SUSE 5181 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2018:2723-2: Security update for ffmpeg-4
openSUSE-SU-2018:2797-2: critical: Security update for hylafax+
openSUSE-SU-2018:2801-2: moderate: Security update for obs-service-refresh_patches
openSUSE-SU-2018:2809-1: important: Security update for python-Django1
openSUSE-SU-2018:2810-1: moderate: Security update for aubio



openSUSE-SU-2018:2723-2: Security update for ffmpeg-4

openSUSE Security Update: Security update for ffmpeg-4
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2723-2
Rating: low
References: #1092241 #1100348 #1105869
Cross-References: CVE-2018-13300 CVE-2018-15822
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for ffmpeg-4 to version 4.0.2 fixes the following issues:

These security issues were fixed:

- CVE-2018-15822: The flv_write_packet function did not check for an empty
audio packet, leading to an assertion failure and DoS (bsc#1105869).
- CVE-2018-13300: An improper argument passed to the avpriv_request_sample
function may have triggered an out-of-array read while converting a
crafted AVI file to MPEG4, leading to a denial of service and possibly
an information disclosure (bsc#1100348).

These non-security issues were fixed:

- Enable webvtt encoders and decoders (boo#1092241).
- Build codec2 encoder and decoder, add libcodec2 to enable_decoders and
enable_encoders.
- Enable mpeg 1 and 2 encoders.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1004=1



Package List:

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

ffmpeg-4-debugsource-4.0.2-bp150.3.3.1
ffmpeg-4-libavcodec-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libavdevice-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libavfilter-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libavformat-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libavresample-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libavutil-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libpostproc-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libswresample-devel-4.0.2-bp150.3.3.1
ffmpeg-4-libswscale-devel-4.0.2-bp150.3.3.1
ffmpeg-4-private-devel-4.0.2-bp150.3.3.1
libavcodec58-4.0.2-bp150.3.3.1
libavcodec58-debuginfo-4.0.2-bp150.3.3.1
libavdevice58-4.0.2-bp150.3.3.1
libavdevice58-debuginfo-4.0.2-bp150.3.3.1
libavfilter7-4.0.2-bp150.3.3.1
libavfilter7-debuginfo-4.0.2-bp150.3.3.1
libavformat58-4.0.2-bp150.3.3.1
libavformat58-debuginfo-4.0.2-bp150.3.3.1
libavresample4-4.0.2-bp150.3.3.1
libavresample4-debuginfo-4.0.2-bp150.3.3.1
libavutil56-4.0.2-bp150.3.3.1
libavutil56-debuginfo-4.0.2-bp150.3.3.1
libpostproc55-4.0.2-bp150.3.3.1
libpostproc55-debuginfo-4.0.2-bp150.3.3.1
libswresample3-4.0.2-bp150.3.3.1
libswresample3-debuginfo-4.0.2-bp150.3.3.1
libswscale5-4.0.2-bp150.3.3.1
libswscale5-debuginfo-4.0.2-bp150.3.3.1

- openSUSE Backports SLE-15 (aarch64_ilp32):

libavcodec58-64bit-4.0.2-bp150.3.3.1
libavcodec58-64bit-debuginfo-4.0.2-bp150.3.3.1
libavdevice58-64bit-4.0.2-bp150.3.3.1
libavdevice58-64bit-debuginfo-4.0.2-bp150.3.3.1
libavfilter7-64bit-4.0.2-bp150.3.3.1
libavfilter7-64bit-debuginfo-4.0.2-bp150.3.3.1
libavformat58-64bit-4.0.2-bp150.3.3.1
libavformat58-64bit-debuginfo-4.0.2-bp150.3.3.1
libavresample4-64bit-4.0.2-bp150.3.3.1
libavresample4-64bit-debuginfo-4.0.2-bp150.3.3.1
libavutil56-64bit-4.0.2-bp150.3.3.1
libavutil56-64bit-debuginfo-4.0.2-bp150.3.3.1
libpostproc55-64bit-4.0.2-bp150.3.3.1
libpostproc55-64bit-debuginfo-4.0.2-bp150.3.3.1
libswresample3-64bit-4.0.2-bp150.3.3.1
libswresample3-64bit-debuginfo-4.0.2-bp150.3.3.1
libswscale5-64bit-4.0.2-bp150.3.3.1
libswscale5-64bit-debuginfo-4.0.2-bp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-13300.html
https://www.suse.com/security/cve/CVE-2018-15822.html
https://bugzilla.suse.com/1092241
https://bugzilla.suse.com/1100348
https://bugzilla.suse.com/1105869

