SUSE 5132 Published by

The following security updates has been released for openSUSE:

openSUSE-SU-2017:2270-1: important: Security update for freeradius-server
openSUSE-SU-2017:2271-1: important: Security update for ImageMagick



openSUSE-SU-2017:2270-1: important: Security update for freeradius-server

openSUSE Security Update: Security update for freeradius-server
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2270-1
Rating: important
References: #1049086
Cross-References: CVE-2017-10978 CVE-2017-10983 CVE-2017-10984
CVE-2017-10985 CVE-2017-10986 CVE-2017-10987
CVE-2017-10988
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 7 vulnerabilities is now available.

Description:

This update for freeradius-server fixes the following issues:

- update to 3.0.15 (bsc#1049086)
* Bind the lifetime of program name and python path to the module
* CVE-2017-10978: FR-GV-201: Check input / output length in
make_secret() (bsc#1049086)
* CVE-2017-10983: FR-GV-206: Fix read overflow when decoding DHCP option
63 (bsc#1049086)
* CVE-2017-10984: FR-GV-301: Fix write overflow in data2vp_wimax()
(bsc#1049086)
* CVE-2017-10985: FR-GV-302: Fix infinite loop and memory exhaustion
with 'concat' attributes (bsc#1049086)
* CVE-2017-10986: FR-GV-303: Fix infinite read in dhcp_attr2vp()
(bsc#1049086)
* CVE-2017-10987: FR-GV-304: Fix buffer over-read in
fr_dhcp_decode_suboptions() (bsc#1049086)
* CVE-2017-10988: FR-GV-305: Decode 'signed' attributes correctly.
(bsc#1049086)
* FR-AD-001: use strncmp() instead of memcmp() for bounded data
* Print messages when we see deprecated configuration items
* Show reasons why we couldn't parse a certificate expiry time
* Be more accepting about truncated ASN1 times.
* Fix OpenSSL API issue which could leak small amounts of memory.
* For Access-Reject, call rad_authlog() after running the post-auth
section, just like for Access-Accept.
* Don't crash when reading corrupted data from session resumption cache.
* Parse port in dhcpclient.
* Don't leak memory for OpenSSL.
* Portability fixes taken from OpenBSD port collection.
* run rad_authlog after post-auth for Access-Reject.
* Don't process VMPS packets twice.
* Fix attribute truncation in rlm_perl
* Fix bug when processing huntgroups.
* FR-AD-002 - Bind the lifetime of program name and python path to the
module
* FR-AD-003 - Pass correct statement length into sqlite3_prepare[_v2]

This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-972=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (x86_64):

freeradius-server-3.0.15-3.1
freeradius-server-debuginfo-3.0.15-3.1
freeradius-server-debugsource-3.0.15-3.1
freeradius-server-devel-3.0.15-3.1
freeradius-server-doc-3.0.15-3.1
freeradius-server-krb5-3.0.15-3.1
freeradius-server-krb5-debuginfo-3.0.15-3.1
freeradius-server-ldap-3.0.15-3.1
freeradius-server-ldap-debuginfo-3.0.15-3.1
freeradius-server-libs-3.0.15-3.1
freeradius-server-libs-debuginfo-3.0.15-3.1
freeradius-server-mysql-3.0.15-3.1
freeradius-server-mysql-debuginfo-3.0.15-3.1
freeradius-server-perl-3.0.15-3.1
freeradius-server-perl-debuginfo-3.0.15-3.1
freeradius-server-postgresql-3.0.15-3.1
freeradius-server-postgresql-debuginfo-3.0.15-3.1
freeradius-server-python-3.0.15-3.1
freeradius-server-python-debuginfo-3.0.15-3.1
freeradius-server-sqlite-3.0.15-3.1
freeradius-server-sqlite-debuginfo-3.0.15-3.1
freeradius-server-utils-3.0.15-3.1
freeradius-server-utils-debuginfo-3.0.15-3.1


