Security update for gdm
Announcement ID: | SUSE-SU-2018:2771-1 |
Rating: | moderate |
References: | #1081947 #1103093 #1103737 |
Cross-References: | CVE-2018-14424 |
Affected Products: |
|
An update that solves one vulnerability and has two fixes is now available.
Description:
This update for gdm provides the following fixes:
This security issue was fixed:
- CVE-2018-14424: The daemon in GDM did not properly unexport display objects from its D-Bus interface when they are destroyed, which allowed a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution (bsc#1103737)
These non-security issues were fixed:
- Enable pam_keyinit module (bsc#1081947)
- Fix a build race in SLE (bsc#1103093)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Desktop Applications 15:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-1939=1
Package List:
- SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64):
- gdm-3.26.2.1-13.9.1
- gdm-debuginfo-3.26.2.1-13.9.1
- gdm-debugsource-3.26.2.1-13.9.1
- gdm-devel-3.26.2.1-13.9.1
- libgdm1-3.26.2.1-13.9.1
- libgdm1-debuginfo-3.26.2.1-13.9.1
- typelib-1_0-Gdm-1_0-3.26.2.1-13.9.1
- SUSE Linux Enterprise Module for Desktop Applications 15 (noarch):
- gdm-lang-3.26.2.1-13.9.1
- gdmflexiserver-3.26.2.1-13.9.1