SUSE 5153 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2018:3035-1: moderate: Security update for gitolite
openSUSE-SU-2018:3036-1: important: Security update for ghostscript
openSUSE-SU-2018:3038-1: important: Security update for ghostscript
openSUSE-SU-2018:3043-1: moderate: Security update for unzip



openSUSE-SU-2018:3035-1: moderate: Security update for gitolite

openSUSE Security Update: Security update for gitolite
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3035-1
Rating: moderate
References: #1108272
Cross-References: CVE-2018-16976
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for gitolite fixes the following issues:

Gitolite was updated to 3.6.9:

- CVE-2018-16976: prevent racy access to repos in process of migration to
gitolite (boo#1108272)
- 'info' learns new '-p' option to show only physical repos (as opposed to
wild repos)

The update to 3.6.8 contains:

- fix bug when deleting *all* hooks for a repo
- allow trailing slashes in repo names
- make pre-receive hook driver bail on non-zero exit of a pre-receive hook
- allow templates in gitolite.conf (new feature)
- various optimiations

The update to 3.6.7 contains:

- allow repo-specific hooks to be organised into subdirectories, and allow
the multi-hook driver to be placed in some other location of your choice
- allow simple test code to be embedded within the gitolite.conf file; see
contrib/utils/testconf for how. (This goes on the client side, not on
the server)
- allow syslog "facility" to be changed, from the default of 'local0'
- allow syslog "facility" to be changed, from the default of replaced with
a space separated list of members

The update to 3.6.6 contains:

- simple but important fix for a future perl deprecation (perl will be
removing "." from @INC in 5.24)
- 'perms' now requires a '-c' to activate batch mode (should not affect
interactive use but check your scripts perhaps?)
- gitolite setup now accepts a '-m' option to supply a custom message
(useful when it is used by a script)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1118=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1118=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1118=1



Package List:

- openSUSE Leap 42.3 (noarch):

gitolite-3.6.9-4.3.1

- openSUSE Leap 15.0 (noarch):

gitolite-3.6.9-lp150.2.3.1

- openSUSE Backports SLE-15 (noarch):

gitolite-3.6.9-bp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-16976.html
https://bugzilla.suse.com/1108272

--


openSUSE-SU-2018:3036-1: important: Security update for ghostscript

openSUSE Security Update: Security update for ghostscript
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3036-1
Rating: important
References: #1106171 #1106172 #1106173 #1106195 #1107410
#1107411 #1107412 #1107413 #1107420 #1107421
#1107422 #1107423 #1107426 #1107581 #1108027
#1109105
Cross-References: CVE-2018-15908 CVE-2018-15909 CVE-2018-15910
CVE-2018-15911 CVE-2018-16509 CVE-2018-16510
CVE-2018-16511 CVE-2018-16513 CVE-2018-16539
CVE-2018-16540 CVE-2018-16541 CVE-2018-16542
CVE-2018-16543 CVE-2018-16585 CVE-2018-16802
CVE-2018-17183
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 16 vulnerabilities is now available.

Description:

This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted
PostScript to potentially overwrite or replace error handlers to inject
code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that
could have been used by attackers able to supply crafted PostScript
files to crash the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
PostScript files to bypass .tempfile restrictions and write files
(bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams
parameter that could have been used to crash the interpreter or execute
code (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
operator that could have been used to crash the interpreter or
potentially execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that
could have been used to crash the interpreter or possibly have
unspecified other impact (bsc#1107412).
- CVE-2018-16509: Incorrect "restoration of privilege" checking during
handling
of /invalidaccess exceptions could be have been used by attackers able
to supply crafted PostScript to execute code using the "pipe"
instruction (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the "CS" and "SC" PDF
primitives could have been used by remote attackers able to supply
crafted PDFs to crash the interpreter or possibly have unspecified other
impact (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript
files from using insufficient interpreter stack-size checking during
error handling to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript
files from using incorrect free logic in pagedevice replacement to crash
the interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could
have been used to crash the interpreter or possibly have unspecified
other impact (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript
files from using incorrect access checking in temp file handling to
disclose contents
of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to
have an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in "ztype" could have been used by
remote attackers able to supply crafted PostScript to crash the
interpreter or possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted
even though it is not intended for use during document processing (e.g.,
after the startup phase). This lead to memory corruption, allowing
remote attackers able to supply crafted PostScript to crash the
interpreter or possibly have unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect "restoration of privilege" checking when
running
out of stack during exception handling could have been used by attackers
able to supply crafted PostScript to execute code using the "pipe"
instruction. This is due to an incomplete fix for CVE-2018-16509
(bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
security fixes to the SAFER file access restrictions (specifically
accessing ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check
http://www.ghostscript.com/doc/9.25/News.htm and the changes file of the
package.

