From sle-security-updates at lists.suse.com Thu Oct 1 05:10:25 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 1 Oct 2015 13:10:25 +0200 (CEST) Subject: SUSE-SU-2015:1663-1: important: Security update for haproxy Message-ID: <20151001111025.70ECC3213B@maintenance.suse.de> SUSE Security Update: Security update for haproxy ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1663-1 Rating: important References: #937042 #937202 Cross-References: CVE-2015-3281 CVE-2015-4000 Affected Products: SUSE OpenStack Cloud Compute 5 SUSE Linux Enterprise High Availability 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: haproxy was updated to fix two security issues. These security issues were fixed: - CVE-2015-3281: Information disclosure (bsc#937042). - CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937202). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Compute 5: zypper in -t patch SUSE-SLE12-CLOUD-5-2015-625=1 - SUSE Linux Enterprise High Availability 12: zypper in -t patch SUSE-SLE-HA-12-2015-625=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud Compute 5 (x86_64): haproxy-1.5.4-2.4.1 haproxy-debuginfo-1.5.4-2.4.1 haproxy-debugsource-1.5.4-2.4.1 - SUSE Linux Enterprise High Availability 12 (s390x x86_64): haproxy-1.5.4-2.4.1 haproxy-debuginfo-1.5.4-2.4.1 haproxy-debugsource-1.5.4-2.4.1 References: https://www.suse.com/security/cve/CVE-2015-3281.html https://www.suse.com/security/cve/CVE-2015-4000.html https://bugzilla.suse.com/937042 https://bugzilla.suse.com/937202 From sle-security-updates at lists.suse.com Thu Oct 1 08:10:01 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 1 Oct 2015 16:10:01 +0200 (CEST) Subject: SUSE-SU-2015:1666-1: moderate: Security update for Cloud Compute 12 Message-ID: <20151001141001.3079E32139@maintenance.suse.de> SUSE Security Update: Security update for Cloud Compute 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1666-1 Rating: moderate References: #915245 #917091 #920573 #922751 #926596 #926773 #927625 #930574 #931839 #934523 #944339 Affected Products: SUSE OpenStack Cloud Compute 5 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This collective update for the Cloud Compute 12 Module provides several fixes and enhancements. openstack-suse: - Do not copy upstream Python requirements to the package. (bsc#920573) openstack-nova: - Fix metadata not returning just instance private IP. (bsc#934523) - Enable tenant/user specific instance filtering. (bsc#927625) - Cleanup allocated networks after rescheduling. (bsc#931839) - Fix instance filtering. (bsc#927625) - Websocket Proxy should verify Origin header to prevent Cross-Site WebSocket hijacking. (bsc#917091, CVE-2015-0259) openstack-neutron: - Change neutron-ha-tool to read password from /etc/neutron/os_password. (bsc#922751) - Change port status when it is bound. (bsc#926773) - Require conntrack-tools for SLE12. (bsc#944339) - Allow images with existing routes in the network 169.254.0.0/16 to access metadata server. (bsc#915245) openstack-ceilometer: - Fix issue when ceilometer-expirer is called from the wrong user via cronjob and the resulting logs end up having wrong ownership. (bsc#930574) - Move the cron job to collector package. (bsc#926596) For a comprehensive list of changes, please refer to the packages' change log. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Compute 5: zypper in -t patch SUSE-SLE12-CLOUD-5-2015-629=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud Compute 5 (noarch): openstack-ceilometer-2014.2.4.dev18-3.2 openstack-ceilometer-agent-compute-2014.2.4.dev18-3.2 openstack-neutron-2014.2.4~a0~dev78-7.2 openstack-neutron-dhcp-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-ha-tool-2014.2.4~a0~dev78-7.2 openstack-neutron-l3-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-lbaas-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-linuxbridge-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-metadata-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-metering-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-openvswitch-agent-2014.2.4~a0~dev78-7.2 openstack-neutron-vpn-agent-2014.2.4~a0~dev78-7.2 openstack-nova-2014.2.4~a0~dev61-6.2 openstack-nova-compute-2014.2.4~a0~dev61-6.2 openstack-suse-sudo-2014.2-5.1 python-ceilometer-2014.2.4.dev18-3.2 python-neutron-2014.2.4~a0~dev78-7.2 python-nova-2014.2.4~a0~dev61-6.2 References: https://bugzilla.suse.com/915245 https://bugzilla.suse.com/917091 https://bugzilla.suse.com/920573 https://bugzilla.suse.com/922751 https://bugzilla.suse.com/926596 https://bugzilla.suse.com/926773 https://bugzilla.suse.com/927625 https://bugzilla.suse.com/930574 https://bugzilla.suse.com/931839 https://bugzilla.suse.com/934523 https://bugzilla.suse.com/944339 From sle-security-updates at lists.suse.com Mon Oct 5 07:09:45 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 5 Oct 2015 15:09:45 +0200 (CEST) Subject: SUSE-SU-2015:1676-1: moderate: Security update for wireshark Message-ID: <20151005130946.25A7732138@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1676-1 Rating: moderate References: #935158 #941500 Cross-References: CVE-2015-3813 CVE-2015-4652 CVE-2015-6241 CVE-2015-6242 CVE-2015-6243 CVE-2015-6244 CVE-2015-6245 CVE-2015-6246 CVE-2015-6247 CVE-2015-6248 CVE-2015-6249 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: Wireshark has been updated to 1.12.7. (FATE#319388) The following vulnerabilities have been fixed: * Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241 * Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242 * Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243 * The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244 * The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245 * The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246 * The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247 * Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248 * The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-wireshark-1127-12112=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-wireshark-1127-12112=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-wireshark-1127-12112=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-wireshark-1127-12112=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-wireshark-1127-12112=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): wireshark-devel-1.12.7-0.5.3 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64): wireshark-1.12.7-0.5.3 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): wireshark-devel-1.12.7-0.5.3 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 x86_64): wireshark-1.12.7-0.5.3 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): wireshark-1.12.7-0.5.3 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): wireshark-1.12.7-0.5.3 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): wireshark-1.12.7-0.5.3 References: https://www.suse.com/security/cve/CVE-2015-3813.html https://www.suse.com/security/cve/CVE-2015-4652.html https://www.suse.com/security/cve/CVE-2015-6241.html https://www.suse.com/security/cve/CVE-2015-6242.html https://www.suse.com/security/cve/CVE-2015-6243.html https://www.suse.com/security/cve/CVE-2015-6244.html https://www.suse.com/security/cve/CVE-2015-6245.html https://www.suse.com/security/cve/CVE-2015-6246.html https://www.suse.com/security/cve/CVE-2015-6247.html https://www.suse.com/security/cve/CVE-2015-6248.html https://www.suse.com/security/cve/CVE-2015-6249.html https://bugzilla.suse.com/935158 https://bugzilla.suse.com/941500 From sle-security-updates at lists.suse.com Mon Oct 5 09:09:58 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 5 Oct 2015 17:09:58 +0200 (CEST) Subject: SUSE-SU-2015:1676-2: moderate: Security update for wireshark Message-ID: <20151005150958.78B5F3213B@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1676-2 Rating: moderate References: #935158 #941500 Cross-References: CVE-2015-3813 CVE-2015-4652 CVE-2015-6241 CVE-2015-6242 CVE-2015-6243 CVE-2015-6244 CVE-2015-6245 CVE-2015-6246 CVE-2015-6247 CVE-2015-6248 CVE-2015-6249 Affected Products: SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: Wireshark has been updated to 1.12.7. (FATE#319388) The following vulnerabilities have been fixed: * Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241 * Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242 * Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243 * The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244 * The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245 * The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246 * The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247 * Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248 * The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-wireshark-1127-12112=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-wireshark-1127-12112=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-wireshark-1127-12112=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-wireshark-1127-12112=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): wireshark-1.12.7-0.5.3 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): wireshark-1.12.7-0.5.3 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): wireshark-debuginfo-1.12.7-0.5.3 wireshark-debugsource-1.12.7-0.5.3 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): wireshark-debuginfo-1.12.7-0.5.3 wireshark-debugsource-1.12.7-0.5.3 References: https://www.suse.com/security/cve/CVE-2015-3813.html https://www.suse.com/security/cve/CVE-2015-4652.html https://www.suse.com/security/cve/CVE-2015-6241.html https://www.suse.com/security/cve/CVE-2015-6242.html https://www.suse.com/security/cve/CVE-2015-6243.html https://www.suse.com/security/cve/CVE-2015-6244.html https://www.suse.com/security/cve/CVE-2015-6245.html https://www.suse.com/security/cve/CVE-2015-6246.html https://www.suse.com/security/cve/CVE-2015-6247.html https://www.suse.com/security/cve/CVE-2015-6248.html https://www.suse.com/security/cve/CVE-2015-6249.html https://bugzilla.suse.com/935158 https://bugzilla.suse.com/941500 From sle-security-updates at lists.suse.com Mon Oct 5 09:10:40 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 5 Oct 2015 17:10:40 +0200 (CEST) Subject: SUSE-SU-2015:1678-1: moderate: Security update for kernel-source Message-ID: <20151005151040.BA25A3213B@maintenance.suse.de> SUSE Security Update: Security update for kernel-source ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1678-1 Rating: moderate References: #777565 #867362 #873385 #883380 #884333 #886785 #891116 #894936 #915517 #917830 #917968 #919463 #920016 #920110 #920250 #920733 #921430 #923002 #923245 #923431 #924701 #925705 #925881 #925903 #926240 #926953 #927355 #928988 #929076 #929142 #929143 #930092 #930934 #931620 #932350 #932458 #932882 #933429 #933721 #933896 #933904 #933907 #933936 #934944 #935053 #935055 #935572 #935705 #935866 #935906 #936077 #936095 #936118 #936423 #936637 #936831 #936875 #936921 #936925 #937032 #937256 #937402 #937444 #937503 #937641 #937855 #938485 #939910 #939994 #940338 #940398 #940925 #940966 #942204 #942305 #942350 #942367 #942404 #942605 #942688 #942938 #943477 Cross-References: CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2015-0777 CVE-2015-1420 CVE-2015-1805 CVE-2015-2150 CVE-2015-2830 CVE-2015-4167 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 CVE-2015-5707 CVE-2015-6252 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-EXTRA SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 15 vulnerabilities and has 67 fixes is now available. Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. Following security bugs were fixed: * CVE-2015-6252: Possible file descriptor leak for each VHOST_SET_LOG_FDcommand issued, this could eventually wasting available system resources and creating a denial of service (bsc#942367). * CVE-2015-5707: Possible integer overflow in the calculation of total number of pages in bio_map_user_iov() (bsc#940338). * CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allowed remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood (bsc#936831). * CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allowed remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831). * CVE-2015-1420: Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function (bsc#915517). * CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O" vector array overrun. (bsc#933429) * CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. (bsc#919463) * CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16. (bsc#926240) * CVE-2015-4700: The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler (bsc#935705). * CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 did not validate certain length values, which allowed local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem (bsc#933907). * CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors. (bsc#917830) * CVE-2014-9728: The UDF filesystem implementation in the Linux kernel before 3.18.2 did not validate certain lengths, which allowed local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c (bsc#933904). * CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allowed local users to cause a denial of service (system crash) via a crafted UDF filesystem image (bsc#933904). * CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 did not ensure a certain data-structure size consistency, which allowed local users to cause a denial of service (system crash) via a crafted UDF filesystem image (bsc#933904). * CVE-2014-9731: The UDF filesystem implementation in the Linux kernel before 3.18.2 did not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allowed local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896). The following non-security bugs were fixed: - Btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350). - Btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942404). - Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350). - Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404). - Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350). - Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404). - Btrfs: fix hang when failing to submit bio of directIO (bnc#942688). - Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688). - Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688). - DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938). - DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938). - DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938). - DRM/i915: Remove i965_hpd_irq_setup (bsc#942938). - DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938). - Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944). - IB/core: Fix mismatch between locked and pinned pages (bnc#937855). - IB/iser: Add Discovery support (bsc#923002). - IB/iser: Move informational messages from error to info level (bsc#923002). - NFS: never queue requests with rq_cong set on the sending queue (bsc#932458). - NFSD: Fix nfsv4 opcode decoding error (bsc#935906). - NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910). - PCI: Disable Bus Master only on kexec reboot (bsc#920110). - PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110). - PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110). - PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431). - PCI: disable Bus Master on PCI device shutdown (bsc#920110). - USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721). - USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721). - Apparmor: fix file_permission if profile is updated (bsc#917968). - block: Discard bios do not have data (bsc#928988). - cifs: Fix missing crypto allocation (bnc#937402). - drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572). - drm/i915: (re)init HPD interrupt storm statistics (bsc#942938). - drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938). - drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938). - drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938). - drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938). - drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938). - drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938). - drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938). - drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938). - drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938). - drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938). - drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938). - drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938). - drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938). - drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938). - drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938). - drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938). - drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938). - drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938). - drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938). - drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938). - drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938). - drm/i915: fix hotplug event bit tracking (bsc#942938). - drm/i915: fix hpd interrupt register locking (bsc#942938). - drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938). - drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938). - drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938). - drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938). - drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938). - drm/i915: implement ibx_hpd_irq_setup (bsc#942938). - drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938). - drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582). - drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582). - drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572). - ehci-pci: enable interrupt on BayTrail (bnc926007). - exec: kill the unnecessary mm->def_flags setting in load_elf_binary() (fate#317831,bnc#891116)). - ext3: Fix data corruption in inodes with journalled data (bsc#936637). - fanotify: Fix deadlock with permission events (bsc#935053). - fork: reset mm->pinned_vm (bnc#937855). - hrtimer: prevent timer interrupt DoS (bnc#886785). - hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092). - hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092). - hv_storvsc: use small sg_tablesize on x86 (bnc#937256). - ibmveth: Add GRO support (bsc#935055). - ibmveth: Add support for Large Receive Offload (bsc#935055). - ibmveth: Add support for TSO (bsc#935055). - ibmveth: add support for TSO6. - ibmveth: change rx buffer default allocation for CMO (bsc#935055). - igb: do not reuse pages with pfmemalloc flag fix (bnc#920016). - inotify: Fix nested sleeps in inotify_read() (bsc#940925). - iommu/amd: Fix memory leak in free_pagetable (bsc#935866). - iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866). - ipv6: probe routes asynchronous in rt6_probe (bsc#936118). - ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355). - kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110). - kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444). - kernel: add panic_on_warn. - kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509). - kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953). - libata: prevent HSM state change race between ISR and PIO (bsc#923245). - libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002). - md: use kzalloc() when bitmap is disabled (bsc#939994). - megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936). - megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485). - mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355). - mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance). - mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620). - mm, thp: fix collapsing of hugepages on madvise (VM Functionality). - mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620). - mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620). - mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620). - mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143). - mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620). - mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620). - mm: make page pfmemalloc check more robust (bnc#920016). - mm: restrict access to slab files under procfs and sysfs (bnc#936077). - mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620). - net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355). - net: Fix "ip rule delete table 256" (bsc#873385). - net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362). - net: ipv6: fib: do not sleep inside atomic lock (bsc#867362). - netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350). - nfsd: support disabling 64bit dir cookies (bnc#937503). - pagecache limit: Do not skip over small zones that easily (bnc#925881). - pagecache limit: add tracepoints (bnc#924701). - pagecache limit: export debugging counters via /proc/vmstat (bnc#924701). - pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701). - pagecache limit: reduce starvation due to reclaim retries (bnc#925903). - pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355). - pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819). - pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819). - perf, nmi: Fix unknown NMI warning (bsc#929142). - perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142). - qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095). - r8169: remember WOL preferences on driver load (bsc#942305). - s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595). - sched: fix __sched_setscheduler() vs load balancing race (bnc#921430) - scsi: Correctly set the scsi host/msg/status bytes (bnc#933936). - scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204). - scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002) - scsi: Set hostbyte status in scsi_check_sense() (bsc#920733). - scsi: kabi: allow iscsi disocvery session support (bsc#923002). - scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934). - scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733). - scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002). - sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338). - st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875). - supported.conf: enable sch_mqprio (bsc#932882) - udf: Remove repeated loads blocksize (bsc#933907). - usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641). - usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721). - usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721). - vmxnet3: Bump up driver version number (bsc#936423). - vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423). - vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423). - vmxnet3: Register shutdown handler for device (fwd) (bug#936423). - x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250). - x86, tls: Interpret an all-zero struct user_desc as "no segment" (bsc#920250). - x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076). - x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032). - x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605). - xenbus: add proper handling of XS_ERROR from Xenbus for transactions. - xfs: fix problem when using md+XFS under high load (bnc#925705). - xhci: Allocate correct amount of scratchpad buffers (bnc#933721). - xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721). - xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721). - xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721). - xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721). - xhci: do not report PLC when link is in internal resume state (bnc#933721). - xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721). - xhci: report U3 when link is in resume state (bnc#933721). - xhci: rework cycle bit checking for new dequeue pointers (bnc#933721). - zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-kernel-20150908-12114=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-kernel-20150908-12114=1 - SUSE Linux Enterprise Server 11-EXTRA: zypper in -t patch slexsp3-kernel-20150908-12114=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-kernel-20150908-12114=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-kernel-20150908-12114=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch): kernel-docs-3.0.101-65.3 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-3.0.101-65.1 kernel-default-base-3.0.101-65.1 kernel-default-devel-3.0.101-65.1 kernel-source-3.0.101-65.1 kernel-syms-3.0.101-65.1 kernel-trace-3.0.101-65.1 kernel-trace-base-3.0.101-65.1 kernel-trace-devel-3.0.101-65.1 - SUSE Linux Enterprise Server 11-SP4 (i586 x86_64): kernel-ec2-3.0.101-65.1 kernel-ec2-base-3.0.101-65.1 kernel-ec2-devel-3.0.101-65.1 kernel-xen-3.0.101-65.1 kernel-xen-base-3.0.101-65.1 kernel-xen-devel-3.0.101-65.1 - SUSE Linux Enterprise Server 11-SP4 (s390x): kernel-default-man-3.0.101-65.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64): kernel-ppc64-3.0.101-65.1 kernel-ppc64-base-3.0.101-65.1 kernel-ppc64-devel-3.0.101-65.1 - SUSE Linux Enterprise Server 11-SP4 (i586): kernel-pae-3.0.101-65.1 kernel-pae-base-3.0.101-65.1 kernel-pae-devel-3.0.101-65.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-65.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64): kernel-xen-extra-3.0.101-65.1 - SUSE Linux Enterprise Server 11-EXTRA (x86_64): kernel-trace-extra-3.0.101-65.1 - SUSE Linux Enterprise Server 11-EXTRA (ppc64): kernel-ppc64-extra-3.0.101-65.1 - SUSE Linux Enterprise Server 11-EXTRA (i586): kernel-pae-extra-3.0.101-65.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): kernel-default-3.0.101-65.1 kernel-default-base-3.0.101-65.1 kernel-default-devel-3.0.101-65.1 kernel-default-extra-3.0.101-65.1 kernel-source-3.0.101-65.1 kernel-syms-3.0.101-65.1 kernel-trace-devel-3.0.101-65.1 kernel-xen-3.0.101-65.1 kernel-xen-base-3.0.101-65.1 kernel-xen-devel-3.0.101-65.1 kernel-xen-extra-3.0.101-65.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586): kernel-pae-3.0.101-65.1 kernel-pae-base-3.0.101-65.1 kernel-pae-devel-3.0.101-65.1 kernel-pae-extra-3.0.101-65.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-debuginfo-3.0.101-65.1 kernel-default-debugsource-3.0.101-65.1 kernel-trace-debuginfo-3.0.101-65.1 kernel-trace-debugsource-3.0.101-65.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 s390x x86_64): kernel-default-devel-debuginfo-3.0.101-65.1 kernel-trace-devel-debuginfo-3.0.101-65.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-65.1 kernel-ec2-debugsource-3.0.101-65.1 kernel-xen-debuginfo-3.0.101-65.1 kernel-xen-debugsource-3.0.101-65.1 kernel-xen-devel-debuginfo-3.0.101-65.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64): kernel-ppc64-debuginfo-3.0.101-65.1 kernel-ppc64-debugsource-3.0.101-65.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586): kernel-pae-debuginfo-3.0.101-65.1 kernel-pae-debugsource-3.0.101-65.1 kernel-pae-devel-debuginfo-3.0.101-65.1 References: https://www.suse.com/security/cve/CVE-2014-9728.html https://www.suse.com/security/cve/CVE-2014-9729.html https://www.suse.com/security/cve/CVE-2014-9730.html https://www.suse.com/security/cve/CVE-2014-9731.html https://www.suse.com/security/cve/CVE-2015-0777.html https://www.suse.com/security/cve/CVE-2015-1420.html https://www.suse.com/security/cve/CVE-2015-1805.html https://www.suse.com/security/cve/CVE-2015-2150.html https://www.suse.com/security/cve/CVE-2015-2830.html https://www.suse.com/security/cve/CVE-2015-4167.html https://www.suse.com/security/cve/CVE-2015-4700.html https://www.suse.com/security/cve/CVE-2015-5364.html https://www.suse.com/security/cve/CVE-2015-5366.html https://www.suse.com/security/cve/CVE-2015-5707.html https://www.suse.com/security/cve/CVE-2015-6252.html https://bugzilla.suse.com/777565 https://bugzilla.suse.com/867362 https://bugzilla.suse.com/873385 https://bugzilla.suse.com/883380 https://bugzilla.suse.com/884333 https://bugzilla.suse.com/886785 https://bugzilla.suse.com/891116 https://bugzilla.suse.com/894936 https://bugzilla.suse.com/915517 https://bugzilla.suse.com/917830 https://bugzilla.suse.com/917968 https://bugzilla.suse.com/919463 https://bugzilla.suse.com/920016 https://bugzilla.suse.com/920110 https://bugzilla.suse.com/920250 https://bugzilla.suse.com/920733 https://bugzilla.suse.com/921430 https://bugzilla.suse.com/923002 https://bugzilla.suse.com/923245 https://bugzilla.suse.com/923431 https://bugzilla.suse.com/924701 https://bugzilla.suse.com/925705 https://bugzilla.suse.com/925881 https://bugzilla.suse.com/925903 https://bugzilla.suse.com/926240 https://bugzilla.suse.com/926953 https://bugzilla.suse.com/927355 https://bugzilla.suse.com/928988 https://bugzilla.suse.com/929076 https://bugzilla.suse.com/929142 https://bugzilla.suse.com/929143 https://bugzilla.suse.com/930092 https://bugzilla.suse.com/930934 https://bugzilla.suse.com/931620 https://bugzilla.suse.com/932350 https://bugzilla.suse.com/932458 https://bugzilla.suse.com/932882 https://bugzilla.suse.com/933429 https://bugzilla.suse.com/933721 https://bugzilla.suse.com/933896 https://bugzilla.suse.com/933904 https://bugzilla.suse.com/933907 https://bugzilla.suse.com/933936 https://bugzilla.suse.com/934944 https://bugzilla.suse.com/935053 https://bugzilla.suse.com/935055 https://bugzilla.suse.com/935572 https://bugzilla.suse.com/935705 https://bugzilla.suse.com/935866 https://bugzilla.suse.com/935906 https://bugzilla.suse.com/936077 https://bugzilla.suse.com/936095 https://bugzilla.suse.com/936118 https://bugzilla.suse.com/936423 https://bugzilla.suse.com/936637 https://bugzilla.suse.com/936831 https://bugzilla.suse.com/936875 https://bugzilla.suse.com/936921 https://bugzilla.suse.com/936925 https://bugzilla.suse.com/937032 https://bugzilla.suse.com/937256 https://bugzilla.suse.com/937402 https://bugzilla.suse.com/937444 https://bugzilla.suse.com/937503 https://bugzilla.suse.com/937641 https://bugzilla.suse.com/937855 https://bugzilla.suse.com/938485 https://bugzilla.suse.com/939910 https://bugzilla.suse.com/939994 https://bugzilla.suse.com/940338 https://bugzilla.suse.com/940398 https://bugzilla.suse.com/940925 https://bugzilla.suse.com/940966 https://bugzilla.suse.com/942204 https://bugzilla.suse.com/942305 https://bugzilla.suse.com/942350 https://bugzilla.suse.com/942367 https://bugzilla.suse.com/942404 https://bugzilla.suse.com/942605 https://bugzilla.suse.com/942688 https://bugzilla.suse.com/942938 https://bugzilla.suse.com/943477 From sle-security-updates at lists.suse.com Mon Oct 5 10:10:03 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 5 Oct 2015 18:10:03 +0200 (CEST) Subject: SUSE-SU-2015:1680-1: important: Security update for MozillaFirefox, mozilla-nspr Message-ID: <20151005161003.113803213B@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox, mozilla-nspr ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1680-1 Rating: important References: #947003 Cross-References: CVE-2015-4500 CVE-2015-4501 CVE-2015-4506 CVE-2015-4509 CVE-2015-4511 CVE-2015-4517 CVE-2015-4519 CVE-2015-4520 CVE-2015-4521 CVE-2015-4522 CVE-2015-7174 CVE-2015-7175 CVE-2015-7176 CVE-2015-7177 CVE-2015-7180 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 15 vulnerabilities is now available. Description: Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003), fixing bugs and security issues. * MFSA 2015-96/CVE-2015-4500/CVE-2015-4501 Miscellaneous memory safety hazards (rv:41.0 / rv:38.3) * MFSA 2015-101/CVE-2015-4506 Buffer overflow in libvpx while parsing vp9 format video * MFSA 2015-105/CVE-2015-4511 Buffer overflow while decoding WebM video * MFSA 2015-106/CVE-2015-4509 Use-after-free while manipulating HTML media content * MFSA 2015-110/CVE-2015-4519 Dragging and dropping images exposes final URL after redirects * MFSA 2015-111/CVE-2015-4520 Errors in the handling of CORS preflight request headers * MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522 CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177 CVE-2015-7180 Vulnerabilities found through code inspection More details can be found on https://www.mozilla.org/en-US/security/advisories/ The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-640=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-640=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-640=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): MozillaFirefox-debuginfo-38.3.0esr-48.1 MozillaFirefox-debugsource-38.3.0esr-48.1 MozillaFirefox-devel-38.3.0esr-48.1 mozilla-nspr-debuginfo-4.10.9-6.1 mozilla-nspr-debugsource-4.10.9-6.1 mozilla-nspr-devel-4.10.9-6.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): MozillaFirefox-38.3.0esr-48.1 MozillaFirefox-debuginfo-38.3.0esr-48.1 MozillaFirefox-debugsource-38.3.0esr-48.1 MozillaFirefox-translations-38.3.0esr-48.1 mozilla-nspr-4.10.9-6.1 mozilla-nspr-debuginfo-4.10.9-6.1 mozilla-nspr-debugsource-4.10.9-6.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): mozilla-nspr-32bit-4.10.9-6.1 mozilla-nspr-debuginfo-32bit-4.10.9-6.1 - SUSE Linux Enterprise Desktop 12 (x86_64): MozillaFirefox-38.3.0esr-48.1 MozillaFirefox-debuginfo-38.3.0esr-48.1 MozillaFirefox-debugsource-38.3.0esr-48.1 MozillaFirefox-translations-38.3.0esr-48.1 mozilla-nspr-32bit-4.10.9-6.1 mozilla-nspr-4.10.9-6.1 mozilla-nspr-debuginfo-32bit-4.10.9-6.1 mozilla-nspr-debuginfo-4.10.9-6.1 mozilla-nspr-debugsource-4.10.9-6.1 References: https://www.suse.com/security/cve/CVE-2015-4500.html https://www.suse.com/security/cve/CVE-2015-4501.html https://www.suse.com/security/cve/CVE-2015-4506.html https://www.suse.com/security/cve/CVE-2015-4509.html https://www.suse.com/security/cve/CVE-2015-4511.html https://www.suse.com/security/cve/CVE-2015-4517.html https://www.suse.com/security/cve/CVE-2015-4519.html https://www.suse.com/security/cve/CVE-2015-4520.html https://www.suse.com/security/cve/CVE-2015-4521.html https://www.suse.com/security/cve/CVE-2015-4522.html https://www.suse.com/security/cve/CVE-2015-7174.html https://www.suse.com/security/cve/CVE-2015-7175.html https://www.suse.com/security/cve/CVE-2015-7176.html https://www.suse.com/security/cve/CVE-2015-7177.html https://www.suse.com/security/cve/CVE-2015-7180.html https://bugzilla.suse.com/947003 From sle-security-updates at lists.suse.com Mon Oct 5 11:09:44 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 5 Oct 2015 19:09:44 +0200 (CEST) Subject: SUSE-SU-2015:1682-1: moderate: Security update for icedtea-web Message-ID: <20151005170944.E4C363213B@maintenance.suse.de> SUSE Security Update: Security update for icedtea-web ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1682-1 Rating: moderate References: #944208 #944209 Cross-References: CVE-2015-5234 CVE-2015-5235 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The Java IcedTea-Web Plugin was updated to 1.6.1 bringing various features, bug- and securityfixes. * Enabled Entry-Point attribute check * permissions sandbox and signed app and unsigned app with permissions all-permissions now run in sandbox instead of not t all. * fixed DownloadService * comments in deployment.properties now should persists load/save * fixed bug in caching of files with query * fixed issues with recreating of existing shortcut * trustAll/trustNone now processed correctly * headless no longer shows dialogues * RH1231441 Unable to read the text of the buttons of the security dialogue * Fixed RH1233697 icedtea-web: applet origin spoofing (CVE-2015-5235, bsc#944208) * Fixed RH1233667 icedtea-web: unexpected permanent authorization of unsigned applets (CVE-2015-5234, bsc#944209) * MissingALACAdialog made available also for unsigned applications (but ignoring actual manifest value) and fixed * NetX - fixed issues with -html shortcuts - fixed issue with -html receiving garbage in width and height * PolicyEditor - file flag made to work when used standalone - file flag and main argument cannot be used in combination The update to 1.6 is included and brings: * Massively improved offline abilities. Added Xoffline switch to force work without inet connection. * Improved to be able to run with any JDK * JDK 6 and older no longer supported * JDK 8 support added (URLPermission granted if applicable) * JDK 9 supported * Added support for Entry-Point manifest attribute * Added KEY_ENABLE_MANIFEST_ATTRIBUTES_CHECK deployment property to control scan of Manifest file * starting arguments now accept also -- abbreviations * Added new documentation * Added support for menu shortcuts - both javaws applications/applets and html applets are supported * added support for -html switch for javaws. Now you can run most of the applets without browser at all * Control Panel - PR1856: ControlPanel UI improvement for lower resolutions (800*600) * NetX - PR1858: Java Console accepts multi-byte encodings - PR1859: Java Console UI improvement for lower resolutions (800*600) - RH1091563: [abrt] icedtea-web-1.5-2.fc20: Uncaught exception java.lang.ClassCastException in method sun.applet.PluginAppletViewer$8.run() - Dropped support for long unmaintained -basedir argument - Returned support for -jnlp argument - RH1095311, PR574 - References class sun.misc.Ref removed in OpenJDK 9 - fixed, and so buildable on JDK9 * Plugin - PR1743 - Intermittant deadlock in PluginRequestProcessor - PR1298 - LiveConnect - problem setting array elements (applet variables) from JS - RH1121549: coverity defects - Resolves method overloading correctly with superclass heirarchy distance * PolicyEditor - codebases can be renamed in-place, copied, and pasted - codebase URLs can be copied to system clipboard - displays a progress dialog while opening or saving files - codebases without permissions assigned save to file anyway (and re-appear on next open) - PR1776: NullPointer on save-and-exit - PR1850: duplicate codebases when launching from security dialogs - Fixed bug where clicking "Cancel" on the "Save before Exiting" dialog could result in the editor exiting without saving changes - Keyboard accelerators and mnemonics greatly improved - "File - New" allows editing a new policy without first selecting the file to save to * Common - PR1769: support signed applets which specify Sandbox permissions in their manifests * Temporary Permissions in security dialog now multi-selectable and based on PolicyEditor permissions The update to 1.5.2 brings OpenJDK 8 support (fate#318956) * NetX - RH1095311, PR574 - References class sun.misc.Ref removed in OpenJDK 9 - fixed, and so buildable on JDK9 - RH1154177 - decoded file needed from cache - fixed NPE in https dialog - empty codebase behaves as "." Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-642=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-642=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): java-1_7_0-openjdk-plugin-1.6.1-2.3.1 java-1_7_0-openjdk-plugin-debuginfo-1.6.1-2.3.1 java-1_7_0-openjdk-plugin-debugsource-1.6.1-2.3.1 - SUSE Linux Enterprise Desktop 12 (x86_64): java-1_7_0-openjdk-plugin-1.6.1-2.3.1 java-1_7_0-openjdk-plugin-debuginfo-1.6.1-2.3.1 java-1_7_0-openjdk-plugin-debugsource-1.6.1-2.3.1 References: https://www.suse.com/security/cve/CVE-2015-5234.html https://www.suse.com/security/cve/CVE-2015-5235.html https://bugzilla.suse.com/944208 https://bugzilla.suse.com/944209 From sle-security-updates at lists.suse.com Mon Oct 5 11:10:19 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 5 Oct 2015 19:10:19 +0200 (CEST) Subject: SUSE-SU-2015:1683-1: moderate: Security update for conntrack-tools Message-ID: <20151005171019.0F8473213B@maintenance.suse.de> SUSE Security Update: Security update for conntrack-tools ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1683-1 Rating: moderate References: #942149 Cross-References: CVE-2015-6496 Affected Products: SUSE Linux Enterprise High Availability Extension 11-SP4 SUSE Linux Enterprise High Availability Extension 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Fix a possible crash if conntrackd sees DCCP, SCTP and ICMPv6 traffic and the corresponding kernel modules that track this traffic are not available. (bsc#942149, CVE-2015-6496) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11-SP4: zypper in -t patch slehasp4-conntrack-tools-12115=1 - SUSE Linux Enterprise High Availability Extension 11-SP3: zypper in -t patch slehasp3-conntrack-tools-12115=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-conntrack-tools-12115=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11-SP4 (i586 ia64 ppc64 s390x x86_64): conntrack-tools-1.0.0-0.9.1 - SUSE Linux Enterprise High Availability Extension 11-SP3 (i586 ia64 ppc64 s390x x86_64): conntrack-tools-1.0.0-0.9.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): conntrack-tools-debuginfo-1.0.0-0.9.1 conntrack-tools-debugsource-1.0.0-0.9.1 References: https://www.suse.com/security/cve/CVE-2015-6496.html https://bugzilla.suse.com/942149 From sle-security-updates at lists.suse.com Tue Oct 6 05:09:32 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 6 Oct 2015 13:09:32 +0200 (CEST) Subject: SUSE-SU-2015:1689-1: moderate: Security update for icedtea-web Message-ID: <20151006110932.E258A3213B@maintenance.suse.de> SUSE Security Update: Security update for icedtea-web ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1689-1 Rating: moderate References: #944208 #944209 Cross-References: CVE-2015-5234 CVE-2015-5235 Affected Products: SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The Java Plugin IcedTea Web was updated to 1.5.2, fixing bugs and security issues. * permissions sandbox and signed app and unsigned app with permissions all-permissions now run in sandbox instead of not at all. * fixed DownloadService * RH1231441 Unable to read the text of the buttons of the security dialogue * Fixed RH1233697 icedtea-web: applet origin spoofing (CVE-2015-5235, bsc#944208) * Fixed RH1233667 icedtea-web: unexpected permanent authorization of unsigned applets (CVE-2015-5234, bsc#944209) * MissingALACAdialog made available also for unsigned applications (but ignoring actual manifest value) and fixed Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-icedtea-web-12116=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-icedtea-web-12116=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): icedtea-web-1.5.3-0.9.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): icedtea-web-debuginfo-1.5.3-0.9.1 icedtea-web-debugsource-1.5.3-0.9.1 References: https://www.suse.com/security/cve/CVE-2015-5234.html https://www.suse.com/security/cve/CVE-2015-5235.html https://bugzilla.suse.com/944208 https://bugzilla.suse.com/944209 From sle-security-updates at lists.suse.com Wed Oct 7 10:11:20 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 7 Oct 2015 18:11:20 +0200 (CEST) Subject: SUSE-SU-2015:1695-1: moderate: Security update for openssh Message-ID: <20151007161120.8FA8A3213F@maintenance.suse.de> SUSE Security Update: Security update for openssh ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1695-1 Rating: moderate References: #903649 #932483 #936695 #938746 #939932 #943006 #943010 #945484 #945493 #947458 Cross-References: CVE-2015-4000 CVE-2015-5352 CVE-2015-5600 CVE-2015-6563 CVE-2015-6564 Affected Products: SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has 5 fixes is now available. Description: OpenSSH was updated to fix several security issues and bugs. Please note that due to a bug in the previous shipped openssh version, sshd might not correctly restart. Please verify that the ssh daemon is running after installing this update. These security issues were fixed: * CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. (bsc#936695) * CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list. (bsc#938746) * CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM. (bsc#932483) * Hardening patch to fix sftp RCE. (bsc#903649) * CVE-2015-6563: The monitor component in sshd accepted extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. * CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd might have allowed local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. Additional a bug was fixed that could lead to openssh not working in chroot (bsc#947458). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-openssh-12119=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-openssh-12119=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-openssh-12119=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): openssh-6.6p1-13.1 openssh-askpass-gnome-6.6p1-13.3 openssh-fips-6.6p1-13.1 openssh-helpers-6.6p1-13.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): openssh-6.6p1-13.1 openssh-askpass-gnome-6.6p1-13.3 openssh-helpers-6.6p1-13.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): openssh-askpass-gnome-debuginfo-6.6p1-13.3 openssh-debuginfo-6.6p1-13.1 openssh-debugsource-6.6p1-13.1 References: https://www.suse.com/security/cve/CVE-2015-4000.html https://www.suse.com/security/cve/CVE-2015-5352.html https://www.suse.com/security/cve/CVE-2015-5600.html https://www.suse.com/security/cve/CVE-2015-6563.html https://www.suse.com/security/cve/CVE-2015-6564.html https://bugzilla.suse.com/903649 https://bugzilla.suse.com/932483 https://bugzilla.suse.com/936695 https://bugzilla.suse.com/938746 https://bugzilla.suse.com/939932 https://bugzilla.suse.com/943006 https://bugzilla.suse.com/943010 https://bugzilla.suse.com/945484 https://bugzilla.suse.com/945493 https://bugzilla.suse.com/947458 From sle-security-updates at lists.suse.com Thu Oct 8 08:10:05 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 8 Oct 2015 16:10:05 +0200 (CEST) Subject: SUSE-SU-2015:1701-1: important: Security update for php5 Message-ID: <20151008141005.E589C32147@maintenance.suse.de> SUSE Security Update: Security update for php5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1701-1 Rating: important References: #945412 #945428 Cross-References: CVE-2015-6836 CVE-2015-6837 CVE-2015-6838 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: The PHP5 script interpreter was updated to fix security issues: * CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428] * CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-php5-12121=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-php5-12121=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): apache2-mod_php5-5.2.14-0.7.30.72.1 php5-5.2.14-0.7.30.72.1 php5-bcmath-5.2.14-0.7.30.72.1 php5-bz2-5.2.14-0.7.30.72.1 php5-calendar-5.2.14-0.7.30.72.1 php5-ctype-5.2.14-0.7.30.72.1 php5-curl-5.2.14-0.7.30.72.1 php5-dba-5.2.14-0.7.30.72.1 php5-dbase-5.2.14-0.7.30.72.1 php5-dom-5.2.14-0.7.30.72.1 php5-exif-5.2.14-0.7.30.72.1 php5-fastcgi-5.2.14-0.7.30.72.1 php5-ftp-5.2.14-0.7.30.72.1 php5-gd-5.2.14-0.7.30.72.1 php5-gettext-5.2.14-0.7.30.72.1 php5-gmp-5.2.14-0.7.30.72.1 php5-hash-5.2.14-0.7.30.72.1 php5-iconv-5.2.14-0.7.30.72.1 php5-json-5.2.14-0.7.30.72.1 php5-ldap-5.2.14-0.7.30.72.1 php5-mbstring-5.2.14-0.7.30.72.1 php5-mcrypt-5.2.14-0.7.30.72.1 php5-mysql-5.2.14-0.7.30.72.1 php5-odbc-5.2.14-0.7.30.72.1 php5-openssl-5.2.14-0.7.30.72.1 php5-pcntl-5.2.14-0.7.30.72.1 php5-pdo-5.2.14-0.7.30.72.1 php5-pear-5.2.14-0.7.30.72.1 php5-pgsql-5.2.14-0.7.30.72.1 php5-pspell-5.2.14-0.7.30.72.1 php5-shmop-5.2.14-0.7.30.72.1 php5-snmp-5.2.14-0.7.30.72.1 php5-soap-5.2.14-0.7.30.72.1 php5-suhosin-5.2.14-0.7.30.72.1 php5-sysvmsg-5.2.14-0.7.30.72.1 php5-sysvsem-5.2.14-0.7.30.72.1 php5-sysvshm-5.2.14-0.7.30.72.1 php5-tokenizer-5.2.14-0.7.30.72.1 php5-wddx-5.2.14-0.7.30.72.1 php5-xmlreader-5.2.14-0.7.30.72.1 php5-xmlrpc-5.2.14-0.7.30.72.1 php5-xmlwriter-5.2.14-0.7.30.72.1 php5-xsl-5.2.14-0.7.30.72.1 php5-zip-5.2.14-0.7.30.72.1 php5-zlib-5.2.14-0.7.30.72.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): php5-debuginfo-5.2.14-0.7.30.72.1 php5-debugsource-5.2.14-0.7.30.72.1 References: https://www.suse.com/security/cve/CVE-2015-6836.html https://www.suse.com/security/cve/CVE-2015-6837.html https://www.suse.com/security/cve/CVE-2015-6838.html https://bugzilla.suse.com/945412 https://bugzilla.suse.com/945428 From sle-security-updates at lists.suse.com Fri Oct 9 01:10:00 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 09:10:00 +0200 (CEST) Subject: SUSE-SU-2015:1703-1: important: Security update for MozillaFirefox Message-ID: <20151009071000.093A93213F@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1703-1 Rating: important References: #947003 Cross-References: CVE-2015-4500 CVE-2015-4501 CVE-2015-4506 CVE-2015-4509 CVE-2015-4511 CVE-2015-4517 CVE-2015-4519 CVE-2015-4520 CVE-2015-4521 CVE-2015-4522 CVE-2015-7174 CVE-2015-7175 CVE-2015-7176 CVE-2015-7177 CVE-2015-7180 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 15 vulnerabilities is now available. Description: Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003), fixing bugs and security issues. * MFSA 2015-96/CVE-2015-4500/CVE-2015-4501 Miscellaneous memory safety hazards (rv:41.0 / rv:38.3) * MFSA 2015-101/CVE-2015-4506 Buffer overflow in libvpx while parsing vp9 format video * MFSA 2015-105/CVE-2015-4511 Buffer overflow while decoding WebM video * MFSA 2015-106/CVE-2015-4509 Use-after-free while manipulating HTML media content * MFSA 2015-110/CVE-2015-4519 Dragging and dropping images exposes final URL after redirects * MFSA 2015-111/CVE-2015-4520 Errors in the handling of CORS preflight request headers * MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522 CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177 CVE-2015-7180 Vulnerabilities found through code inspection More details can be found on https://www.mozilla.org/en-US/security/advisories/ Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-firefox-20150923-12122=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-firefox-20150923-12122=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-firefox-20150923-12122=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-firefox-20150923-12122=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-firefox-20150923-12122=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-firefox-20150923-12122=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-firefox-20150923-12122=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-firefox-20150923-12122=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-firefox-20150923-12122=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-devel-38.3.0esr-22.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-devel-38.3.0esr-22.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): MozillaFirefox-38.3.0esr-22.1 MozillaFirefox-translations-38.3.0esr-22.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-38.3.0esr-22.1 MozillaFirefox-translations-38.3.0esr-22.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-38.3.0esr-22.1 MozillaFirefox-translations-38.3.0esr-22.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): MozillaFirefox-38.3.0esr-22.1 MozillaFirefox-translations-38.3.0esr-22.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): MozillaFirefox-38.3.0esr-22.1 MozillaFirefox-translations-38.3.0esr-22.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-debuginfo-38.3.0esr-22.1 MozillaFirefox-debugsource-38.3.0esr-22.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-debuginfo-38.3.0esr-22.1 MozillaFirefox-debugsource-38.3.0esr-22.1 References: https://www.suse.com/security/cve/CVE-2015-4500.html https://www.suse.com/security/cve/CVE-2015-4501.html https://www.suse.com/security/cve/CVE-2015-4506.html https://www.suse.com/security/cve/CVE-2015-4509.html https://www.suse.com/security/cve/CVE-2015-4511.html https://www.suse.com/security/cve/CVE-2015-4517.html https://www.suse.com/security/cve/CVE-2015-4519.html https://www.suse.com/security/cve/CVE-2015-4520.html https://www.suse.com/security/cve/CVE-2015-4521.html https://www.suse.com/security/cve/CVE-2015-4522.html https://www.suse.com/security/cve/CVE-2015-7174.html https://www.suse.com/security/cve/CVE-2015-7175.html https://www.suse.com/security/cve/CVE-2015-7176.html https://www.suse.com/security/cve/CVE-2015-7177.html https://www.suse.com/security/cve/CVE-2015-7180.html https://bugzilla.suse.com/947003 From sle-security-updates at lists.suse.com Fri Oct 9 03:09:53 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 11:09:53 +0200 (CEST) Subject: SUSE-SU-2015:1705-1: moderate: Security update for rpcbind Message-ID: <20151009090953.E0FDF32147@maintenance.suse.de> SUSE Security Update: Security update for rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1705-1 Rating: moderate References: #940191 #946204 Cross-References: CVE-2015-7236 Affected Products: SUSE Linux Enterprise Server 12 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-659=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): rpcbind-0.2.1_rc4-13.3.1 rpcbind-debuginfo-0.2.1_rc4-13.3.1 rpcbind-debugsource-0.2.1_rc4-13.3.1 References: https://www.suse.com/security/cve/CVE-2015-7236.html https://bugzilla.suse.com/940191 https://bugzilla.suse.com/946204 From sle-security-updates at lists.suse.com Fri Oct 9 03:10:40 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 11:10:40 +0200 (CEST) Subject: SUSE-SU-2015:1706-1: moderate: Security update for rpcbind Message-ID: <20151009091040.3CCD932147@maintenance.suse.de> SUSE Security Update: Security update for rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1706-1 Rating: moderate References: #940191 #946204 Cross-References: CVE-2015-7236 Affected Products: SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-rpcbind-12123=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-rpcbind-12123=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-rpcbind-12123=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-rpcbind-12123=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-rpcbind-12123=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-rpcbind-12123=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-rpcbind-12123=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for VMWare 11-SP3 (x86_64): rpcbind-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Server 11-SP4 (ia64 ppc64 s390x x86_64): rpcbind-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): rpcbind-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): rpcbind-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): rpcbind-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): rpcbind-debuginfo-0.1.6+git20080930-6.24.1 rpcbind-debugsource-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): rpcbind-debuginfo-0.1.6+git20080930-6.24.1 rpcbind-debugsource-0.1.6+git20080930-6.24.1 References: https://www.suse.com/security/cve/CVE-2015-7236.html https://bugzilla.suse.com/940191 https://bugzilla.suse.com/946204 From sle-security-updates at lists.suse.com Fri Oct 9 03:11:22 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 11:11:22 +0200 (CEST) Subject: SUSE-SU-2015:1707-1: moderate: Security update for libssh Message-ID: <20151009091122.719B232147@maintenance.suse.de> SUSE Security Update: Security update for libssh ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1707-1 Rating: moderate References: #928323 Cross-References: CVE-2015-3146 Affected Products: SUSE Linux Enterprise Workstation Extension 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The encryption library libssh was updated to fix one security issue. The following vulnerability was fixed: * CVE-2015-3146: Unauthenticated remote attackers could crash the server or client with specially crafted packages. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-660=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): libssh-debugsource-0.6.3-8.1 libssh4-0.6.3-8.1 libssh4-debuginfo-0.6.3-8.1 References: https://www.suse.com/security/cve/CVE-2015-3146.html https://bugzilla.suse.com/928323 From sle-security-updates at lists.suse.com Fri Oct 9 04:09:41 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 12:09:41 +0200 (CEST) Subject: SUSE-SU-2015:1705-2: moderate: Security update for rpcbind Message-ID: <20151009100941.C39F232147@maintenance.suse.de> SUSE Security Update: Security update for rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1705-2 Rating: moderate References: #940191 #946204 Cross-References: CVE-2015-7236 Affected Products: SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-659=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 12 (x86_64): rpcbind-0.2.1_rc4-13.3.1 rpcbind-debuginfo-0.2.1_rc4-13.3.1 rpcbind-debugsource-0.2.1_rc4-13.3.1 References: https://www.suse.com/security/cve/CVE-2015-7236.html https://bugzilla.suse.com/940191 https://bugzilla.suse.com/946204 From sle-security-updates at lists.suse.com Fri Oct 9 04:10:18 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 12:10:18 +0200 (CEST) Subject: SUSE-SU-2015:1706-2: moderate: Security update for rpcbind Message-ID: <20151009101018.BED1C32147@maintenance.suse.de> SUSE Security Update: Security update for rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1706-2 Rating: moderate References: #940191 #946204 Cross-References: CVE-2015-7236 Affected Products: SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-rpcbind-12123=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-rpcbind-12123=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586): rpcbind-0.1.6+git20080930-6.24.1 - SUSE Linux Enterprise Server 11-SP4 (i586): rpcbind-0.1.6+git20080930-6.24.1 References: https://www.suse.com/security/cve/CVE-2015-7236.html https://bugzilla.suse.com/940191 https://bugzilla.suse.com/946204 From sle-security-updates at lists.suse.com Fri Oct 9 04:10:52 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 12:10:52 +0200 (CEST) Subject: SUSE-SU-2015:1707-2: moderate: Security update for libssh Message-ID: <20151009101052.973F932147@maintenance.suse.de> SUSE Security Update: Security update for libssh ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1707-2 Rating: moderate References: #928323 Cross-References: CVE-2015-3146 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The encryption library libssh was updated to fix one security issue. The following vulnerability was fixed: * CVE-2015-3146: Unauthenticated remote attackers could crash the server or client with specially crafted packages. