SUSE 5020 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:0052-1: important: Security update for mutt
openSUSE-SU-2019:0053-1: important: Security update for LibVNCServer
openSUSE-SU-2019:0054-1: moderate: Security update for gitolite
openSUSE-SU-2019:0057-1: important: Security update for wget
openSUSE-SU-2019:0058-1: moderate: Security update for live555
openSUSE-SU-2019:0061-1: Security update for libunwind
openSUSE-SU-2019:0063-1: important: Security update for krb5
openSUSE-SU-2019:0064-1: important: Security update for zeromq
openSUSE-SU-2019:0065-1: important: Security update for the Linux Kernel



openSUSE-SU-2019:0052-1: important: Security update for mutt

openSUSE Security Update: Security update for mutt
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0052-1
Rating: important
References: #1061343 #1094717 #1101428 #1101566 #1101567
#1101568 #1101569 #1101570 #1101571 #1101573
#1101576 #1101577 #1101578 #1101581 #1101582
#1101583 #1101588 #1101589 #1120935 #980830
#982129 #986534
Cross-References: CVE-2014-9116 CVE-2018-14349 CVE-2018-14350
CVE-2018-14351 CVE-2018-14352 CVE-2018-14353
CVE-2018-14354 CVE-2018-14355 CVE-2018-14356
CVE-2018-14357 CVE-2018-14358 CVE-2018-14359
CVE-2018-14360 CVE-2018-14361 CVE-2018-14362
CVE-2018-14363
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves 16 vulnerabilities and has 6 fixes is
now available.

Description:

This update for mutt fixes the following issues:

Security issues fixed:

- bsc#1101428: Mutt 1.10.1 security release update.
- CVE-2018-14351: Fix imap/command.c that mishandles long IMAP status
mailbox literal count size (bsc#1101583).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer
underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have
unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers
via backquote characters (bsc#1101578).
- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave
room for quote characters (bsc#1101582).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID
(bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles ".." directory traversal
in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without
a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer
overflow for a FETCH response with along INTERNALDATE field
(bsc#1101588).
- CVE-2018-14363: Fix newsrc.c that does not properlyrestrict '/'
characters that may have unsafe interaction with cache pathnames
(bsc#1101566).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer
overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).
- CVE-2018-14360: Fix nntp_add_group in newsrc.c that has a stack-based
buffer overflow because of incorrect sscanf usage (bsc#1101569).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute
arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14361: Fix that nntp.c proceeds even if memory allocation fails
for messages data (bsc#1101568).

Bug fixes:

- mutt reports as neomutt and incorrect version (bsc#1094717)
- No sidebar available in mutt 1.6.1 from Tumbleweed snapshot 20160517
(bsc#980830)
- mutt-1.6.1 unusable when built with --enable-sidebar (bsc#982129)
- (neo)mutt displaying times in Zulu time (bsc#1061343)
- mutt unconditionally segfaults when displaying a message (bsc#986534)
- For openSUSE Leap 42.3, retain split of -lang and -doc (boo#1120935)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-52=1



Package List:

- openSUSE Leap 42.3 (noarch):

mutt-doc-1.10.1-2.5.1
mutt-lang-1.10.1-2.5.1

- openSUSE Leap 42.3 (x86_64):

mutt-1.10.1-2.5.1
mutt-debuginfo-1.10.1-2.5.1
mutt-debugsource-1.10.1-2.5.1


References:

