SUSE 5152 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2018:4174-1: important: Security update for salt
openSUSE-SU-2018:4175-1: moderate: Security update for pdns
openSUSE-SU-2018:4177-1: moderate: Security update for pdns-recursor



openSUSE-SU-2018:4174-1: important: Security update for salt

openSUSE Security Update: Security update for salt
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4174-1
Rating: important
References: #1110938 #1112874 #1113698 #1113699 #1113784
#1114197 #1114824
Cross-References: CVE-2018-15750 CVE-2018-15751
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves two vulnerabilities and has 5 fixes
is now available.

Description:

This update for salt fixes the following issues:

Security issues fixed:

- CVE-2018-15750: Fixed directory traversal vulnerability in salt-api
(bsc#1113698).
- CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi)
that allows to execute arbitrary commands (bsc#1113699).

Non-security issues fixed:

- Improved handling of LDAP group id. gid is no longer treated as a
string, which could have lead to faulty group creations (bsc#1113784).
- Fixed async call to process manager (bsc#1110938)
- Fixed OS arch detection when RPM is not installed (bsc#1114197)
- Crontab module fix: file attributes option missing (bsc#1114824)
- Fix git_pillar merging across multiple __env__ repositories (bsc#1112874)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1569=1



Package List:

- openSUSE Leap 15.0 (x86_64):

python2-salt-2018.3.0-lp150.3.17.1
python3-salt-2018.3.0-lp150.3.17.1
salt-2018.3.0-lp150.3.17.1
salt-api-2018.3.0-lp150.3.17.1
salt-cloud-2018.3.0-lp150.3.17.1
salt-doc-2018.3.0-lp150.3.17.1
salt-master-2018.3.0-lp150.3.17.1
salt-minion-2018.3.0-lp150.3.17.1
salt-proxy-2018.3.0-lp150.3.17.1
salt-ssh-2018.3.0-lp150.3.17.1
salt-syndic-2018.3.0-lp150.3.17.1

- openSUSE Leap 15.0 (noarch):

salt-bash-completion-2018.3.0-lp150.3.17.1
salt-fish-completion-2018.3.0-lp150.3.17.1
salt-zsh-completion-2018.3.0-lp150.3.17.1


References:

https://www.suse.com/security/cve/CVE-2018-15750.html
https://www.suse.com/security/cve/CVE-2018-15751.html
https://bugzilla.suse.com/1110938
https://bugzilla.suse.com/1112874
https://bugzilla.suse.com/1113698
https://bugzilla.suse.com/1113699
https://bugzilla.suse.com/1113784
https://bugzilla.suse.com/1114197
https://bugzilla.suse.com/1114824

--


openSUSE-SU-2018:4175-1: moderate: Security update for pdns

openSUSE Security Update: Security update for pdns
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4175-1
Rating: moderate
References: #1114157 #1114169
Cross-References: CVE-2018-10851 CVE-2018-14626
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for pdns fixes the following issues:

Security issues fixed:

- CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
- CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).

This update was imported from the openSUSE:Leap:15.0:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1571=1



Package List:

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

pdns-4.1.2-bp150.2.3.1
pdns-backend-geoip-4.1.2-bp150.2.3.1
pdns-backend-godbc-4.1.2-bp150.2.3.1
pdns-backend-ldap-4.1.2-bp150.2.3.1
pdns-backend-lua-4.1.2-bp150.2.3.1
pdns-backend-mydns-4.1.2-bp150.2.3.1
pdns-backend-mysql-4.1.2-bp150.2.3.1
pdns-backend-postgresql-4.1.2-bp150.2.3.1
pdns-backend-remote-4.1.2-bp150.2.3.1
pdns-backend-sqlite3-4.1.2-bp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169

--


openSUSE-SU-2018:4177-1: moderate: Security update for pdns-recursor

openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4177-1
Rating: moderate
References: #1114157 #1114169 #1114170 #1116592
Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644
CVE-2018-16855
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for pdns-recursor fixes the following issues:

Security issues fixed:

- CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
- CVE-2018-14644: Fixed denial of service via crafted query for meta-types
(bsc#1114170).
- CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
- CVE-2018-16855: Fixed case where a crafted query could cause a denial of
service (bsc#1116592)

This update was imported from the openSUSE:Leap:15.0:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1570=1



Package List:

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

pdns-recursor-4.1.2-bp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://www.suse.com/security/cve/CVE-2018-14644.html
https://www.suse.com/security/cve/CVE-2018-16855.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169
https://bugzilla.suse.com/1114170
https://bugzilla.suse.com/1116592

--