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-660=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-660=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libssh-debugsource-0.6.3-8.1 libssh-devel-0.6.3-8.1 libssh-devel-doc-0.6.3-8.1 libssh4-0.6.3-8.1 libssh4-debuginfo-0.6.3-8.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libssh-debugsource-0.6.3-8.1 libssh4-0.6.3-8.1 libssh4-debuginfo-0.6.3-8.1 References: https://www.suse.com/security/cve/CVE-2015-3146.html https://bugzilla.suse.com/928323 From sle-security-updates at lists.suse.com Fri Oct 9 09:10:26 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 9 Oct 2015 17:10:26 +0200 (CEST) Subject: SUSE-SU-2015:1713-1: moderate: Security update for wireshark Message-ID: <20151009151026.AA86232147@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1713-1 Rating: moderate References: #935158 #941500 Cross-References: CVE-2015-3813 CVE-2015-6241 CVE-2015-6242 CVE-2015-6243 CVE-2015-6244 CVE-2015-6245 CVE-2015-6246 CVE-2015-6247 CVE-2015-6248 CVE-2015-6249 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: Wireshark has been updated to 1.12.7. (FATE#319388) The following vulnerabilities have been fixed: * Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241 * Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242 * Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243 * The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244 * The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245 * The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246 * The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247 * Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248 * The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-661=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-661=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-661=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): wireshark-debuginfo-1.12.7-15.1 wireshark-debugsource-1.12.7-15.1 wireshark-devel-1.12.7-15.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): wireshark-1.12.7-15.1 wireshark-debuginfo-1.12.7-15.1 wireshark-debugsource-1.12.7-15.1 - SUSE Linux Enterprise Desktop 12 (x86_64): wireshark-1.12.7-15.1 wireshark-debuginfo-1.12.7-15.1 wireshark-debugsource-1.12.7-15.1 References: https://www.suse.com/security/cve/CVE-2015-3813.html https://www.suse.com/security/cve/CVE-2015-6241.html https://www.suse.com/security/cve/CVE-2015-6242.html https://www.suse.com/security/cve/CVE-2015-6243.html https://www.suse.com/security/cve/CVE-2015-6244.html https://www.suse.com/security/cve/CVE-2015-6245.html https://www.suse.com/security/cve/CVE-2015-6246.html https://www.suse.com/security/cve/CVE-2015-6247.html https://www.suse.com/security/cve/CVE-2015-6248.html https://www.suse.com/security/cve/CVE-2015-6249.html https://bugzilla.suse.com/935158 https://bugzilla.suse.com/941500 From sle-security-updates at lists.suse.com Tue Oct 13 03:09:42 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 13 Oct 2015 11:09:42 +0200 (CEST) Subject: SUSE-SU-2015:1727-1: important: Security update for kernel-source Message-ID: <20151013090942.D4AC932148@maintenance.suse.de> SUSE Security Update: Security update for kernel-source ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1727-1 Rating: important References: #856382 #886785 #898159 #907973 #908950 #912183 #914818 #916543 #920016 #922071 #924722 #929092 #929871 #930813 #932285 #932350 #934430 #934942 #934962 #936556 #936773 #937609 #937612 #937613 #937616 #938550 #938706 #938891 #938892 #938893 #939145 #939266 #939716 #939834 #939994 #940398 #940545 #940679 #940776 #940912 #940925 #940965 #941098 #941305 #941908 #941951 #942160 #942204 #942307 #942367 #948536 Cross-References: CVE-2015-5156 CVE-2015-5157 CVE-2015-5283 CVE-2015-5697 CVE-2015-6252 CVE-2015-6937 CVE-2015-7613 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves 7 vulnerabilities and has 44 fixes is now available. Description: The SUSE Linux Enterprise 12 kernel was updated to 3.12.48-52.27 to receive various security and bugfixes. Following security bugs were fixed: * CVE-2015-7613: A flaw was found in the Linux kernel IPC code that could lead to arbitrary code execution. The ipc_addid() function initialized a shared object that has unset uid/gid values. Since the fields are not initialized, the check can falsely succeed. (bsc#948536) * CVE-2015-5156: When a guests KVM network devices is in a bridge configuration the kernel can create a situation in which packets are fragmented in an unexpected fashion. The GRO functionality can create a situation in which multiple SKB's are chained together in a single packets fraglist (by design). (bsc#940776) * CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI (bsc#938706). * CVE-2015-6252: A flaw was found in the way the Linux kernel's vhost driver treated userspace provided log file descriptor when processing the VHOST_SET_LOG_FD ioctl command. The file descriptor was never released and continued to consume kernel memory. A privileged local user with access to the /dev/vhost-net files could use this flaw to create a denial-of-service attack (bsc#942367). * CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994) * CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable Datagram Sockets (RDS) implementation allowing a local user to cause system DoS. A verification was missing that the underlying transport exists when a connection was created. (bsc#945825) * CVE-2015-5283: A NULL pointer dereference flaw was found in SCTP implementation allowing a local user to cause system DoS. Creation of multiple sockets in parallel when system doesn't have SCTP module loaded can lead to kernel panic. (bsc#947155) The following non-security bugs were fixed: - ALSA: hda - Abort the probe without i915 binding for HSW/BDW (bsc#936556). - Btrfs: Backport subvolume mount option handling (bsc#934962) - Btrfs: Handle unaligned length in extent_same (bsc#937609). - Btrfs: advertise which crc32c implementation is being used on mount (bsc#946057). - Btrfs: allow mounting btrfs subvolumes with different ro/rw options. - Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942509). - Btrfs: clean up error handling in mount_subvol() (bsc#934962). - Btrfs: cleanup orphans while looking up default subvolume (bsc#914818). - Btrfs: do not update mtime/ctime on deduped inodes (bsc#937616). - Btrfs: fail on mismatched subvol and subvolid mount options (bsc#934962). - Btrfs: fix chunk allocation regression leading to transaction abort (bnc#938550). - Btrfs: fix clone / extent-same deadlocks (bsc#937612). - Btrfs: fix crash on close_ctree() if cleaner starts new transaction (bnc#938891). - Btrfs: fix deadlock with extent-same and readpage (bsc#937612). - Btrfs: fix file corruption after cloning inline extents (bnc#942512). - Btrfs: fix file read corruption after extent cloning and fsync (bnc#946902). - Btrfs: fix find_free_dev_extent() malfunction in case device tree has hole (bnc#938550). - Btrfs: fix hang when failing to submit bio of directIO (bnc#942685). - Btrfs: fix list transaction->pending_ordered corruption (bnc#938893). - Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942685). - Btrfs: fix memory leak in the extent_same ioctl (bsc#937613). - Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942685). - Btrfs: fix race between balance and unused block group deletion (bnc#938892). - Btrfs: fix range cloning when same inode used as source and destination (bnc#942511). - Btrfs: fix read corruption of compressed and shared extents (bnc#946906). - Btrfs: fix uninit variable in clone ioctl (bnc#942511). - Btrfs: fix use-after-free in mount_subvol(). - Btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550). - Btrfs: lock superblock before remounting for rw subvol (bsc#934962). - Btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609). - Btrfs: remove all subvol options before mounting top-level (bsc#934962). - Btrfs: show subvol= and subvolid= in /proc/mounts (bsc#934962). - Btrfs: unify subvol= and subvolid= mounting (bsc#934962). - Btrfs: fill ->last_trans for delayed inode in btrfs_fill_inode (bnc#942925). - Btrfs: fix metadata inconsistencies after directory fsync (bnc#942925). - Btrfs: fix stale dir entries after removing a link and fsync (bnc#942925). - Btrfs: fix stale dir entries after unlink, inode eviction and fsync (bnc#942925). - Btrfs: fix stale directory entries after fsync log replay (bnc#942925). - Btrfs: make btrfs_search_forward return with nodes unlocked (bnc#942925). - Btrfs: support NFSv2 export (bnc#929871). - Btrfs: update fix for read corruption of compressed and shared extents (bsc#948256). - Drivers: hv: do not do hypercalls when hypercall_page is NULL. - Drivers: hv: vmbus: add special crash handler. - Drivers: hv: vmbus: add special kexec handler. - Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup(). - Input: evdev - do not report errors form flush() (bsc#939834). - Input: synaptics - do not retrieve the board id on old firmwares (bsc#929092). - Input: synaptics - log queried and quirked dimension values (bsc#929092). - Input: synaptics - query min dimensions for fw v8.1. - Input: synaptics - remove X1 Carbon 3rd gen from the topbuttonpad list (bsc#929092). - Input: synaptics - remove X250 from the topbuttonpad list. - Input: synaptics - remove obsolete min/max quirk for X240 (bsc#929092). - Input: synaptics - skip quirks when post-2013 dimensions (bsc#929092). - Input: synaptics - split synaptics_resolution(), query first (bsc#929092). - Input: synaptics - support min/max board id in min_max_pnpid_table (bsc#929092). - NFS: Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309). - NFSv4: do not set SETATTR for O_RDONLY|O_EXCL (bsc#939716). - PCI: Move MPS configuration check to pci_configure_device() (bsc#943313). - PCI: Set MPS to match upstream bridge (bsc#943313). - SCSI: fix regression in scsi_send_eh_cmnd() (bsc#930813). - SCSI: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204). - SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398). - UAS: fixup for remaining use of dead_list (bnc#934942). - USB: storage: use %*ph specifier to dump small buffers (bnc#934942). - aio: fix reqs_available handling (bsc#943378). - audit: do not generate loginuid log when audit disabled (bsc#941098). - blk-merge: do not compute bi_phys_segments from bi_vcnt for cloned bio (bnc#934430). - blk-merge: fix blk_recount_segments (bnc#934430). - blk-merge: recaculate segment if it isn't less than max segments (bnc#934430). - block: add queue flag for disabling SG merging (bnc#934430). - block: blk-merge: fix blk_recount_segments() (bnc#934430). - config: disable CONFIG_TCM_RBD on ppc64le and s390x - cpufreq: intel_pstate: Add CPU ID for Braswell processor. - dlm: fix missing endian conversion of rcom_status flags (bsc#940679). - dm cache mq: fix memory allocation failure for large cache devices (bsc#942707). - drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938). - drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938). - drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938). - drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938). - drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938). - drm/radeon: fix hotplug race at startup (bsc#942307). - ethtool, net/mlx4_en: Add 100M, 20G, 56G speeds ethtool reporting support (bsc#945710). - hrtimer: prevent timer interrupt DoS (bnc#886785). - hv: fcopy: add memory barrier to propagate state (bnc#943529). - inotify: Fix nested sleeps in inotify_read() (bsc#940925). - intel_pstate: Add CPU IDs for Broadwell processors. - intel_pstate: Add CPUID for BDW-H CPU. - intel_pstate: Add support for SkyLake. - intel_pstate: Correct BYT VID values (bnc#907973). - intel_pstate: Remove periodic P state boost (bnc#907973). - intel_pstate: add sample time scaling (bnc#907973, bnc#924722, bnc#916543). - intel_pstate: don't touch turbo bit if turbo disabled or unavailable (bnc#907973). - intel_pstate: remove setting P state to MAX on init (bnc#907973). - intel_pstate: remove unneeded sample buffers (bnc#907973). - intel_pstate: set BYT MSR with wrmsrl_on_cpu() (bnc#907973). - ipr: Fix incorrect trace indexing (bsc#940912). - ipr: Fix invalid array indexing for HRRQ (bsc#940912). - iwlwifi: dvm: drop non VO frames when flushing (bsc#940545). - kABI workaround for ieee80211_ops.flush argument change (bsc#940545). - kconfig: Do not print status messages in make -s mode (bnc#942160). - kernel/modsign_uefi.c: Check for EFI_RUNTIME_SERVICES in load_uefi_certs (bsc#856382). - kernel: do full redraw of the 3270 screen on reconnect (bnc#943476, LTC#129509). - kexec: define kexec_in_progress in !CONFIG_KEXEC case. - kvm: Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS (bsc#947537). - lpfc: Fix scsi prep dma buf error (bsc#908950). - mac80211: add vif to flush call (bsc#940545). - md/bitmap: do not abuse i_writecount for bitmap files (bsc#943270). - md/bitmap: protect clearing of ->bitmap by mddev->lock (bnc#912183). - md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bnc#912183). - md: fix problems with freeing private data after ->run failure (bnc#912183). - md: level_store: group all important changes into one place (bnc#912183). - md: move GET_BITMAP_FILE ioctl out from mddev_lock (bsc#943270). - md: protect ->pers changes with mddev->lock (bnc#912183). - md: remove mddev_lock from rdev_attr_show() (bnc#912183). - md: remove mddev_lock() from md_attr_show() (bnc#912183). - md: remove need for mddev_lock() in md_seq_show() (bnc#912183). - md: split detach operation out from ->stop (bnc#912183). - md: tidy up set_bitmap_file (bsc#943270). - megaraid_sas: Handle firmware initialization after fast boot (bsc#922071). - mfd: lpc_ich: Assign subdevice ids automatically (bnc#898159). - mm: filemap: Avoid unnecessary barriers and waitqueue lookups -fix (VM/FS Performance (bnc#941951)). - mm: make page pfmemalloc check more robust (bnc#920016). - mm: numa: disable change protection for vma(VM_HUGETLB) (bnc#943573). - netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350). - net/mlx4_core: Add ethernet backplane autoneg device capability (bsc#945710). - net/mlx4_core: Introduce ACCESS_REG CMD and eth_prot_ctrl dev cap (bsc#945710). - net/mlx4_en: Use PTYS register to query ethtool settings (bsc#945710). - net/mlx4_en: Use PTYS register to set ethtool settings (Speed) (bsc#945710). - rcu: Reject memory-order-induced stall-warning false positives (bnc#941908). - s390/dasd: fix kernel panic when alias is set offline (bnc#940965, LTC#128595). - sched: Fix KMALLOC_MAX_SIZE overflow during cpumask allocation (bnc#939266). - sched: Fix cpu_active_mask/cpu_online_mask race (bsc#936773). - sched, numa: do not hint for NUMA balancing on VM_MIXEDMAP mappings (bnc#943573). - uas: Add US_FL_MAX_SECTORS_240 flag (bnc#934942). - uas: Add response iu handling (bnc#934942). - uas: Add uas_get_tag() helper function (bnc#934942). - uas: Check against unexpected completions (bnc#934942). - uas: Cleanup uas_log_cmd_state usage (bnc#934942). - uas: Do not log urb status error on cancellation (bnc#934942). - uas: Do not use scsi_host_find_tag (bnc#934942). - uas: Drop COMMAND_COMPLETED flag (bnc#934942). - uas: Drop all references to a scsi_cmnd once it has been aborted (bnc#934942). - uas: Drop inflight list (bnc#934942). - uas: Fix memleak of non-submitted urbs (bnc#934942). - uas: Fix resetting flag handling (bnc#934942). - uas: Free data urbs on completion (bnc#934942). - uas: Log error codes when logging errors (bnc#934942). - uas: Reduce number of function arguments for uas_alloc_foo functions (bnc#934942). - uas: Remove cmnd reference from the cmd urb (bnc#934942). - uas: Remove support for old sense ui as used in pre-production hardware (bnc#934942). - uas: Remove task-management / abort error handling code (bnc#934942). - uas: Set max_sectors_240 quirk for ASM1053 devices (bnc#934942). - uas: Simplify reset / disconnect handling (bnc#934942). - uas: Simplify unlink of data urbs on error (bnc#934942). - uas: Use scsi_print_command (bnc#934942). - uas: pre_reset and suspend: Fix a few races (bnc#934942). - uas: zap_pending: data urbs should have completed at this time (bnc#934942). - x86/kernel: Do not reserve crashkernel high memory if crashkernel low memory reserving failed (bsc#939145). - x86/smpboot: Check for cpu_active on cpu initialization (bsc#932285). - x86/smpboot: Check for cpu_active on cpu initialization (bsc#936773). - xhci: Workaround for PME stuck issues in Intel xhci (bnc#944028). - xhci: rework cycle bit checking for new dequeue pointers (bnc#944028). - xfs: Fix file type directory corruption for btree directories (bsc#941305). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-668=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-668=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-668=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2015-668=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2015-668=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-668=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): kernel-default-debuginfo-3.12.48-52.27.1 kernel-default-debugsource-3.12.48-52.27.1 kernel-default-extra-3.12.48-52.27.1 kernel-default-extra-debuginfo-3.12.48-52.27.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): kernel-obs-build-3.12.48-52.27.1 kernel-obs-build-debugsource-3.12.48-52.27.1 - SUSE Linux Enterprise Software Development Kit 12 (noarch): kernel-docs-3.12.48-52.27.2 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): kernel-default-3.12.48-52.27.1 kernel-default-base-3.12.48-52.27.1 kernel-default-base-debuginfo-3.12.48-52.27.1 kernel-default-debuginfo-3.12.48-52.27.1 kernel-default-debugsource-3.12.48-52.27.1 kernel-default-devel-3.12.48-52.27.1 kernel-syms-3.12.48-52.27.1 - SUSE Linux Enterprise Server 12 (x86_64): kernel-xen-3.12.48-52.27.2 kernel-xen-base-3.12.48-52.27.2 kernel-xen-base-debuginfo-3.12.48-52.27.2 kernel-xen-debuginfo-3.12.48-52.27.2 kernel-xen-debugsource-3.12.48-52.27.2 kernel-xen-devel-3.12.48-52.27.2 - SUSE Linux Enterprise Server 12 (noarch): kernel-devel-3.12.48-52.27.1 kernel-macros-3.12.48-52.27.1 kernel-source-3.12.48-52.27.1 - SUSE Linux Enterprise Server 12 (s390x): kernel-default-man-3.12.48-52.27.