https://www.suse.com/security/cve/CVE-2014-9116.html
https://www.suse.com/security/cve/CVE-2018-14349.html
https://www.suse.com/security/cve/CVE-2018-14350.html
https://www.suse.com/security/cve/CVE-2018-14351.html
https://www.suse.com/security/cve/CVE-2018-14352.html
https://www.suse.com/security/cve/CVE-2018-14353.html
https://www.suse.com/security/cve/CVE-2018-14354.html
https://www.suse.com/security/cve/CVE-2018-14355.html
https://www.suse.com/security/cve/CVE-2018-14356.html
https://www.suse.com/security/cve/CVE-2018-14357.html
https://www.suse.com/security/cve/CVE-2018-14358.html
https://www.suse.com/security/cve/CVE-2018-14359.html
https://www.suse.com/security/cve/CVE-2018-14360.html
https://www.suse.com/security/cve/CVE-2018-14361.html
https://www.suse.com/security/cve/CVE-2018-14362.html
https://www.suse.com/security/cve/CVE-2018-14363.html
https://bugzilla.suse.com/1061343
https://bugzilla.suse.com/1094717
https://bugzilla.suse.com/1101428
https://bugzilla.suse.com/1101566
https://bugzilla.suse.com/1101567
https://bugzilla.suse.com/1101568
https://bugzilla.suse.com/1101569
https://bugzilla.suse.com/1101570
https://bugzilla.suse.com/1101571
https://bugzilla.suse.com/1101573
https://bugzilla.suse.com/1101576
https://bugzilla.suse.com/1101577
https://bugzilla.suse.com/1101578
https://bugzilla.suse.com/1101581
https://bugzilla.suse.com/1101582
https://bugzilla.suse.com/1101583
https://bugzilla.suse.com/1101588
https://bugzilla.suse.com/1101589
https://bugzilla.suse.com/1120935
https://bugzilla.suse.com/980830
https://bugzilla.suse.com/982129
https://bugzilla.suse.com/986534

--


openSUSE-SU-2019:0053-1: important: Security update for LibVNCServer

openSUSE Security Update: Security update for LibVNCServer
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0053-1
Rating: important
References: #1120114 #1120115 #1120116 #1120117 #1120118
#1120119 #1120120 #1120121 #1120122
Cross-References: CVE-2018-15126 CVE-2018-15127 CVE-2018-20019
CVE-2018-20020 CVE-2018-20021 CVE-2018-20022
CVE-2018-20023 CVE-2018-20024 CVE-2018-6307

Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 9 vulnerabilities is now available.

Description:

This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension
(bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server
code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC
client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c
(bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client
code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper
initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper
initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code
(bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-53=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

LibVNCServer-debugsource-0.9.10-lp150.3.3.1
LibVNCServer-devel-0.9.10-lp150.3.3.1
libvncclient0-0.9.10-lp150.3.3.1
libvncclient0-debuginfo-0.9.10-lp150.3.3.1
libvncserver0-0.9.10-lp150.3.3.1
libvncserver0-debuginfo-0.9.10-lp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-15126.html
https://www.suse.com/security/cve/CVE-2018-15127.html
https://www.suse.com/security/cve/CVE-2018-20019.html
https://www.suse.com/security/cve/CVE-2018-20020.html
https://www.suse.com/security/cve/CVE-2018-20021.html
https://www.suse.com/security/cve/CVE-2018-20022.html
https://www.suse.com/security/cve/CVE-2018-20023.html
https://www.suse.com/security/cve/CVE-2018-20024.html
https://www.suse.com/security/cve/CVE-2018-6307.html
https://bugzilla.suse.com/1120114
https://bugzilla.suse.com/1120115
https://bugzilla.suse.com/1120116
https://bugzilla.suse.com/1120117
https://bugzilla.suse.com/1120118
https://bugzilla.suse.com/1120119
https://bugzilla.suse.com/1120120
https://bugzilla.suse.com/1120121
https://bugzilla.suse.com/1120122

--


openSUSE-SU-2019:0054-1: moderate: Security update for gitolite

openSUSE Security Update: Security update for gitolite
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0054-1
Rating: moderate
References: #1121570
Cross-References: CVE-2018-20683
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for gitolite fixes the following security issue:

- CVE-2018-20683: The rsync command line was not handled correctly, allow
malicious rsync options (boo#1121570)

The version update to 3.6.11 also contains a number of upstream bug fixes.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-54=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-54=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-54=1



Package List:

