SUSE 5152 Published by

The following updates has been released for SUSE:

openSUSE-SU-2018:2723-1: Security update for ffmpeg-4
openSUSE-SU-2018:2724-1: moderate: Security update for chromium
openSUSE-SU-2018:2727-1: moderate: Security update for okular
openSUSE-SU-2018:2728-1: moderate: Security update for chromium
openSUSE-SU-2018:2730-1: important: Security update for spice-gtk
openSUSE-SU-2018:2731-1: moderate: Security update for curl
openSUSE-SU-2018:2733-1: moderate: Security update for okular
openSUSE-SU-2018:2734-1: Security update for ffmpeg-4
openSUSE-SU-2018:2736-1: moderate: Security update for curl



openSUSE-SU-2018:2723-1: Security update for ffmpeg-4

openSUSE Security Update: Security update for ffmpeg-4
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2723-1
Rating: low
References: #1092241 #1100348 #1105869
Cross-References: CVE-2018-13300 CVE-2018-15822
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for ffmpeg-4 to version 4.0.2 fixes the following issues:

These security issues were fixed:

- CVE-2018-15822: The flv_write_packet function did not check for an empty
audio packet, leading to an assertion failure and DoS (bsc#1105869).
- CVE-2018-13300: An improper argument passed to the avpriv_request_sample
function may have triggered an out-of-array read while converting a
crafted AVI file to MPEG4, leading to a denial of service and possibly
an information disclosure (bsc#1100348).

These non-security issues were fixed:

- Enable webvtt encoders and decoders (boo#1092241).
- Build codec2 encoder and decoder, add libcodec2 to enable_decoders and
enable_encoders.
- Enable mpeg 1 and 2 encoders.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1004=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1004=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

ffmpeg-4-debugsource-4.0.2-13.1
ffmpeg-4-libavcodec-devel-4.0.2-13.1
ffmpeg-4-libavdevice-devel-4.0.2-13.1
ffmpeg-4-libavfilter-devel-4.0.2-13.1
ffmpeg-4-libavformat-devel-4.0.2-13.1
ffmpeg-4-libavresample-devel-4.0.2-13.1
ffmpeg-4-libavutil-devel-4.0.2-13.1
ffmpeg-4-libpostproc-devel-4.0.2-13.1
ffmpeg-4-libswresample-devel-4.0.2-13.1
ffmpeg-4-libswscale-devel-4.0.2-13.1
ffmpeg-4-private-devel-4.0.2-13.1
libavcodec58-4.0.2-13.1
libavcodec58-debuginfo-4.0.2-13.1
libavdevice58-4.0.2-13.1
libavdevice58-debuginfo-4.0.2-13.1
libavfilter7-4.0.2-13.1
libavfilter7-debuginfo-4.0.2-13.1
libavformat58-4.0.2-13.1
libavformat58-debuginfo-4.0.2-13.1
libavresample4-4.0.2-13.1
libavresample4-debuginfo-4.0.2-13.1
libavutil56-4.0.2-13.1
libavutil56-debuginfo-4.0.2-13.1
libpostproc55-4.0.2-13.1
libpostproc55-debuginfo-4.0.2-13.1
libswresample3-4.0.2-13.1
libswresample3-debuginfo-4.0.2-13.1
libswscale5-4.0.2-13.1
libswscale5-debuginfo-4.0.2-13.1

- openSUSE Leap 42.3 (x86_64):

libavcodec58-32bit-4.0.2-13.1
libavcodec58-debuginfo-32bit-4.0.2-13.1
libavdevice58-32bit-4.0.2-13.1
libavdevice58-debuginfo-32bit-4.0.2-13.1
libavfilter7-32bit-4.0.2-13.1
libavfilter7-debuginfo-32bit-4.0.2-13.1
libavformat58-32bit-4.0.2-13.1
libavformat58-debuginfo-32bit-4.0.2-13.1
libavresample4-32bit-4.0.2-13.1
libavresample4-debuginfo-32bit-4.0.2-13.1
libavutil56-32bit-4.0.2-13.1
libavutil56-debuginfo-32bit-4.0.2-13.1
libpostproc55-32bit-4.0.2-13.1
libpostproc55-debuginfo-32bit-4.0.2-13.1
libswresample3-32bit-4.0.2-13.1
libswresample3-debuginfo-32bit-4.0.2-13.1
libswscale5-32bit-4.0.2-13.1
libswscale5-debuginfo-32bit-4.0.2-13.1