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1122=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

ghostscript-9.25-14.9.1
ghostscript-debuginfo-9.25-14.9.1
ghostscript-debugsource-9.25-14.9.1
ghostscript-devel-9.25-14.9.1
ghostscript-mini-9.25-14.9.1
ghostscript-mini-debuginfo-9.25-14.9.1
ghostscript-mini-debugsource-9.25-14.9.1
ghostscript-mini-devel-9.25-14.9.1
ghostscript-x11-9.25-14.9.1
ghostscript-x11-debuginfo-9.25-14.9.1


References:

https://www.suse.com/security/cve/CVE-2018-15908.html
https://www.suse.com/security/cve/CVE-2018-15909.html
https://www.suse.com/security/cve/CVE-2018-15910.html
https://www.suse.com/security/cve/CVE-2018-15911.html
https://www.suse.com/security/cve/CVE-2018-16509.html
https://www.suse.com/security/cve/CVE-2018-16510.html
https://www.suse.com/security/cve/CVE-2018-16511.html
https://www.suse.com/security/cve/CVE-2018-16513.html
https://www.suse.com/security/cve/CVE-2018-16539.html
https://www.suse.com/security/cve/CVE-2018-16540.html
https://www.suse.com/security/cve/CVE-2018-16541.html
https://www.suse.com/security/cve/CVE-2018-16542.html
https://www.suse.com/security/cve/CVE-2018-16543.html
https://www.suse.com/security/cve/CVE-2018-16585.html
https://www.suse.com/security/cve/CVE-2018-16802.html
https://www.suse.com/security/cve/CVE-2018-17183.html
https://bugzilla.suse.com/1106171
https://bugzilla.suse.com/1106172
https://bugzilla.suse.com/1106173
https://bugzilla.suse.com/1106195
https://bugzilla.suse.com/1107410
https://bugzilla.suse.com/1107411
https://bugzilla.suse.com/1107412
https://bugzilla.suse.com/1107413
https://bugzilla.suse.com/1107420
https://bugzilla.suse.com/1107421
https://bugzilla.suse.com/1107422
https://bugzilla.suse.com/1107423
https://bugzilla.suse.com/1107426
https://bugzilla.suse.com/1107581
https://bugzilla.suse.com/1108027
https://bugzilla.suse.com/1109105

--


openSUSE-SU-2018:3038-1: important: Security update for ghostscript

openSUSE Security Update: Security update for ghostscript
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3038-1
Rating: important
References: #1106171 #1106172 #1106173 #1106195 #1107410
#1107411 #1107412 #1107413 #1107420 #1107421
#1107422 #1107423 #1107426 #1107581 #1108027
#1109105
Cross-References: CVE-2018-15908 CVE-2018-15909 CVE-2018-15910
CVE-2018-15911 CVE-2018-16509 CVE-2018-16510
CVE-2018-16511 CVE-2018-16513 CVE-2018-16539
CVE-2018-16540 CVE-2018-16541 CVE-2018-16542
CVE-2018-16543 CVE-2018-16585 CVE-2018-16802
CVE-2018-17183
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 16 vulnerabilities is now available.

Description:

This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted
PostScript to potentially overwrite or replace error handlers to inject
code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that
could have been used by attackers able to supply crafted PostScript
files to crash the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
PostScript files to bypass .tempfile restrictions and write files
(bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams
parameter that could have been used to crash the interpreter or execute
code (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
operator that could have been used to crash the interpreter or
potentially execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that
could have been used to crash the interpreter or possibly have
unspecified other impact (bsc#1107412).
- CVE-2018-16509: Incorrect "restoration of privilege" checking during
handling
of /invalidaccess exceptions could be have been used by attackers able
to supply crafted PostScript to execute code using the "pipe"
instruction (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the "CS" and "SC" PDF
primitives could have been used by remote attackers able to supply
crafted PDFs to crash the interpreter or possibly have unspecified other
impact (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript
files from using insufficient interpreter stack-size checking during
error handling to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript
files from using incorrect free logic in pagedevice replacement to crash
the interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could
have been used to crash the interpreter or possibly have unspecified
other impact (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript
files from using incorrect access checking in temp file handling to
disclose contents
of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to
have an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in "ztype" could have been used by
remote attackers able to supply crafted PostScript to crash the
interpreter or possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted
even though it is not intended for use during document processing (e.g.,
after the startup phase). This lead to memory corruption, allowing
remote attackers able to supply crafted PostScript to crash the
interpreter or possibly have unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect "restoration of privilege" checking when
running
out of stack during exception handling could have been used by attackers
able to supply crafted PostScript to execute code using the "pipe"
instruction. This is due to an incomplete fix for CVE-2018-16509
(bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
security fixes to the SAFER file access restrictions (specifically
accessing ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check
http://www.ghostscript.com/doc/9.25/News.htm