- openSUSE Leap 42.3 (noarch):

gitolite-3.6.11-4.6.1

- openSUSE Leap 15.0 (noarch):

gitolite-3.6.11-lp150.2.6.1

- openSUSE Backports SLE-15 (noarch):

gitolite-3.6.11-bp150.3.6.1


References:

https://www.suse.com/security/cve/CVE-2018-20683.html
https://bugzilla.suse.com/1121570

--


openSUSE-SU-2019:0057-1: important: Security update for wget

openSUSE Security Update: Security update for wget
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0057-1
Rating: important
References: #1120382
Cross-References: CVE-2018-20483
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for wget fixes the following issues:

Security issue fixed:

- CVE-2018-20483: Fixed an information disclosure through file metadata
(bsc#1120382)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-57=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

wget-1.19.5-lp150.2.3.1
wget-debuginfo-1.19.5-lp150.2.3.1
wget-debugsource-1.19.5-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-20483.html
https://bugzilla.suse.com/1120382

--


openSUSE-SU-2019:0058-1: moderate: Security update for live555

openSUSE Security Update: Security update for live555
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0058-1
Rating: moderate
References: #1114779 #1121892
Cross-References: CVE-2018-4013 CVE-2019-6256
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update fixes two security issues in live555:

- CVE-2018-4013: Remote code execution vulnerability (bsc#1114779)
- CVE-2019-6256: Denial of Service issue with RTSP-over-HTTP tunneling via
x-sessioncookie HTTP headers (boo#1121892)

This library is statically linked into VLC. However VLC is not affected
because it only uses the live555 library to implement the RTSP client.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-58=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-58=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-58=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

live555-devel-2018.12.14-7.3.1

- openSUSE Leap 15.0 (x86_64):

live555-devel-2018.12.14-lp150.2.3.1

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

live555-devel-2018.12.14-bp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-4013.html
https://www.suse.com/security/cve/CVE-2019-6256.html
https://bugzilla.suse.com/1114779
https://bugzilla.suse.com/1121892

--


openSUSE-SU-2019:0061-1: Security update for libunwind

openSUSE Security Update: Security update for libunwind
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0061-1
Rating: low
References: #1122012 #936786
Cross-References: CVE-2015-3239
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for libunwind fixes one minor security issue and one bug.

The following security issue was fixed:

- CVE-2015-3239: off-by-one error that could be triggered when reading
untrusted binaries (boo#936786)

The following packaging bug was fixed:

- boo#1122012: The 32 bit were not generated on Leap 42.3


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-61=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libunwind-1.1-15.3.1
libunwind-debuginfo-1.1-15.3.1
libunwind-debugsource-1.1-15.3.1
libunwind-devel-1.1-15.3.1

- openSUSE Leap 42.3 (x86_64):

libunwind-32bit-1.1-15.3.1
libunwind-debuginfo-32bit-1.1-15.3.1


References:

https://www.suse.com/security/cve/CVE-2015-3239.html
https://bugzilla.suse.com/1122012
https://bugzilla.suse.com/936786

--


openSUSE-SU-2019:0063-1: important: Security update for krb5

openSUSE Security Update: Security update for krb5
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0063-1
Rating: important
References: #1120489
Cross-References: CVE-2018-20217
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types
(bsc#1120489)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-63=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

krb5-1.15.2-lp150.5.3.1
krb5-client-1.15.2-lp150.5.3.1
krb5-client-debuginfo-1.15.2-lp150.5.3.1
krb5-debuginfo-1.15.2-lp150.5.3.1
krb5-debugsource-1.15.2-lp150.5.3.1
krb5-devel-1.15.2-lp150.5.3.1
krb5-mini-1.15.2-lp150.5.3.1
krb5-mini-debuginfo-1.15.2-lp150.5.3.1
krb5-mini-debugsource-1.15.2-lp150.5.3.1
krb5-mini-devel-1.15.2-lp150.5.3.1
krb5-plugin-kdb-ldap-1.15.2-lp150.5.3.1
krb5-plugin-kdb-ldap-debuginfo-1.15.2-lp150.5.3.1
krb5-plugin-preauth-otp-1.15.2-lp150.5.3.1
krb5-plugin-preauth-otp-debuginfo-1.15.2-lp150.5.3.1
krb5-plugin-preauth-pkinit-1.15.2-lp150.5.3.1
krb5-plugin-preauth-pkinit-debuginfo-1.15.2-lp150.5.3.1
krb5-server-1.15.2-lp150.5.3.1
krb5-server-debuginfo-1.15.2-lp150.5.3.1