- openSUSE Leap 15.0 (x86_64):

ffmpeg-4-debugsource-4.0.2-lp150.13.1
ffmpeg-4-libavcodec-devel-4.0.2-lp150.13.1
ffmpeg-4-libavdevice-devel-4.0.2-lp150.13.1
ffmpeg-4-libavfilter-devel-4.0.2-lp150.13.1
ffmpeg-4-libavformat-devel-4.0.2-lp150.13.1
ffmpeg-4-libavresample-devel-4.0.2-lp150.13.1
ffmpeg-4-libavutil-devel-4.0.2-lp150.13.1
ffmpeg-4-libpostproc-devel-4.0.2-lp150.13.1
ffmpeg-4-libswresample-devel-4.0.2-lp150.13.1
ffmpeg-4-libswscale-devel-4.0.2-lp150.13.1
ffmpeg-4-private-devel-4.0.2-lp150.13.1
libavcodec58-4.0.2-lp150.13.1
libavcodec58-debuginfo-4.0.2-lp150.13.1
libavdevice58-4.0.2-lp150.13.1
libavdevice58-debuginfo-4.0.2-lp150.13.1
libavfilter7-4.0.2-lp150.13.1
libavfilter7-debuginfo-4.0.2-lp150.13.1
libavformat58-4.0.2-lp150.13.1
libavformat58-debuginfo-4.0.2-lp150.13.1
libavresample4-4.0.2-lp150.13.1
libavresample4-debuginfo-4.0.2-lp150.13.1
libavutil56-4.0.2-lp150.13.1
libavutil56-debuginfo-4.0.2-lp150.13.1
libpostproc55-4.0.2-lp150.13.1
libpostproc55-debuginfo-4.0.2-lp150.13.1
libswresample3-4.0.2-lp150.13.1
libswresample3-debuginfo-4.0.2-lp150.13.1
libswscale5-4.0.2-lp150.13.1
libswscale5-debuginfo-4.0.2-lp150.13.1


References:

https://www.suse.com/security/cve/CVE-2018-13300.html
https://www.suse.com/security/cve/CVE-2018-15822.html
https://bugzilla.suse.com/1092241
https://bugzilla.suse.com/1100348
https://bugzilla.suse.com/1105869

--


openSUSE-SU-2018:2724-1: moderate: Security update for chromium

openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2724-1
Rating: moderate
References: #1108114 #1108175
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that contains security fixes can now be installed.

Description:

This update for Chromium to version 69.0.3497.92 fixes the following
issues:

Security issues fixed ((boo#1108114):

- Function signature mismatch in WebAssembly
- URL Spoofing in Omnibox

The following tracked packaging issues were fixed:

- the chromium package incorrectly provied swiftshader resolvables
(boo#1108175)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2018-1005=1



Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):

chromedriver-69.0.3497.92-68.1
chromedriver-debuginfo-69.0.3497.92-68.1
chromium-69.0.3497.92-68.1
chromium-debuginfo-69.0.3497.92-68.1
chromium-debugsource-69.0.3497.92-68.1


References:

https://bugzilla.suse.com/1108114
https://bugzilla.suse.com/1108175

--


openSUSE-SU-2018:2727-1: moderate: Security update for okular

openSUSE Security Update: Security update for okular
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2727-1
Rating: moderate
References: #1107591
Cross-References: CVE-2018-1000801
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for okular fixes the following security issue:

- CVE-2018-1000801: Prevent directory traversal vulnerability in function
unpackDocumentArchive could have resulted in arbitrary file creation via
a specially crafted Okular archive (bsc#1107591).


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2018-1006=1



Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):

okular-17.04.2-11.1
okular-debuginfo-17.04.2-11.1
okular-debugsource-17.04.2-11.1
okular-devel-17.04.2-11.1

- SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):

okular-lang-17.04.2-11.1


References:

https://www.suse.com/security/cve/CVE-2018-1000801.html
https://bugzilla.suse.com/1107591

--


openSUSE-SU-2018:2728-1: moderate: Security update for chromium

openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2728-1
Rating: moderate
References: #1108114 #1108175
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________

An update that contains security fixes can now be installed.