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1123=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

ghostscript-9.25-lp150.2.6.1
ghostscript-debuginfo-9.25-lp150.2.6.1
ghostscript-debugsource-9.25-lp150.2.6.1
ghostscript-devel-9.25-lp150.2.6.1
ghostscript-mini-9.25-lp150.2.6.1
ghostscript-mini-debuginfo-9.25-lp150.2.6.1
ghostscript-mini-debugsource-9.25-lp150.2.6.1
ghostscript-mini-devel-9.25-lp150.2.6.1
ghostscript-x11-9.25-lp150.2.6.1
ghostscript-x11-debuginfo-9.25-lp150.2.6.1

- openSUSE Leap 15.0 (x86_64):

libspectre-debugsource-0.2.8-lp150.2.3.1
libspectre-devel-0.2.8-lp150.2.3.1
libspectre1-0.2.8-lp150.2.3.1
libspectre1-debuginfo-0.2.8-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-15908.html
https://www.suse.com/security/cve/CVE-2018-15909.html
https://www.suse.com/security/cve/CVE-2018-15910.html
https://www.suse.com/security/cve/CVE-2018-15911.html
https://www.suse.com/security/cve/CVE-2018-16509.html
https://www.suse.com/security/cve/CVE-2018-16510.html
https://www.suse.com/security/cve/CVE-2018-16511.html
https://www.suse.com/security/cve/CVE-2018-16513.html
https://www.suse.com/security/cve/CVE-2018-16539.html
https://www.suse.com/security/cve/CVE-2018-16540.html
https://www.suse.com/security/cve/CVE-2018-16541.html
https://www.suse.com/security/cve/CVE-2018-16542.html
https://www.suse.com/security/cve/CVE-2018-16543.html
https://www.suse.com/security/cve/CVE-2018-16585.html
https://www.suse.com/security/cve/CVE-2018-16802.html
https://www.suse.com/security/cve/CVE-2018-17183.html
https://bugzilla.suse.com/1106171
https://bugzilla.suse.com/1106172
https://bugzilla.suse.com/1106173
https://bugzilla.suse.com/1106195
https://bugzilla.suse.com/1107410
https://bugzilla.suse.com/1107411
https://bugzilla.suse.com/1107412
https://bugzilla.suse.com/1107413
https://bugzilla.suse.com/1107420
https://bugzilla.suse.com/1107421
https://bugzilla.suse.com/1107422
https://bugzilla.suse.com/1107423
https://bugzilla.suse.com/1107426
https://bugzilla.suse.com/1107581
https://bugzilla.suse.com/1108027
https://bugzilla.suse.com/1109105

--


openSUSE-SU-2018:3043-1: moderate: Security update for unzip

openSUSE Security Update: Security update for unzip
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3043-1
Rating: moderate
References: #1013992 #1013993 #1080074 #910683 #914442
#950110 #950111
Cross-References: CVE-2014-9636 CVE-2014-9913 CVE-2015-7696
CVE-2015-7697 CVE-2016-9844 CVE-2018-1000035

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves 6 vulnerabilities and has one errata
is now available.

Description:

This update for unzip fixes the following security issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory
writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection
could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop
and lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory
writes possibly resulting in DoS or corruption (bsc#1013992)
- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing
of password-protected archives that allowed an attacker to perform a
denial of service or to possibly achieve code execution (bsc#1080074).
- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write
and crash) via an extra field with an uncompressed size smaller than the
compressed field size in a zip archive that advertises STORED method
compression (bsc#914442).

This non-security issue was fixed:

- Allow processing of Windows zip64 archives (Windows archivers set
total_disks field to 0 but per standard, valid values are 1 and higher)
(bnc#910683)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1124=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

unzip-6.00-31.3.1
unzip-debuginfo-6.00-31.3.1
unzip-debugsource-6.00-31.3.1
unzip-doc-6.00-31.3.1
unzip-rcc-6.00-31.3.1
unzip-rcc-debuginfo-6.00-31.3.1
unzip-rcc-debugsource-6.00-31.3.1


References:

https://www.suse.com/security/cve/CVE-2014-9636.html
https://www.suse.com/security/cve/CVE-2014-9913.html
https://www.suse.com/security/cve/CVE-2015-7696.html
https://www.suse.com/security/cve/CVE-2015-7697.html
https://www.suse.com/security/cve/CVE-2016-9844.html
https://www.suse.com/security/cve/CVE-2018-1000035.html
https://bugzilla.suse.com/1013992
https://bugzilla.suse.com/1013993
https://bugzilla.suse.com/1080074
https://bugzilla.suse.com/910683
https://bugzilla.suse.com/914442
https://bugzilla.suse.com/950110
https://bugzilla.suse.com/950111

--