From sle-security-updates at lists.suse.com Wed Apr 1 18:06:32 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 Apr 2015 02:06:32 +0200 (CEST) Subject: SUSE-SU-2015:0652-1: important: Security update for Linux kernel Message-ID: <20150402000632.33BB032398@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0652-1 Rating: important References: #771619 #833820 #846404 #857643 #875051 #885077 #891211 #892235 #896390 #896391 #896779 #899338 #902346 #902349 #902351 #904700 #905100 #905312 #907822 #908870 #911325 #912654 #912705 #912916 #913059 #915335 #915826 Cross-References: CVE-2010-5313 CVE-2012-6657 CVE-2013-4299 CVE-2013-7263 CVE-2014-0181 CVE-2014-3184 CVE-2014-3185 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688 CVE-2014-7841 CVE-2014-7842 CVE-2014-8160 CVE-2014-8709 CVE-2014-9420 CVE-2014-9584 CVE-2014-9585 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 17 vulnerabilities and has 10 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 1 LTSS kernel was updated to fix security issues on kernels on the x86_64 architecture. The following security bugs have been fixed: * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allowed remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device (bnc#846404). * CVE-2014-8160: SCTP firewalling failed until the SCTP module was loaded (bnc#913059). * CVE-2014-9584: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 did not validate a length value in the Extensions Reference (ER) System Use Field, which allowed local users to obtain sensitive information from kernel memory via a crafted iso9660 image (bnc#912654). * CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 did not properly choose memory locations for the vDSO area, which made it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD (bnc#912705). * CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 did not restrict the number of Rock Ridge continuation entries, which allowed local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image (bnc#911325). * CVE-2014-0181: The Netlink implementation in the Linux kernel through 3.14.1 did not provide a mechanism for authorizing socket operations based on the opener of a socket, which allowed local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program (bnc#875051). * CVE-2010-5313: Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allowed L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842 (bnc#907822). * CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allowed guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313 (bnc#905312). * CVE-2014-3688: The SCTP implementation in the Linux kernel before 3.17.4 allowed remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an associations output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351). * CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allowed remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter (bnc#902349). * CVE-2014-3673: The SCTP implementation in the Linux kernel through 3.17.2 allowed remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346). * CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allowed remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk (bnc#905100). * CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 did not properly maintain a certain tail pointer, which allowed remote attackers to obtain sensitive cleartext information by reading packets (bnc#904700). * CVE-2013-7263: The Linux kernel before 3.12.4 updated certain length values before ensuring that associated data structures have been initialized, which allowed local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c (bnc#857643). * CVE-2012-6657: The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 did not ensure that a keepalive action is associated with a stream socket, which allowed local users to cause a denial of service (system crash) by leveraging the ability to create a raw socket (bnc#896779). * CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allowed physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response (bnc#896391). * CVE-2014-3184: The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c (bnc#896390). The following non-security bugs have been fixed: * KVM: SVM: Make Use of the generic guest-mode functions (bnc#907822). * KVM: inject #UD if instruction emulation fails and exit to userspace (bnc#907822). * block: Fix bogus partition statistics reports (bnc#885077 bnc#891211). * block: skip request queue cleanup if no elevator is assigned (bnc#899338). * isofs: Fix unchecked printing of ER records. * Re-enable nested-spinlocks-backport patch for xen (bnc#908870). * time, ntp: Do not update time_state in middle of leap second (bnc#912916). * timekeeping: Avoid possible deadlock from clock_was_set_delayed (bnc#771619, bnc#915335). * udf: Check component length before reading it. * udf: Check path length when reading symlink. * udf: Verify i_size when loading inode. * udf: Verify symlink size before loading it. * vt: prevent race between modifying and reading unicode map (bnc#915826). * writeback: Do not sync data dirtied after sync start (bnc#833820). * xfs: Avoid blocking on inode flush in background inode reclaim (bnc#892235). Security Issues: * CVE-2010-5313 * CVE-2012-6657 * CVE-2013-4299 * CVE-2013-7263 * CVE-2014-0181 * CVE-2014-3184 * CVE-2014-3185 * CVE-2014-3673 * CVE-2014-3687 * CVE-2014-3688 * CVE-2014-7841 * CVE-2014-7842 * CVE-2014-8160 * CVE-2014-8709 * CVE-2014-9420 * CVE-2014-9584 * CVE-2014-9585 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-kernel=10315 slessp1-kernel=10316 slessp1-kernel=10317 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.6.32.59]: kernel-default-2.6.32.59-0.19.1 kernel-default-base-2.6.32.59-0.19.1 kernel-default-devel-2.6.32.59-0.19.1 kernel-source-2.6.32.59-0.19.1 kernel-syms-2.6.32.59-0.19.1 kernel-trace-2.6.32.59-0.19.1 kernel-trace-base-2.6.32.59-0.19.1 kernel-trace-devel-2.6.32.59-0.19.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64) [New Version: 2.6.32.59]: kernel-ec2-2.6.32.59-0.19.1 kernel-ec2-base-2.6.32.59-0.19.1 kernel-ec2-devel-2.6.32.59-0.19.1 kernel-xen-2.6.32.59-0.19.1 kernel-xen-base-2.6.32.59-0.19.1 kernel-xen-devel-2.6.32.59-0.19.1 xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-0.9.17 xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-0.9.17 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x) [New Version: 2.6.32.59]: kernel-default-man-2.6.32.59-0.19.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586) [New Version: 2.6.32.59]: kernel-pae-2.6.32.59-0.19.1 kernel-pae-base-2.6.32.59-0.19.1 kernel-pae-devel-2.6.32.59-0.19.1 xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.9.17 - SLE 11 SERVER Unsupported Extras (i586 s390x x86_64): kernel-default-extra-2.6.32.59-0.19.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-2.6.32.59-0.19.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-2.6.32.59-0.19.1 References: https://www.suse.com/security/cve/CVE-2010-5313.html https://www.suse.com/security/cve/CVE-2012-6657.html https://www.suse.com/security/cve/CVE-2013-4299.html https://www.suse.com/security/cve/CVE-2013-7263.html https://www.suse.com/security/cve/CVE-2014-0181.html https://www.suse.com/security/cve/CVE-2014-3184.html https://www.suse.com/security/cve/CVE-2014-3185.html https://www.suse.com/security/cve/CVE-2014-3673.html https://www.suse.com/security/cve/CVE-2014-3687.html https://www.suse.com/security/cve/CVE-2014-3688.html https://www.suse.com/security/cve/CVE-2014-7841.html https://www.suse.com/security/cve/CVE-2014-7842.html https://www.suse.com/security/cve/CVE-2014-8160.html https://www.suse.com/security/cve/CVE-2014-8709.html https://www.suse.com/security/cve/CVE-2014-9420.html https://www.suse.com/security/cve/CVE-2014-9584.html https://www.suse.com/security/cve/CVE-2014-9585.html https://bugzilla.suse.com/771619 https://bugzilla.suse.com/833820 https://bugzilla.suse.com/846404 https://bugzilla.suse.com/857643 https://bugzilla.suse.com/875051 https://bugzilla.suse.com/885077 https://bugzilla.suse.com/891211 https://bugzilla.suse.com/892235 https://bugzilla.suse.com/896390 https://bugzilla.suse.com/896391 https://bugzilla.suse.com/896779 https://bugzilla.suse.com/899338 https://bugzilla.suse.com/902346 https://bugzilla.suse.com/902349 https://bugzilla.suse.com/902351 https://bugzilla.suse.com/904700 https://bugzilla.suse.com/905100 https://bugzilla.suse.com/905312 https://bugzilla.suse.com/907822 https://bugzilla.suse.com/908870 https://bugzilla.suse.com/911325 https://bugzilla.suse.com/912654 https://bugzilla.suse.com/912705 https://bugzilla.suse.com/912916 https://bugzilla.suse.com/913059 https://bugzilla.suse.com/915335 https://bugzilla.suse.com/915826 https://download.suse.com/patch/finder/?keywords=01007b3b761286f24a9cd5a7197794e2 https://download.suse.com/patch/finder/?keywords=8944e139fcc8a84a52412d23cce7f98a https://download.suse.com/patch/finder/?keywords=a5e2892de750f2c5d2fba65db2f8b808 https://download.suse.com/patch/finder/?keywords=afe31f60701fa39738b0574722eb95ef https://download.suse.com/patch/finder/?keywords=cfbfe04e5c8b61b50f91d849de2217e9 https://download.suse.com/patch/finder/?keywords=ef5762f62e2e26eab3ef31d6b58ad159 From sle-security-updates at lists.suse.com Wed Apr 1 19:04:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 Apr 2015 03:04:48 +0200 (CEST) Subject: SUSE-SU-2015:0653-1: moderate: Security update for wireshark Message-ID: <20150402010448.B932A32398@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0653-1 Rating: moderate References: #920696 #920697 #920699 Cross-References: CVE-2015-2188 CVE-2015-2189 CVE-2015-2191 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. It includes one version update. Description: Wireshark was updated to version 1.10.13 fixing bugs and security issues: The following security issues have been fixed. * The WCP dissector could crash. wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] * The pcapng file parser could crash. wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] * The TNEF dissector could go into an infinite loop. wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] Further bug fixes and updated protocol support are listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html Security Issues: * CVE-2015-2188 * CVE-2015-2189 * CVE-2015-2191 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-wireshark=10444 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-wireshark=10444 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-wireshark=10444 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-wireshark=10444 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.10.13]: wireshark-devel-1.10.13-0.2.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64) [New Version: 1.10.13]: wireshark-1.10.13-0.2.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 1.10.13]: wireshark-1.10.13-0.2.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.10.13]: wireshark-1.10.13-0.2.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 1.10.13]: wireshark-1.10.13-0.2.1 References: https://www.suse.com/security/cve/CVE-2015-2188.html https://www.suse.com/security/cve/CVE-2015-2189.html https://www.suse.com/security/cve/CVE-2015-2191.html https://bugzilla.suse.com/920696 https://bugzilla.suse.com/920697 https://bugzilla.suse.com/920699 https://download.suse.com/patch/finder/?keywords=ee08d72dacf1833cac37391d991e56ba From sle-security-updates at lists.suse.com Thu Apr 2 06:04:55 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 Apr 2015 14:04:55 +0200 (CEST) Subject: SUSE-SU-2015:0657-1: moderate: Security update for wireshark Message-ID: <20150402120455.616113239A@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0657-1 Rating: moderate References: #920696 #920697 #920699 Cross-References: CVE-2015-2188 CVE-2015-2189 CVE-2015-2191 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: Wireshark was updated to 1.10.13 to fix bugs and security issues. The following security issues were fixed: * The WCP dissector could crash. wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] * The pcapng file parser could crash. wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] * The TNEF dissector could go into an infinite loop. wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-151=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-151=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): wireshark-debuginfo-1.10.13-8.1 wireshark-debugsource-1.10.13-8.1 wireshark-devel-1.10.13-8.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): wireshark-1.10.13-8.1 wireshark-debuginfo-1.10.13-8.1 wireshark-debugsource-1.10.13-8.1 References: https://www.suse.com/security/cve/CVE-2015-2188.html https://www.suse.com/security/cve/CVE-2015-2189.html https://www.suse.com/security/cve/CVE-2015-2191.html https://bugzilla.suse.com/920696 https://bugzilla.suse.com/920697 https://bugzilla.suse.com/920699 From sle-security-updates at lists.suse.com Thu Apr 2 07:04:55 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 Apr 2015 15:04:55 +0200 (CEST) Subject: SUSE-SU-2015:0657-2: moderate: Security update for wireshark Message-ID: <20150402130455.240AB3239A@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0657-2 Rating: moderate References: #920696 #920697 #920699 Cross-References: CVE-2015-2188 CVE-2015-2189 CVE-2015-2191 Affected Products: SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: Wireshark was updated to 1.10.13 to fix bugs and security issues. The following security issues were fixed: * The WCP dissector could crash. wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] * The pcapng file parser could crash. wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] * The TNEF dissector could go into an infinite loop. wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-151=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 12 (x86_64): wireshark-1.10.13-8.1 wireshark-debuginfo-1.10.13-8.1 wireshark-debugsource-1.10.13-8.1 References: https://www.suse.com/security/cve/CVE-2015-2188.html https://www.suse.com/security/cve/CVE-2015-2189.html https://www.suse.com/security/cve/CVE-2015-2191.html https://bugzilla.suse.com/920696 https://bugzilla.suse.com/920697 https://bugzilla.suse.com/920699 From sle-security-updates at lists.suse.com Thu Apr 2 13:04:53 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 Apr 2015 21:04:53 +0200 (CEST) Subject: SUSE-SU-2015:0658-1: important: Security Update for Linux Kernel Message-ID: <20150402190453.A98083239A@maintenance.suse.de> SUSE Security Update: Security Update for Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0658-1 Rating: important References: #898675 #903997 #904242 #909309 #909477 #909684 #910517 #913080 #914818 #915200 #915660 #917830 #918584 #918615 #918620 #918644 #919463 #919719 #919939 #920615 #920805 #920839 #921313 #921527 #921990 #922272 #922275 #922278 #922284 #924460 Cross-References: CVE-2015-0777 CVE-2015-2150 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has 28 fixes is now available. Description: The SUSE Linux Enterprise Server 12 kernel was updated to 3.12.39 to receive various security and bugfixes. Following security bugs were fixed: - CVE-2015-0777: The XEN usb backend could leak information to the guest system due to copying uninitialized memory. - CVE-2015-2150: Xen and the Linux kernel did not properly restrict access to PCI command registers, which might have allowed local guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. The following non-security bugs were fixed: - Added Little Endian support to vtpm module (bsc#918620). - Add support for pnfs block layout. Patches not included by default yet - ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#921313). - btrfs: add missing blk_finish_plug in btrfs_sync_log() (bnc#922284). - btrfs: cleanup orphans while looking up default subvolume (bsc#914818). - btrfs: do not ignore errors from btrfs_lookup_xattr in do_setxattr (bnc#922272). - btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group (bnc#922278). - btrfs: fix data loss in the fast fsync path (bnc#922275). - btrfs: fix fsync data loss after adding hard link to inode (bnc#922275). - cgroup: revert cgroup_mutex removal from idr_remove (bnc#918644). - cifs: fix use-after-free bug in find_writable_file (bnc#909477). - crypto: rng - RNGs must return 0 in success case (bsc#920805). - crypto: testmgr - fix RNG return code enforcement (bsc#920805). - exit: Always reap resource stats in __exit_signal() (Time scalability). - fork: report pid reservation failure properly (bnc#909684). - fsnotify: Fix handling of renames in audit (bnc#915200). - HID: hyperv: match wait_for_completion_timeout return type. - hv: address compiler warnings for hv_fcopy_daemon.c. - hv: address compiler warnings for hv_kvp_daemon.c. - hv: check vmbus_device_create() return value in vmbus_process_offer(). - hv: do not add redundant / in hv_start_fcopy(). - hv: hv_balloon: Do not post pressure status from interrupt context. - hv: hv_balloon: Fix a locking bug in the balloon driver. - hv: hv_balloon: Make adjustments in computing the floor. - hv: hv_fcopy: drop the obsolete message on transfer failure. - hv: kvp_daemon: make IPv6-only-injection work. - hv: remove unused bytes_written from kvp_update_file(). - hv: rename sc_lock to the more generic lock. - hv: vmbus: Fix a bug in vmbus_establish_gpadl(). - hv: vmbus: hv_process_timer_expiration() can be static. - hv: vmbus: Implement a clockevent device. - hv: vmbus: serialize Offer and Rescind offer. - hv: vmbus: Support a vmbus API for efficiently sending page arrays. - hv: vmbus: Use get_cpu() to get the current CPU. - hyperv: fix sparse warnings. - hyperv: Fix the error processing in netvsc_send(). - hyperv: match wait_for_completion_timeout return type. - hyperv: netvsc.c: match wait_for_completion_timeout return type. - iommu/vt-d: Fix dmar_domain leak in iommu_attach_device (bsc#924460). - kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242). - kABI: protect linux/namei.h include in procfs. - kABI: protect struct hif_scatter_req. - kabi/severities: Stop maintaining the kgraft kabi - kernel/sched/clock.c: add another clock for use with the soft lockup watchdog (bsc#919939). - kgr: Allow patches to require an exact kernel version (bnc#920615). - KVM: PPC: Book3S HV: ptes are big endian (bsc#920839). - mm: convert the rest to new page table lock api (the suse-only cases) (fate#315482). - mm: fix anon_vma->degree underflow in anon_vma endless growing prevention (bnc#904242). - mm: fix corner case in anon_vma endless growing prevention (bnc#904242). - mm: prevent endless growth of anon_vma hierarchy (bnc#904242). - mm: prevent endless growth of anon_vma hierarchy mm: prevent endless growth of anon_vma hierarchy (bnc#904242). - mm: vmscan: count only dirty pages as congested (VM Performance, bnc#910517). - module: Clean up ro/nx after early module load failures (bsc#921990). - module: set nx before marking module MODULE_STATE_COMING (bsc#921990). - net: add sysfs helpers for netdev_adjacent logic (bnc#915660). - net: correct error path in rtnl_newlink() (bnc#915660). - net: fix creation adjacent device symlinks (bnc#915660). - net: prevent of emerging cross-namespace symlinks (bnc#915660). - net: rename sysfs symlinks on device name change (bnc#915660). - nfs: cap request size to fit a kmalloced page array (bnc#898675). - nfs: commit layouts in fdatasync (bnc#898675). - NFSv4.1: Do not trust attributes if a pNFS LAYOUTCOMMIT is outstanding (bnc#898675). - NFSv4.1: Ensure that the layout recall callback matches layout stateids (bnc#898675). - NFSv4.1: Ensure that we free existing layout segments if we get a new layout (bnc#898675). - NFSv4.1: Fix a race in nfs4_write_inode (bnc#898675). - NFSv4.1: Fix wraparound issues in pnfs_seqid_is_newer() (bnc#898675). - NFSv4.1: Minor optimisation in get_layout_by_fh_locked() (bnc#898675). - NFSv4: Do not update the open stateid unless it is newer than the old one (bnc#898675). - pnfs: add a common GETDEVICELIST implementation (bnc#898675). - pnfs: add a nfs4_get_deviceid helper (bnc#898675). - pnfs: add flag to force read-modify-write in ->write_begin (bnc#898675). - pnfs: add return_range method (bnc#898675). - pnfs: allow splicing pre-encoded pages into the layoutcommit args (bnc#898675). - pnfs: avoid using stale stateids after layoutreturn (bnc#898675). - pnfs/blocklayout: allocate separate pages for the layoutcommit payload (bnc#898675). - pnfs/blocklayout: correctly decrement extent length (bnc#898675). - pnfs/blocklayout: do not set pages uptodate (bnc#898675). - pnfs/blocklayout: Fix a 64-bit division/remainder issue in bl_map_stripe (bnc#898675). - pnfs/blocklayout: implement the return_range method (bnc#898675). - pnfs/blocklayout: improve GETDEVICEINFO error reporting (bnc#898675). - pnfs/blocklayout: include vmalloc.h for __vmalloc (bnc#898675). - pnfs/blocklayout: in-kernel GETDEVICEINFO XDR parsing (bnc#898675). - pnfs/blocklayout: move all rpc_pipefs related code into a single file (bnc#898675). - pnfs/blocklayout: move extent processing to blocklayout.c (bnc#898675). - pnfs/blocklayout: plug block queues (bnc#898675). - pnfs/blocklayout: refactor extent processing (bnc#898675). - pnfs/blocklayout: reject pnfs blocksize larger than page size (bnc#898675). - pNFS/blocklayout: Remove a couple of unused variables (bnc#898675). - pnfs/blocklayout: remove read-modify-write handling in bl_write_pagelist (bnc#898675). - pnfs/blocklayout: remove some debugging (bnc#898675). - pnfs/blocklayout: return layouts on setattr (bnc#898675). - pnfs/blocklayout: rewrite extent tracking (bnc#898675). - pnfs/blocklayout: use the device id cache (bnc#898675). - pnfs: do not check sequence on new stateids in layoutget (bnc#898675). - pnfs: do not pass uninitialized lsegs to ->free_lseg (bnc#898675). - pnfs: enable CB_NOTIFY_DEVICEID support (bnc#898675). - pnfs: factor GETDEVICEINFO implementations (bnc#898675). - pnfs: force a layout commit when encountering busy segments during recall (bnc#898675). - pnfs: remove GETDEVICELIST implementation (bnc#898675). - pnfs: retry after a bad stateid error from layoutget (bnc#898675). - powerpc: add running_clock for powerpc to prevent spurious softlockup warnings (bsc#919939). - powerpc/pseries: Fix endian problems with LE migration (bsc#918584). - remove cgroup_mutex around deactivate_super because it might be dangerous. - rtmutex: Document pi chain walk (mutex scalability). - rtmutex: No need to keep task ref for lock owner check (mutex scalability). - rtmutex: Simplify rtmutex_slowtrylock() (mutex scalability). - rtnetlink: fix a memory leak when ->newlink fails (bnc#915660). - sched: Change thread_group_cputime() to use for_each_thread() (Time scalability). - sched: replace INIT_COMPLETION with reinit_completion. - sched, time: Atomically increment stime & utime (Time scalability). - scsi: storvsc: Always send on the selected outgoing channel. - scsi: storvsc: Do not assume that the scatterlist is not chained. - scsi: storvsc: Enable clustering. - scsi: storvsc: Fix a bug in copy_from_bounce_buffer(). - scsi: storvsc: Increase the ring buffer size. - scsi: storvsc: Retrieve information about the capability of the target. - scsi: storvsc: Set the tablesize based on the information given by the host. - scsi: storvsc: Size the queue depth based on the ringbuffer size. - storvsc: fix a bug in storvsc limits. - storvsc: force discovery of LUNs that may have been removed. - storvsc: force SPC-3 compliance on win8 and win8 r2 hosts. - storvsc: in responce to a scan event, scan the host. - take read_seqbegin_or_lock() and friends to seqlock.h (Time scalability). - tcp: prevent fetching dst twice in early demux code (bnc#903997 bnc#919719). - time, signal: Protect resource use statistics with seqlock -kabi (Time scalability). - time, signal: Protect resource use statistics with seqlock (Time scalability). - udp: only allow UFO for packets from SOCK_DGRAM sockets (bnc#909309). - Update Xen patches to 3.12.39. - virtio: rng: add derating factor for use by hwrng core (bsc#918615). - x86, AVX-512: AVX-512 Feature Detection (bsc#921527). - x86, AVX-512: Enable AVX-512 States Context Switch (bsc#921527). - xenbus: add proper handling of XS_ERROR from Xenbus for transactions. - xfs: xfs_alloc_fix_minleft can underflow near ENOSPC (bnc#913080). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-152=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-152=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-152=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2015-152=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2015-152=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-152=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): kernel-default-debuginfo-3.12.39-47.1 kernel-default-debugsource-3.12.39-47.1 kernel-default-extra-3.12.39-47.1 kernel-default-extra-debuginfo-3.12.39-47.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): kernel-obs-build-3.12.39-47.2 kernel-obs-build-debugsource-3.12.39-47.2 - SUSE Linux Enterprise Software Development Kit 12 (noarch): kernel-docs-3.12.39-47.3 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): kernel-default-3.12.39-47.1 kernel-default-base-3.12.39-47.1 kernel-default-base-debuginfo-3.12.39-47.1 kernel-default-debuginfo-3.12.39-47.1 kernel-default-debugsource-3.12.39-47.1 kernel-default-devel-3.12.39-47.1 kernel-syms-3.12.39-47.1 - SUSE Linux Enterprise Server 12 (x86_64): kernel-xen-3.12.39-47.1 kernel-xen-base-3.12.39-47.1 kernel-xen-base-debuginfo-3.12.39-47.1 kernel-xen-debuginfo-3.12.39-47.1 kernel-xen-debugsource-3.12.39-47.1 kernel-xen-devel-3.12.39-47.1 - SUSE Linux Enterprise Server 12 (noarch): kernel-devel-3.12.39-47.1 kernel-macros-3.12.39-47.1 kernel-source-3.12.39-47.1 - SUSE Linux Enterprise Server 12 (s390x): kernel-default-man-3.12.39-47.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.39-47.1 kernel-ec2-debuginfo-3.12.39-47.1 kernel-ec2-debugsource-3.12.39-47.1 kernel-ec2-devel-3.12.39-47.1 kernel-ec2-extra-3.12.39-47.1 kernel-ec2-extra-debuginfo-3.12.39-47.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_39-47-default-1-2.1 kgraft-patch-3_12_39-47-xen-1-2.1 - SUSE Linux Enterprise Desktop 12 (x86_64): kernel-default-3.12.39-47.1 kernel-default-debuginfo-3.12.39-47.1 kernel-default-debugsource-3.12.39-47.1 kernel-default-devel-3.12.39-47.1 kernel-default-extra-3.12.39-47.1 kernel-default-extra-debuginfo-3.12.39-47.1 kernel-syms-3.12.39-47.1 kernel-xen-3.12.39-47.1 kernel-xen-debuginfo-3.12.39-47.1 kernel-xen-debugsource-3.12.39-47.1 kernel-xen-devel-3.12.39-47.1 - SUSE Linux Enterprise Desktop 12 (noarch): kernel-devel-3.12.39-47.1 kernel-macros-3.12.39-47.1 kernel-source-3.12.39-47.1 References: https://www.suse.com/security/cve/CVE-2015-0777.html https://www.suse.com/security/cve/CVE-2015-2150.html https://bugzilla.suse.com/898675 https://bugzilla.suse.com/903997 https://bugzilla.suse.com/904242 https://bugzilla.suse.com/909309 https://bugzilla.suse.com/909477 https://bugzilla.suse.com/909684 https://bugzilla.suse.com/910517 https://bugzilla.suse.com/913080 https://bugzilla.suse.com/914818 https://bugzilla.suse.com/915200 https://bugzilla.suse.com/915660 https://bugzilla.suse.com/917830 https://bugzilla.suse.com/918584 https://bugzilla.suse.com/918615 https://bugzilla.suse.com/918620 https://bugzilla.suse.com/918644 https://bugzilla.suse.com/919463 https://bugzilla.suse.com/919719 https://bugzilla.suse.com/919939 https://bugzilla.suse.com/920615 https://bugzilla.suse.com/920805 https://bugzilla.suse.com/920839 https://bugzilla.suse.com/921313 https://bugzilla.suse.com/921527 https://bugzilla.suse.com/921990 https://bugzilla.suse.com/922272 https://bugzilla.suse.com/922275 https://bugzilla.suse.com/922278 https://bugzilla.suse.com/922284 https://bugzilla.suse.com/924460 From sle-security-updates at lists.suse.com Thu Apr 2 18:04:50 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 3 Apr 2015 02:04:50 +0200 (CEST) Subject: SUSE-SU-2015:0660-1: Security update for haproxy Message-ID: <20150403000450.076FE32395@maintenance.suse.de> SUSE Security Update: Security update for haproxy ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0660-1 Rating: low References: #876438 #895849 Cross-References: CVE-2014-6269 Affected Products: SUSE Cloud 5 SUSE Cloud 4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. It includes one version update. Description: This security update for haproxy provides version 1.5.4 with various fixes, improvements and one security fix. * Update from version 1.4.24 to 1.5.4 => For a detailed description, please refer to the package changelog. Security Issues: * CVE-2014-6269 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 5: zypper in -t patch sleclo50sp3-haproxy=10407 - SUSE Cloud 4: zypper in -t patch sleclo40sp3-haproxy=10405 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 5 (x86_64) [New Version: 1.5.4]: haproxy-1.5.4-0.7.1 - SUSE Cloud 4 (x86_64) [New Version: 1.5.4]: haproxy-1.5.4-0.9.1 References: https://www.suse.com/security/cve/CVE-2014-6269.html https://bugzilla.suse.com/876438 https://bugzilla.suse.com/895849 https://download.suse.com/patch/finder/?keywords=5762869195d48ad4cbaa57223f63cce3 https://download.suse.com/patch/finder/?keywords=d0b0b2ec05dfd22de2b9d184896189dc From sle-security-updates at lists.suse.com Tue Apr 7 05:05:23 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 Apr 2015 13:05:23 +0200 (CEST) Subject: SUSE-SU-2015:0667-1: moderate: Security update for libarchive Message-ID: <20150407110523.D78B13239A@maintenance.suse.de> SUSE Security Update: Security update for libarchive ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0667-1 Rating: moderate References: #800024 #920870 Cross-References: CVE-2013-0211 CVE-2015-2304 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: libarchive was updated to fix a directory traversal in the bsdcpio tool, which allowed attackers supplying crafted archives to overwrite files. (CVE-2015-2304) Also, a integer overflow was fixed that could also overflow buffers. (CVE-2013-0211) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-155=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-155=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-155=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libarchive-debugsource-3.1.2-9.1 libarchive-devel-3.1.2-9.