- openSUSE Leap 15.0 (x86_64):

krb5-32bit-1.15.2-lp150.5.3.1
krb5-32bit-debuginfo-1.15.2-lp150.5.3.1
krb5-devel-32bit-1.15.2-lp150.5.3.1


References:

https://www.suse.com/security/cve/CVE-2018-20217.html
https://bugzilla.suse.com/1120489

--


openSUSE-SU-2019:0064-1: important: Security update for zeromq

openSUSE Security Update: Security update for zeromq
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0064-1
Rating: important
References: #1121717
Cross-References: CVE-2019-6250
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for zeromq fixes the following issues:

Security issue fixed:

- CVE-2019-6250: fix a remote execution vulnerability due to pointer
arithmetic overflow (bsc#1121717)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-64=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libzmq5-4.2.2-2.8.1
libzmq5-debuginfo-4.2.2-2.8.1
zeromq-debugsource-4.2.2-2.8.1
zeromq-devel-4.2.2-2.8.1
zeromq-tools-4.2.2-2.8.1
zeromq-tools-debuginfo-4.2.2-2.8.1

- openSUSE Leap 42.3 (x86_64):

libzmq5-32bit-4.2.2-2.8.1
libzmq5-debuginfo-32bit-4.2.2-2.8.1


References:

https://www.suse.com/security/cve/CVE-2019-6250.html
https://bugzilla.suse.com/1121717

--


openSUSE-SU-2019:0065-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0065-1
Rating: important
References: #1024718 #1046299 #1050242 #1050244 #1051510
#1055121 #1055186 #1058115 #1060463 #1065729
#1078248 #1079935 #1082387 #1083647 #1086282
#1086283 #1086423 #1087978 #1088386 #1090888
#1091405 #1094244 #1097593 #1102875 #1102877
#1102879 #1102882 #1102896 #1103257 #1104353
#1104427 #1104967 #1105168 #1106105 #1106110
#1106615 #1106913 #1108270 #1109272 #1109665
#1110558 #1111188 #1111469 #1111696 #1111795
#1113722 #1114279 #1114871 #1116040 #1116183
#1116336 #1116803 #1116841 #1117115 #1117162
#1117165 #1117186 #1117561 #1117656 #1117953
#1118152 #1118215 #1118316 #1118319 #1118428
#1118484 #1118752 #1118760 #1118761 #1118762
#1118766 #1118767 #1118768 #1118769 #1118771
#1118772 #1118773 #1118774 #1118775 #1118798
#1118809 #1118962 #1119017 #1119086 #1119212
#1119322 #1119410 #1119714 #1119749 #1119804
#1119946 #1119962 #1119968 #1120036 #1120046
#1120053 #1120054 #1120055 #1120058 #1120088
#1120092 #1120094 #1120096 #1120097 #1120173
#1120214 #1120223 #1120228 #1120230 #1120232
#1120234 #1120235 #1120238 #1120594 #1120598
#1120600 #1120601 #1120602 #1120603 #1120604
#1120606 #1120612 #1120613 #1120614 #1120615
#1120616 #1120617 #1120618 #1120620 #1120621
#1120632 #1120633 #1120743 #1121017 #1121058
#1121263 #1121273 #1121477 #1121483 #1121621
#1121714 #1121715
Cross-References: CVE-2018-12232 CVE-2018-14625 CVE-2018-16862
CVE-2018-16884 CVE-2018-18397 CVE-2018-19407
CVE-2018-19824 CVE-2018-19854 CVE-2018-19985
CVE-2018-20169 CVE-2018-9568
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves 11 vulnerabilities and has 131 fixes
is now available.