Description:

This update for Chromium to version 69.0.3497.92 fixes the following
issues:

Security issues fixed ((boo#1108114):

- Function signature mismatch in WebAssembly
- URL Spoofing in Omnibox

The following tracked packaging issues were fixed:

- the chromium package incorrectly provied swiftshader resolvables
(boo#1108175)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1005=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1005=1



Package List:

- openSUSE Leap 42.3 (x86_64):

chromedriver-69.0.3497.92-171.1
chromedriver-debuginfo-69.0.3497.92-171.1
chromium-69.0.3497.92-171.1
chromium-debuginfo-69.0.3497.92-171.1
chromium-debugsource-69.0.3497.92-171.1

- openSUSE Leap 15.0 (x86_64):

chromedriver-69.0.3497.92-lp150.2.13.1
chromedriver-debuginfo-69.0.3497.92-lp150.2.13.1
chromium-69.0.3497.92-lp150.2.13.1
chromium-debuginfo-69.0.3497.92-lp150.2.13.1
chromium-debugsource-69.0.3497.92-lp150.2.13.1


References:

https://bugzilla.suse.com/1108114
https://bugzilla.suse.com/1108175

--


openSUSE-SU-2018:2730-1: important: Security update for spice-gtk

openSUSE Security Update: Security update for spice-gtk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2730-1
Rating: important
References: #1101295 #1101420 #1104448
Cross-References: CVE-2018-10873 CVE-2018-10893
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for spice-gtk fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling
(bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)

Other bugs fixed:

- Add setuid bit to spice-client-glib-usb-acl-helper (bsc#1101420)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1015=1



Package List:

- openSUSE Leap 15.0 (x86_64):

libspice-client-glib-2_0-8-0.34-lp150.2.3.1
libspice-client-glib-2_0-8-debuginfo-0.34-lp150.2.3.1
libspice-client-glib-helper-0.34-lp150.2.3.1
libspice-client-glib-helper-debuginfo-0.34-lp150.2.3.1
libspice-client-gtk-3_0-5-0.34-lp150.2.3.1
libspice-client-gtk-3_0-5-debuginfo-0.34-lp150.2.3.1
libspice-controller0-0.34-lp150.2.3.1
libspice-controller0-debuginfo-0.34-lp150.2.3.1
spice-gtk-0.34-lp150.2.3.1
spice-gtk-debuginfo-0.34-lp150.2.3.1
spice-gtk-debugsource-0.34-lp150.2.3.1
spice-gtk-devel-0.34-lp150.2.3.1
typelib-1_0-SpiceClientGlib-2_0-0.34-lp150.2.3.1
typelib-1_0-SpiceClientGtk-3_0-0.34-lp150.2.3.1

- openSUSE Leap 15.0 (noarch):

spice-gtk-lang-0.34-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-10873.html
https://www.suse.com/security/cve/CVE-2018-10893.html
https://bugzilla.suse.com/1101295
https://bugzilla.suse.com/1101420
https://bugzilla.suse.com/1104448

--


openSUSE-SU-2018:2731-1: moderate: Security update for curl

openSUSE Security Update: Security update for curl
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2731-1
Rating: moderate
References: #1086367 #1106019
Cross-References: CVE-2018-14618
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for curl fixes the following issues:

This security issue was fixed:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
(bsc#1106019)

This non-security issue was fixed:

- Use OPENSSL_config instead of CONF_modules_load_file() to avoid crashes
due to openssl engines conflicts (bsc#1086367)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1010=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

curl-7.60.0-lp150.2.12.1
curl-debuginfo-7.60.0-lp150.2.12.1
curl-debugsource-7.60.0-lp150.2.12.1
curl-mini-7.60.0-lp150.2.12.1
curl-mini-debuginfo-7.60.0-lp150.2.12.1
curl-mini-debugsource-7.60.0-lp150.2.12.1
libcurl-devel-7.60.0-lp150.2.12.1
libcurl-mini-devel-7.60.0-lp150.2.12.1
libcurl4-7.60.0-lp150.2.12.1
libcurl4-debuginfo-7.60.0-lp150.2.12.1
libcurl4-mini-7.60.0-lp150.2.12.1
libcurl4-mini-debuginfo-7.60.0-lp150.2.12.1

- openSUSE Leap 15.0 (x86_64):

libcurl-devel-32bit-7.60.0-lp150.2.12.1
libcurl4-32bit-7.60.0-lp150.2.12.1
libcurl4-32bit-debuginfo-7.60.0-lp150.2.12.1


References:

https://www.suse.com/security/cve/CVE-2018-14618.html
https://bugzilla.suse.com/1086367
https://bugzilla.suse.com/1106019

--


openSUSE-SU-2018:2733-1: moderate: Security update for okular

openSUSE Security Update: Security update for okular
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2733-1
Rating: moderate
References: #1107591
Cross-References: CVE-2018-1000801
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for okular fixes the following security issue:

- CVE-2018-1000801: Prevent directory traversal vulnerability in function
unpackDocumentArchive could have resulted in arbitrary file creation via
a specially crafted Okular archive (bsc#1107591).


