SUSE 5181 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2018:1553-1: important: Security update for git
This update fixes two vulnerabilities is git: 1) path sanity-checks on NTFS can read arbitrary memory (CVE-2018-11233, boo#1095218). 2) arbitrary code execution when recursively cloning a malicious repository (CVE-2018-11235, boo#1095219)

Available for both openSUSE Leap 42.3 and 15.0

openSUSE-SU-2018:1560-1: moderate: Security update for dpdk-thunderxdpdk
This update fixes a security issue in the DPDK vhost-user interface. The interface did not check to verify that all the requested guest physical range was mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may have lead to a malicious guest exposing vhost-user backend process memory (CVE-2018-1059, bsc#1089638).

Available for openSUSE Leap 42.3



openSUSE-SU-2018:1553-1: important: Security update for git

openSUSE Security Update: Security update for git
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:1553-1
Rating: important
References: #1095218 #1095219
Cross-References: CVE-2018-11233 CVE-2018-11235
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for fixes the following security issues:

* path sanity-checks on NTFS can read arbitrary memory (CVE-2018-11233,
boo#1095218)
* arbitrary code execution when recursively cloning a malicious repository
(CVE-2018-11235, boo#1095219)


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-557=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-557=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

git-2.13.7-13.1
git-arch-2.13.7-13.1
git-core-2.13.7-13.1
git-core-debuginfo-2.13.7-13.1
git-credential-gnome-keyring-2.13.7-13.1
git-credential-gnome-keyring-debuginfo-2.13.7-13.1
git-cvs-2.13.7-13.1
git-daemon-2.13.7-13.1
git-daemon-debuginfo-2.13.7-13.1
git-debugsource-2.13.7-13.1
git-email-2.13.7-13.1
git-gui-2.13.7-13.1
git-svn-2.13.7-13.1
git-svn-debuginfo-2.13.7-13.1
git-web-2.13.7-13.1
gitk-2.13.7-13.1

- openSUSE Leap 42.3 (noarch):

git-doc-2.13.7-13.1

- openSUSE Leap 15.0 (i586 x86_64):

git-2.16.4-lp150.2.3.1
git-arch-2.16.4-lp150.2.3.1
git-core-2.16.4-lp150.2.3.1
git-core-debuginfo-2.16.4-lp150.2.3.1
git-credential-gnome-keyring-2.16.4-lp150.2.3.1
git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1
git-credential-libsecret-2.16.4-lp150.2.3.1
git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1
git-cvs-2.16.4-lp150.2.3.1
git-daemon-2.16.4-lp150.2.3.1
git-daemon-debuginfo-2.16.4-lp150.2.3.1
git-debuginfo-2.16.4-lp150.2.3.1
git-debugsource-2.16.4-lp150.2.3.1
git-email-2.16.4-lp150.2.3.1
git-gui-2.16.4-lp150.2.3.1
git-p4-2.16.4-lp150.2.3.1
git-svn-2.16.4-lp150.2.3.1
git-svn-debuginfo-2.16.4-lp150.2.3.1
git-web-2.16.4-lp150.2.3.1
gitk-2.16.4-lp150.2.3.1

- openSUSE Leap 15.0 (noarch):

git-doc-2.16.4-lp150.2.3.1


References:

https://www.suse.com/security/cve/CVE-2018-11233.html
https://www.suse.com/security/cve/CVE-2018-11235.html
https://bugzilla.suse.com/1095218
https://bugzilla.suse.com/1095219

--


openSUSE-SU-2018:1560-1: moderate: Security update for dpdk-thunderxdpdk

openSUSE Security Update: Security update for dpdk-thunderxdpdk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:1560-1
Rating: moderate
References: #1089638
Cross-References: CVE-2018-1059
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


This update fixes the following issues:

- CVE-2018-1059: The DPDK vhost-user interface did not check to verify
that all the requested guest physical range was mapped and contiguous
when performing Guest Physical Addresses to Host Virtual Addresses
translations. This may have lead to a malicious guest exposing
vhost-user backend process memory (bsc#1089638).

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-558=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

dpdk-16.11.6-6.5.1
dpdk-debuginfo-16.11.6-6.5.1
dpdk-debugsource-16.11.6-6.5.1
dpdk-devel-16.11.6-6.5.1
dpdk-devel-debuginfo-16.11.6-6.5.1
dpdk-examples-16.11.6-6.5.1
dpdk-examples-debuginfo-16.11.6-6.5.1
dpdk-tools-16.11.6-6.5.1

- openSUSE Leap 42.3 (x86_64):

dpdk-kmp-default-16.11.6_k4.4.132_53-6.5.1
dpdk-kmp-default-debuginfo-16.11.6_k4.4.132_53-6.5.1

- openSUSE Leap 42.3 (noarch):

dpdk-doc-16.11.6-6.5.1


References:

https://www.suse.com/security/cve/CVE-2018-1059.html
https://bugzilla.suse.com/1089638

--