SUSE Security Update: Security update for gdm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2771-1
Rating:             moderate
References:         #1081947 #1103093 #1103737 
Cross-References:   CVE-2018-14424
Affected Products:
                    SUSE Linux Enterprise Module for Desktop Applications 15
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for gdm provides the following fixes:

   This security issue was fixed:

   - CVE-2018-14424: The daemon in GDM did not properly unexport display
     objects from its D-Bus interface when they are destroyed, which allowed
     a local attacker to trigger a use-after-free via a specially crafted
     sequence of D-Bus method calls, resulting in a denial of service or
     potential code execution (bsc#1103737)

   These non-security issues were fixed:

   - Enable pam_keyinit module (bsc#1081947)
   - Fix a build race in SLE (bsc#1103093)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Desktop Applications 15:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-1939=1



Package List:

   - SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64):

      gdm-3.26.2.1-13.9.1
      gdm-debuginfo-3.26.2.1-13.9.1
      gdm-debugsource-3.26.2.1-13.9.1
      gdm-devel-3.26.2.1-13.9.1
      libgdm1-3.26.2.1-13.9.1
      libgdm1-debuginfo-3.26.2.1-13.9.1
      typelib-1_0-Gdm-1_0-3.26.2.1-13.9.1

   - SUSE Linux Enterprise Module for Desktop Applications 15 (noarch):

      gdm-lang-3.26.2.1-13.9.1
      gdmflexiserver-3.26.2.1-13.9.1


References:

   https://www.suse.com/security/cve/CVE-2018-14424.html
   https://bugzilla.suse.com/1081947
   https://bugzilla.suse.com/1103093
   https://bugzilla.suse.com/1103737

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:2771-1 moderate: gdm

September 20, 2018
An update that solves one vulnerability and has two fixes is now available

Summary

This update for gdm provides the following fixes: This security issue was fixed: - CVE-2018-14424: The daemon in GDM did not properly unexport display objects from its D-Bus interface when they are destroyed, which allowed a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution (bsc#1103737) These non-security issues were fixed: - Enable pam_keyinit module (bsc#1081947) - Fix a build race in SLE (bsc#1103093) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Desktop Applications 15: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-1939=1 Package List: - SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64): gdm-3.26.2.1-13.9.1 gdm-debuginfo-3.26.2.1-13.9.1 gdm-debugsource-3.26.2.1-13.9.1 gdm-devel-3.26.2.1-13.9.1 libgdm1-3.26.2.1-13.9.1 libgdm1-debuginfo-3.26.2.1-13.9.1 typelib-1_0-Gdm-1_0-3.26.2.1-13.9.1 - SUSE Linux Enterprise Module for Desktop Applications 15 (noarch): gdm-lang-3.26.2.1-13.9.1 gdmflexiserver-3.26.2.1-13.9.1

References

#1081947 #1103093 #1103737

Cross- CVE-2018-14424

Affected Products:

SUSE Linux Enterprise Module for Desktop Applications 15

https://www.suse.com/security/cve/CVE-2018-14424.html

https://bugzilla.suse.com/1081947

https://bugzilla.suse.com/1103093

https://bugzilla.suse.com/1103737

Severity
Announcement ID: SUSE-SU-2018:2771-1
Rating: moderate

Related News