References:

https://www.suse.com/security/cve/CVE-2017-10978.html
https://www.suse.com/security/cve/CVE-2017-10983.html
https://www.suse.com/security/cve/CVE-2017-10984.html
https://www.suse.com/security/cve/CVE-2017-10985.html
https://www.suse.com/security/cve/CVE-2017-10986.html
https://www.suse.com/security/cve/CVE-2017-10987.html
https://www.suse.com/security/cve/CVE-2017-10988.html
https://bugzilla.suse.com/1049086

openSUSE-SU-2017:2271-1: important: Security update for ImageMagick

openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2271-1
Rating: important
References: #1042812 #1042826 #1043289 #1049072
Cross-References: CVE-2017-11403 CVE-2017-9439 CVE-2017-9440
CVE-2017-9501
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage
incoders/pdb.c (bsc#1042826)
- CVE-2017-9440: A memory leak was found in the function ReadPSDChannelin
coders/psd.c (bsc#1042812)
- CVE-2017-9501: An assertion failure could cause a denial of service via
a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an
out-of-order CloseBlob call, resulting in a use-after-free via acrafted
file (bsc#1049072)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-971=1

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-971=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (i586 x86_64):

ImageMagick-6.8.8.1-34.1
ImageMagick-debuginfo-6.8.8.1-34.1
ImageMagick-debugsource-6.8.8.1-34.1
ImageMagick-devel-6.8.8.1-34.1
ImageMagick-extra-6.8.8.1-34.1
ImageMagick-extra-debuginfo-6.8.8.1-34.1
libMagick++-6_Q16-3-6.8.8.1-34.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-34.1
libMagick++-devel-6.8.8.1-34.1
libMagickCore-6_Q16-1-6.8.8.1-34.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-34.1
libMagickWand-6_Q16-1-6.8.8.1-34.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-34.1
perl-PerlMagick-6.8.8.1-34.1
perl-PerlMagick-debuginfo-6.8.8.1-34.1

- openSUSE Leap 42.3 (x86_64):

ImageMagick-devel-32bit-6.8.8.1-34.1
libMagick++-6_Q16-3-32bit-6.8.8.1-34.1
libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-34.1
libMagick++-devel-32bit-6.8.8.1-34.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-34.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-34.1
libMagickWand-6_Q16-1-32bit-6.8.8.1-34.1
libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-34.1

- openSUSE Leap 42.3 (noarch):

ImageMagick-doc-6.8.8.1-34.1

- openSUSE Leap 42.2 (i586 x86_64):

ImageMagick-6.8.8.1-30.6.1
ImageMagick-debuginfo-6.8.8.1-30.6.1
ImageMagick-debugsource-6.8.8.1-30.6.1
ImageMagick-devel-6.8.8.1-30.6.1
ImageMagick-extra-6.8.8.1-30.6.1
ImageMagick-extra-debuginfo-6.8.8.1-30.6.1
libMagick++-6_Q16-3-6.8.8.1-30.6.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-30.6.1
libMagick++-devel-6.8.8.1-30.6.1
libMagickCore-6_Q16-1-6.8.8.1-30.6.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-30.6.1
libMagickWand-6_Q16-1-6.8.8.1-30.6.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-30.6.1
perl-PerlMagick-6.8.8.1-30.6.1
perl-PerlMagick-debuginfo-6.8.8.1-30.6.1

- openSUSE Leap 42.2 (noarch):

ImageMagick-doc-6.8.8.1-30.6.1

- openSUSE Leap 42.2 (x86_64):

ImageMagick-devel-32bit-6.8.8.1-30.6.1
libMagick++-6_Q16-3-32bit-6.8.8.1-30.6.1
libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-30.6.1
libMagick++-devel-32bit-6.8.8.1-30.6.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-30.6.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-30.6.1
libMagickWand-6_Q16-1-32bit-6.8.8.1-30.6.1
libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-30.6.1


References:

https://www.suse.com/security/cve/CVE-2017-11403.html
https://www.suse.com/security/cve/CVE-2017-9439.html
https://www.suse.com/security/cve/CVE-2017-9440.html
https://www.suse.com/security/cve/CVE-2017-9501.html
https://bugzilla.suse.com/1042812
https://bugzilla.suse.com/1042826
https://bugzilla.suse.com/1043289
https://bugzilla.suse.com/1049072