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.48-52.27.1 kernel-ec2-debuginfo-3.12.48-52.27.1 kernel-ec2-debugsource-3.12.48-52.27.1 kernel-ec2-devel-3.12.48-52.27.1 kernel-ec2-extra-3.12.48-52.27.1 kernel-ec2-extra-debuginfo-3.12.48-52.27.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_48-52_27-default-1-2.6 kgraft-patch-3_12_48-52_27-xen-1-2.6 - SUSE Linux Enterprise Desktop 12 (x86_64): kernel-default-3.12.48-52.27.1 kernel-default-debuginfo-3.12.48-52.27.1 kernel-default-debugsource-3.12.48-52.27.1 kernel-default-devel-3.12.48-52.27.1 kernel-default-extra-3.12.48-52.27.1 kernel-default-extra-debuginfo-3.12.48-52.27.1 kernel-syms-3.12.48-52.27.1 kernel-xen-3.12.48-52.27.2 kernel-xen-debuginfo-3.12.48-52.27.2 kernel-xen-debugsource-3.12.48-52.27.2 kernel-xen-devel-3.12.48-52.27.2 - SUSE Linux Enterprise Desktop 12 (noarch): kernel-devel-3.12.48-52.27.1 kernel-macros-3.12.48-52.27.1 kernel-source-3.12.48-52.27.1 References: https://www.suse.com/security/cve/CVE-2015-5156.html https://www.suse.com/security/cve/CVE-2015-5157.html https://www.suse.com/security/cve/CVE-2015-5283.html https://www.suse.com/security/cve/CVE-2015-5697.html https://www.suse.com/security/cve/CVE-2015-6252.html https://www.suse.com/security/cve/CVE-2015-6937.html https://www.suse.com/security/cve/CVE-2015-7613.html https://bugzilla.suse.com/856382 https://bugzilla.suse.com/886785 https://bugzilla.suse.com/898159 https://bugzilla.suse.com/907973 https://bugzilla.suse.com/908950 https://bugzilla.suse.com/912183 https://bugzilla.suse.com/914818 https://bugzilla.suse.com/916543 https://bugzilla.suse.com/920016 https://bugzilla.suse.com/922071 https://bugzilla.suse.com/924722 https://bugzilla.suse.com/929092 https://bugzilla.suse.com/929871 https://bugzilla.suse.com/930813 https://bugzilla.suse.com/932285 https://bugzilla.suse.com/932350 https://bugzilla.suse.com/934430 https://bugzilla.suse.com/934942 https://bugzilla.suse.com/934962 https://bugzilla.suse.com/936556 https://bugzilla.suse.com/936773 https://bugzilla.suse.com/937609 https://bugzilla.suse.com/937612 https://bugzilla.suse.com/937613 https://bugzilla.suse.com/937616 https://bugzilla.suse.com/938550 https://bugzilla.suse.com/938706 https://bugzilla.suse.com/938891 https://bugzilla.suse.com/938892 https://bugzilla.suse.com/938893 https://bugzilla.suse.com/939145 https://bugzilla.suse.com/939266 https://bugzilla.suse.com/939716 https://bugzilla.suse.com/939834 https://bugzilla.suse.com/939994 https://bugzilla.suse.com/940398 https://bugzilla.suse.com/940545 https://bugzilla.suse.com/940679 https://bugzilla.suse.com/940776 https://bugzilla.suse.com/940912 https://bugzilla.suse.com/940925 https://bugzilla.suse.com/940965 https://bugzilla.suse.com/941098 https://bugzilla.suse.com/941305 https://bugzilla.suse.com/941908 https://bugzilla.suse.com/941951 https://bugzilla.suse.com/942160 https://bugzilla.suse.com/942204 https://bugzilla.suse.com/942307 https://bugzilla.suse.com/942367 https://bugzilla.suse.com/948536 From sle-security-updates at lists.suse.com Wed Oct 14 02:09:36 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 14 Oct 2015 10:09:36 +0200 (CEST) Subject: SUSE-SU-2015:1733-1: moderate: Security update for spice Message-ID: <20151014080936.CDB0F32148@maintenance.suse.de> SUSE Security Update: Security update for spice ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1733-1 Rating: moderate References: #944460 #948976 Cross-References: CVE-2015-3247 CVE-2015-5260 CVE-2015-5261 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: Spice was updated to fix three security issues. The following vulnerabilities were fixed: * CVE-2015-3247: heap corruption in the spice server (bsc#944460) * CVE-2015-5261: Guest could have accessed host memory using crafted images (bsc#948976) * CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944460) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-674=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-674=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-674=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (x86_64): libspice-server-devel-0.12.4-8.5.1 spice-debugsource-0.12.4-8.5.1 - SUSE Linux Enterprise Server 12 (x86_64): libspice-server1-0.12.4-8.5.1 libspice-server1-debuginfo-0.12.4-8.5.1 spice-debugsource-0.12.4-8.5.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libspice-server1-0.12.4-8.5.1 libspice-server1-debuginfo-0.12.4-8.5.1 spice-debugsource-0.12.4-8.5.1 References: https://www.suse.com/security/cve/CVE-2015-3247.html https://www.suse.com/security/cve/CVE-2015-5260.html https://www.suse.com/security/cve/CVE-2015-5261.html https://bugzilla.suse.com/944460 https://bugzilla.suse.com/948976 From sle-security-updates at lists.suse.com Wed Oct 14 09:10:31 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 14 Oct 2015 17:10:31 +0200 (CEST) Subject: SUSE-SU-2015:1740-1: important: Security update for flash-player Message-ID: <20151014151031.0CA8E32148@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1740-1 Rating: important References: #950169 Cross-References: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626 CVE-2015-7627 CVE-2015-7628 CVE-2015-7629 CVE-2015-7630 CVE-2015-7631 CVE-2015-7632 CVE-2015-7633 CVE-2015-7634 CVE-2015-7643 CVE-2015-7644 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169). These security issues were fixed: - A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628). - A defense-in-depth feature in the Flash broker API (CVE-2015-5569). - Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644). - A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632). - Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-680=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-680=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): flash-player-11.2.202.535-105.1 flash-player-gnome-11.2.202.535-105.1 - SUSE Linux Enterprise Desktop 12 (x86_64): flash-player-11.2.202.535-105.1 flash-player-gnome-11.2.202.535-105.1 References: https://www.suse.com/security/cve/CVE-2015-5569.html https://www.suse.com/security/cve/CVE-2015-7625.html https://www.suse.com/security/cve/CVE-2015-7626.html https://www.suse.com/security/cve/CVE-2015-7627.html https://www.suse.com/security/cve/CVE-2015-7628.html https://www.suse.com/security/cve/CVE-2015-7629.html https://www.suse.com/security/cve/CVE-2015-7630.html https://www.suse.com/security/cve/CVE-2015-7631.html https://www.suse.com/security/cve/CVE-2015-7632.html https://www.suse.com/security/cve/CVE-2015-7633.html https://www.suse.com/security/cve/CVE-2015-7634.html https://www.suse.com/security/cve/CVE-2015-7643.html https://www.suse.com/security/cve/CVE-2015-7644.html https://bugzilla.suse.com/950169 From sle-security-updates at lists.suse.com Wed Oct 14 09:11:20 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 14 Oct 2015 17:11:20 +0200 (CEST) Subject: SUSE-SU-2015:1742-1: important: Security update for flash-player Message-ID: <20151014151120.EC5A732148@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1742-1 Rating: important References: #950169 Cross-References: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626 CVE-2015-7627 CVE-2015-7628 CVE-2015-7629 CVE-2015-7630 CVE-2015-7631 CVE-2015-7632 CVE-2015-7633 CVE-2015-7634 CVE-2015-7643 CVE-2015-7644 Affected Products: SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169). These security issues were fixed: - A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628). - A defense-in-depth feature in the Flash broker API (CVE-2015-5569). - Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644). - A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632). - Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-flash-player-12127=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-flash-player-12127=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): flash-player-11.2.202.535-0.20.1 flash-player-gnome-11.2.202.535-0.20.1 flash-player-kde4-11.2.202.535-0.20.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): flash-player-11.2.202.535-0.20.1 flash-player-gnome-11.2.202.535-0.20.1 flash-player-kde4-11.2.202.535-0.20.1 References: https://www.suse.com/security/cve/CVE-2015-5569.html https://www.suse.com/security/cve/CVE-2015-7625.html https://www.suse.com/security/cve/CVE-2015-7626.html https://www.suse.com/security/cve/CVE-2015-7627.html https://www.suse.com/security/cve/CVE-2015-7628.html https://www.suse.com/security/cve/CVE-2015-7629.html https://www.suse.com/security/cve/CVE-2015-7630.html https://www.suse.com/security/cve/CVE-2015-7631.html https://www.suse.com/security/cve/CVE-2015-7632.html https://www.suse.com/security/cve/CVE-2015-7633.html https://www.suse.com/security/cve/CVE-2015-7634.html https://www.suse.com/security/cve/CVE-2015-7643.html https://www.suse.com/security/cve/CVE-2015-7644.html https://bugzilla.suse.com/950169 From sle-security-updates at lists.suse.com Thu Oct 15 05:26:51 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 15 Oct 2015 13:26:51 +0200 (CEST) Subject: SUSE-SU-2015:1757-1: important: Security update for docker Message-ID: <20151015112651.118BC32148@maintenance.suse.de> SUSE Security Update: Security update for docker ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1757-1 Rating: important References: #949660 Cross-References: CVE-2014-8178 CVE-2014-8179 Affected Products: SUSE Linux Enterprise Module for Containers 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: docker was updated to version 1.8.3 to fix two security issues. These security issues were fixed: - CVE-2014-8178: Manipulated layer IDs could have lead to local graph poisoning (bsc#949660). - CVE-2014-8179: Manifest validation and parsing logic errors allowed pull-by-digest validation bypass (bsc#949660). This non-security issues was fixed: - Add `--disable-legacy-registry` to prevent a daemon from using a v1 registry More information about docker 1.8.3 can be found at https://blog.docker.com/2015/10/security-release-docker-1-8-3-1-6-2-cs7/ Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Containers 12: zypper in -t patch SUSE-SLE-Module-Containers-12-2015-691=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Module for Containers 12 (x86_64): docker-1.8.3-49.1 docker-debuginfo-1.8.3-49.1 docker-debugsource-1.8.3-49.1 References: https://www.suse.com/security/cve/CVE-2014-8178.html https://www.suse.com/security/cve/CVE-2014-8179.html https://bugzilla.suse.com/949660 From sle-security-updates at lists.suse.com Fri Oct 16 02:09:37 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 16 Oct 2015 10:09:37 +0200 (CEST) Subject: SUSE-SU-2015:1765-1: moderate: Security update for vorbis-tools Message-ID: <20151016080937.99265320E8@maintenance.suse.de> SUSE Security Update: Security update for vorbis-tools ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1765-1 Rating: moderate References: #943795 Cross-References: CVE-2015-6749 Affected Products: SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: vorbis-tools was updated to fix a buffer overflow in aiff_open() that could be triggered by opening prepared malicious files. (CVE-2015-6749, bsc#943795). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-704=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-704=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): vorbis-tools-1.4.0-26.1 vorbis-tools-debuginfo-1.4.0-26.1 vorbis-tools-debugsource-1.4.0-26.1 - SUSE Linux Enterprise Server 12 (noarch): vorbis-tools-lang-1.4.0-26.1 - SUSE Linux Enterprise Desktop 12 (x86_64): vorbis-tools-1.4.0-26.1 vorbis-tools-debuginfo-1.4.0-26.1 vorbis-tools-debugsource-1.4.0-26.1 - SUSE Linux Enterprise Desktop 12 (noarch): vorbis-tools-lang-1.4.0-26.1 References: https://www.suse.com/security/cve/CVE-2015-6749.html https://bugzilla.suse.com/943795 From sle-security-updates at lists.suse.com Fri Oct 16 09:10:25 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 16 Oct 2015 17:10:25 +0200 (CEST) Subject: SUSE-SU-2015:1770-1: critical: Security update for flash-player Message-ID: <20151016151025.B99A5320E8@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1770-1 Rating: critical References: #950474 Cross-References: CVE-2015-7645 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: flash-player was updated to fix one security issue. This security issue was fixed: - CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-707=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-707=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): flash-player-11.2.202.540-108.1 flash-player-gnome-11.2.202.540-108.1 - SUSE Linux Enterprise Desktop 12 (x86_64): flash-player-11.2.202.540-108.1 flash-player-gnome-11.2.202.540-108.1 References: https://www.suse.com/security/cve/CVE-2015-7645.html https://bugzilla.suse.com/950474 From sle-security-updates at lists.suse.com Fri Oct 16 09:10:45 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 16 Oct 2015 17:10:45 +0200 (CEST) Subject: SUSE-SU-2015:1771-1: critical: Security update for flash-player Message-ID: <20151016151045.1A921320E8@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1771-1 Rating: critical References: #950474 Cross-References: CVE-2015-7645 Affected Products: SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: flash-player was updated to fix one security issue. This security issue was fixed: - CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-flash-player-12139=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-flash-player-12139=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): flash-player-11.2.202.540-0.23.1 flash-player-gnome-11.2.202.540-0.23.1 flash-player-kde4-11.2.202.540-0.23.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): flash-player-11.2.202.540-0.23.1 flash-player-gnome-11.2.202.540-0.23.1 flash-player-kde4-11.2.202.540-0.23.1 References: https://www.suse.com/security/cve/CVE-2015-7645.html https://bugzilla.suse.com/950474 From sle-security-updates at lists.suse.com Mon Oct 19 02:09:41 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 19 Oct 2015 10:09:41 +0200 (CEST) Subject: SUSE-SU-2015:1775-1: moderate: Security update for vorbis-tools Message-ID: <20151019080941.1C23C32139@maintenance.suse.de> SUSE Security Update: Security update for vorbis-tools ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1775-1 Rating: moderate References: #914439 #914441 #943795 Cross-References: CVE-2014-9638 CVE-2014-9639 CVE-2015-6749 Affected Products: SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: vorbis-tools was updated to fix several security issues. - A buffer overflow in aiff_open() that could be triggered by opening prepared malicious files (CVE-2015-6749, bsc#943795). - A division by zero and integer overflow by crafted WAV files was fixed (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-vorbis-tools-12141=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-vorbis-tools-12141=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-vorbis-tools-12141=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-vorbis-tools-12141=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): vorbis-tools-1.1.1-174.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): vorbis-tools-1.1.1-174.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): vorbis-tools-debuginfo-1.1.1-174.1 vorbis-tools-debugsource-1.1.1-174.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64): vorbis-tools-debuginfo-1.1.1-174.1 vorbis-tools-debugsource-1.1.1-174.1 References: https://www.suse.com/security/cve/CVE-2014-9638.html https://www.suse.com/security/cve/CVE-2014-9639.html https://www.suse.com/security/cve/CVE-2015-6749.html https://bugzilla.suse.com/914439 https://bugzilla.suse.com/914441 https://bugzilla.suse.com/943795 From sle-security-updates at lists.suse.com Mon Oct 19 02:10:26 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 19 Oct 2015 10:10:26 +0200 (CEST) Subject: SUSE-SU-2015:1776-1: moderate: Security update for haproxy Message-ID: <20151019081026.A3C8A32139@maintenance.suse.de> SUSE Security Update: Security update for haproxy ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1776-1 Rating: moderate References: #937042 #937202 #947204 Cross-References: CVE-2015-3281 Affected Products: SUSE OpenStack Cloud 5 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: haxproy was updated to backport various security fixes and related patches (bsc#937202) (bsc#937042) (CVE-2015-3281) + BUG/MAJOR: buffers: make the buffer_slow_realign() function respect output data + BUG/MINOR: ssl: fix smp_fetch_ssl_fc_session_id + MEDIUM: ssl: replace standards DH groups with custom ones + BUG/MEDIUM: ssl: fix tune.ssl.default-dh-param value being overwritten + MINOR: ssl: add a destructor to free allocated SSL ressources + BUG/MINOR: ssl: Display correct filename in error message + MINOR: ssl: load certificates in alphabetical order + BUG/MEDIUM: checks: fix conflicts between agent checks and ssl healthchecks + BUG/MEDIUM: ssl: force a full GC in case of memory shortage + BUG/MEDIUM: ssl: fix bad ssl context init can cause segfault in case of OOM. + BUG/MINOR: ssl: correctly initialize ssl ctx for invalid certificates + MINOR: ssl: add statement to force some ssl options in global. + MINOR: ssl: add fetchs 'ssl_c_der' and 'ssl_f_der' to return DER formatted certs Also the init script was fixed for the haproxy status checks (bsc#947204) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-haproxy-12142=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): haproxy-1.5.4-12.1 References: https://www.suse.com/security/cve/CVE-2015-3281.html https://bugzilla.suse.com/937042 https://bugzilla.suse.com/937202 https://bugzilla.suse.com/947204 From sle-security-updates at lists.suse.com Tue Oct 20 02:09:52 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 20 Oct 2015 10:09:52 +0200 (CEST) Subject: SUSE-SU-2015:1782-1: important: Security update for qemu Message-ID: <20151020080952.AF66C32139@maintenance.suse.de> SUSE Security Update: Security update for qemu ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1782-1 Rating: important References: #902737 #928308 #934506 #934517 #936537 #937125 #937572 #938344 #939216 #943446 #944017 #945404 #945778 #945987 #945989 Cross-References: CVE-2014-7815 CVE-2015-5154 CVE-2015-5278 CVE-2015-5279 CVE-2015-6855 Affected Products: SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has 10 fixes is now available. Description: qemu was updated to fix several security issues and bugs. The following vulnerabilities were fixed: - CVE-2015-5154: Heap-based buffer overflow in the IDE subsystem in QEMU, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands. (bsc#938344). - CVE-2015-5278: QEMU was vulnerable to an infinite loop issue that could occur when receiving packets over the network. (bsc#945989) - CVE-2015-5279: QEMU was vulnerable to a heap buffer overflow issue that could occur when receiving packets over the network. (bsc#945987) - CVE-2015-6855: QEMU was vulnerable to a divide by zero issue that could occur while executing an IDE command WIN_READ_NATIVE_MAX to determine the maximum size of a drive. (bsc#945404) - CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value. (bsc#902737): Also these non-security issues were fixed: - bsc#937572: Fixed dictzip on big endian systems - bsc#934517: Fix 'info tlb' causes guest to freeze - bsc#934506: Fix vte monitor consol looks empy - bsc#937125: Fix parsing of scsi-disk wwn uint64 property - bsc#945778: Drop .probe hooks for DictZip and tar block drivers - bsc#937572: Fold common-obj-y -> block-obj-y change into original patches - bsc#928308,bsc#944017: Fix virtio-ccw index errors when initrd gets too large - bsc#936537: Fix possible qemu-img error when converting to compressed qcow2 image - bsc#939216: Fix reboot fail after install using uefi - bsc#943446: qemu-img convert doesn't create MB aligned VHDs anymore Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-715=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-715=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): qemu-2.0.2-48.9.1 qemu-block-curl-2.0.2-48.9.1 qemu-block-curl-debuginfo-2.0.2-48.9.1 qemu-debugsource-2.0.2-48.9.1 qemu-guest-agent-2.0.2-48.9.1 qemu-guest-agent-debuginfo-2.0.2-48.9.1 qemu-lang-2.0.2-48.9.1 qemu-tools-2.0.2-48.9.1 qemu-tools-debuginfo-2.0.2-48.9.