Description:



The openSUSE Leap 15.0 kernel was updated to receive various security and
bugfixes.


The following security bugs were fixed:

- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c
allowed local users to cause a denial of service (NULL pointer
dereference and BUG) via crafted system calls that reach a situation
where ioapic is uninitialized (bnc#1116841).
- CVE-2018-14625: An attacker might have bene able to have an uncontrolled
read to kernel-memory from within a vm guest. A race condition between
connect() and close() function may allow an attacker using the AF_VSOCK
protocol to gather a 4 byte information leak or possibly intercept or
corrupt AF_VSOCK messages destined to other clients (bnc#1106615).
- CVE-2018-19985: The function hso_probe read if_num from the USB device
(as an u8) and used it without a length check to index an array,
resulting in an OOB memory read in hso_probe or hso_get_config_data that
could be used by local attackers (bsc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at
the same time can make bc_svc_process() use wrong back-channel IDs and
cause a use-after-free vulnerability. Thus a malicious container user
can cause a host kernel memory corruption and a system panic. Due to the
nature of the flaw, privilege escalation cannot be fully ruled out
(bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the
reading of an extra descriptor, related to __usb_get_extra_descriptor in
drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-18397: The userfaultfd implementation mishandled access control
for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users
to write data into holes in a tmpfs file (if the user has read-only
access to that file, and that file contains holes), related to
fs/userfaultfd.c and mm/userfaultfd.c (bnc#1117656).
- CVE-2018-12232: In net/socket.c there was a race condition between
fchownat and close in cases where they target the same socket file
descriptor, related to the sock_close and sockfs_setattr functions.
fchownat did not increment the file descriptor reference count, which
allowed close to set the socket to NULL during fchownat's execution,
leading to a NULL pointer dereference and system crash (bnc#1097593).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory
corruption due to type confusion. This could lead to local escalation of
privilege with no additional execution privileges needed. User
interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in the way that the cleancache
subsystem clears an inode after the final file truncation (removal). The
new file created with the same inode may contain leftover pages from
cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19854: An issue was discovered in the crypto_report_one() and
related functions in crypto/crypto_user.c (the crypto user configuration
API) do not fully initialize structures that are copied to userspace,
potentially leaking sensitive memory to user programs. NOTE: this is a
CVE-2013-2547 regression but with easier exploitability because the
attacker did not need a capability (however, the system must have the
CONFIG_CRYPTO_USER kconfig option) (bnc#1118428).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA
driver by supplying a malicious USB Sound device (with zero interfaces)
that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-65=1



Package List:

- openSUSE Leap 15.0 (x86_64):

kernel-debug-4.12.14-lp150.12.45.1
kernel-debug-base-4.12.14-lp150.12.45.1
kernel-debug-base-debuginfo-4.12.14-lp150.12.45.1
kernel-debug-debuginfo-4.12.14-lp150.12.45.1
kernel-debug-debugsource-4.12.14-lp150.12.45.1
kernel-debug-devel-4.12.14-lp150.12.45.1
kernel-debug-devel-debuginfo-4.12.14-lp150.12.45.1
kernel-default-4.12.14-lp150.12.45.1
kernel-default-base-4.12.14-lp150.12.45.1
kernel-default-base-debuginfo-4.12.14-lp150.12.45.1
kernel-default-debuginfo-4.12.14-lp150.12.45.1
kernel-default-debugsource-4.12.14-lp150.12.45.1
kernel-default-devel-4.12.14-lp150.12.45.1
kernel-default-devel-debuginfo-4.12.14-lp150.12.45.1
kernel-kvmsmall-4.12.14-lp150.12.45.1
kernel-kvmsmall-base-4.12.14-lp150.12.45.1
kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.45.1
kernel-kvmsmall-debuginfo-4.12.14-lp150.12.45.1
kernel-kvmsmall-debugsource-4.12.14-lp150.12.45.1
kernel-kvmsmall-devel-4.12.14-lp150.12.45.1
kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.45.1
kernel-obs-build-4.12.14-lp150.12.45.1
kernel-obs-build-debugsource-4.12.14-lp150.12.45.1
kernel-obs-qa-4.12.14-lp150.12.45.1
kernel-syms-4.12.14-lp150.12.45.1
kernel-vanilla-4.12.14-lp150.12.45.1
kernel-vanilla-base-4.12.14-lp150.12.45.1
kernel-vanilla-base-debuginfo-4.12.14-lp150.12.45.1
kernel-vanilla-debuginfo-4.12.14-lp150.12.45.1
kernel-vanilla-debugsource-4.12.14-lp150.12.45.1
kernel-vanilla-devel-4.12.14-lp150.12.45.1
kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.45.1