--


openSUSE-SU-2018:2797-2: critical: Security update for hylafax+

openSUSE Security Update: Security update for hylafax+
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2797-2
Rating: critical
References: #1109084
Cross-References: CVE-2018-17141
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for hylafax+ fixes the following issues:

Security issues fixed in 5.6.1:

- CVE-2018-17141: multiple vulnerabilities affecting fax page reception in
JPEG format Specially crafted input may have allowed remote execution of
arbitrary code (boo#1109084)

Additionally, this update also contains all upstream corrections and
bugfixes in the 5.6.1 version, including:

- fix RFC2047 encoding by notify
- add jobcontrol PageSize feature
- don't wait forever after +FRH:3
- fix faxmail transition between a message and external types
- avoid pagehandling from introducing some unnecessary EOM signals
- improve proxy connection error handling and logging
- add initial ModemGroup limits feature
- pass the user's uid onto the session log file for sent faxes
- improve job waits to minimize triggers
- add ProxyTaglineFormat and ProxyTSI features


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1027=1



Package List:

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

hylafax+-5.6.1-bp150.4.3.1
hylafax+-client-5.6.1-bp150.4.3.1
hylafax+-client-debuginfo-5.6.1-bp150.4.3.1
hylafax+-debuginfo-5.6.1-bp150.4.3.1
hylafax+-debugsource-5.6.1-bp150.4.3.1
libfaxutil5_6_1-5.6.1-bp150.4.3.1
libfaxutil5_6_1-debuginfo-5.6.1-bp150.4.3.1


References:

https://www.suse.com/security/cve/CVE-2018-17141.html
https://bugzilla.suse.com/1109084

--


openSUSE-SU-2018:2801-2: moderate: Security update for obs-service-refresh_patches

openSUSE Security Update: Security update for obs-service-refresh_patches
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2801-2
Rating: moderate
References: #1108189
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that contains security fixes can now be installed.

Description:

This update for obs-service-refresh_patches fixes the following security
issue:

- An attacker creating a specially formated archive could have tricked the
service in deleting directories that shouldn't be deleted (boo#1108189)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1029=1



Package List:

- openSUSE Backports SLE-15 (noarch):

obs-service-refresh_patches-0.3.9+git.1537184752.d624424-bp150.3.3.1


References:

https://bugzilla.suse.com/1108189

--


openSUSE-SU-2018:2809-1: important: Security update for python-Django1

openSUSE Security Update: Security update for python-Django1
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2809-1
Rating: important
References: #1102680
Cross-References: CVE-2018-14574
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-Django1 to version 1.11.15 fixes the following
issues:

The following security vulnerability was fixed:

- CVE-2018-14574: Fixed an open redirect possibility in CommonMiddleware
(boo#1102680)

The following other bugs were fixed:

- Fixed WKBWriter.write() and write_hex() for empty polygons on GEOS 3.6.1+
- Fixed a regression where altering a field with a unique constraint may
drop and rebuild more foreign keys than necessary
- Fixed crashes in django.contrib.admindocs when a view is a callable
object, such as django.contrib.syndication.views.Feed
- Fixed a regression where QuerySet.values() or values_list() after
combining an annotated and unannotated queryset with union(),
difference(), or intersection() crashed due to mismatching columns

This update was imported from the openSUSE:Leap:15.0:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-884=1



Package List:

- openSUSE Backports SLE-15 (noarch):

python2-Django1-1.11.15-bp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-14574.html
https://bugzilla.suse.com/1102680

--


openSUSE-SU-2018:2810-1: moderate: Security update for aubio

openSUSE Security Update: Security update for aubio
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2810-1
Rating: moderate
References: #1102359 #1102364
Cross-References: CVE-2018-14522 CVE-2018-14523
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for aubio fixes the following issues:

- CVE-2018-14522: Fixed a crash in aubio_pitch_set_unit (bsc#1102359)
- CVE-2018-14523: Fixed a buffer overrread resulting in crash or
information leakage in new_aubio_pitchyinfft (bsc#1102364)

This update was imported from the openSUSE:Leap:15.0:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-883=1



Package List:

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

python-aubio-debugsource-0.4.6-bp150.3.3.1
python2-aubio-0.4.6-bp150.3.3.1
python2-aubio-debuginfo-0.4.6-bp150.3.3.1
python3-aubio-0.4.6-bp150.3.3.1
python3-aubio-debuginfo-0.4.6-bp150.3.3.1

- openSUSE Backports SLE-15 (x86_64):

aubio-tools-0.4.6-bp150.3.3.1
libaubio-devel-0.4.6-bp150.3.3.1
libaubio5-0.4.6-bp150.3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-14522.html
https://www.suse.com/security/cve/CVE-2018-14523.html
https://bugzilla.suse.com/1102359
https://bugzilla.suse.com/1102364

--