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): qemu-kvm-2.0.2-48.9.1 - SUSE Linux Enterprise Server 12 (ppc64le): qemu-ppc-2.0.2-48.9.1 qemu-ppc-debuginfo-2.0.2-48.9.1 - SUSE Linux Enterprise Server 12 (noarch): qemu-ipxe-1.0.0-48.9.1 qemu-seabios-1.7.4-48.9.1 qemu-sgabios-8-48.9.1 qemu-vgabios-1.7.4-48.9.1 - SUSE Linux Enterprise Server 12 (x86_64): qemu-block-rbd-2.0.2-48.9.1 qemu-block-rbd-debuginfo-2.0.2-48.9.1 qemu-x86-2.0.2-48.9.1 qemu-x86-debuginfo-2.0.2-48.9.1 - SUSE Linux Enterprise Server 12 (s390x): qemu-s390-2.0.2-48.9.1 qemu-s390-debuginfo-2.0.2-48.9.1 - SUSE Linux Enterprise Desktop 12 (x86_64): qemu-2.0.2-48.9.1 qemu-block-curl-2.0.2-48.9.1 qemu-block-curl-debuginfo-2.0.2-48.9.1 qemu-debugsource-2.0.2-48.9.1 qemu-kvm-2.0.2-48.9.1 qemu-tools-2.0.2-48.9.1 qemu-tools-debuginfo-2.0.2-48.9.1 qemu-x86-2.0.2-48.9.1 qemu-x86-debuginfo-2.0.2-48.9.1 - SUSE Linux Enterprise Desktop 12 (noarch): qemu-ipxe-1.0.0-48.9.1 qemu-seabios-1.7.4-48.9.1 qemu-sgabios-8-48.9.1 qemu-vgabios-1.7.4-48.9.1 References: https://www.suse.com/security/cve/CVE-2014-7815.html https://www.suse.com/security/cve/CVE-2015-5154.html https://www.suse.com/security/cve/CVE-2015-5278.html https://www.suse.com/security/cve/CVE-2015-5279.html https://www.suse.com/security/cve/CVE-2015-6855.html https://bugzilla.suse.com/902737 https://bugzilla.suse.com/928308 https://bugzilla.suse.com/934506 https://bugzilla.suse.com/934517 https://bugzilla.suse.com/936537 https://bugzilla.suse.com/937125 https://bugzilla.suse.com/937572 https://bugzilla.suse.com/938344 https://bugzilla.suse.com/939216 https://bugzilla.suse.com/943446 https://bugzilla.suse.com/944017 https://bugzilla.suse.com/945404 https://bugzilla.suse.com/945778 https://bugzilla.suse.com/945987 https://bugzilla.suse.com/945989 From sle-security-updates at lists.suse.com Tue Oct 20 05:10:02 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 20 Oct 2015 13:10:02 +0200 (CEST) Subject: SUSE-SU-2015:1785-1: important: Security update for librsvg Message-ID: <20151020111002.BDAE732139@maintenance.suse.de> SUSE Security Update: Security update for librsvg ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1785-1 Rating: important References: #840753 Cross-References: CVE-2013-1881 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: librsvg was updated to fix one security issue. This security issue was fixed: - CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-librsvg-12145=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-librsvg-12145=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-librsvg-12145=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-librsvg-12145=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-librsvg-12145=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-librsvg-12145=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-librsvg-12145=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-librsvg-12145=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-librsvg-12145=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): librsvg-devel-2.26.0-2.5.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): librsvg-devel-2.26.0-2.5.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): librsvg-2.26.0-2.5.1 rsvg-view-2.26.0-2.5.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (x86_64): librsvg-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): librsvg-2.26.0-2.5.1 rsvg-view-2.26.0-2.5.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): librsvg-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): librsvg-x86-2.26.0-2.5.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): librsvg-2.26.0-2.5.1 rsvg-view-2.26.0-2.5.1 - SUSE Linux Enterprise Server 11-SP3 (ppc64 s390x x86_64): librsvg-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Server 11-SP3 (ia64): librsvg-x86-2.26.0-2.5.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): librsvg-2.26.0-2.5.1 rsvg-view-2.26.0-2.5.1 - SUSE Linux Enterprise Desktop 11-SP4 (x86_64): librsvg-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): librsvg-2.26.0-2.5.1 rsvg-view-2.26.0-2.5.1 - SUSE Linux Enterprise Desktop 11-SP3 (x86_64): librsvg-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): librsvg-debuginfo-2.26.0-2.5.1 librsvg-debugsource-2.26.0-2.5.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64): librsvg-debuginfo-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64): librsvg-debuginfo-x86-2.26.0-2.5.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): librsvg-debuginfo-2.26.0-2.5.1 librsvg-debugsource-2.26.0-2.5.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (ppc64 s390x x86_64): librsvg-debuginfo-32bit-2.26.0-2.5.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (ia64): librsvg-debuginfo-x86-2.26.0-2.5.1 References: https://www.suse.com/security/cve/CVE-2013-1881.html https://bugzilla.suse.com/840753 From sle-security-updates at lists.suse.com Tue Oct 20 07:10:27 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 20 Oct 2015 15:10:27 +0200 (CEST) Subject: SUSE-SU-2015:1787-1: moderate: Security update for gtk2 Message-ID: <20151020131027.716E832139@maintenance.suse.de> SUSE Security Update: Security update for gtk2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1787-1 Rating: moderate References: #922741 #942801 #948791 Cross-References: CVE-2015-4491 CVE-2015-7674 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: gtk2 was updated to fix two security issues. These security issues were fixed: - CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801). - CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791). This non-security issue was fixed: - Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-gtk2-12146=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-gtk2-12146=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-gtk2-12146=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-gtk2-12146=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-gtk2-12146=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-gtk2-12146=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-gtk2-12146=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-gtk2-12146=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): gtk2-devel-2.18.9-0.35.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64): gtk2-devel-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): gtk2-devel-2.18.9-0.35.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (ppc64): gtk2-devel-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): gtk2-2.18.9-0.35.1 gtk2-doc-2.18.9-0.35.1 gtk2-lang-2.18.9-0.35.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (x86_64): gtk2-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): gtk2-2.18.9-0.35.1 gtk2-doc-2.18.9-0.35.1 gtk2-lang-2.18.9-0.35.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): gtk2-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): gtk2-x86-2.18.9-0.35.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): gtk2-2.18.9-0.35.1 gtk2-doc-2.18.9-0.35.1 gtk2-lang-2.18.9-0.35.1 - SUSE Linux Enterprise Server 11-SP3 (ppc64 s390x x86_64): gtk2-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Server 11-SP3 (ia64): gtk2-x86-2.18.9-0.35.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): gtk2-2.18.9-0.35.1 gtk2-lang-2.18.9-0.35.1 - SUSE Linux Enterprise Desktop 11-SP4 (x86_64): gtk2-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): gtk2-2.18.9-0.35.1 gtk2-lang-2.18.9-0.35.1 - SUSE Linux Enterprise Desktop 11-SP3 (x86_64): gtk2-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): gtk2-debuginfo-2.18.9-0.35.1 gtk2-debugsource-2.18.9-0.35.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64): gtk2-debuginfo-32bit-2.18.9-0.35.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64): gtk2-debuginfo-x86-2.18.9-0.35.1 References: https://www.suse.com/security/cve/CVE-2015-4491.html https://www.suse.com/security/cve/CVE-2015-7674.html https://bugzilla.suse.com/922741 https://bugzilla.suse.com/942801 https://bugzilla.suse.com/948791 From sle-security-updates at lists.suse.com Tue Oct 20 07:11:38 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 20 Oct 2015 15:11:38 +0200 (CEST) Subject: SUSE-SU-2015:1788-1: moderate: Security update for mysql Message-ID: <20151020131138.0E56C32139@maintenance.suse.de> SUSE Security Update: Security update for mysql ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1788-1 Rating: moderate References: #924663 #928962 #934401 #938412 Cross-References: CVE-2015-2582 CVE-2015-2611 CVE-2015-2617 CVE-2015-2620 CVE-2015-2639 CVE-2015-2641 CVE-2015-2643 CVE-2015-2648 CVE-2015-2661 CVE-2015-3152 CVE-2015-4737 CVE-2015-4752 CVE-2015-4756 CVE-2015-4757 CVE-2015-4761 CVE-2015-4767 CVE-2015-4769 CVE-2015-4771 CVE-2015-4772 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 19 vulnerabilities is now available. Description: MySQL was updated to version 5.5.45, fixing bugs and security issues. A list of all changes can be found on: - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html - http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html To fix the "BACKRONYM" security issue (CVE-2015-3152) the behaviour of the SSL options was changed slightly to meet expectations: Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl connection is required. The mysql client will now print an error if ssl is required, but the server can not handle a ssl connection [bnc#924663], [bnc#928962], [CVE-2015-3152] Additional bugs fixed: - fix rc.mysql-multi script to start instances after restart properly [bnc#934401]. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-mysql-12147=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-mysql-12147=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-mysql-12147=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-mysql-12147=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-mysql-12147=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-mysql-12147=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-mysql-12147=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-mysql-12147=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-mysql-12147=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libmysql55client_r18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ia64): libmysql55client_r18-x86-5.5.45-0.11.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (ppc64 s390x x86_64): libmysql55client_r18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (ia64): libmysql55client_r18-x86-5.5.45-0.11.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): libmysql55client18-5.5.45-0.11.1 libmysql55client_r18-5.5.45-0.11.1 mysql-5.5.45-0.11.1 mysql-client-5.5.45-0.11.1 mysql-tools-5.5.45-0.11.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (x86_64): libmysql55client18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libmysql55client18-5.5.45-0.11.1 libmysql55client_r18-5.5.45-0.11.1 mysql-5.5.45-0.11.1 mysql-client-5.5.45-0.11.1 mysql-tools-5.5.45-0.11.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libmysql55client18-32bit-5.5.45-0.11.1 libmysql55client_r18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libmysql55client18-x86-5.5.45-0.11.1 libmysql55client_r18-x86-5.5.45-0.11.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): libmysql55client18-5.5.45-0.11.1 libmysql55client_r18-5.5.45-0.11.1 mysql-5.5.45-0.11.1 mysql-client-5.5.45-0.11.1 mysql-tools-5.5.45-0.11.1 - SUSE Linux Enterprise Server 11-SP3 (ppc64 s390x x86_64): libmysql55client18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Server 11-SP3 (ia64): libmysql55client18-x86-5.5.45-0.11.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): libmysql55client18-5.5.45-0.11.1 libmysql55client_r18-5.5.45-0.11.1 mysql-5.5.45-0.11.1 mysql-client-5.5.45-0.11.1 - SUSE Linux Enterprise Desktop 11-SP4 (x86_64): libmysql55client18-32bit-5.5.45-0.11.1 libmysql55client_r18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): libmysql55client18-5.5.45-0.11.1 libmysql55client_r18-5.5.45-0.11.1 mysql-5.5.45-0.11.1 mysql-client-5.5.45-0.11.1 - SUSE Linux Enterprise Desktop 11-SP3 (x86_64): libmysql55client18-32bit-5.5.45-0.11.1 libmysql55client_r18-32bit-5.5.45-0.11.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): mysql-debuginfo-5.5.45-0.11.1 mysql-debugsource-5.5.45-0.11.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): mysql-debuginfo-5.5.45-0.11.1 mysql-debugsource-5.5.45-0.11.1 References: https://www.suse.com/security/cve/CVE-2015-2582.html https://www.suse.com/security/cve/CVE-2015-2611.html https://www.suse.com/security/cve/CVE-2015-2617.html https://www.suse.com/security/cve/CVE-2015-2620.html https://www.suse.com/security/cve/CVE-2015-2639.html https://www.suse.com/security/cve/CVE-2015-2641.html https://www.suse.com/security/cve/CVE-2015-2643.html https://www.suse.com/security/cve/CVE-2015-2648.html https://www.suse.com/security/cve/CVE-2015-2661.html https://www.suse.com/security/cve/CVE-2015-3152.html https://www.suse.com/security/cve/CVE-2015-4737.html https://www.suse.com/security/cve/CVE-2015-4752.html https://www.suse.com/security/cve/CVE-2015-4756.html https://www.suse.com/security/cve/CVE-2015-4757.html https://www.suse.com/security/cve/CVE-2015-4761.html https://www.suse.com/security/cve/CVE-2015-4767.html https://www.suse.com/security/cve/CVE-2015-4769.html https://www.suse.com/security/cve/CVE-2015-4771.html https://www.suse.com/security/cve/CVE-2015-4772.html https://bugzilla.suse.com/924663 https://bugzilla.suse.com/928962 https://bugzilla.suse.com/934401 https://bugzilla.suse.com/938412 From sle-security-updates at lists.suse.com Wed Oct 21 02:09:49 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 21 Oct 2015 10:09:49 +0200 (CEST) Subject: SUSE-SU-2015:1790-1: moderate: Security update for icu Message-ID: <20151021080949.7DAC832139@maintenance.suse.de> SUSE Security Update: Security update for icu ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1790-1 Rating: moderate References: #917129 Cross-References: CVE-2014-9654 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: icu was updated to fix one security issue. This security issue was fixed: - CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-icu-12151=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-icu-12151=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-icu-12151=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-icu-12151=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libicu-devel-4.0-7.30.2 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libicu-devel-32bit-4.0-7.30.2 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64): icu-4.0-7.30.2 - SUSE Linux Enterprise Software Development Kit 11-SP4 (x86_64): libicu-32bit-4.0-7.30.2 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libicu-4.0-7.30.2 libicu-doc-4.0-7.30.2 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libicu-32bit-4.0-7.30.2 - SUSE Linux Enterprise Server 11-SP4 (ia64): libicu-x86-4.0-7.30.2 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): icu-4.0-7.30.2 libicu-4.0-7.30.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): icu-debuginfo-4.0-7.30.2 icu-debugsource-4.0-7.30.2 References: https://www.suse.com/security/cve/CVE-2014-9654.html https://bugzilla.suse.com/917129 From sle-security-updates at lists.suse.com Wed Oct 21 04:09:49 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 21 Oct 2015 12:09:49 +0200 (CEST) Subject: SUSE-SU-2015:1791-1: moderate: Security update for strongswan Message-ID: <20151021100949.C916432139@maintenance.suse.de> SUSE Security Update: Security update for strongswan ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1791-1 Rating: moderate References: #933591 Cross-References: CVE-2015-4171 Affected Products: SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: strongswan was updated to fix one security issue. This security issue was fixed: - CVE-2015-4171: A problem that could enable rogue servers to gain user credentials from a client in certain IKEv2 setups. (bsc#933591) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-strongswan-12152=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-strongswan-12152=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): strongswan-4.4.0-6.29.2 strongswan-doc-4.4.0-6.29.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): strongswan-debuginfo-4.4.0-6.29.2 strongswan-debugsource-4.4.0-6.29.2 References: https://www.suse.com/security/cve/CVE-2015-4171.html https://bugzilla.suse.com/933591 From sle-security-updates at lists.suse.com Wed Oct 21 04:10:21 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 21 Oct 2015 12:10:21 +0200 (CEST) Subject: SUSE-SU-2015:1792-1: moderate: Security update for augeas Message-ID: <20151021101021.150CF32139@maintenance.suse.de> SUSE Security Update: Security update for augeas ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1792-1 Rating: moderate References: #925225 Cross-References: CVE-2014-8119 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes an untrusted argument escaping problem (CVE-2014-8119): * new API - aug_escape_name() - which can be used to escape untrusted inputs before using them as part of path expressions * aug_match() is changed to return properly escaped output Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-augeas-12153=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-augeas-12153=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-augeas-12153=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-augeas-12153=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-augeas-12153=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-augeas-12153=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-augeas-12153=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-augeas-12153=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-augeas-12153=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): augeas-devel-0.9.0-3.17.2 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): augeas-devel-0.9.0-3.17.2 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): augeas-0.9.0-3.17.2 augeas-lenses-0.9.0-3.17.2 libaugeas0-0.9.0-3.17.2 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): augeas-0.9.0-3.17.2 augeas-lenses-0.9.0-3.17.2 libaugeas0-0.9.0-3.17.2 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): augeas-0.9.0-3.17.2 augeas-lenses-0.9.0-3.17.2 libaugeas0-0.9.0-3.17.2 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): libaugeas0-0.9.0-3.17.2 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): libaugeas0-0.9.0-3.17.