SUSE 5017 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2018:4282-1: moderate: Security update for polkit
openSUSE-SU-2018:4283-1: moderate: Security update for mozilla-nspr and mozilla-nss
openSUSE-SU-2018:4299-1: moderate: Security update for libraw



openSUSE-SU-2018:4282-1: moderate: Security update for polkit

openSUSE Security Update: Security update for polkit
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4282-1
Rating: moderate
References: #1118277
Cross-References: CVE-2018-19788
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (boo#1118277)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1617=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libpolkit0-0.113-14.6.1
libpolkit0-debuginfo-0.113-14.6.1
polkit-0.113-14.6.1
polkit-debuginfo-0.113-14.6.1
polkit-debugsource-0.113-14.6.1
polkit-devel-0.113-14.6.1
polkit-devel-debuginfo-0.113-14.6.1
typelib-1_0-Polkit-1_0-0.113-14.6.1

- openSUSE Leap 42.3 (noarch):

polkit-doc-0.113-14.6.1

- openSUSE Leap 42.3 (x86_64):

libpolkit0-32bit-0.113-14.6.1
libpolkit0-debuginfo-32bit-0.113-14.6.1


References:

https://www.suse.com/security/cve/CVE-2018-19788.html
https://bugzilla.suse.com/1118277

--


openSUSE-SU-2018:4283-1: moderate: Security update for mozilla-nspr and mozilla-nss

openSUSE Security Update: Security update for mozilla-nspr and mozilla-nss
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4283-1
Rating: moderate
References: #1097410 #1119105
Cross-References: CVE-2018-0495
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher
attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
SSLv2-compatible ClientHello with a ServerHello that had an all-zero
random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA
signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1618=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

libfreebl3-3.40.1-lp150.2.10.2
libfreebl3-debuginfo-3.40.1-lp150.2.10.2
libsoftokn3-3.40.1-lp150.2.10.2
libsoftokn3-debuginfo-3.40.1-lp150.2.10.2
mozilla-nspr-4.20-lp150.2.3.1
mozilla-nspr-debuginfo-4.20-lp150.2.3.1
mozilla-nspr-debugsource-4.20-lp150.2.3.1
mozilla-nspr-devel-4.20-lp150.2.3.1
mozilla-nss-3.40.1-lp150.2.10.2
mozilla-nss-certs-3.40.1-lp150.2.10.2
mozilla-nss-certs-debuginfo-3.40.1-lp150.2.10.2
mozilla-nss-debuginfo-3.40.1-lp150.2.10.2
mozilla-nss-debugsource-3.40.1-lp150.2.10.2
mozilla-nss-devel-3.40.1-lp150.2.10.2
mozilla-nss-sysinit-3.40.1-lp150.2.10.2
mozilla-nss-sysinit-debuginfo-3.40.1-lp150.2.10.2
mozilla-nss-tools-3.40.1-lp150.2.10.2
mozilla-nss-tools-debuginfo-3.40.1-lp150.2.10.2

- openSUSE Leap 15.0 (x86_64):

libfreebl3-32bit-3.40.1-lp150.2.10.2
libfreebl3-32bit-debuginfo-3.40.1-lp150.2.10.2
libsoftokn3-32bit-3.40.1-lp150.2.10.2
libsoftokn3-32bit-debuginfo-3.40.1-lp150.2.10.2
mozilla-nspr-32bit-4.20-lp150.2.3.1
mozilla-nspr-32bit-debuginfo-4.20-lp150.2.3.1
mozilla-nss-32bit-3.40.1-lp150.2.10.2
mozilla-nss-32bit-debuginfo-3.40.1-lp150.2.10.2
mozilla-nss-certs-32bit-3.40.1-lp150.2.10.2
mozilla-nss-certs-32bit-debuginfo-3.40.1-lp150.2.10.2
mozilla-nss-sysinit-32bit-3.40.1-lp150.2.10.2
mozilla-nss-sysinit-32bit-debuginfo-3.40.1-lp150.2.10.2


References:

https://www.suse.com/security/cve/CVE-2018-0495.html
https://bugzilla.suse.com/1097410
https://bugzilla.suse.com/1119105

--


openSUSE-SU-2018:4299-1: moderate: Security update for libraw

openSUSE Security Update: Security update for libraw
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4299-1
Rating: moderate
References: #1097973 #1097974 #1097975 #1118894
Cross-References: CVE-2018-5804 CVE-2018-5805 CVE-2018-5806
CVE-2018-5808 CVE-2018-5816
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for libraw fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-5804: Fixed a type confusion error within the identify function
that could trigger a division by zero, leading to a denial of service
(Dos). (boo#1097975)
- CVE-2018-5805: Fixed a boundary error within the quicktake_100_load_raw
function that could cause a stack-based buffer overflow and subsequently
trigger a crash. (boo#1097973)
- CVE-2018-5806: Fixed an error within the leaf_hdr_load_raw function that
could trigger a NULL pointer deference, leading to a denial of service
(DoS). (boo#1097974)
- CVE-2018-5808: Fixed an error within the find_green function that could
cause a stack-based buffer overflow and subsequently execute arbitrary
code. (boo#1118894)
- CVE-2018-5816: Fixed a type confusion error within the identify function
that could trigger a division by zero, leading to a denial of service
(DoS). (boo#1097975)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1619=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

libraw-debugsource-0.17.1-26.1
libraw-devel-0.17.1-26.1
libraw-devel-static-0.17.1-26.1
libraw-tools-0.17.1-26.1
libraw-tools-debuginfo-0.17.1-26.1
libraw15-0.17.1-26.1
libraw15-debuginfo-0.17.1-26.1


References:

https://www.suse.com/security/cve/CVE-2018-5804.html
https://www.suse.com/security/cve/CVE-2018-5805.html
https://www.suse.com/security/cve/CVE-2018-5806.html
https://www.suse.com/security/cve/CVE-2018-5808.html
https://www.suse.com/security/cve/CVE-2018-5816.html
https://bugzilla.suse.com/1097973
https://bugzilla.suse.com/1097974
https://bugzilla.suse.com/1097975
https://bugzilla.suse.com/1118894

--