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1006=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1006=1



Package List:

- openSUSE Leap 42.3 (x86_64):

okular-17.04.2-6.1
okular-debuginfo-17.04.2-6.1
okular-debugsource-17.04.2-6.1
okular-devel-17.04.2-6.1

- openSUSE Leap 42.3 (noarch):

okular-lang-17.04.2-6.1

- openSUSE Leap 15.0 (x86_64):

okular-17.12.3-lp150.3.3.1
okular-debuginfo-17.12.3-lp150.3.3.1
okular-debugsource-17.12.3-lp150.3.3.1
okular-devel-17.12.3-lp150.3.3.1

- openSUSE Leap 15.0 (noarch):

okular-lang-17.12.3-lp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-1000801.html
https://bugzilla.suse.com/1107591

--


openSUSE-SU-2018:2734-1: Security update for ffmpeg-4

openSUSE Security Update: Security update for ffmpeg-4
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2734-1
Rating: low
References: #1092241 #1100348 #1105869
Cross-References: CVE-2018-13300 CVE-2018-15822
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for ffmpeg-4 to version 4.0.2 fixes the following issues:

These security issues were fixed:

- CVE-2018-15822: The flv_write_packet function did not check for an empty
audio packet, leading to an assertion failure and DoS (bsc#1105869).
- CVE-2018-13300: An improper argument passed to the avpriv_request_sample
function may have triggered an out-of-array read while converting a
crafted AVI file to MPEG4, leading to a denial of service and possibly
an information disclosure (bsc#1100348).

These non-security issues were fixed:

- Enable webvtt encoders and decoders (boo#1092241).
- Build codec2 encoder and decoder, add libcodec2 to enable_decoders and
enable_encoders.
- Enable mpeg 1 and 2 encoders.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2018-1004=1



Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

ffmpeg-4-libavcodec-devel-4.0.2-13.1
ffmpeg-4-libavdevice-devel-4.0.2-13.1
ffmpeg-4-libavfilter-devel-4.0.2-13.1
ffmpeg-4-libavformat-devel-4.0.2-13.1
ffmpeg-4-libavresample-devel-4.0.2-13.1
ffmpeg-4-libavutil-devel-4.0.2-13.1
ffmpeg-4-libpostproc-devel-4.0.2-13.1
ffmpeg-4-libswresample-devel-4.0.2-13.1
ffmpeg-4-libswscale-devel-4.0.2-13.1
ffmpeg-4-private-devel-4.0.2-13.1
libavcodec58-4.0.2-13.1
libavdevice58-4.0.2-13.1
libavfilter7-4.0.2-13.1
libavformat58-4.0.2-13.1
libavresample4-4.0.2-13.1
libavutil56-4.0.2-13.1
libpostproc55-4.0.2-13.1
libswresample3-4.0.2-13.1
libswscale5-4.0.2-13.1


References:

https://www.suse.com/security/cve/CVE-2018-13300.html
https://www.suse.com/security/cve/CVE-2018-15822.html
https://bugzilla.suse.com/1092241
https://bugzilla.suse.com/1100348
https://bugzilla.suse.com/1105869

--


openSUSE-SU-2018:2736-1: moderate: Security update for curl

openSUSE Security Update: Security update for curl
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2736-1
Rating: moderate
References: #1089533 #1106019
Cross-References: CVE-2018-14618
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for curl fixes the following issues:

This security issue was fixed:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
(bsc#1106019)

This non-security issue was fixed:

- Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1008=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

curl-7.37.0-39.1
curl-debuginfo-7.37.0-39.1
curl-debugsource-7.37.0-39.1
libcurl-devel-7.37.0-39.1
libcurl4-7.37.0-39.1
libcurl4-debuginfo-7.37.0-39.1

- openSUSE Leap 42.3 (x86_64):

libcurl-devel-32bit-7.37.0-39.1
libcurl4-32bit-7.37.0-39.1
libcurl4-debuginfo-32bit-7.37.0-39.1


References:

https://www.suse.com/security/cve/CVE-2018-14618.html
https://bugzilla.suse.com/1089533
https://bugzilla.suse.com/1106019

--