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libarchive-debugsource-3.1.2-9.1 libarchive13-3.1.2-9.1 libarchive13-debuginfo-3.1.2-9.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libarchive-debugsource-3.1.2-9.1 libarchive13-3.1.2-9.1 libarchive13-debuginfo-3.1.2-9.1 References: https://www.suse.com/security/cve/CVE-2013-0211.html https://www.suse.com/security/cve/CVE-2015-2304.html https://bugzilla.suse.com/800024 https://bugzilla.suse.com/920870 From sle-security-updates at lists.suse.com Tue Apr 7 05:06:08 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 Apr 2015 13:06:08 +0200 (CEST) Subject: SUSE-SU-2015:0668-1: moderate: Security update for libzip Message-ID: <20150407110609.01EFC3239A@maintenance.suse.de> SUSE Security Update: Security update for libzip ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0668-1 Rating: moderate References: #923240 Cross-References: CVE-2015-2331 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Libzip was updated to fix one security issue. A zip file with an unusually large number of entries could have caused an integer overflow leading to a write past the heap boundary, crashing the application. (CVE-2015-2331 bnc#923240) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-154=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-154=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-154=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libzip-debuginfo-0.11.1-6.1 libzip-debugsource-0.11.1-6.1 libzip-devel-0.11.1-6.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libzip-debuginfo-0.11.1-6.1 libzip-debugsource-0.11.1-6.1 libzip2-0.11.1-6.1 libzip2-debuginfo-0.11.1-6.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libzip-debuginfo-0.11.1-6.1 libzip-debugsource-0.11.1-6.1 libzip2-0.11.1-6.1 libzip2-debuginfo-0.11.1-6.1 References: https://www.suse.com/security/cve/CVE-2015-2331.html https://bugzilla.suse.com/923240 From sle-security-updates at lists.suse.com Tue Apr 7 10:04:53 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 Apr 2015 18:04:53 +0200 (CEST) Subject: SUSE-SU-2015:0669-1: moderate: Security update for libssh2_org Message-ID: <20150407160453.399313239D@maintenance.suse.de> SUSE Security Update: Security update for libssh2_org ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0669-1 Rating: moderate References: #921070 Cross-References: CVE-2015-1782 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The ssh client library libssh2_org was updated to fix a security issue. CVE-2015-1782: A malicious server could send a crafted SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a crash of the libssh2_org using application. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-157=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-157=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-157=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libssh2-devel-1.4.3-11.1 libssh2_org-debugsource-1.4.3-11.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libssh2-1-1.4.3-11.1 libssh2-1-debuginfo-1.4.3-11.1 libssh2_org-debugsource-1.4.3-11.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): libssh2-1-32bit-1.4.3-11.1 libssh2-1-debuginfo-32bit-1.4.3-11.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libssh2-1-1.4.3-11.1 libssh2-1-32bit-1.4.3-11.1 libssh2-1-debuginfo-1.4.3-11.1 libssh2-1-debuginfo-32bit-1.4.3-11.1 libssh2_org-debugsource-1.4.3-11.1 References: https://www.suse.com/security/cve/CVE-2015-1782.html https://bugzilla.suse.com/921070 From sle-security-updates at lists.suse.com Tue Apr 7 10:05:16 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 Apr 2015 18:05:16 +0200 (CEST) Subject: SUSE-SU-2015:0670-1: moderate: Security update for pigz Message-ID: <20150407160516.7561132399@maintenance.suse.de> SUSE Security Update: Security update for pigz ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0670-1 Rating: moderate References: #913627 Cross-References: CVE-2015-1191 Affected Products: SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Pigz, a multi-threaded implementation of gzip, was updated to fix one vulnerability. The following vulnerability was fixed: * A crafted file could have caused an unwanted directory traversal on extract (CVE-2015-1191) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-156=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-156=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): pigz-2.3-5.1 pigz-debuginfo-2.3-5.1 pigz-debugsource-2.3-5.1 - SUSE Linux Enterprise Desktop 12 (x86_64): pigz-2.3-5.1 pigz-debuginfo-2.3-5.1 pigz-debugsource-2.3-5.1 References: https://www.suse.com/security/cve/CVE-2015-1191.html https://bugzilla.suse.com/913627 From sle-security-updates at lists.suse.com Tue Apr 7 15:04:49 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 Apr 2015 23:04:49 +0200 (CEST) Subject: SUSE-SU-2015:0674-1: important: Security update for xorg-x11-libs Message-ID: <20150407210449.819843239A@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libs ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0674-1 Rating: important References: #921978 Cross-References: CVE-2015-1802 CVE-2015-1803 CVE-2015-1804 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: LibXFont was updated to fix security problems that could be used by local attackers to gain X server privileges (root). The following security issues have been fixed: * CVE-2015-1802: The bdf parser reads a count for the number of properties defined in a font from the font file, and allocates arrays with entries for each property based on that count. It never checked to see if that count was negative, or large enough to overflow when multiplied by the size of the structures being allocated, and could thus allocate the wrong buffer size, leading to out of bounds writes. * CVE-2015-1803: If the bdf parser failed to parse the data for the bitmap for any character, it would proceed with an invalid pointer to the bitmap data and later crash when trying to read the bitmap from that pointer. * CVE-2015-1804: The bdf parser read metrics values as 32-bit integers, but stored them into 16-bit integers. Overflows could occur in various operations leading to out-of-bounds memory access. Security Issues: * CVE-2015-1802 * CVE-2015-1803 * CVE-2015-1804 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-xorg-x11-devel=10487 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-xorg-x11-devel=10487 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-xorg-x11-devel=10487 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-xorg-x11-devel=10487 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): xorg-x11-devel-7.4-8.26.44.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64): xorg-x11-devel-32bit-7.4-8.26.44.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): xorg-x11-libs-7.4-8.26.44.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): xorg-x11-libs-32bit-7.4-8.26.44.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): xorg-x11-libs-7.4-8.26.44.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): xorg-x11-libs-32bit-7.4-8.26.44.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): xorg-x11-libs-x86-7.4-8.26.44.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): xorg-x11-libs-7.4-8.26.44.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): xorg-x11-libs-32bit-7.4-8.26.44.1 References: https://www.suse.com/security/cve/CVE-2015-1802.html https://www.suse.com/security/cve/CVE-2015-1803.html https://www.suse.com/security/cve/CVE-2015-1804.html https://bugzilla.suse.com/921978 https://download.suse.com/patch/finder/?keywords=9bf31baa0e7f2f9f6297b4bbb4c5bb16 From sle-security-updates at lists.suse.com Tue Apr 7 19:04:54 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 Apr 2015 03:04:54 +0200 (CEST) Subject: SUSE-SU-2015:0675-1: moderate: Security update for GnuTLS Message-ID: <20150408010454.4D6C532398@maintenance.suse.de> SUSE Security Update: Security update for GnuTLS ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0675-1 Rating: moderate References: #919938 #921684 Cross-References: CVE-2014-8155 CVE-2015-0282 CVE-2015-0294 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: GnuTLS was updated to fix two security issues: * CVE-2015-0294: A certificate algorithm consistency checking issue was fixed, where GnuTLS did not check whether the two signature algorithms match on certificate import. This problem is not deemed to be exploitable currently. * CVE-2015-0282: GNUTLS-SA-2015-1: GnuTLS did not verify the RSA PKCS #1 signature algorithm to match the signature algorithm in the certificate, leading to a potential downgrade to a disallowed algorithm, such as MD5, without detecting it. Security Issues: * CVE-2015-0294 * CVE-2014-8155 * CVE-2015-0282 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-gnutls=10535 - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-gnutls=10536 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-gnutls=10536 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-gnutls=10536 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-gnutls=10536 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-gnutls=10536 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (x86_64): gnutls-2.4.1-24.39.55.1 libgnutls-extra26-2.4.1-24.39.55.1 libgnutls26-2.4.1-24.39.55.1 libgnutls26-32bit-2.4.1-24.39.55.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): libgnutls-devel-2.4.1-24.39.55.1 libgnutls-extra-devel-2.4.1-24.39.55.1 libgnutls-extra26-2.4.1-24.39.55.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): gnutls-2.4.1-24.39.55.1 libgnutls-extra26-2.4.1-24.39.55.1 libgnutls26-2.4.1-24.39.55.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): libgnutls26-32bit-2.4.1-24.39.55.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): gnutls-2.4.1-24.39.55.1 libgnutls-extra26-2.4.1-24.39.55.1 libgnutls26-2.4.1-24.39.55.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): libgnutls26-32bit-2.4.1-24.39.55.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): libgnutls26-x86-2.4.1-24.39.55.1 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): libgnutls-extra26-2.4.1-24.39.55.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): gnutls-2.4.1-24.39.55.1 libgnutls26-2.4.1-24.39.55.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): libgnutls26-32bit-2.4.1-24.39.55.1 References: https://www.suse.com/security/cve/CVE-2014-8155.html https://www.suse.com/security/cve/CVE-2015-0282.html https://www.suse.com/security/cve/CVE-2015-0294.html https://bugzilla.suse.com/919938 https://bugzilla.suse.com/921684 https://download.suse.com/patch/finder/?keywords=951b449be6ba7a46cf9a00cb94802aa7 https://download.suse.com/patch/finder/?keywords=96acf93b3a6ebecc75fae75257911b3f From sle-security-updates at lists.suse.com Tue Apr 7 19:05:20 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 Apr 2015 03:05:20 +0200 (CEST) Subject: SUSE-SU-2015:0676-1: moderate: Security update for libssh2_org Message-ID: <20150408010520.A9F063236F@maintenance.suse.de> SUSE Security Update: Security update for libssh2_org ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0676-1 Rating: moderate References: #921070 Cross-References: CVE-2015-1782 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The ssh client library libssh2_org was updated to fix a security issue: * CVE-2015-1782: A malicious server could send a crafted SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a crash of the application using libssh2_org. Security Issues: * CVE-2015-1782 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-libssh2-1=10426 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-libssh2-1=10426 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-libssh2-1=10426 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-libssh2-1=10426 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): libssh2-devel-1.2.9-4.2.4.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64): libssh2-1-32bit-1.2.9-4.2.4.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): libssh2-1-1.2.9-4.2.4.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (ia64): libssh2-1-x86-1.2.9-4.2.4.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): libssh2-1-1.2.9-4.2.4.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): libssh2-1-1.2.9-4.2.4.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): libssh2-1-1.2.9-4.2.4.1 References: https://www.suse.com/security/cve/CVE-2015-1782.html https://bugzilla.suse.com/921070 https://download.suse.com/patch/finder/?keywords=b10fe108d336366eae9bb892cf2b668b From sle-security-updates at lists.suse.com Wed Apr 8 07:04:55 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 Apr 2015 15:04:55 +0200 (CEST) Subject: SUSE-SU-2015:0679-1: moderate: Security update for tcpdump Message-ID: <20150408130455.187C03239D@maintenance.suse.de> SUSE Security Update: Security update for tcpdump ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0679-1 Rating: moderate References: #922220 #922221 #922222 #922223 #923142 Cross-References: CVE-2014-9140 CVE-2015-0261 CVE-2015-2153 CVE-2015-2154 CVE-2015-2155 Affected Products: SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: tcpdump was updated to fix five vulnerabilities in protocol printers When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network. The following vulnerabilities were fixed: * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220) * PPP printer remote DoS (CVE-2014-9140, bnc#923142) * force printer remote DoS (CVE-2015-2155, bnc#922223) * ethernet printer remote DoS (CVE-2015-2154, bnc#922222) * tcp printer remote DoS (CVE-2015-2153, bnc#922221) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-159=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-159=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): tcpdump-4.5.1-7.1 tcpdump-debuginfo-4.5.1-7.1 tcpdump-debugsource-4.5.1-7.1 - SUSE Linux Enterprise Desktop 12 (x86_64): tcpdump-4.5.1-7.1 tcpdump-debuginfo-4.5.1-7.1 tcpdump-debugsource-4.5.1-7.1 References: https://www.suse.com/security/cve/CVE-2014-9140.html https://www.suse.com/security/cve/CVE-2015-0261.html https://www.suse.com/security/cve/CVE-2015-2153.html https://www.suse.com/security/cve/CVE-2015-2154.html https://www.suse.com/security/cve/CVE-2015-2155.html https://bugzilla.suse.com/922220 https://bugzilla.suse.com/922221 https://bugzilla.suse.com/922222 https://bugzilla.suse.com/922223 https://bugzilla.suse.com/923142 From sle-security-updates at lists.suse.com Wed Apr 8 10:04:56 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 Apr 2015 18:04:56 +0200 (CEST) Subject: SUSE-SU-2015:0688-1: moderate: Security update for webkitgtk Message-ID: <20150408160456.401A03239D@maintenance.suse.de> SUSE Security Update: Security update for webkitgtk ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0688-1 Rating: moderate References: #866728 #871792 #879607 #883026 Cross-References: CVE-2014-1344 CVE-2014-1384 CVE-2014-1385 CVE-2014-1386 CVE-2014-1387 CVE-2014-1388 CVE-2014-1389 CVE-2014-1390 CVE-2015-2330 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This update fixes the following security issues: - Fix SSL connection issues with some websites after the POODLE vulnerability fix. - Fix a crash when loading flash plugins. - Fix build on GNU Hurd - Fix build on OS X. - Fix documentation of webkit_print_operation_get_page_setup(). - Security fixes: CVE-2014-1344, CVE-2014-1384, CVE-2014-1385, CVE-2014-1386, CVE-2014-1387, CVE-2014-1388, CVE-2014-1389, CVE-2014-1390, CVE-2015-2330. (bnc#879607, bnc#871792) - Pass autoreconf and enable libtool BuildRequires: Needed for above patch since it touches the buildsystem. - Bugs fixed: boo#871792, boo#879607 and boo#879607. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-160=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-160=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-160=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-160=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): libjavascriptcoregtk-1_0-0-2.4.8-16.2 libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 libjavascriptcoregtk-1_0-0-debuginfo-2.4.8-16.2 libjavascriptcoregtk-1_0-0-debuginfo-32bit-2.4.8-16.2 libwebkit2gtk-3_0-25-2.4.8-16.2 libwebkit2gtk-3_0-25-debuginfo-2.4.8-16.2 libwebkitgtk-1_0-0-2.4.8-16.2 libwebkitgtk-1_0-0-32bit-2.4.8-16.2 libwebkitgtk-1_0-0-debuginfo-2.4.8-16.2 libwebkitgtk-1_0-0-debuginfo-32bit-2.4.8-16.2 typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 typelib-1_0-WebKit-3_0-2.4.8-16.2 - SUSE Linux Enterprise Workstation Extension 12 (noarch): libwebkitgtk2-lang-2.4.8-16.2 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libjavascriptcoregtk-1_0-0-2.4.8-16.2 libjavascriptcoregtk-1_0-0-debuginfo-2.4.8-16.2 libwebkit2gtk-3_0-25-2.4.8-16.2 libwebkit2gtk-3_0-25-debuginfo-2.4.8-16.2 libwebkitgtk-1_0-0-2.4.8-16.2 libwebkitgtk-1_0-0-debuginfo-2.4.8-16.2 libwebkitgtk-devel-2.4.8-16.2 libwebkitgtk3-devel-2.4.8-16.2 typelib-1_0-JavaScriptCore-1_0-2.4.8-16.2 typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 typelib-1_0-WebKit-1_0-2.4.8-16.2 typelib-1_0-WebKit-3_0-2.4.8-16.2 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libjavascriptcoregtk-3_0-0-2.4.8-16.2 libjavascriptcoregtk-3_0-0-debuginfo-2.4.8-16.2 libwebkitgtk-3_0-0-2.4.8-16.2 libwebkitgtk-3_0-0-debuginfo-2.4.8-16.2 - SUSE Linux Enterprise Server 12 (noarch): libwebkitgtk3-lang-2.4.8-16.2 - SUSE Linux Enterprise Desktop 12 (x86_64): libjavascriptcoregtk-1_0-0-2.4.8-16.2 libjavascriptcoregtk-1_0-0-32bit-2.4.8-16.2 libjavascriptcoregtk-1_0-0-debuginfo-2.4.8-16.2 libjavascriptcoregtk-1_0-0-debuginfo-32bit-2.4.8-16.2 libjavascriptcoregtk-3_0-0-2.4.8-16.2 libjavascriptcoregtk-3_0-0-debuginfo-2.4.8-16.2 libwebkit2gtk-3_0-25-2.4.8-16.2 libwebkit2gtk-3_0-25-debuginfo-2.4.8-16.2 libwebkitgtk-1_0-0-2.4.8-16.2 libwebkitgtk-1_0-0-32bit-2.4.8-16.2 libwebkitgtk-1_0-0-debuginfo-2.4.8-16.2 libwebkitgtk-1_0-0-debuginfo-32bit-2.4.8-16.2 libwebkitgtk-3_0-0-2.4.8-16.2 libwebkitgtk-3_0-0-debuginfo-2.4.8-16.2 typelib-1_0-JavaScriptCore-3_0-2.4.8-16.2 typelib-1_0-WebKit-3_0-2.4.8-16.2 - SUSE Linux Enterprise Desktop 12 (noarch): libwebkitgtk2-lang-2.4.8-16.2 libwebkitgtk3-lang-2.4.8-16.2 References: https://www.suse.com/security/cve/CVE-2014-1344.html https://www.suse.com/security/cve/CVE-2014-1384.html https://www.suse.com/security/cve/CVE-2014-1385.html https://www.suse.com/security/cve/CVE-2014-1386.html https://www.suse.com/security/cve/CVE-2014-1387.html https://www.suse.com/security/cve/CVE-2014-1388.html https://www.suse.com/security/cve/CVE-2014-1389.html https://www.suse.com/security/cve/CVE-2014-1390.html https://www.suse.com/security/cve/CVE-2015-2330.html https://bugzilla.suse.com/866728 https://bugzilla.suse.com/871792 https://bugzilla.suse.com/879607 https://bugzilla.suse.com/883026 From sle-security-updates at lists.suse.com Wed Apr 8 17:04:54 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 9 Apr 2015 01:04:54 +0200 (CEST) Subject: SUSE-SU-2015:0689-1: moderate: Security update for apache2 Message-ID: <20150408230454.438303227C@maintenance.suse.de> SUSE Security Update: Security update for apache2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0689-1 Rating: moderate References: #713970 #871310 #899836 #904427 #907339 #907477 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: The Apache2 webserver was updated to fix various issues. The following feature was added: * Provide support for the tunneling of web socket connections to a backend websockets server. (FATE#316880) The following security issues have been fixed: * CVE-2013-5704: The mod_headers module in the Apache HTTP Server 2.2.22 allowed remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. The fix also adds a "MergeTrailers" directive to restore legacy behavior. * CVE-2014-3581: The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header. * CVE-2003-1418: Apache HTTP Server allowed remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID). We so far assumed that this not useful to attackers, the fix is basically just reducing potential information leaks. The following bugs have been fixed: * Treat the "server unavailable" condition as a transient error with all LDAP SDKs. (bsc#904427) * Fixed a segmentation fault at startup if the certs are shared across > 1 server_rec. (bsc#907339) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-apache2=10533 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-apache2=10533 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-apache2=10533 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): apache2-devel-2.2.12-1.51.52.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): apache2-2.2.12-1.51.52.1 apache2-doc-2.2.12-1.51.52.1 apache2-example-pages-2.2.12-1.51.52.1 apache2-prefork-2.2.12-1.51.52.1 apache2-utils-2.2.12-1.51.52.1 apache2-worker-2.2.12-1.51.52.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): apache2-2.2.12-1.51.52.1 apache2-doc-2.2.12-1.51.52.1 apache2-example-pages-2.2.12-1.51.52.1 apache2-prefork-2.2.12-1.51.52.1 apache2-utils-2.2.12-1.51.52.1 apache2-worker-2.2.12-1.51.52.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): apache2-2.2.12-1.51.52.1 apache2-doc-2.2.12-1.51.52.1 apache2-example-pages-2.2.12-1.51.52.1 apache2-prefork-2.2.12-1.51.52.1 apache2-utils-2.2.12-1.51.52.1 apache2-worker-2.2.12-1.51.52.1 References: https://bugzilla.suse.com/713970 https://bugzilla.suse.com/871310 https://bugzilla.suse.com/899836 https://bugzilla.suse.com/904427 https://bugzilla.suse.com/907339 https://bugzilla.suse.com/907477 https://download.suse.com/patch/finder/?keywords=aed66cdca5146f7cf6159ba1f3cd8dba From sle-security-updates at lists.suse.com Wed Apr 8 19:06:39 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 9 Apr 2015 03:06:39 +0200 (CEST) Subject: SUSE-SU-2015:0692-1: moderate: Security update for tcpdump Message-ID: <20150409010639.5F9D43227C@maintenance.suse.de> SUSE Security Update: Security update for tcpdump ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0692-1 Rating: moderate References: #922220 #922222 #923142 Cross-References: CVE-2014-9140 CVE-2015-0261 CVE-2015-2154 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network. The following vulnerabilities in protocol printers have been fixed: * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220) * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222) * PPP printer remote DoS (CVE-2014-9140, bnc#923142) Security Issues: * CVE-2015-0261 * CVE-2015-2154 * CVE-2014-9140 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-tcpdump=10509 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-tcpdump=10509 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-tcpdump=10509 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): tcpdump-3.9.8-1.27.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): tcpdump-3.9.8-1.27.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): tcpdump-3.9.8-1.27.1 References: https://www.suse.com/security/cve/CVE-2014-9140.html https://www.suse.com/security/cve/CVE-2015-0261.html https://www.suse.com/security/cve/CVE-2015-2154.html https://bugzilla.suse.com/922220 https://bugzilla.suse.com/922222 https://bugzilla.suse.com/923142 https://download.suse.com/patch/finder/?keywords=b1ed612a474548c41216438bc4792147 From sle-security-updates at lists.suse.com Thu Apr 9 13:04:49 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 9 Apr 2015 21:04:49 +0200 (CEST) Subject: SUSE-SU-2015:0694-1: moderate: Security update for python-Django Message-ID: <20150409190449.E904132280@maintenance.suse.de> SUSE Security Update: Security update for python-Django ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0694-1 Rating: moderate References: #923172 #923176 Cross-References: CVE-2015-2316 CVE-2015-2317 Affected Products: SUSE Cloud 5 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: python-Django has been updated to fix two vulnerabilities: * URLs starting with control characters could have allowed XSS (cross-site-scripting) attacks via user-supplied redirect URLs (CVE-2015-2317) * An infinite loop possibility could be triggered in the strip_tags() function, which allowed denial of service attacks (CVE-2015-2316) Security Issues: * CVE-2015-2316 * CVE-2015-2317 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 5: zypper in -t patch sleclo50sp3-python-Django=10539 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 5 (x86_64) [New Version: 1.6.11]: python-Django-1.6.11-0.7.1 References: https://www.suse.com/security/cve/CVE-2015-2316.html https://www.suse.com/security/cve/CVE-2015-2317.html https://bugzilla.suse.com/923172 https://bugzilla.suse.com/923176 https://download.suse.com/patch/finder/?keywords=8a88c0888cf48190b19e475391be53e5 From sle-security-updates at lists.suse.com Thu Apr 9 13:05:18 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 9 Apr 2015 21:05:18 +0200 (CEST) Subject: SUSE-SU-2015:0695-1: moderate: Security update for python-django Message-ID: <20150409190518.432A632280@maintenance.suse.de> SUSE Security Update: Security update for python-django ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0695-1 Rating: moderate References: #923176 Cross-References: CVE-2015-2316 CVE-2015-2317 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: python-django has been updated to fix one vulnerability: * URLs starting with control characters could have allowed XSS (cross-site-scripting) attacks via user-supplied redirect URLs. (CVE-2015-2317) Security Issues: * CVE-2015-2317 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-python-django=10538 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (x86_64) [New Version: 1.5.12]: python-django-1.5.12-0.9.1 References: https://www.suse.com/security/cve/CVE-2015-2316.html https://www.suse.com/security/cve/CVE-2015-2317.html https://bugzilla.suse.com/923176 https://download.suse.com/patch/finder/?keywords=6284b6b4b38647b5bbe8850ccf21fe75 From sle-security-updates at lists.suse.com Thu Apr 9 17:06:01 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 10 Apr 2015 01:06:01 +0200 (CEST) Subject: SUSE-SU-2015:0699-1: moderate: Security update for python-PyYAML Message-ID: <20150409230601.53DDE3227C@maintenance.suse.de> SUSE Security Update: Security update for python-PyYAML ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0699-1 Rating: moderate References: #921588 Cross-References: CVE-2014-9130 Affected Products: SUSE Cloud 5 SUSE Cloud 4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: python-PyYAML was updated to fix one security issue which could have allowed an attacker to cause a denial of service by supplying specially crafted strings. (CVE-2014-9130, bsc#921588) Security Issues: * CVE-2014-9130 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 5: zypper in -t patch sleclo50sp3-python-PyYAML=10455 - SUSE Cloud 4: zypper in -t patch sleclo40sp3-python-PyYAML=10526 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 5 (x86_64): python-PyYAML-3.10-0.13.1 - SUSE Cloud 4 (x86_64): python-PyYAML-3.10-0.15.1 References: https://www.suse.com/security/cve/CVE-2014-9130.html https://bugzilla.suse.com/921588 https://download.suse.com/patch/finder/?keywords=4b517af23d377debd8084e3d4d725ba4 https://download.suse.com/patch/finder/?keywords=7ede6bed165f288b384f45ae9449ecc0 From sle-security-updates at lists.suse.com Fri Apr 10 03:04:58 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 10 Apr 2015 11:04:58 +0200 (CEST) Subject: SUSE-SU-2015:0701-1: moderate: Security update for xen Message-ID: <20150410090458.331FF32280@maintenance.suse.de> SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0701-1 Rating: moderate References: #921842 #922705 #922706 #922709 #923758 Cross-References: CVE-2015-2751 CVE-2015-2752 CVE-2015-2756 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves three vulnerabilities and has two fixes is now available. Description: Xen was updated 4.4.2_01 to address three security issues and functional bugs. The following vulnerabilities were fixed: - Long latency MMIO mapping operations are not preemptible (XSA-125, CVE-2015-2752, bnc#922705) - Unmediated PCI command register access in qemu (XSA-126, CVE-2015-2756, bnc#922706) - Certain domctl operations may be abused to lock up the host (XSA-127, CVE-2015-2751, bnc#922709) The following non-security bugs were fixed: - xen dmesg contains bogus output in early boot (bnc#923758) - Xentop doesn't display disk statistics for VMs using qdisks (bnc#921842) The following functionality was enabled: - Enable spice support in qemu for x86_64 - Add Qxl vga support Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-162=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-162=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-162=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (x86_64): xen-debugsource-4.4.2_02-15.1 xen-devel-4.4.2_02-15.1 - SUSE Linux Enterprise Server 12 (x86_64): xen-4.4.2_02-15.1 xen-debugsource-4.4.2_02-15.1 xen-doc-html-4.4.2_02-15.1 xen-kmp-default-4.4.2_02_k3.12.38_44-15.1 xen-kmp-default-debuginfo-4.4.2_02_k3.12.38_44-15.1 xen-libs-32bit-4.4.2_02-15.1 xen-libs-4.4.2_02-15.1 xen-libs-debuginfo-32bit-4.4.2_02-15.1 xen-libs-debuginfo-4.4.2_02-15.1 xen-tools-4.4.2_02-15.1 xen-tools-debuginfo-4.4.2_02-15.1 xen-tools-domU-4.4.2_02-15.1 xen-tools-domU-debuginfo-4.4.2_02-15.1 - SUSE Linux Enterprise Desktop 12 (x86_64): xen-4.4.2_02-15.1 xen-debugsource-4.4.2_02-15.1 xen-kmp-default-4.4.2_02_k3.12.38_44-15.1 xen-kmp-default-debuginfo-4.4.2_02_k3.12.38_44-15.1 xen-libs-32bit-4.4.2_02-15.1 xen-libs-4.4.2_02-15.1 xen-libs-debuginfo-32bit-4.4.2_02-15.1 xen-libs-debuginfo-4.4.2_02-15.1 References: https://www.suse.com/security/cve/CVE-2015-2751.html https://www.suse.com/security/cve/CVE-2015-2752.html https://www.suse.com/security/cve/CVE-2015-2756.html https://bugzilla.suse.com/921842 https://bugzilla.suse.com/922705 https://bugzilla.suse.com/922706 https://bugzilla.suse.com/922709 https://bugzilla.suse.com/923758 From sle-security-updates at lists.suse.com Fri Apr 10 03:06:02 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 10 Apr 2015 11:06:02 +0200 (CEST) Subject: SUSE-SU-2015:0702-1: important: Security update for libXfont Message-ID: <20150410090602.E4FC432280@maintenance.suse.de> SUSE Security Update: Security update for libXfont ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0702-1 Rating: important References: #921978 Cross-References: CVE-2015-1802 CVE-2015-1803 CVE-2015-1804 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: LibXFont was updated to fix security problems. Following security issues were fixed: - CVE-2015-1802: The bdf parser reads a count for the number of properties defined in a font from the font file, and allocates arrays with entries for each property based on that count. It never checked to see if that count was negative, or large enough to overflow when multiplied by the size of the structures being allocated, and could thus allocate the wrong buffer size, leading to out of bounds writes. - CVE-2015-1803: If the bdf parser failed to parse the data for the bitmap for any character, it would proceed with an invalid pointer to the bitmap data and later crash when trying to read the bitmap from that pointer. - CVE-2015-1804: The bdf parser read metrics values as 32-bit integers, but stored them into 16-bit integers. Overflows could occur in various operations leading to out-of-bounds memory access. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-161=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-161=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-161=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libXfont-debugsource-1.4.7-4.1 libXfont-devel-1.4.7-4.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libXfont-debugsource-1.4.7-4.1 libXfont1-1.4.7-4.1 libXfont1-debuginfo-1.4.7-4.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libXfont-debugsource-1.4.7-4.1 libXfont1-1.4.7-4.1 libXfont1-debuginfo-1.4.7-4.1 References: https://www.suse.com/security/cve/CVE-2015-1802.html https://www.suse.com/security/cve/CVE-2015-1803.html https://www.suse.com/security/cve/CVE-2015-1804.html https://bugzilla.suse.com/921978 From sle-security-updates at lists.suse.com Fri Apr 10 09:04:54 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 10 Apr 2015 17:04:54 +0200 (CEST) Subject: SUSE-SU-2015:0704-1: important: Security update for MozillaFirefox Message-ID: <20150410150454.4640F32280@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0704-1 Rating: important References: #925368 Cross-References: CVE-2015-0801 CVE-2015-0807 CVE-2015-0813 CVE-2015-0814 CVE-2015-0815 CVE-2015-0816 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 ______________________________________________________________________________ An update that fixes 6 vulnerabilities is now available. Description: Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues. The following vulnerabilities were fixed: * Miscellaneous memory safety hazards (MFSA 2015-30/CVE-2015-0814/CVE-2015-0815) * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31/CVE-2015-0813) * resource:// documents can load privileged pages (MFSA 2015-33/CVE-2015-0816) * CORS requests should not follow 30x redirections after preflight (MFSA 2015-37/CVE-2015-0807) * Same-origin bypass through anchor navigation (MFSA 2015-40/CVE-2015-0801) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-165=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-165=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): MozillaFirefox-debuginfo-31.6.0esr-30.1 MozillaFirefox-debugsource-31.6.0esr-30.1 MozillaFirefox-devel-31.6.0esr-30.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): MozillaFirefox-31.6.0esr-30.1 MozillaFirefox-debuginfo-31.6.0esr-30.1 MozillaFirefox-debugsource-31.6.0esr-30.1 MozillaFirefox-translations-31.6.0esr-30.1 References: https://www.suse.com/security/cve/CVE-2015-0801.html https://www.suse.com/security/cve/CVE-2015-0807.html https://www.suse.com/security/cve/CVE-2015-0813.html https://www.suse.com/security/cve/CVE-2015-0814.html https://www.suse.com/security/cve/CVE-2015-0815.html https://www.suse.com/security/cve/CVE-2015-0816.html https://bugzilla.suse.com/925368 From sle-security-updates at lists.suse.com Fri Apr 10 10:04:45 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 10 Apr 2015 18:04:45 +0200 (CEST) Subject: SUSE-SU-2015:0704-2: important: Security update for MozillaFirefox Message-ID: <20150410160445.C293132280@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0704-2 Rating: important References: #925368 Cross-References: CVE-2015-0801 CVE-2015-0807 CVE-2015-0813 CVE-2015-0814 CVE-2015-0815 CVE-2015-0816 Affected Products: SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 6 vulnerabilities is now available. Description: Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues. The following vulnerabilities were fixed: * Miscellaneous memory safety hazards (MFSA 2015-30/CVE-2015-0814/CVE-2015-0815) * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31/CVE-2015-0813) * resource:// documents can load privileged pages (MFSA 2015-33/CVE-2015-0816) * CORS requests should not follow 30x redirections after preflight (MFSA 2015-37/CVE-2015-0807) * Same-origin bypass through anchor navigation (MFSA 2015-40/CVE-2015-0801) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-165=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 12 (x86_64): MozillaFirefox-31.6.0esr-30.1 MozillaFirefox-debuginfo-31.6.0esr-30.1 MozillaFirefox-debugsource-31.6.0esr-30.1 MozillaFirefox-translations-31.6.0esr-30.1 References: https://www.suse.com/security/cve/CVE-2015-0801.html https://www.suse.com/security/cve/CVE-2015-0807.html https://www.suse.com/security/cve/CVE-2015-0813.html https://www.suse.com/security/cve/CVE-2015-0814.html https://www.suse.com/security/cve/CVE-2015-0815.html https://www.suse.com/security/cve/CVE-2015-0816.html https://bugzilla.suse.com/925368 From sle-security-updates at lists.suse.com Fri Apr 10 22:04:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 11 Apr 2015 06:04:48 +0200 (CEST) Subject: SUSE-SU-2015:0706-1: moderate: Security update for Mozilla Firefox Message-ID: <20150411040448.9FBF632282@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0706-1 Rating: moderate References: #925368 Cross-References: CVE-2015-0801 CVE-2015-0807 CVE-2015-0813 CVE-2015-0814 CVE-2015-0816 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. It includes one version update. Description: Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues. The following vulnerabilities have been fixed: * Miscellaneous memory safety hazards (MFSA 2015-30/CVE-2015-0814/CVE-2015-0815) * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31/CVE-2015-0813) * resource:// documents can load privileged pages (MFSA 2015-33/CVE-2015-0816) * CORS requests should not follow 30x redirections after preflight (MFSA 2015-37/CVE-2015-0807) * Same-origin bypass through anchor navigation (MFSA 2015-40/CVE-2015-0801) Security Issues: * CVE-2015-0801 * CVE-2015-0807 * CVE-2015-0813 * CVE-2015-0814 * CVE-2015-0816 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-MozillaFirefox-20150402=10571 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-MozillaFirefox-20150402=10571 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-MozillaFirefox-20150402=10571 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-MozillaFirefox-20150402=10571 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-devel-31.6.0esr-0.8.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 31.6.0esr]: MozillaFirefox-31.6.0esr-0.8.1 MozillaFirefox-translations-31.6.0esr-0.8.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 31.6.0esr]: MozillaFirefox-31.6.0esr-0.8.1 MozillaFirefox-translations-31.6.0esr-0.8.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 31.6.0esr]: MozillaFirefox-31.6.0esr-0.8.1 MozillaFirefox-translations-31.6.0esr-0.8.1 References: https://www.suse.com/security/cve/CVE-2015-0801.html https://www.suse.com/security/cve/CVE-2015-0807.html https://www.suse.com/security/cve/CVE-2015-0813.html https://www.suse.com/security/cve/CVE-2015-0814.html https://www.suse.com/security/cve/CVE-2015-0816.html https://bugzilla.suse.com/925368 https://download.suse.com/patch/finder/?keywords=fb627bb0476b53b140119c2fe513afca From sle-security-updates at lists.suse.com Fri Apr 10 22:05:59 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 11 Apr 2015 06:05:59 +0200 (CEST) Subject: SUSE-SU-2015:0709-1: moderate: Security update for subversion Message-ID: <20150411040559.446BE32282@maintenance.suse.de> SUSE Security Update: Security update for subversion ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0709-1 Rating: moderate References: #923794 #923795 Cross-References: CVE-2015-0248 CVE-2015-0251 Affected Products: SUSE Studio Onsite 1.3 SUSE Linux Enterprise Software Development Kit 11 SP3 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: Apache Subversion has been updated to fix two vulnerabilities: * Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. (bsc#923794, CVE-2015-0248) * Subversion HTTP servers could allow spoofing svn:author property values for new revisions. (bsc#923795, CVE-2015-0251) Security Issues: * CVE-2015-0248 * CVE-2015-0251 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-subversion=10574 - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-subversion=10575 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): subversion-1.6.17-1.33.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): subversion-1.6.17-1.33.1 subversion-devel-1.6.17-1.33.1 subversion-perl-1.6.17-1.33.1 subversion-python-1.6.17-1.33.1 subversion-server-1.6.17-1.33.1 subversion-tools-1.6.17-1.33.1 References: https://www.suse.com/security/cve/CVE-2015-0248.html https://www.suse.com/security/cve/CVE-2015-0251.html https://bugzilla.suse.com/923794 https://bugzilla.suse.com/923795 https://download.suse.com/patch/finder/?keywords=4f3646882ff69da7bd1872c6abd7faa0 https://download.suse.com/patch/finder/?keywords=aae3332e381a32d0bf691a6fb465ae8a From sle-security-updates at lists.suse.com Mon Apr 13 12:04:52 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 13 Apr 2015 20:04:52 +0200 (CEST) Subject: SUSE-SU-2015:0716-1: moderate: Security update for pigz Message-ID: <20150413180452.49CD032107@maintenance.suse.de> SUSE Security Update: Security update for pigz ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0716-1 Rating: moderate References: #913627 Cross-References: CVE-2015-1191 Affected Products: SUSE Studio Onsite 1.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: The file compression program pigz was updated to fix a directory traversal while decompressing a file with restoring file name, which could be used by attackers to overwrite files owned by the decompressing user. (CVE-2015-1191) Security Issues: * CVE-2015-1191 Contraindications: Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-pigz=10525 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64) [New Version: 2.1.6]: pigz-2.1.6-0.12.1 References: https://www.suse.com/security/cve/CVE-2015-1191.html https://bugzilla.suse.com/913627 https://download.suse.com/patch/finder/?keywords=b52ed7a2abb92f0f98883224915079a0 From sle-security-updates at lists.suse.com Wed Apr 15 05:05:11 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 15 Apr 2015 13:05:11 +0200 (CEST) Subject: SUSE-SU-2015:0722-1: important: Security update for Adobe Flash Player Message-ID: <20150415110511.CCC1232107@maintenance.suse.de> SUSE Security Update: Security update for Adobe Flash Player ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0722-1 Rating: important References: #927089 Cross-References: CVE-2015-0346 CVE-2015-0347 CVE-2015-0348 CVE-2015-0349 CVE-2015-0350 CVE-2015-0351 CVE-2015-0352 CVE-2015-0353 CVE-2015-0354 CVE-2015-0355 CVE-2015-0356 CVE-2015-0357 CVE-2015-0358 CVE-2015-0359 CVE-2015-0360 CVE-2015-3038 CVE-2015-3039 CVE-2015-3040 CVE-2015-3041 CVE-2015-3042 CVE-2015-3043 CVE-2015-3044 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 22 vulnerabilities is now available. Description: Adobe Flash Player was updated to 11.2.202.457 to fix several security issues that could lead to remote code execution. An exploit for CVE-2015-3043 was reported to exist in the wild. The following vulnerabilities were fixed: * Memory corruption vulnerabilities that could lead to code execution (CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043). * Type confusion vulnerability that could lead to code execution (CVE-2015-0356). * Buffer overflow vulnerability that could lead to code execution (CVE-2015-0348). * Use-after-free vulnerabilities that could lead to code execution (CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039). * Double-free vulnerabilities that could lead to code execution (CVE-2015-0346, CVE-2015-0359). * Memory leak vulnerabilities that could be used to bypass ASLR (CVE-2015-0357, CVE-2015-3040). * Security bypass vulnerability that could lead to information disclosure (CVE-2015-3044). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-167=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-167=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (i586 x86_64): flash-player-11.2.202.457-80.1 flash-player-gnome-11.2.202.457-80.1 - SUSE Linux Enterprise Desktop 12 (i586 x86_64): flash-player-11.2.202.457-80.1 flash-player-gnome-11.2.202.457-80.1 References: https://www.suse.com/security/cve/CVE-2015-0346.html https://www.suse.com/security/cve/CVE-2015-0347.html https://www.suse.com/security/cve/CVE-2015-0348.html https://www.suse.com/security/cve/CVE-2015-0349.html https://www.suse.com/security/cve/CVE-2015-0350.html https://www.suse.com/security/cve/CVE-2015-0351.html https://www.suse.com/security/cve/CVE-2015-0352.html https://www.suse.com/security/cve/CVE-2015-0353.html https://www.suse.com/security/cve/CVE-2015-0354.html https://www.suse.com/security/cve/CVE-2015-0355.html https://www.suse.com/security/cve/CVE-2015-0356.html https://www.suse.com/security/cve/CVE-2015-0357.html https://www.suse.com/security/cve/CVE-2015-0358.html https://www.suse.com/security/cve/CVE-2015-0359.html https://www.suse.com/security/cve/CVE-2015-0360.html https://www.suse.com/security/cve/CVE-2015-3038.html https://www.suse.com/security/cve/CVE-2015-3039.html https://www.suse.com/security/cve/CVE-2015-3040.html https://www.suse.com/security/cve/CVE-2015-3041.html https://www.suse.com/security/cve/CVE-2015-3042.html https://www.suse.com/security/cve/CVE-2015-3043.html https://www.suse.com/security/cve/CVE-2015-3044.html https://bugzilla.suse.com/927089 From sle-security-updates at lists.suse.com Wed Apr 15 16:04:47 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 16 Apr 2015 00:04:47 +0200 (CEST) Subject: SUSE-SU-2015:0723-1: important: Security update for flash-player Message-ID: <20150415220447.783BE3213E@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0723-1 Rating: important References: #927089 Cross-References: CVE-2015-0346 CVE-2015-0347 CVE-2015-0348 CVE-2015-0349 CVE-2015-0350 CVE-2015-0351 CVE-2015-0352 CVE-2015-0353 CVE-2015-0354 CVE-2015-0355 CVE-2015-0356 CVE-2015-0357 CVE-2015-0358 CVE-2015-0359 CVE-2015-0360 CVE-2015-3038 CVE-2015-3039 CVE-2015-3040 CVE-2015-3041 CVE-2015-3042 CVE-2015-3043 CVE-2015-3044 Affected Products: SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes 22 vulnerabilities is now available. It includes one version update. Description: Adobe Flash Player was updated to version 11.2.202.457 to fix several security issues that could have lead to remote code execution. An exploit for CVE-2015-3043 was reported to exist in the wild. The following vulnerabilities have been fixed: * Memory corruption vulnerabilities that could have lead to code execution (CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043). * Type confusion vulnerability that could have lead to code execution (CVE-2015-0356). * Buffer overflow vulnerability that could have lead to code execution (CVE-2015-0348). * Use-after-free vulnerabilities that could have lead to code execution (CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039). * Double-free vulnerabilities that could have lead to code execution (CVE-2015-0346, CVE-2015-0359). * Memory leak vulnerabilities that could have been used to bypass ASLR (CVE-2015-0357, CVE-2015-3040). * Security bypass vulnerability that could have lead to information disclosure (CVE-2015-3044). Security Issues: * CVE-2015-0346 * CVE-2015-0347 * CVE-2015-0348 * CVE-2015-0349 * CVE-2015-0350 * CVE-2015-0351 * CVE-2015-0352 * CVE-2015-0353 * CVE-2015-0354 * CVE-2015-0355 * CVE-2015-0356 * CVE-2015-0357 * CVE-2015-0358 * CVE-2015-0359 * CVE-2015-0360 * CVE-2015-3038 * CVE-2015-3039 * CVE-2015-3040 * CVE-2015-3041 * CVE-2015-3042 * CVE-2015-3043 * CVE-2015-3044 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-flash-player=10615 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 11.2.202.457]: flash-player-11.2.202.457-0.3.1 flash-player-gnome-11.2.202.457-0.3.1 flash-player-kde4-11.2.202.457-0.3.1 References: https://www.suse.com/security/cve/CVE-2015-0346.html https://www.suse.com/security/cve/CVE-2015-0347.html https://www.suse.com/security/cve/CVE-2015-0348.html https://www.suse.com/security/cve/CVE-2015-0349.html https://www.suse.com/security/cve/CVE-2015-0350.html https://www.suse.com/security/cve/CVE-2015-0351.html https://www.suse.com/security/cve/CVE-2015-0352.html https://www.suse.com/security/cve/CVE-2015-0353.html https://www.suse.com/security/cve/CVE-2015-0354.html https://www.suse.com/security/cve/CVE-2015-0355.html https://www.suse.com/security/cve/CVE-2015-0356.html https://www.suse.com/security/cve/CVE-2015-0357.html https://www.suse.com/security/cve/CVE-2015-0358.html https://www.suse.com/security/cve/CVE-2015-0359.html https://www.suse.com/security/cve/CVE-2015-0360.html https://www.suse.com/security/cve/CVE-2015-3038.html https://www.suse.com/security/cve/CVE-2015-3039.html https://www.suse.com/security/cve/CVE-2015-3040.html https://www.suse.com/security/cve/CVE-2015-3041.html https://www.suse.com/security/cve/CVE-2015-3042.html https://www.suse.com/security/cve/CVE-2015-3043.html https://www.suse.com/security/cve/CVE-2015-3044.html https://bugzilla.suse.com/927089 https://download.suse.com/patch/finder/?keywords=93ace65cf2a9138aed0ed06c86bdb248 From sle-security-updates at lists.suse.com Mon Apr 20 09:05:24 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 20 Apr 2015 17:05:24 +0200 (CEST) Subject: SUSE-SU-2015:0735-1: moderate: Security update for gnutls Message-ID: <20150420150524.0804628012@maintenance.suse.de> SUSE Security Update: Security update for gnutls ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0735-1 Rating: moderate References: #919938 Cross-References: CVE-2015-0294 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: gnutls was updated to fix a certificate algorithm consistency checking issue. (CVE-2015-0294) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-168=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-168=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-168=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): gnutls-debuginfo-3.2.15-7.2 gnutls-debugsource-3.2.15-7.2 libgnutls-devel-3.2.15-7.2 libgnutls-openssl-devel-3.2.15-7.2 libgnutlsxx-devel-3.2.15-7.2 libgnutlsxx28-3.2.15-7.2 libgnutlsxx28-debuginfo-3.2.15-7.2 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): gnutls-3.2.15-7.2 gnutls-debuginfo-3.2.15-7.2 gnutls-debugsource-3.2.15-7.2 libgnutls-openssl27-3.2.15-7.2 libgnutls-openssl27-debuginfo-3.2.15-7.2 libgnutls28-3.2.15-7.2 libgnutls28-debuginfo-3.2.15-7.2 - SUSE Linux Enterprise Server 12 (s390x x86_64): libgnutls28-32bit-3.2.15-7.2 libgnutls28-debuginfo-32bit-3.2.15-7.2 - SUSE Linux Enterprise Desktop 12 (x86_64): gnutls-3.2.15-7.2 gnutls-debuginfo-3.2.15-7.2 gnutls-debugsource-3.2.15-7.2 libgnutls28-3.2.15-7.2 libgnutls28-32bit-3.2.15-7.2 libgnutls28-debuginfo-3.2.15-7.2 libgnutls28-debuginfo-32bit-3.2.15-7.2 References: https://www.suse.com/security/cve/CVE-2015-0294.html https://bugzilla.suse.com/919938 From sle-security-updates at lists.suse.com Mon Apr 20 13:04:58 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 20 Apr 2015 21:04:58 +0200 (CEST) Subject: SUSE-SU-2015:0736-1: important: Security update for Real Time Linux Kernel Message-ID: <20150420190458.5E6B727F8B@maintenance.suse.de> SUSE Security Update: Security update for Real Time Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0736-1 Rating: important References: #771619 #816099 #829110 #833588 #833820 #846656 #853040 #856760 #864401 #864404 #864409 #864411 #865419 #875051 #876086 #876594 #877593 #882470 #883948 #884817 #887597 #891277 #894213 #895841 #896484 #900279 #900644 #902232 #902349 #902351 #902675 #903096 #903640 #904053 #904242 #904659 #904671 #905304 #905312 #905799 #906586 #907196 #907338 #907551 #907611 #907818 #908069 #908163 #908393 #908550 #908551 #908572 #908825 #909077 #909078 #909088 #909092 #909093 #909095 #909264 #909565 #909740 #909846 #910013 #910150 #910159 #910251 #910321 #910322 #910517 #911181 #911325 #911326 #912171 #912705 #913059 #914355 #914423 #914726 #915209 #915322 #915335 #915791 #915826 #916515 #916982 #917839 #917884 #920250 #924282 Cross-References: CVE-2013-7263 CVE-2014-0181 CVE-2014-3687 CVE-2014-3688 CVE-2014-3690 CVE-2014-4608 CVE-2014-7822 CVE-2014-7842 CVE-2014-7970 CVE-2014-8133 CVE-2014-8134 CVE-2014-8160 CVE-2014-8369 CVE-2014-8559 CVE-2014-9090 CVE-2014-9322 CVE-2014-9419 CVE-2014-9420 CVE-2014-9584 CVE-2014-9585 CVE-2015-1593 Affected Products: SUSE Linux Enterprise Real Time Extension 11 SP3 ______________________________________________________________________________ An update that solves 21 vulnerabilities and has 69 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes. The following security bugs have been fixed: * CVE-2015-1593: An integer overflow in the stack randomization on 64-bit systems lead to less effective stack ASLR on those systems. (bsc#917839) * CVE-2014-8160: iptables rules could be bypassed if the specific network protocol module was not loaded, allowing e.g. SCTP to bypass the firewall if the sctp protocol was not enabled. (bsc#913059) * CVE-2014-7822: A flaw was found in the way the Linux kernels splice() system call validated its parameters. On certain file systems, a local, unprivileged user could have used this flaw to write past the maximum file size, and thus crash the system. (bnc#915322) * CVE-2014-9419: The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel did not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which made it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address (bnc#911326). * CVE-2014-9584: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel did not validate a length value in the Extensions Reference (ER) System Use Field, which allowed local users to obtain sensitive information from kernel memory via a crafted iso9660 image (bnc#912654). * CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel did not properly choose memory locations for the vDSO area, which made it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD (bnc#912705). * CVE-2014-8559: The d_walk function in fs/dcache.c in the Linux kernel did not properly maintain the semantics of rename_lock, which allowed local users to cause a denial of service (deadlock and system hang) via a crafted application (bnc#903640). * CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the Linux kernel did not restrict the number of Rock Ridge continuation entries, which allowed local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image (bsc#911325). * CVE-2014-8134: The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel used an improper paravirt_enabled setting for KVM guest kernels, which made it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value (bnc#907818 909077 909078). * CVE-2014-8369: The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel miscalculated the number of pages during the handling of a mapping failure, which allowed guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges. NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601 (bsc#902675). * CVE-2014-3690: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel on Intel processors did not ensure that the value in the CR4 control register remains the same after a VM entry, which allowed host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU (bnc#902232). * CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux kernel allowed guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313 (bnc#905312). * CVE-2014-0181: The Netlink implementation in the Linux kernel did not provide a mechanism for authorizing socket operations based on the opener of a socket, which allowed local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program (bnc#875051). * CVE-2014-3688: The SCTP implementation in the Linux kernel allowed remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an associations output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351). * CVE-2014-7970: The pivot_root implementation in fs/namespace.c in the Linux kernel did not properly interact with certain locations of a chroot directory, which allowed local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call (bnc#900644). * CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel allowed remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter (bnc#902349 904899). The following non-security bugs have been fixed: * ACPI idle: permit sparse C-state sub-state numbers (bnc#908550,FATE#317933). * ALSA : hda - not use assigned converters for all unused pins (FATE#317933). * ALSA: hda - Add Device IDs for Intel Wildcat Point-LP PCH (FATE#317347). * ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets (FATE#317347). * ALSA: hda - add PCI IDs for Intel BayTrail (FATE#317347). * ALSA: hda - add PCI IDs for Intel Braswell (FATE#317347). * ALSA: hda - add codec ID for Braswell display audio codec (FATE#317933). * ALSA: hda - add codec ID for Broadwell display audio codec (FATE#317933). * ALSA: hda - add codec ID for Valleyview2 display codec (FATE#317933). * ALSA: hda - define is_haswell() to check if a display audio codec is Haswell (FATE#317933). * ALSA: hda - hdmi: Re-setup pin and infoframe on plug-in on all codecs (FATE#317933). * ALSA: hda - not choose assigned converters for unused pins of Valleyview (FATE#317933). * ALSA: hda - rename function not_share_unassigned_cvt() (FATE#317933). * ALSA: hda - unmute pin amplifier in infoframe setup for Haswell (FATE#317933). * ALSA: hda - verify pin:converter connection on unsol event for HSW and VLV (FATE#317933). * ALSA: hda - verify pin:cvt connection on preparing a stream for Intel HDMI codec (FATE#317933). * ALSA: hda/hdmi - apply Valleyview fix-ups to Cherryview display codec (FATE#317933). * ALSA: hda/hdmi - apply all Haswell fix-ups to Broadwell display codec (FATE#317933). * ALSA: hda_intel: Add Device IDs for Intel Sunrise Point PCH (FATE#317347). * ALSA: hda_intel: Add DeviceIDs for Sunrise Point-LP (FATE#317347). * Add support for AdvancedSilicon HID multitouch screen (2149:36b1) (FATE#317933). * Disable switching to bootsplash at oops/panic (bnc#877593). * Do not trigger congestion wait on dirty-but-not-writeout pages (VM Performance, bnc#909093, bnc#910517). * Fix HDIO_DRIVE_* ioctl() regression (bnc#833588, bnc#905799) * Fix Module.supported handling for external modules (bnc#905304). * Fix zero freq if frequency is requested too quickly in a row (bnc#908572). * Fix zero freq if frequency is requested too quickly in a row (bnc#908572). * Fixup kABI after patches.fixes/writeback-do-not-sync-data-dirtied-after-sync-start.patch (bn c#833820). * Force native backlight for HP POS machines (bnc#908551,FATE#317933). * HID: use multi input quirk for 22b9:2968 (FATE#317933). * IPoIB: Use a private hash table for path lookup in xmit path (bsc#907196). * Import kabi files from kernel 3.0.101-0.40 * KEYS: Fix stale key registration at error path (bnc#908163). * NFS: Add sequence_priviliged_ops for nfs4_proc_sequence() (bnc#864401). * NFS: do not use STABLE writes during writeback (bnc#816099). * NFSv4.1 handle DS stateid errors (bnc#864401). * NFSv4.1: Do not decode skipped layoutgets (bnc#864411). * NFSv4.1: Fix a race in the pNFS return-on-close code (bnc#864409). * NFSv4.1: Fix an ABBA locking issue with session and state serialisation (bnc#864409). * NFSv4.1: We must release the sequence id when we fail to get a session slot (bnc#864401). * NFSv4: Do not accept delegated opens when a delegation recall is in effect (bnc#864409). * NFSv4: Ensure correct locking when accessing the "^a" list (bnc#864401). * NFSv4: Fix another reboot recovery race (bnc#916982). * Preserve kabi checksum of path_is_under(). * Refresh patches.drivers/HID-multitouch-add-support-for-Atmel-212c. Fix the non-working touchsreen (bnc#909740) * Revert "drm/i915: Calculate correct stolen size for GEN7+" (bnc#908550,FATE#317933). * SUNRPC: Do not allow low priority tasks to pre-empt higher priority ones (bnc#864401). * SUNRPC: When changing the queue priority, ensure that we change the