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): augeas-debuginfo-0.9.0-3.17.2 augeas-debugsource-0.9.0-3.17.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): augeas-debuginfo-0.9.0-3.17.2 augeas-debugsource-0.9.0-3.17.2 References: https://www.suse.com/security/cve/CVE-2014-8119.html https://bugzilla.suse.com/925225 From sle-security-updates at lists.suse.com Fri Oct 23 03:09:36 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 23 Oct 2015 11:09:36 +0200 (CEST) Subject: SUSE-SU-2015:1810-1: moderate: Security update for python-Django Message-ID: <20151023090936.A972332139@maintenance.suse.de> SUSE Security Update: Security update for python-Django ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1810-1 Rating: moderate References: #937522 #937523 #941587 Cross-References: CVE-2015-5143 CVE-2015-5144 CVE-2015-5963 Affected Products: SUSE OpenStack Cloud 5 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for python-Django fixes the following security issues: - Prevent Denial-of-service possibility by filling session store. (bsc#937522, CVE-2015-5143) - Prevent Header injection possibility. (bsc#937523, CVE-2015-5144) - A remote denial of service (resource exhaustion) attack against the django session store was fixed in Python Django. This might have allowed remote attackers to exhaust existing web sessions. (bsc#941587, CVE-2015-5963) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-python-Django-12162=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): python-Django-1.6.11-10.2 References: https://www.suse.com/security/cve/CVE-2015-5143.html https://www.suse.com/security/cve/CVE-2015-5144.html https://www.suse.com/security/cve/CVE-2015-5963.html https://bugzilla.suse.com/937522 https://bugzilla.suse.com/937523 https://bugzilla.suse.com/941587 From sle-security-updates at lists.suse.com Fri Oct 23 10:09:45 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 23 Oct 2015 18:09:45 +0200 (CEST) Subject: SUSE-SU-2015:1815-1: moderate: Security update for python-Django Message-ID: <20151023160945.801E632139@maintenance.suse.de> SUSE Security Update: Security update for python-Django ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1815-1 Rating: moderate References: #937522 #937523 #941587 Cross-References: CVE-2015-5143 CVE-2015-5144 CVE-2015-5963 Affected Products: SUSE Enterprise Storage 1.0 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for python-Django fixes the following security issues: - Prevent Denial-of-service possibility by filling session store. (bsc#937522, CVE-2015-5143) - Prevent Header injection possibility. (bsc#937523, CVE-2015-5144) - A remote denial of service (resource exhaustion) attack against the django session store was fixed in Python Django. This might have allowed remote attackers to exhaust existing web sessions. (bsc#941587, CVE-2015-5963) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Enterprise Storage 1.0: zypper in -t patch SUSE-Storage-1.0-2015-743=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Enterprise Storage 1.0 (noarch): python-Django-1.6.11-8.1 References: https://www.suse.com/security/cve/CVE-2015-5143.html https://www.suse.com/security/cve/CVE-2015-5144.html https://www.suse.com/security/cve/CVE-2015-5963.html https://bugzilla.suse.com/937522 https://bugzilla.suse.com/937523 https://bugzilla.suse.com/941587 From sle-security-updates at lists.suse.com Mon Oct 26 08:09:53 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 26 Oct 2015 15:09:53 +0100 (CET) Subject: SUSE-SU-2015:1818-1: important: Security update for php53 Message-ID: <20151026140953.3E66A32139@maintenance.suse.de> SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1818-1 Rating: important References: #935074 #942291 #942294 #942295 #942296 #945412 #945428 Cross-References: CVE-2015-6831 CVE-2015-6833 CVE-2015-6836 CVE-2015-6837 CVE-2015-6838 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has two fixes is now available. Description: This update of PHP5 brings several security fixes. Security fixes: * CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295] * CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428] * CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412] It also includes a bugfix for the odbc module: * compare with SQL_NULL_DATA correctly [bnc#935074] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-php53-12163=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-php53-12163=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-php53-12163=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-php53-12163=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-php53-12163=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-php53-12163=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-php53-12163=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-48.1 php53-imap-5.3.17-48.1 php53-posix-5.3.17-48.1 php53-readline-5.3.17-48.1 php53-sockets-5.3.17-48.1 php53-sqlite-5.3.17-48.1 php53-tidy-5.3.17-48.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-48.1 php53-imap-5.3.17-48.1 php53-posix-5.3.17-48.1 php53-readline-5.3.17-48.1 php53-sockets-5.3.17-48.1 php53-sqlite-5.3.17-48.1 php53-tidy-5.3.17-48.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): apache2-mod_php53-5.3.17-48.1 php53-5.3.17-48.1 php53-bcmath-5.3.17-48.1 php53-bz2-5.3.17-48.1 php53-calendar-5.3.17-48.1 php53-ctype-5.3.17-48.1 php53-curl-5.3.17-48.1 php53-dba-5.3.17-48.1 php53-dom-5.3.17-48.1 php53-exif-5.3.17-48.1 php53-fastcgi-5.3.17-48.1 php53-fileinfo-5.3.17-48.1 php53-ftp-5.3.17-48.1 php53-gd-5.3.17-48.1 php53-gettext-5.3.17-48.1 php53-gmp-5.3.17-48.1 php53-iconv-5.3.17-48.1 php53-intl-5.3.17-48.1 php53-json-5.3.17-48.1 php53-ldap-5.3.17-48.1 php53-mbstring-5.3.17-48.1 php53-mcrypt-5.3.17-48.1 php53-mysql-5.3.17-48.1 php53-odbc-5.3.17-48.1 php53-openssl-5.3.17-48.1 php53-pcntl-5.3.17-48.1 php53-pdo-5.3.17-48.1 php53-pear-5.3.17-48.1 php53-pgsql-5.3.17-48.1 php53-pspell-5.3.17-48.1 php53-shmop-5.3.17-48.1 php53-snmp-5.3.17-48.1 php53-soap-5.3.17-48.1 php53-suhosin-5.3.17-48.1 php53-sysvmsg-5.3.17-48.1 php53-sysvsem-5.3.17-48.1 php53-sysvshm-5.3.17-48.1 php53-tokenizer-5.3.17-48.1 php53-wddx-5.3.17-48.1 php53-xmlreader-5.3.17-48.1 php53-xmlrpc-5.3.17-48.1 php53-xmlwriter-5.3.17-48.1 php53-xsl-5.3.17-48.1 php53-zip-5.3.17-48.1 php53-zlib-5.3.17-48.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-48.1 php53-5.3.17-48.1 php53-bcmath-5.3.17-48.1 php53-bz2-5.3.17-48.1 php53-calendar-5.3.17-48.1 php53-ctype-5.3.17-48.1 php53-curl-5.3.17-48.1 php53-dba-5.3.17-48.1 php53-dom-5.3.17-48.1 php53-exif-5.3.17-48.1 php53-fastcgi-5.3.17-48.1 php53-fileinfo-5.3.17-48.1 php53-ftp-5.3.17-48.1 php53-gd-5.3.17-48.1 php53-gettext-5.3.17-48.1 php53-gmp-5.3.17-48.1 php53-iconv-5.3.17-48.1 php53-intl-5.3.17-48.1 php53-json-5.3.17-48.1 php53-ldap-5.3.17-48.1 php53-mbstring-5.3.17-48.1 php53-mcrypt-5.3.17-48.1 php53-mysql-5.3.17-48.1 php53-odbc-5.3.17-48.1 php53-openssl-5.3.17-48.1 php53-pcntl-5.3.17-48.1 php53-pdo-5.3.17-48.1 php53-pear-5.3.17-48.1 php53-pgsql-5.3.17-48.1 php53-pspell-5.3.17-48.1 php53-shmop-5.3.17-48.1 php53-snmp-5.3.17-48.1 php53-soap-5.3.17-48.1 php53-suhosin-5.3.17-48.1 php53-sysvmsg-5.3.17-48.1 php53-sysvsem-5.3.17-48.1 php53-sysvshm-5.3.17-48.1 php53-tokenizer-5.3.17-48.1 php53-wddx-5.3.17-48.1 php53-xmlreader-5.3.17-48.1 php53-xmlrpc-5.3.17-48.1 php53-xmlwriter-5.3.17-48.1 php53-xsl-5.3.17-48.1 php53-zip-5.3.17-48.1 php53-zlib-5.3.17-48.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-48.1 php53-5.3.17-48.1 php53-bcmath-5.3.17-48.1 php53-bz2-5.3.17-48.1 php53-calendar-5.3.17-48.1 php53-ctype-5.3.17-48.1 php53-curl-5.3.17-48.1 php53-dba-5.3.17-48.1 php53-dom-5.3.17-48.1 php53-exif-5.3.17-48.1 php53-fastcgi-5.3.17-48.1 php53-fileinfo-5.3.17-48.1 php53-ftp-5.3.17-48.1 php53-gd-5.3.17-48.1 php53-gettext-5.3.17-48.1 php53-gmp-5.3.17-48.1 php53-iconv-5.3.17-48.1 php53-intl-5.3.17-48.1 php53-json-5.3.17-48.1 php53-ldap-5.3.17-48.1 php53-mbstring-5.3.17-48.1 php53-mcrypt-5.3.17-48.1 php53-mysql-5.3.17-48.1 php53-odbc-5.3.17-48.1 php53-openssl-5.3.17-48.1 php53-pcntl-5.3.17-48.1 php53-pdo-5.3.17-48.1 php53-pear-5.3.17-48.1 php53-pgsql-5.3.17-48.1 php53-pspell-5.3.17-48.1 php53-shmop-5.3.17-48.1 php53-snmp-5.3.17-48.1 php53-soap-5.3.17-48.1 php53-suhosin-5.3.17-48.1 php53-sysvmsg-5.3.17-48.1 php53-sysvsem-5.3.17-48.1 php53-sysvshm-5.3.17-48.1 php53-tokenizer-5.3.17-48.1 php53-wddx-5.3.17-48.1 php53-xmlreader-5.3.17-48.1 php53-xmlrpc-5.3.17-48.1 php53-xmlwriter-5.3.17-48.1 php53-xsl-5.3.17-48.1 php53-zip-5.3.17-48.1 php53-zlib-5.3.17-48.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-debuginfo-5.3.17-48.1 php53-debugsource-5.3.17-48.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): php53-debuginfo-5.3.17-48.1 php53-debugsource-5.3.17-48.1 References: https://www.suse.com/security/cve/CVE-2015-6831.html https://www.suse.com/security/cve/CVE-2015-6833.html https://www.suse.com/security/cve/CVE-2015-6836.html https://www.suse.com/security/cve/CVE-2015-6837.html https://www.suse.com/security/cve/CVE-2015-6838.html https://bugzilla.suse.com/935074 https://bugzilla.suse.com/942291 https://bugzilla.suse.com/942294 https://bugzilla.suse.com/942295 https://bugzilla.suse.com/942296 https://bugzilla.suse.com/945412 https://bugzilla.suse.com/945428 From sle-security-updates at lists.suse.com Mon Oct 26 11:10:31 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 26 Oct 2015 18:10:31 +0100 (CET) Subject: SUSE-SU-2015:1821-1: moderate: Security update for postgresql93 Message-ID: <20151026171031.6C8F432139@maintenance.suse.de> SUSE Security Update: Security update for postgresql93 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1821-1 Rating: moderate References: #949669 #949670 Cross-References: CVE-2015-5288 CVE-2015-5289 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The PostreSQL database postgresql93 was updated to the bugfix release 9.3.10: Security issues fixed: - CVE-2015-5289, bsc#949670: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. - CVE-2015-5288, bsc#949669: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. For the full release notes, see: http://www.postgresql.org/docs/current/static/release-9-3-10.html Other bugs fixed: * Move systemd related stuff and user creation to postgresql-init. * Remove some obsolete %suse_version conditionals. * Relax dependency on libpq to major version. * Fix possible failure to recover from an inconsistent database state. See full release notes for details. * Fix rare failure to invalidate relation cache init file. * Avoid deadlock between incoming sessions and CREATE/DROP DATABASE. * Improve planner's cost estimates for semi-joins and anti-joins with inner indexscans * For the full release notes for 9.3.9 see: http://www.postgresql.org/docs/9.3/static/release-9-3-9.html Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-746=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-746=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-746=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): postgresql93-devel-9.3.10-11.1 postgresql93-devel-debuginfo-9.3.10-11.1 postgresql93-libs-debugsource-9.3.10-11.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): postgresql93-9.3.10-11.1 postgresql93-contrib-9.3.10-11.1 postgresql93-contrib-debuginfo-9.3.10-11.1 postgresql93-debuginfo-9.3.10-11.1 postgresql93-debugsource-9.3.10-11.1 postgresql93-libs-debugsource-9.3.10-11.1 postgresql93-server-9.3.10-11.1 postgresql93-server-debuginfo-9.3.10-11.1 - SUSE Linux Enterprise Server 12 (noarch): postgresql93-docs-9.3.10-11.1 - SUSE Linux Enterprise Desktop 12 (x86_64): postgresql93-9.3.10-11.1 postgresql93-debuginfo-9.3.10-11.1 postgresql93-debugsource-9.3.10-11.1 postgresql93-libs-debugsource-9.3.10-11.1 References: https://www.suse.com/security/cve/CVE-2015-5288.html https://www.suse.com/security/cve/CVE-2015-5289.html https://bugzilla.suse.com/949669 https://bugzilla.suse.com/949670 From sle-security-updates at lists.suse.com Tue Oct 27 05:10:07 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 27 Oct 2015 12:10:07 +0100 (CET) Subject: SUSE-SU-2015:1829-1: moderate: Security update for lxc Message-ID: <20151027111007.BC71032139@maintenance.suse.de> SUSE Security Update: Security update for lxc ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1829-1 Rating: moderate References: #946744 Cross-References: CVE-2015-1335 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server for VMWare 11-SP3 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP4 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: lxc was update to fix one security issue. The following vulnerability was fixed: * CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-lxc-12166=1 - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-lxc-12166=1 - SUSE Linux Enterprise Server for VMWare 11-SP3: zypper in -t patch slessp3-lxc-12166=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-lxc-12166=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-lxc-12166=1 - SUSE Linux Enterprise Desktop 11-SP4: zypper in -t patch sledsp4-lxc-12166=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-lxc-12166=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-lxc-12166=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-lxc-12166=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): lxc-devel-0.8.0-0.25.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64): lxc-devel-0.8.0-0.25.1 - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): lxc-0.8.0-0.25.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): lxc-debuginfo-0.8.0-0.25.1 lxc-debugsource-0.8.0-0.25.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64): lxc-debuginfo-0.8.0-0.25.1 lxc-debugsource-0.8.0-0.25.1 References: https://www.suse.com/security/cve/CVE-2015-1335.html https://bugzilla.suse.com/946744 From sle-security-updates at lists.suse.com Tue Oct 27 10:09:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 27 Oct 2015 17:09:48 +0100 (CET) Subject: SUSE-SU-2015:1833-1: moderate: Security update for gcc48 Message-ID: <20151027160948.22F5C32139@maintenance.suse.de> SUSE Security Update: Security update for gcc48 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1833-1 Rating: moderate References: #945842 #947772 #947791 #948168 #949000 Cross-References: CVE-2015-5276 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves one vulnerability and has four fixes is now available. Description: This update for GCC 4.8 provides the following fixes: - Fix C++11 std::random_device short read issue that could lead to predictable randomness. (CVE-2015-5276, bsc#945842) - Fix linker segmentation fault when building SLOF on ppc64le. (bsc#949000) - Fix no_instrument_function attribute handling on PPC64 with -mprofile-kernel. (bsc#947791) - Fix internal compiler error with aarch64 target using PCH and builtin functions. (bsc#947772) - Fix libffi issues on aarch64. (bsc#948168) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-756=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-756=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-756=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-756=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): gcc48-gij-32bit-4.8.5-24.1 gcc48-gij-4.8.5-24.1 gcc48-gij-debuginfo-32bit-4.8.5-24.1 gcc48-gij-debuginfo-4.8.5-24.1 libgcj48-32bit-4.8.5-24.1 libgcj48-4.8.5-24.1 libgcj48-debuginfo-32bit-4.8.5-24.1 libgcj48-debuginfo-4.8.5-24.1 libgcj48-debugsource-4.8.5-24.1 libgcj48-jar-4.8.5-24.1 libgcj_bc1-4.8.5-24.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): gcc48-debuginfo-4.8.5-24.1 gcc48-debugsource-4.8.5-24.1 gcc48-fortran-4.8.5-24.1 gcc48-fortran-debuginfo-4.8.5-24.1 gcc48-gij-4.8.5-24.1 gcc48-gij-debuginfo-4.8.5-24.1 gcc48-java-4.8.5-24.1 gcc48-java-debuginfo-4.8.5-24.1 gcc48-obj-c++-4.8.5-24.1 gcc48-obj-c++-debuginfo-4.8.5-24.1 gcc48-objc-4.8.5-24.1 gcc48-objc-debuginfo-4.8.5-24.1 libffi48-debugsource-4.8.5-24.1 libffi48-devel-4.8.5-24.1 libgcj48-4.8.5-24.1 libgcj48-debuginfo-4.8.5-24.1 libgcj48-debugsource-4.8.5-24.1 libgcj48-devel-4.8.5-24.1 libgcj48-devel-debuginfo-4.8.5-24.1 libgcj48-jar-4.8.5-24.1 libgcj_bc1-4.8.5-24.1 libobjc4-4.8.5-24.1 libobjc4-debuginfo-4.8.5-24.1 - SUSE Linux Enterprise Software Development Kit 12 (s390x x86_64): gcc48-objc-32bit-4.8.5-24.1 libobjc4-32bit-4.8.5-24.1 - SUSE Linux Enterprise Software Development Kit 12 (x86_64): gcc48-ada-4.8.5-24.1 gcc48-ada-debuginfo-4.8.5-24.1 libada48-4.8.5-24.1 libada48-debuginfo-4.8.5-24.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): cpp48-4.8.5-24.1 cpp48-debuginfo-4.8.5-24.1 gcc48-4.8.5-24.1 gcc48-c++-4.8.5-24.1 gcc48-c++-debuginfo-4.8.5-24.1 gcc48-debuginfo-4.8.5-24.1 gcc48-debugsource-4.8.5-24.1 gcc48-locale-4.8.5-24.1 libstdc++48-devel-4.8.5-24.