- openSUSE Leap 15.0 (noarch):

kernel-devel-4.12.14-lp150.12.45.1
kernel-docs-4.12.14-lp150.12.45.1
kernel-docs-html-4.12.14-lp150.12.45.1
kernel-macros-4.12.14-lp150.12.45.1
kernel-source-4.12.14-lp150.12.45.1
kernel-source-vanilla-4.12.14-lp150.12.45.1


References:

https://www.suse.com/security/cve/CVE-2018-12232.html
https://www.suse.com/security/cve/CVE-2018-14625.html
https://www.suse.com/security/cve/CVE-2018-16862.html
https://www.suse.com/security/cve/CVE-2018-16884.html
https://www.suse.com/security/cve/CVE-2018-18397.html
https://www.suse.com/security/cve/CVE-2018-19407.html
https://www.suse.com/security/cve/CVE-2018-19824.html
https://www.suse.com/security/cve/CVE-2018-19854.html
https://www.suse.com/security/cve/CVE-2018-19985.html
https://www.suse.com/security/cve/CVE-2018-20169.html
https://www.suse.com/security/cve/CVE-2018-9568.html
https://bugzilla.suse.com/1024718
https://bugzilla.suse.com/1046299
https://bugzilla.suse.com/1050242
https://bugzilla.suse.com/1050244
https://bugzilla.suse.com/1051510
https://bugzilla.suse.com/1055121
https://bugzilla.suse.com/1055186
https://bugzilla.suse.com/1058115
https://bugzilla.suse.com/1060463
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1078248
https://bugzilla.suse.com/1079935
https://bugzilla.suse.com/1082387
https://bugzilla.suse.com/1083647
https://bugzilla.suse.com/1086282
https://bugzilla.suse.com/1086283
https://bugzilla.suse.com/1086423
https://bugzilla.suse.com/1087978
https://bugzilla.suse.com/1088386
https://bugzilla.suse.com/1090888
https://bugzilla.suse.com/1091405
https://bugzilla.suse.com/1094244
https://bugzilla.suse.com/1097593
https://bugzilla.suse.com/1102875
https://bugzilla.suse.com/1102877
https://bugzilla.suse.com/1102879
https://bugzilla.suse.com/1102882
https://bugzilla.suse.com/1102896
https://bugzilla.suse.com/1103257
https://bugzilla.suse.com/1104353
https://bugzilla.suse.com/1104427
https://bugzilla.suse.com/1104967
https://bugzilla.suse.com/1105168
https://bugzilla.suse.com/1106105
https://bugzilla.suse.com/1106110
https://bugzilla.suse.com/1106615
https://bugzilla.suse.com/1106913
https://bugzilla.suse.com/1108270
https://bugzilla.suse.com/1109272
https://bugzilla.suse.com/1109665
https://bugzilla.suse.com/1110558
https://bugzilla.suse.com/1111188
https://bugzilla.suse.com/1111469
https://bugzilla.suse.com/1111696
https://bugzilla.suse.com/1111795
https://bugzilla.suse.com/1113722
https://bugzilla.suse.com/1114279
https://bugzilla.suse.com/1114871
https://bugzilla.suse.com/1116040
https://bugzilla.suse.com/1116183
https://bugzilla.suse.com/1116336
https://bugzilla.suse.com/1116803
https://bugzilla.suse.com/1116841
https://bugzilla.suse.com/1117115
https://bugzilla.suse.com/1117162
https://bugzilla.suse.com/1117165
https://bugzilla.suse.com/1117186
https://bugzilla.suse.com/1117561