owner (bnc#864401). * Setting rbd and libceph as supported drivers (bsc#917884) * The bug number in patches.fixes/timekeeping-avoid-possible-deadlock-from-clock_was_set.patch changed from bsc#771619 to bsc#915335. * audit: efficiency fix 1: only wake up if queue shorter than backlog limit (bnc#908393). * audit: efficiency fix 2: request exclusive wait since all need same resource (bnc#908393). * audit: fix endless wait in audit_log_start() (bnc#908393). * audit: make use of remaining sleep time from wait_for_auditd (bnc#908393). * audit: refactor hold queue flush (bnc#908393). * audit: reset audit backlog wait time after error recovery (bnc#908393). * audit: wait_for_auditd() should use TASK_UNINTERRUPTIBLE (bnc#908393). * block: rbd: use NULL instead of 0 (FATE#318328 bsc#917884). * block: replace strict_strtoul() with kstrtoul() (FATE#318328 bsc#917884). * bonding: propagate LRO disabling down to slaves (bnc#829110 bnc#891277 bnc#904053). * cciss: fix broken mutex usage in ioctl (bnc#910013). * ceph: Add necessary clean up if invalid reply received in handle_reply() (FATE#318328 bsc#917884). * ceph: remove bogus extern (FATE#318328 bsc#917884). * config: Disable CONFIG_RCU_FAST_NO_HZ (bnc#884817) This option has been verified to be racy vs hotplug, and is irrelevant to SLE in any case. * coredump: ensure the fpu state is flushed for proper multi-threaded core dump (bnc#904671). * crush: CHOOSE_LEAF -> CHOOSELEAF throughout (FATE#318328 bsc#917884). * crush: add SET_CHOOSE_TRIES rule step (FATE#318328 bsc#917884). * crush: add note about r in recursive choose (FATE#318328 bsc#917884). * crush: add set_choose_local_[fallback_]tries steps (FATE#318328 bsc#917884). * crush: apply chooseleaf_tries to firstn mode too (FATE#318328 bsc#917884). * crush: attempts -> tries (FATE#318328 bsc#917884). * crush: clarify numrep vs endpos (FATE#318328 bsc#917884). * crush: eliminate CRUSH_MAX_SET result size limitation (FATE#318328 bsc#917884). * crush: factor out (trivial) crush_destroy_rule() (FATE#318328 bsc#917884). * crush: fix crush_choose_firstn comment (FATE#318328 bsc#917884). * crush: fix some comments (FATE#318328 bsc#917884). * crush: generalize descend_once (FATE#318328 bsc#917884). * crush: new SET_CHOOSE_LEAF_TRIES command (FATE#318328 bsc#917884). * crush: pass parent r value for indep call (FATE#318328 bsc#917884). * crush: pass weight vector size to map function (FATE#318328 bsc#917884). * crush: reduce scope of some local variables (FATE#318328 bsc#917884). * crush: return CRUSH_ITEM_UNDEF for failed placements with indep (FATE#318328 bsc#917884). * crush: strip firstn conditionals out of crush_choose, rename (FATE#318328 bsc#917884). * crush: use breadth-first search for indep mode (FATE#318328 bsc#917884). * crypto: add missing crypto module aliases (bsc#914423). * crypto: include crypto- module prefix in template (bsc#914423). * crypto: kernel oops at insmod of the z90crypt device driver (bnc#909088, LTC#119591). * crypto: prefix module autoloading with "crypto-" (bsc#914423). * dm raid: add region_size parameter (bnc#895841). * do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484). * drm/cirrus: Fix cirrus drm driver for fbdev + qemu (bsc#909846,bnc#856760). * drm/i915: split PCI IDs out into i915_drm.h v4 (bnc#908550,FATE#317933). * fix dcache exit scaling (bnc#876594). * infiniband: ipoib: Sanitize neighbour handling in ipoib_main.c (bsc#907196). * iommu/vt-d: Fix an off-by-one bug in __domain_mapping() (bsc#908825). * ipoib: Convert over to dev_lookup_neigh_skb() (bsc#907196). * ipoib: Need to do dst_neigh_lookup_skb() outside of priv->lock (bsc#907196). * ipv6: fix net reference leak in IPv6 conntrack reassembly (bnc#865419). * isofs: Fix unchecked printing of ER records. * kABI: protect console include in consolemap. * kabi fix (bnc#864404). * kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242). * kernel/audit.c: avoid negative sleep durations (bnc#908393). * kernel: 3215 tty close crash (bnc#915209, LTC#120873). * kernel: incorrect clock_gettime result (bnc#915209, LTC#121184). * kvm: Do not expose MONITOR cpuid as available (bnc#887597) * kvm: iommu: Add cond_resched to legacy device assignment code (bnc#910159). * libceph: CEPH_OSD_FLAG_* enum update (FATE#318328 bsc#917884). * libceph: add ceph_kv{malloc,free}() and switch to them (FATE#318328 bsc#917884). * libceph: add ceph_pg_pool_by_id() (FATE#318328 bsc#917884). * libceph: add function to ensure notifies are complete (FATE#318328 bsc#917884). * libceph: add process_one_ticket() helper (FATE#318328 bsc#917884). * libceph: all features fields must be u64 (FATE#318328 bsc#917884). * libceph: block I/O when PAUSE or FULL osd map flags are set (FATE#318328 bsc#917884). * libceph: call r_unsafe_callback when unsafe reply is received (FATE#318328 bsc#917884). * libceph: create_singlethread_workqueue() does not return ERR_PTRs (FATE#318328 bsc#917884). * libceph: do not hard code max auth ticket len (FATE#318328 bsc#917884). * libceph: dout() is missing a newline (FATE#318328 bsc#917884). * libceph: factor out logic from ceph_osdc_start_request() (FATE#318328 bsc#917884). * libceph: fix error handling in ceph_osdc_init() (FATE#318328 bsc#917884). * libceph: fix preallocation check in get_reply() (FATE#318328 bsc#917884). * libceph: fix safe completion (FATE#318328 bsc#917884). * libceph: follow redirect replies from osds (FATE#318328 bsc#917884). * libceph: follow {read,write}_tier fields on osd request submission (FATE#318328 bsc#917884). * libceph: gracefully handle large reply messages from the mon (FATE#318328 bsc#917884). * libceph: introduce and start using oid abstraction (FATE#318328 bsc#917884). * libceph: rename MAX_OBJ_NAME_SIZE to CEPH_MAX_OID_NAME_LEN (FATE#318328 bsc#917884). * libceph: rename ceph_msg::front_max to front_alloc_len (FATE#318328 bsc#917884). * libceph: rename ceph_osd_request::r_{oloc,oid} to r_base_{oloc,oid} (FATE#318328 bsc#917884). * libceph: rename front to front_len in get_reply() (FATE#318328 bsc#917884). * libceph: replace ceph_calc_ceph_pg() with ceph_oloc_oid_to_pg() (FATE#318328 bsc#917884). * libceph: resend all writes after the osdmap loses the full flag (FATE#318328 bsc#917884). * libceph: start using oloc abstraction (FATE#318328 bsc#917884). * libceph: take map_sem for read in handle_reply() (FATE#318328 bsc#917884). * libceph: update ceph_features.h (FATE#318328 bsc#917884). * libceph: use CEPH_MON_PORT when the specified port is 0 (FATE#318328 bsc#917884). * libiscsi: Added new boot entries in the session sysfs (FATE#316723 bsc#914355) * mei: ME hardware reset needs to be synchronized (bnc#876086). * mei: add 9 series PCH mei device ids (bnc#876086). * mei: add hw start callback (bnc#876086). * mei: cancel stall timers in mei_reset (bnc#876086). * mei: do not have to clean the state on power up (bnc#876086). * mei: limit the number of consecutive resets (bnc#876086). * mei: me: add Lynx Point Wellsburg work station device id (bnc#876086). * mei: me: clear interrupts on the resume path (bnc#876086). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#876086). * mei: me: fix hardware reset flow (bnc#876086). * mei: me: read H_CSR after asserting reset (bnc#876086). * mm, vmscan: prevent kswapd livelock due to pfmemalloc-throttled process being killed (VM Functionality bnc#910150). * mm: fix BUG in __split_huge_page_pmd (bnc#906586). * mm: fix corner case in anon_vma endless growing prevention (bnc#904242). * mm: prevent endless growth of anon_vma hierarchy (bnc#904242). * mm: vmscan: count only dirty pages as congested (VM Performance, bnc#910517). * net, sunrpc: suppress allocation warning in rpc_malloc() (bnc#904659). * net: 8021q/bluetooth/bridge/can/ceph: Remove extern from function prototypes (FATE#318328 bsc#917884). * net: handle more general stacking in dev_disable_lro() (bnc#829110 bnc#891277 bnc#904053). * netfilter: do not drop packet on insert collision (bnc#907611). * nf_conntrack: avoid reference leak in __ipv6_conntrack_in() (bnc#865419). * nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484). * nfsd: fix EXDEV checking in rename (bnc#915791). * pnfs: defer release of pages in layoutget (bnc#864411). * proc_sys_revalidate: fix Oops on NULL nameidata (bnc#907551). * qlge: fix an "&&" vs "||" bug (bsc#912171). * rbd: Fix error recovery in rbd_obj_read_sync() (FATE#318328 bsc#917884). * rbd: Use min_t() to fix comparison of distinct pointer types warning (FATE#318328 bsc#917884). * rbd: add "minor" sysfs rbd device attribute (FATE#318328 bsc#917884). * rbd: add support for single-major device number allocation scheme (FATE#318328 bsc#917884). * rbd: clean up a few things in the refresh path (FATE#318328 bsc#917884). * rbd: complete notifies before cleaning up osd_client and rbd_dev (FATE#318328 bsc#917884). * rbd: do not destroy ceph_opts in rbd_add() (FATE#318328 bsc#917884). * rbd: do not hold ctl_mutex to get/put device (FATE#318328 bsc#917884). * rbd: drop an unsafe assertion (FATE#318328 bsc#917884). * rbd: drop original request earlier for existence check (FATE#318328 bsc#917884). * rbd: enable extended devt in single-major mode (FATE#318328 bsc#917884). * rbd: fetch object order before using it (FATE#318328 bsc#917884). * rbd: fix I/O error propagation for reads (FATE#318328 bsc#917884). * rbd: fix a couple warnings (FATE#318328 bsc#917884). * rbd: fix buffer size for writes to images with snapshots (FATE#318328 bsc#917884). * rbd: fix cleanup in rbd_add() (FATE#318328 bsc#917884). * rbd: fix error handling from rbd_snap_name() (FATE#318328 bsc#917884). * rbd: fix error paths in rbd_img_request_fill() (FATE#318328 bsc#917884). * rbd: fix null dereference in dout (FATE#318328 bsc#917884). * rbd: fix use-after free of rbd_dev->disk (FATE#318328 bsc#917884). * rbd: flush dcache after zeroing page data (FATE#318328 bsc#917884). * rbd: ignore unmapped snapshots that no longer exist (FATE#318328 bsc#917884). * rbd: introduce rbd_dev_header_unwatch_sync() and switch to it (FATE#318328 bsc#917884). * rbd: make rbd_obj_notify_ack() synchronous (FATE#318328 bsc#917884). * rbd: protect against concurrent unmaps (FATE#318328 bsc#917884). * rbd: protect against duplicate client creation (FATE#318328 bsc#917884). * rbd: rbd_device::dev_id is an int, format it as such (FATE#318328 bsc#917884). * rbd: refactor rbd_init() a bit (FATE#318328 bsc#917884). * rbd: send snapshot context with writes (FATE#318328 bsc#917884). * rbd: set removing flag while holding list lock (FATE#318328 bsc#917884). * rbd: switch to ida for rbd id assignments (FATE#318328 bsc#917884). * rbd: take a little credit (FATE#318328 bsc#917884). * rbd: tear down watch request if rbd_dev_device_setup() fails (FATE#318328 bsc#917884). * rbd: tweak "loaded" message and module description (FATE#318328 bsc#917884). * rbd: use reference counts for image requests (FATE#318328 bsc#917884). * rbd: use rwsem to protect header updates (FATE#318328 bsc#917884). * rbd: use the correct length for format 2 object names (FATE#318328 bsc#917884). * rpm/kernel-binary.spec.in: Own the modules directory in the devel package (bnc#910322) * scsi_dh_alua: add missing hunk in alua_set_params() (bnc#846656). * scsifront: avoid acquiring same lock twice if ring is full. * sd: medium access timeout counter fails to reset (bnc#894213). * storvsc: ring buffer failures may result in I/O freeze * swap: fix shmem swapping when more than 8 areas (bnc#903096). * timekeeping: Avoid possible deadlock from clock_was_set_delayed (bsc#771619). * tty: Fix memory leak in virtual console when enable unicode translation (bnc#916515). * udf: Check component length before reading it. * udf: Check path length when reading symlink. * udf: Verify i_size when loading inode. * udf: Verify symlink size before loading it. * udp: Add MIB counters for rcvbuferrors (bnc#909565). * usb: xhci: rework root port wake bits if controller is not allowed to wakeup (bsc#909264). * virtio_net: drop dst reference before transmitting a packet (bnc#882470). * vt: push the tty_lock down into the map handling (bnc#915826). * workqueue: Make rescuer thread process more works (bnc#900279). * x86, xsave: remove thread_has_fpu() bug check in __sanitize_i387_state() (bnc#904671). * x86-64/MCE: flip CPU and bank numbers in log message. * x86/UV: Fix NULL pointer dereference in uv_flush_tlb_others() if the "^a" boot option is used (bsc#909092). * x86/UV: Fix conditional in gru_exit() (bsc#909095). * x86/early quirk: use gen6 stolen detection for VLV (bnc#908550,FATE#317933). * x86/gpu: Print the Intel graphics stolen memory range (bnc#908550). * x86/hpet: Make boot_hpet_disable extern (bnc#908550,FATE#317933). * x86/intel: Add quirk to disable HPET for the Baytrail platform (bnc#908550,FATE#317933). * x86/uv: Fix UV2 BAU legacy mode (bsc#909092). * x86/uv: Fix the UV BAU destination timeout period (bsc#909092). * x86/uv: Implement UV BAU runtime enable and disable control via /proc/sgi_uv/ (bsc#909092). * x86/uv: Update the UV3 TLB shootdown logic (bsc#909092). * x86/uv: Work around UV2 BAU hangs (bsc#909092). * x86: UV BAU: Avoid NULL pointer reference in ptc_seq_show (bsc#911181). * x86: UV BAU: Increase maximum CPUs per socket/hub (bsc#911181). * x86: add early quirk for reserving Intel graphics stolen memory v5 (bnc#908550,FATE#317933). * x86: irq: Check for valid irq descriptor in check_irq_vectors_for_cpu_disable (bnc#914726). * xen-privcmd-hcall-preemption: Fix EFLAGS.IF access. * xfs: re-enable non-blocking behaviour in xfs_map_blocks (bnc#900279). * xfs: recheck buffer pinned status after push trylock failure (bnc#907338). * xfs: remove log force from xfs_buf_trylock() (bnc#907338). * xhci: fix incorrect type in assignment in handle_device_notification() (bsc#910321). * zcrypt: Number of supported ap domains is not retrievable (bnc#915209, LTC#120788). Security Issues: * CVE-2013-7263 * CVE-2014-0181 * CVE-2014-3687 * CVE-2014-3688 * CVE-2014-3690 * CVE-2014-4608 * CVE-2014-7822 * CVE-2014-7842 * CVE-2014-7970 * CVE-2014-8133 * CVE-2014-8134 * CVE-2014-8160 * CVE-2014-8369 * CVE-2014-8559 * CVE-2014-9090 * CVE-2014-9322 * CVE-2014-9419 * CVE-2014-9420 * CVE-2014-9584 * CVE-2014-9585 * CVE-2015-1593 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 11 SP3: zypper in -t patch slertesp3-kernel=10569 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]: cluster-network-kmp-rt-1.4_3.0.101_rt130_0.33.36-2.28.1.14 cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.33.36-2.28.1.14 drbd-kmp-rt-8.4.4_3.0.101_rt130_0.33.36-0.23.1.14 drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.33.36-0.23.1.14 iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.33.36-0.39.1.14 iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.33.36-0.39.1.14 kernel-rt-3.0.101.rt130-0.33.36.1 kernel-rt-base-3.0.101.rt130-0.33.36.1 kernel-rt-devel-3.0.101.rt130-0.33.36.1 kernel-rt_trace-3.0.101.rt130-0.33.36.1 kernel-rt_trace-base-3.0.101.rt130-0.33.36.1 