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): gcc48-32bit-4.8.5-24.1 libstdc++48-devel-32bit-4.8.5-24.1 - SUSE Linux Enterprise Server 12 (x86_64): libasan0-32bit-4.8.5-24.1 libasan0-32bit-debuginfo-4.8.5-24.1 libasan0-4.8.5-24.1 libasan0-debuginfo-4.8.5-24.1 - SUSE Linux Enterprise Server 12 (noarch): gcc48-info-4.8.5-24.1 - SUSE Linux Enterprise Server 12 (s390x): libffi48-debugsource-4.8.5-24.1 - SUSE Linux Enterprise Desktop 12 (x86_64): cpp48-4.8.5-24.1 cpp48-debuginfo-4.8.5-24.1 gcc48-32bit-4.8.5-24.1 gcc48-4.8.5-24.1 gcc48-c++-4.8.5-24.1 gcc48-c++-debuginfo-4.8.5-24.1 gcc48-debuginfo-4.8.5-24.1 gcc48-debugsource-4.8.5-24.1 gcc48-gij-32bit-4.8.5-24.1 gcc48-gij-4.8.5-24.1 gcc48-gij-debuginfo-32bit-4.8.5-24.1 gcc48-gij-debuginfo-4.8.5-24.1 libasan0-32bit-4.8.5-24.1 libasan0-32bit-debuginfo-4.8.5-24.1 libasan0-4.8.5-24.1 libasan0-debuginfo-4.8.5-24.1 libgcj48-32bit-4.8.5-24.1 libgcj48-4.8.5-24.1 libgcj48-debuginfo-32bit-4.8.5-24.1 libgcj48-debuginfo-4.8.5-24.1 libgcj48-debugsource-4.8.5-24.1 libgcj48-jar-4.8.5-24.1 libgcj_bc1-4.8.5-24.1 libstdc++48-devel-32bit-4.8.5-24.1 libstdc++48-devel-4.8.5-24.1 - SUSE Linux Enterprise Desktop 12 (noarch): gcc48-info-4.8.5-24.1 References: https://www.suse.com/security/cve/CVE-2015-5276.html https://bugzilla.suse.com/945842 https://bugzilla.suse.com/947772 https://bugzilla.suse.com/947791 https://bugzilla.suse.com/948168 https://bugzilla.suse.com/949000 From sle-security-updates at lists.suse.com Wed Oct 28 05:10:18 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 28 Oct 2015 12:10:18 +0100 (CET) Subject: SUSE-SU-2015:1838-1: moderate: Security update for polkit Message-ID: <20151028111018.29B0F32139@maintenance.suse.de> SUSE Security Update: Security update for polkit ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1838-1 Rating: moderate References: #912889 #933922 #935119 #939246 #943816 #950114 Cross-References: CVE-2015-3218 CVE-2015-3255 CVE-2015-3256 CVE-2015-4625 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves four vulnerabilities and has two fixes is now available. Description: polkit was updated to the 0.113 release, fixing security issues and bugs. Security issues fixed: * Fixes CVE-2015-4625, a local privilege escalation due to predictable authentication session cookie values. Thanks to Tavis Ormandy, Google Project Zero for reporting this issue. For the future, authentication agents are encouraged to use PolkitAgentSession instead of using the D-Bus agent response API directly. (bsc#935119) * Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the JavaScript interpreter, possibly leading to local privilege escalation. (bsc#943816) * Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate action IDs, possibly leading to local privilege escalation. Thanks to Laurent Bigonville for reporting this issue. (bsc#939246) * Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to Tavis Ormandy, Google Project Zero, for reporting this issue. (bsc#933922) Other issues fixed: * On systemd-213 and later, the "active" state is shared across all sessions of an user, instead of being tracked separately. * pkexec, when not given a program to execute, runs the users shell by default. * Fixed shutdown problems on powerpc64le (bsc#950114) * polkit had a memory leak (bsc#912889) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-759=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-759=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-759=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-759=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): libpolkit0-32bit-0.113-4.1 libpolkit0-debuginfo-32bit-0.113-4.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): polkit-debuginfo-0.113-4.1 polkit-debugsource-0.113-4.1 polkit-devel-0.113-4.1 polkit-devel-debuginfo-0.113-4.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libpolkit0-0.113-4.1 libpolkit0-debuginfo-0.113-4.1 polkit-0.113-4.1 polkit-debuginfo-0.113-4.1 polkit-debugsource-0.113-4.1 typelib-1_0-Polkit-1_0-0.113-4.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libpolkit0-0.113-4.1 libpolkit0-32bit-0.113-4.1 libpolkit0-debuginfo-0.113-4.1 libpolkit0-debuginfo-32bit-0.113-4.1 polkit-0.113-4.1 polkit-debuginfo-0.113-4.1 polkit-debugsource-0.113-4.1 typelib-1_0-Polkit-1_0-0.113-4.1 References: https://www.suse.com/security/cve/CVE-2015-3218.html https://www.suse.com/security/cve/CVE-2015-3255.html https://www.suse.com/security/cve/CVE-2015-3256.html https://www.suse.com/security/cve/CVE-2015-4625.html https://bugzilla.suse.com/912889 https://bugzilla.suse.com/933922 https://bugzilla.suse.com/935119 https://bugzilla.suse.com/939246 https://bugzilla.suse.com/943816 https://bugzilla.suse.com/950114 From sle-security-updates at lists.suse.com Wed Oct 28 10:09:51 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 28 Oct 2015 17:09:51 +0100 (CET) Subject: SUSE-SU-2015:1840-1: moderate: Security update for openssh Message-ID: <20151028160951.A573532139@maintenance.suse.de> SUSE Security Update: Security update for openssh ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1840-1 Rating: moderate References: #673532 #903649 #905118 #914309 #932483 #936695 #938746 Cross-References: CVE-2015-4000 CVE-2015-5352 CVE-2015-5600 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS ______________________________________________________________________________ An update that solves three vulnerabilities and has four fixes is now available. Description: openssh was updated to fix four security issues. These security issues were fixed: - CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695). - CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746). - CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483). - Hardening patch to fix sftp RCE (bsc#903649). These non-security issues were fixed: - bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer. - bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-openssh-12168=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): openssh-5.1p1-41.69.1 openssh-askpass-5.1p1-41.69.1 openssh-askpass-gnome-5.1p1-41.69.4 References: https://www.suse.com/security/cve/CVE-2015-4000.html https://www.suse.com/security/cve/CVE-2015-5352.html https://www.suse.com/security/cve/CVE-2015-5600.html https://bugzilla.suse.com/673532 https://bugzilla.suse.com/903649 https://bugzilla.suse.com/905118 https://bugzilla.suse.com/914309 https://bugzilla.suse.com/932483 https://bugzilla.suse.com/936695 https://bugzilla.suse.com/938746 From sle-security-updates at lists.suse.com Fri Oct 30 03:09:52 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 30 Oct 2015 10:09:52 +0100 (CET) Subject: SUSE-SU-2015:1844-1: moderate: Security update for glibc Message-ID: <20151030090952.F1BA532139@maintenance.suse.de> SUSE Security Update: Security update for glibc ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1844-1 Rating: moderate References: #915955 #918187 #920338 #927080 #928723 #931480 #934084 #937853 #939211 #940195 #940332 #944494 #945779 Cross-References: CVE-2014-8121 CVE-2015-1781 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has 11 fixes is now available. Description: glibc was updated to fix bugs and security issues. Security issues fixed: * A buffer overflow in nss_dns was fixed that could lead to crashes. (CVE-2015-1781, bsc#927080, BZ #18287) * A denial of service attack (out of memory) in the NSS files backend was fixed (CVE-2014-8121, bsc#918187, GLIBC BZ #18007) Non security bugs fixed: * Fix regression in threaded application malloc performance (bsc#915955, GLIBC#17195) * Fix read past end of pattern in fnmatch (bsc#920338, GLIBC#17062, GLIBC#18032, GLIBC#18036) * Record TTL also for DNS PTR queries (bsc#928723, GLIBC#18513) * Increase MINSIGSTKSZ and SIGSTKSZ for aarch64 (bsc#931480, GLIBC#16850) * Fix handling of IPv6 nameservers (bsc#939211, GLIBC#13028, GLIBC#17053) * Avoid use of asm/ptrace.h (bsc#934084) * Do not corrupt the top of a threaded heap if top chunk is MINSIZE (GLIBC#18502) * Terminate unwinding after makecontext_ret on s390 (bsc#940332. bsc#944494, GLIBC#18508) * Restore signal mask in set/swapcontext on s390 (bsc#940195, bsc#944494, GLIBC#18080) * fix dlopen in static binaries (bsc#937853, GLIBC#17250) * Properly reread entry after failure in nss_files getent function (bsc#945779, BZ #18991) Features added: * AVX512 support (fate#318844) * Add compatibility symlinks for LSB 3.0 (fate#318933) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-764=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-764=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-764=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): glibc-debuginfo-2.19-22.7.1 glibc-debugsource-2.19-22.7.1 glibc-devel-static-2.19-22.7.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): glibc-2.19-22.7.1 glibc-debuginfo-2.19-22.7.1 glibc-debugsource-2.19-22.7.1 glibc-devel-2.19-22.7.1 glibc-devel-debuginfo-2.19-22.7.1 glibc-locale-2.19-22.7.1 glibc-locale-debuginfo-2.19-22.7.1 glibc-profile-2.19-22.7.1 nscd-2.19-22.7.1 nscd-debuginfo-2.19-22.7.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): glibc-32bit-2.19-22.7.1 glibc-debuginfo-32bit-2.19-22.7.1 glibc-devel-32bit-2.19-22.7.1 glibc-devel-debuginfo-32bit-2.19-22.7.1 glibc-locale-32bit-2.19-22.7.1 glibc-locale-debuginfo-32bit-2.19-22.7.1 glibc-profile-32bit-2.19-22.7.1 - SUSE Linux Enterprise Server 12 (noarch): glibc-html-2.19-22.7.1 glibc-i18ndata-2.19-22.7.1 glibc-info-2.19-22.7.1 - SUSE Linux Enterprise Desktop 12 (x86_64): glibc-2.19-22.7.1 glibc-32bit-2.19-22.7.1 glibc-debuginfo-2.19-22.7.1 glibc-debuginfo-32bit-2.19-22.7.1 glibc-debugsource-2.19-22.7.1 glibc-devel-2.19-22.7.1 glibc-devel-32bit-2.19-22.7.1 glibc-devel-debuginfo-2.19-22.7.1 glibc-devel-debuginfo-32bit-2.19-22.7.1 glibc-locale-2.19-22.7.1 glibc-locale-32bit-2.19-22.7.1 glibc-locale-debuginfo-2.19-22.7.1 glibc-locale-debuginfo-32bit-2.19-22.7.1 nscd-2.19-22.7.1 nscd-debuginfo-2.19-22.7.1 - SUSE Linux Enterprise Desktop 12 (noarch): glibc-i18ndata-2.19-22.7.1 References: https://www.suse.com/security/cve/CVE-2014-8121.html https://www.suse.com/security/cve/CVE-2015-1781.html https://bugzilla.suse.com/915955 https://bugzilla.suse.com/918187 https://bugzilla.suse.com/920338 https://bugzilla.suse.com/927080 https://bugzilla.suse.com/928723 https://bugzilla.suse.com/931480 https://bugzilla.suse.com/934084 https://bugzilla.suse.com/937853 https://bugzilla.suse.com/939211 https://bugzilla.suse.com/940195 https://bugzilla.suse.com/940332 https://bugzilla.suse.com/944494 https://bugzilla.suse.com/945779 From sle-security-updates at lists.suse.com Fri Oct 30 05:09:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 30 Oct 2015 12:09:48 +0100 (CET) Subject: SUSE-SU-2015:1846-1: important: Security update for openstack-swift Message-ID: <20151030110948.8E599320F0@maintenance.suse.de> SUSE Security Update: Security update for openstack-swift ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1846-1 Rating: important References: #900253 #927793 #942641 Cross-References: CVE-2014-7960 CVE-2015-1856 CVE-2015-5223 Affected Products: SUSE OpenStack Cloud 5 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: openstack-swift was updated to fix three security issues. These security issues were fixed: - CVE-2015-1856: OpenStack Object Storage (Swift), when allow_version is configured, allowed remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container (bsc#927793). - CVE-2014-7960: OpenStack Object Storage (Swift) allowed remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined (bsc#900253). - CVE-2015-5223: Information leak via Swift tempurls (bsc#942641). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-openstack-swift-12171=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): openstack-swift-2.1.0-11.1 openstack-swift-account-2.1.0-11.1 openstack-swift-container-2.1.0-11.1 openstack-swift-object-2.1.0-11.1 openstack-swift-proxy-2.1.0-11.1 python-swift-2.1.0-11.1 - SUSE OpenStack Cloud 5 (noarch): openstack-swift-doc-2.1.0-11.1 References: https://www.suse.com/security/cve/CVE-2014-7960.html https://www.suse.com/security/cve/CVE-2015-1856.html https://www.suse.com/security/cve/CVE-2015-5223.html https://bugzilla.suse.com/900253 https://bugzilla.suse.com/927793 https://bugzilla.suse.com/942641 From sle-security-updates at lists.suse.com Fri Oct 30 10:10:24 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 30 Oct 2015 17:10:24 +0100 (CET) Subject: SUSE-SU-2015:1851-1: moderate: Security update for apache2 Message-ID: <20151030161024.428EA320FF@maintenance.suse.de> SUSE Security Update: Security update for apache2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1851-1 Rating: moderate References: #444878 #869790 #911159 #915666 #927845 #930228 #931002 #931723 #938723 #938728 #939516 #949766 #949771 Cross-References: CVE-2014-8111 CVE-2015-3183 CVE-2015-3185 CVE-2015-4000 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Enterprise Storage 1.0 ______________________________________________________________________________ An update that solves four vulnerabilities and has 9 fixes is now available. Description: The Apache2 webserver was updated to fix several issues: Security issues fixed: - The chunked transfer coding implementation in the Apache HTTP Server did not properly parse chunk headers, which allowed remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. [bsc#938728, CVE-2015-3183] - The LOGJAM security issue was addressed by: [bnc#931723 CVE-2015-4000] * changing the SSLCipherSuite cipherstring to disable export cipher suites and deploy Ephemeral Elliptic-Curve Diffie-Hellman (ECDHE) ciphers. * Adjust 'gensslcert' script to generate a strong and unique Diffie Hellman Group and append it to the server certificate file. - The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x did not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allowed remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. [bnc#938723 bnc#939516 CVE-2015-3185] - Tomcat mod_jk information leak due to incorrect JkMount/JkUnmount directives processing [bnc#927845 CVE-2014-8111] Other bugs fixed: - Now provides a suse_maintenance_mmn_# [bnc#915666]. - Hardcoded modules in the %files [bnc#444878]. - Fixed the IfModule directive around SSLSessionCache [bnc#911159]. - allow only TCP ports in Yast2 firewall files [bnc#931002] - fixed a regression when some LDAP searches or comparisons might be done with the wrong credentials when a backend connection is reused [bnc#930228] - Fixed split-logfile2 script [bnc#869790] - remove the changed MODULE_MAGIC_NUMBER_MINOR from which confuses modules the way that they expect functionality that our apache does not provide [bnc#915666] - gensslcert: CN now defaults to `hostname -f` [bnc#949766], fix help [bnc#949771] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-772=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-772=1 - SUSE Enterprise Storage 1.0: zypper in -t patch SUSE-Storage-1.0-2015-772=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): apache2-debuginfo-2.4.10-14.10.1 apache2-debugsource-2.4.10-14.10.1 apache2-devel-2.4.10-14.10.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): apache2-2.4.10-14.10.1 apache2-debuginfo-2.4.10-14.10.1 apache2-debugsource-2.4.10-14.10.1 apache2-example-pages-2.4.10-14.10.1 apache2-mod_auth_kerb-5.4-2.4.1 apache2-mod_auth_kerb-debuginfo-5.4-2.4.1 apache2-mod_auth_kerb-debugsource-5.4-2.4.1 apache2-mod_jk-1.2.40-2.6.1 apache2-mod_jk-debuginfo-1.2.40-2.6.1 apache2-mod_jk-debugsource-1.2.40-2.6.1 apache2-mod_security2-2.8.0-3.4.1 apache2-mod_security2-debuginfo-2.8.0-3.4.1 apache2-mod_security2-debugsource-2.8.0-3.4.1 apache2-prefork-2.4.10-14.10.1 apache2-prefork-debuginfo-2.4.10-14.10.1 apache2-utils-2.4.10-14.10.1 apache2-utils-debuginfo-2.4.10-14.10.1 apache2-worker-2.4.10-14.10.1 apache2-worker-debuginfo-2.4.10-14.10.1 - SUSE Linux Enterprise Server 12 (noarch): apache2-doc-2.4.10-14.10.1 - SUSE Enterprise Storage 1.0 (x86_64): apache2-mod_fastcgi-2.4.7-3.4.1 apache2-mod_fastcgi-debuginfo-2.4.7-3.4.1 apache2-mod_fastcgi-debugsource-2.4.7-3.4.1 References: https://www.suse.com/security/cve/CVE-2014-8111.html https://www.suse.com/security/cve/CVE-2015-3183.html https://www.suse.com/security/cve/CVE-2015-3185.html https://www.suse.com/security/cve/CVE-2015-4000.html https://bugzilla.suse.com/444878 https://bugzilla.suse.com/869790 https://bugzilla.suse.com/911159 https://bugzilla.suse.com/915666 https://bugzilla.suse.com/927845 https://bugzilla.suse.com/930228 https://bugzilla.suse.com/931002 https://bugzilla.suse.com/931723 https://bugzilla.suse.com/938723 https://bugzilla.suse.com/938728 https://bugzilla.suse.com/939516 https://bugzilla.suse.com/949766 https://bugzilla.suse.com/949771 From sle-security-updates at lists.suse.com Fri Oct 30 10:13:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 30 Oct 2015 17:13:48 +0100 (CET) Subject: SUSE-SU-2015:1853-1: important: Security update for xen Message-ID: <20151030161348.7079332139@maintenance.suse.de> SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:1853-1 Rating: important References: #877642 #907514 #910258 #918984 #923967 #932267 #941074 #944463 #944697 #947165 #950367 #950703 #950705 #950706 Cross-References: CVE-2014-0222 CVE-2015-4037 CVE-2015-5239 CVE-2015-6815 CVE-2015-7311 CVE-2015-7835 CVE-2015-7969 CVE-2015-7971 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP3 SUSE Linux Enterprise Server 11-SP3 SUSE Linux Enterprise Desktop 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that solves 8 vulnerabilities and has 6 fixes is now available. Description: xen was updated to fix nine security issues. These security issues were fixed: - CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267). - CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165). - CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463). - CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697). - CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706). These non-security issues were fixed: - bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed - bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed - bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed - bsc#941074: Device 51728 could not be connected. Hotplug scripts not working Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP3: zypper in -t patch sdksp3-xen-12174=1 - SUSE Linux Enterprise Server 11-SP3: zypper in -t patch slessp3-xen-12174=1 - SUSE Linux Enterprise Desktop 11-SP3: zypper in -t patch sledsp3-xen-12174=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-xen-12174=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 x86_64): xen-devel-4.2.5_14-18.2 - SUSE Linux Enterprise Server 11-SP3 (i586 x86_64): xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 xen-libs-4.2.5_14-18.2 xen-tools-domU-4.2.5_14-18.2 - SUSE Linux Enterprise Server 11-SP3 (x86_64): xen-4.2.5_14-18.2 xen-doc-html-4.2.5_14-18.2 xen-doc-pdf-4.2.5_14-18.2 xen-libs-32bit-4.2.5_14-18.2 xen-tools-4.2.5_14-18.2 - SUSE Linux Enterprise Server 11-SP3 (i586): xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64): xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 xen-libs-4.2.5_14-18.2 xen-tools-domU-4.2.5_14-18.2 - SUSE Linux Enterprise Desktop 11-SP3 (x86_64): xen-4.2.5_14-18.2 xen-doc-html-4.2.5_14-18.2 xen-doc-pdf-4.2.5_14-18.2 xen-libs-32bit-4.2.5_14-18.2 xen-tools-4.2.5_14-18.2 - SUSE Linux Enterprise Desktop 11-SP3 (i586): xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64): xen-debuginfo-4.2.5_14-18.2 xen-debugsource-4.2.5_14-18.2 References: https://www.suse.com/security/cve/CVE-2014-0222.html https://www.suse.com/security/cve/CVE-2015-4037.html https://www.suse.com/security/cve/CVE-2015-5239.html https://www.suse.com/security/cve/CVE-2015-6815.html https://www.suse.com/security/cve/CVE-2015-7311.html https://www.suse.com/security/cve/CVE-2015-7835.html https://www.suse.com/security/cve/CVE-2015-7969.html https://www.suse.com/security/cve/CVE-2015-7971.html https://bugzilla.suse.com/877642 https://bugzilla.suse.com/907514 https://bugzilla.suse.com/910258 https://bugzilla.suse.com/918984 https://bugzilla.suse.com/923967 https://bugzilla.suse.com/932267 https://bugzilla.suse.com/941074 https://bugzilla.suse.com/944463 https://bugzilla.suse.com/944697 https://bugzilla.suse.com/947165 https://bugzilla.suse.com/950367 https://bugzilla.suse.com/950703 https://bugzilla.suse.com/950705 https://bugzilla.suse.com/950706