https://bugzilla.suse.com/1117656
https://bugzilla.suse.com/1117953
https://bugzilla.suse.com/1118152
https://bugzilla.suse.com/1118215
https://bugzilla.suse.com/1118316
https://bugzilla.suse.com/1118319
https://bugzilla.suse.com/1118428
https://bugzilla.suse.com/1118484
https://bugzilla.suse.com/1118752
https://bugzilla.suse.com/1118760
https://bugzilla.suse.com/1118761
https://bugzilla.suse.com/1118762
https://bugzilla.suse.com/1118766
https://bugzilla.suse.com/1118767
https://bugzilla.suse.com/1118768
https://bugzilla.suse.com/1118769
https://bugzilla.suse.com/1118771
https://bugzilla.suse.com/1118772
https://bugzilla.suse.com/1118773
https://bugzilla.suse.com/1118774
https://bugzilla.suse.com/1118775
https://bugzilla.suse.com/1118798
https://bugzilla.suse.com/1118809
https://bugzilla.suse.com/1118962
https://bugzilla.suse.com/1119017
https://bugzilla.suse.com/1119086
https://bugzilla.suse.com/1119212
https://bugzilla.suse.com/1119322
https://bugzilla.suse.com/1119410
https://bugzilla.suse.com/1119714
https://bugzilla.suse.com/1119749
https://bugzilla.suse.com/1119804
https://bugzilla.suse.com/1119946
https://bugzilla.suse.com/1119962
https://bugzilla.suse.com/1119968
https://bugzilla.suse.com/1120036
https://bugzilla.suse.com/1120046
https://bugzilla.suse.com/1120053
https://bugzilla.suse.com/1120054
https://bugzilla.suse.com/1120055
https://bugzilla.suse.com/1120058
https://bugzilla.suse.com/1120088
https://bugzilla.suse.com/1120092
https://bugzilla.suse.com/1120094
https://bugzilla.suse.com/1120096
https://bugzilla.suse.com/1120097
https://bugzilla.suse.com/1120173
https://bugzilla.suse.com/1120214
https://bugzilla.suse.com/1120223
https://bugzilla.suse.com/1120228
https://bugzilla.suse.com/1120230
https://bugzilla.suse.com/1120232
https://bugzilla.suse.com/1120234
https://bugzilla.suse.com/1120235
https://bugzilla.suse.com/1120238
https://bugzilla.suse.com/1120594
https://bugzilla.suse.com/1120598
https://bugzilla.suse.com/1120600
https://bugzilla.suse.com/1120601
https://bugzilla.suse.com/1120602
https://bugzilla.suse.com/1120603
https://bugzilla.suse.com/1120604
https://bugzilla.suse.com/1120606
https://bugzilla.suse.com/1120612
https://bugzilla.suse.com/1120613
https://bugzilla.suse.com/1120614
https://bugzilla.suse.com/1120615
https://bugzilla.suse.com/1120616
https://bugzilla.suse.com/1120617
https://bugzilla.suse.com/1120618
https://bugzilla.suse.com/1120620
https://bugzilla.suse.com/1120621
https://bugzilla.suse.com/1120632
https://bugzilla.suse.com/1120633
https://bugzilla.suse.com/1120743
https://bugzilla.suse.com/1121017
https://bugzilla.suse.com/1121058
https://bugzilla.suse.com/1121263
https://bugzilla.suse.com/1121273
https://bugzilla.suse.com/1121477
https://bugzilla.suse.com/1121483
https://bugzilla.suse.com/1121621
https://bugzilla.suse.com/1121714
https://bugzilla.suse.com/1121715

--