-5.6.39-33.1

- openSUSE Leap 42.2 (i586 x86_64):

libmysql56client18-5.6.39-24.15.1
libmysql56client18-debuginfo-5.6.39-24.15.1
libmysql56client_r18-5.6.39-24.15.1
mysql-community-server-5.6.39-24.15.1
mysql-community-server-bench-5.6.39-24.15.1
mysql-community-server-bench-debuginfo-5.6.39-24.15.1
mysql-community-server-client-5.6.39-24.15.1
mysql-community-server-client-debuginfo-5.6.39-24.15.1
mysql-community-server-debuginfo-5.6.39-24.15.1
mysql-community-server-debugsource-5.6.39-24.15.1
mysql-community-server-test-5.6.39-24.15.1
mysql-community-server-test-debuginfo-5.6.39-24.15.1
mysql-community-server-tools-5.6.39-24.15.1
mysql-community-server-tools-debuginfo-5.6.39-24.15.1

- openSUSE Leap 42.2 (noarch):

mysql-community-server-errormessages-5.6.39-24.15.1

- openSUSE Leap 42.2 (x86_64):

libmysql56client18-32bit-5.6.39-24.15.1
libmysql56client18-debuginfo-32bit-5.6.39-24.15.1
libmysql56client_r18-32bit-5.6.39-24.15.1


References:

https://www.suse.com/security/cve/CVE-2017-3737.html
https://www.suse.com/security/cve/CVE-2018-2562.html
https://www.suse.com/security/cve/CVE-2018-2573.html
https://www.suse.com/security/cve/CVE-2018-2583.html
https://www.suse.com/security/cve/CVE-2018-2590.html
https://www.suse.com/security/cve/CVE-2018-2591.html
https://www.suse.com/security/cve/CVE-2018-2612.html
https://www.suse.com/security/cve/CVE-2018-2622.html
https://www.suse.com/security/cve/CVE-2018-2640.html
https://www.suse.com/security/cve/CVE-2018-2645.html
https://www.suse.com/security/cve/CVE-2018-2647.html
https://www.suse.com/security/cve/CVE-2018-2665.html
https://www.suse.com/security/cve/CVE-2018-2668.html
https://www.suse.com/security/cve/CVE-2018-2696.html
https://www.suse.com/security/cve/CVE-2018-2703.html
https://bugzilla.suse.com/1076369

--


openSUSE-SU-2018:0229-1: important: Security update for newsbeuter

openSUSE Security Update: Security update for newsbeuter
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:0229-1
Rating: important
References: #1059057
Cross-References: CVE-2017-14500
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for newsbeuter fixes one issues.

This security issue was fixed:

- CVE-2017-14500: Improper Neutralization of special elements allowed
remote attackers to perform user-assisted code execution by crafting an
RSS item with a media enclosure that includes shell metacharacters in
its filename (bsc#1059057).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-92=1

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2018-92=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (x86_64):

newsbeuter-2.9-8.1
newsbeuter-debuginfo-2.9-8.1
newsbeuter-debugsource-2.9-8.1

- openSUSE Leap 42.3 (noarch):

newsbeuter-lang-2.9-8.1

- openSUSE Leap 42.2 (noarch):

newsbeuter-lang-2.9-2.6.1

- openSUSE Leap 42.2 (x86_64):

newsbeuter-2.9-2.6.1
newsbeuter-debuginfo-2.9-2.6.1
newsbeuter-debugsource-2.9-2.6.1


References:

https://www.suse.com/security/cve/CVE-2017-14500.html
https://bugzilla.suse.com/1059057

--