kernel-rt_trace-devel-3.0.101.rt130-0.33.36.1 kernel-source-rt-3.0.101.rt130-0.33.36.1 kernel-syms-rt-3.0.101.rt130-0.33.36.1 lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.33.36-0.12.1.13 lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.33.36-0.12.1.13 ocfs2-kmp-rt-1.6_3.0.101_rt130_0.33.36-0.21.1.14 ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.33.36-0.21.1.14 ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14 ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14 References: https://www.suse.com/security/cve/CVE-2013-7263.html https://www.suse.com/security/cve/CVE-2014-0181.html https://www.suse.com/security/cve/CVE-2014-3687.html https://www.suse.com/security/cve/CVE-2014-3688.html https://www.suse.com/security/cve/CVE-2014-3690.html https://www.suse.com/security/cve/CVE-2014-4608.html https://www.suse.com/security/cve/CVE-2014-7822.html https://www.suse.com/security/cve/CVE-2014-7842.html https://www.suse.com/security/cve/CVE-2014-7970.html https://www.suse.com/security/cve/CVE-2014-8133.html https://www.suse.com/security/cve/CVE-2014-8134.html https://www.suse.com/security/cve/CVE-2014-8160.html https://www.suse.com/security/cve/CVE-2014-8369.html https://www.suse.com/security/cve/CVE-2014-8559.html https://www.suse.com/security/cve/CVE-2014-9090.html https://www.suse.com/security/cve/CVE-2014-9322.html https://www.suse.com/security/cve/CVE-2014-9419.html https://www.suse.com/security/cve/CVE-2014-9420.html https://www.suse.com/security/cve/CVE-2014-9584.html https://www.suse.com/security/cve/CVE-2014-9585.html https://www.suse.com/security/cve/CVE-2015-1593.html https://bugzilla.suse.com/771619 https://bugzilla.suse.com/816099 https://bugzilla.suse.com/829110 https://bugzilla.suse.com/833588 https://bugzilla.suse.com/833820 https://bugzilla.suse.com/846656 https://bugzilla.suse.com/853040 https://bugzilla.suse.com/856760 https://bugzilla.suse.com/864401 https://bugzilla.suse.com/864404 https://bugzilla.suse.com/864409 https://bugzilla.suse.com/864411 https://bugzilla.suse.com/865419 https://bugzilla.suse.com/875051 https://bugzilla.suse.com/876086 https://bugzilla.suse.com/876594 https://bugzilla.suse.com/877593 https://bugzilla.suse.com/882470 https://bugzilla.suse.com/883948 https://bugzilla.suse.com/884817 https://bugzilla.suse.com/887597 https://bugzilla.suse.com/891277 https://bugzilla.suse.com/894213 https://bugzilla.suse.com/895841 https://bugzilla.suse.com/896484 https://bugzilla.suse.com/900279 https://bugzilla.suse.com/900644 https://bugzilla.suse.com/902232 https://bugzilla.suse.com/902349 https://bugzilla.suse.com/902351 https://bugzilla.suse.com/902675 https://bugzilla.suse.com/903096 https://bugzilla.suse.com/903640 https://bugzilla.suse.com/904053 https://bugzilla.suse.com/904242 https://bugzilla.suse.com/904659 https://bugzilla.suse.com/904671 https://bugzilla.suse.com/905304 https://bugzilla.suse.com/905312 https://bugzilla.suse.com/905799 https://bugzilla.suse.com/906586 https://bugzilla.suse.com/907196 https://bugzilla.suse.com/907338 https://bugzilla.suse.com/907551 https://bugzilla.suse.com/907611 https://bugzilla.suse.com/907818 https://bugzilla.suse.com/908069 https://bugzilla.suse.com/908163 https://bugzilla.suse.com/908393 https://bugzilla.suse.com/908550 https://bugzilla.suse.com/908551 https://bugzilla.suse.com/908572 https://bugzilla.suse.com/908825 https://bugzilla.suse.com/909077 https://bugzilla.suse.com/909078 https://bugzilla.suse.com/909088 https://bugzilla.suse.com/909092 https://bugzilla.suse.com/909093 https://bugzilla.suse.com/909095 https://bugzilla.suse.com/909264 https://bugzilla.suse.com/909565 https://bugzilla.suse.com/909740 https://bugzilla.suse.com/909846 https://bugzilla.suse.com/910013 https://bugzilla.suse.com/910150 https://bugzilla.suse.com/910159 https://bugzilla.suse.com/910251 https://bugzilla.suse.com/910321 https://bugzilla.suse.com/910322 https://bugzilla.suse.com/910517 https://bugzilla.suse.com/911181 https://bugzilla.suse.com/911325 https://bugzilla.suse.com/911326 https://bugzilla.suse.com/912171 https://bugzilla.suse.com/912705 https://bugzilla.suse.com/913059 https://bugzilla.suse.com/914355 https://bugzilla.suse.com/914423 https://bugzilla.suse.com/914726 https://bugzilla.suse.com/915209 https://bugzilla.suse.com/915322 https://bugzilla.suse.com/915335 https://bugzilla.suse.com/915791 https://bugzilla.suse.com/915826 https://bugzilla.suse.com/916515 https://bugzilla.suse.com/916982 https://bugzilla.suse.com/917839 https://bugzilla.suse.com/917884 https://bugzilla.suse.com/920250 https://bugzilla.suse.com/924282 https://download.suse.com/patch/finder/?keywords=6ac65f6e9ab5fc78350f4042c5cd491b From sle-security-updates at lists.suse.com Tue Apr 21 11:05:03 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 21 Apr 2015 19:05:03 +0200 (CEST) Subject: SUSE-SU-2015:0743-1: important: Security update for mariadb Message-ID: <20150421170503.B8A2828012@maintenance.suse.de> SUSE Security Update: Security update for mariadb ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0743-1 Rating: important References: #873351 #876282 #880891 #896400 #904627 #906117 #906194 #911442 #911556 #915911 #915912 #915913 #915914 #919229 Cross-References: CVE-2010-5298 CVE-2012-5615 CVE-2014-0195 CVE-2014-0198 CVE-2014-0221 CVE-2014-0224 CVE-2014-2494 CVE-2014-3470 CVE-2014-4207 CVE-2014-4258 CVE-2014-4260 CVE-2014-4274 CVE-2014-4287 CVE-2014-6463 CVE-2014-6464 CVE-2014-6469 CVE-2014-6474 CVE-2014-6478 CVE-2014-6484 CVE-2014-6489 CVE-2014-6491 CVE-2014-6494 CVE-2014-6495 CVE-2014-6496 CVE-2014-6500 CVE-2014-6505 CVE-2014-6507 CVE-2014-6520 CVE-2014-6530 CVE-2014-6551 CVE-2014-6555 CVE-2014-6559 CVE-2014-6564 CVE-2014-6568 CVE-2015-0374 CVE-2015-0381 CVE-2015-0382 CVE-2015-0391 CVE-2015-0411 CVE-2015-0432 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 40 vulnerabilities is now available. Description: mariadb was updated to version 10.0.16 to fix 40 security issues. These security issues were fixed: - CVE-2015-0411: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption (bnc#915911). - CVE-2015-0382: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allowed remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381 (bnc#915911). - CVE-2015-0381: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allowed remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382 (bnc#915911). - CVE-2015-0432: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allowed remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key (bnc#915911). - CVE-2014-6568: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allowed remote authenticated users to affect availability via vectors related to Server : InnoDB : DML (bnc#915911). - CVE-2015-0374: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allowed remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key (bnc#915911). - CVE-2014-6507: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML (bnc#915912). - CVE-2014-6491: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500 (bnc#915912). - CVE-2014-6500: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491 (bnc#915912). - CVE-2014-6469: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and eariler and 5.6.20 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER (bnc#915912). - CVE-2014-6555: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML (bnc#915912). - CVE-2014-6559: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING (bnc#915912). - CVE-2014-6494: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496 (bnc#915912). - CVE-2014-6496: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allowed remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494 (bnc#915912). - CVE-2014-6464: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS (bnc#915912). - CVE-2010-5298: Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allowed remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment (bnc#873351). - CVE-2014-0195: The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h did not properly validate fragment lengths in DTLS ClientHello messages, which allowed remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment (bnc#880891). - CVE-2014-0198: The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, did not properly manage a buffer pointer during certain recursive calls, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition (bnc#876282). - CVE-2014-0221: The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allowed remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake (bnc#915913). - CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h did not properly restrict processing of ChangeCipherSpec messages, which allowed man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability (bnc#915913). - CVE-2014-3470: The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allowed remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value (bnc#915913). - CVE-2014-6474: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED (bnc#915913). - CVE-2014-6489: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allowed remote authenticated users to affect integrity and availability via vectors related to SERVER:SP (bnc#915913). - CVE-2014-6564: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML (bnc#915913). - CVE-2012-5615: Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allowed remote attackers to enumerate valid usernames (bnc#915913). - CVE-2014-4274: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM (bnc#896400). - CVE-2014-4287: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS (bnc#915913). - CVE-2014-6463: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (bnc#915913). - CVE-2014-6478: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL (bnc#915913). - CVE-2014-6484: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect availability via vectors related to SERVER:DML (bnc#915913). - CVE-2014-6495: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL (bnc#915913). - CVE-2014-6505: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE (bnc#915913). - CVE-2014-6520: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allowed remote authenticated users to affect availability via vectors related to SERVER:DDL (bnc#915913). - CVE-2014-6530: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP (bnc#915913). - CVE-2014-6551: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allowed local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN (bnc#915913). - CVE-2015-0391: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allowed remote authenticated users to affect availability via vectors related to DDL (bnc#915913). - CVE-2014-4258: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allowed remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC (bnc#915914). - CVE-2014-4260: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allowed remote authenticated users to affect integrity and availability via vectors related to SRCHAR (bnc#915914). - CVE-2014-2494: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allowed remote authenticated users to affect availability via vectors related to ENARC (bnc#915914). - CVE-2014-4207: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allowed remote authenticated users to affect availability via vectors related to SROPTZR (bnc#915914). These non-security issues were fixed: - Get query produced incorrect results in MariaDB 10.0.11 vs MySQL 5.5 - SLES12 (bnc#906194). - After update to version 10.0.14 mariadb did not start - Job for mysql.service failed (bnc#911442). - Fix crash when disk full situation is reached on alter table (bnc#904627). - Allow md5 in FIPS mode (bnc#911556). - Fixed a situation when bit and hex string literals unintentionally changed column names (bnc#919229). Release notes: https://kb.askmonty.org/en/mariadb-10016-release-notes/ Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2015-170=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-170=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-170=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-170=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): libmysqlclient_r18-10.0.16-15.1 libmysqlclient_r18-32bit-10.0.16-15.1 mariadb-debuginfo-10.0.16-15.1 mariadb-debugsource-10.0.16-15.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libmysqlclient-devel-10.0.16-15.1 libmysqlclient_r18-10.0.16-15.1 libmysqld-devel-10.0.16-15.1 libmysqld18-10.0.16-15.1 libmysqld18-debuginfo-10.0.16-15.1 mariadb-debuginfo-10.0.16-15.1 mariadb-debugsource-10.0.16-15.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libmysqlclient18-10.0.16-15.1 libmysqlclient18-debuginfo-10.0.16-15.1 mariadb-10.0.16-15.1 mariadb-client-10.0.16-15.1 mariadb-client-debuginfo-10.0.16-15.1 mariadb-debuginfo-10.0.16-15.1 mariadb-debugsource-10.0.16-15.1 mariadb-errormessages-10.0.16-15.1 mariadb-tools-10.0.16-15.1 mariadb-tools-debuginfo-10.0.16-15.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): libmysqlclient18-32bit-10.0.16-15.1 libmysqlclient18-debuginfo-32bit-10.0.16-15.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libmysqlclient18-10.0.16-15.1 libmysqlclient18-32bit-10.0.16-15.1 libmysqlclient18-debuginfo-10.0.16-15.1 libmysqlclient18-debuginfo-32bit-10.0.16-15.1 libmysqlclient_r18-10.0.16-15.1 libmysqlclient_r18-32bit-10.0.16-15.1 mariadb-10.0.16-15.1 mariadb-client-10.0.16-15.1 mariadb-client-debuginfo-10.0.16-15.1 mariadb-debuginfo-10.0.16-15.1 mariadb-debugsource-10.0.16-15.1 mariadb-errormessages-10.0.16-15.1 References: https://www.suse.com/security/cve/CVE-2010-5298.html https://www.suse.com/security/cve/CVE-2012-5615.html https://www.suse.com/security/cve/CVE-2014-0195.html https://www.suse.com/security/cve/CVE-2014-0198.html https://www.suse.com/security/cve/CVE-2014-0221.html https://www.suse.com/security/cve/CVE-2014-0224.html https://www.suse.com/security/cve/CVE-2014-2494.html https://www.suse.com/security/cve/CVE-2014-3470.html https://www.suse.com/security/cve/CVE-2014-4207.html https://www.suse.com/security/cve/CVE-2014-4258.html https://www.suse.com/security/cve/CVE-2014-4260.html https://www.suse.com/security/cve/CVE-2014-4274.html https://www.suse.com/security/cve/CVE-2014-4287.html https://www.suse.com/security/cve/CVE-2014-6463.html https://www.suse.com/security/cve/CVE-2014-6464.html https://www.suse.com/security/cve/CVE-2014-6469.html https://www.suse.com/security/cve/CVE-2014-6474.html https://www.suse.com/security/cve/CVE-2014-6478.html https://www.suse.com/security/cve/CVE-2014-6484.html https://www.suse.com/security/cve/CVE-2014-6489.html https://www.suse.com/security/cve/CVE-2014-6491.html https://www.suse.com/security/cve/CVE-2014-6494.html https://www.suse.com/security/cve/CVE-2014-6495.html https://www.suse.com/security/cve/CVE-2014-6496.html https://www.suse.com/security/cve/CVE-2014-6500.html https://www.suse.com/security/cve/CVE-2014-6505.html https://www.suse.com/security/cve/CVE-2014-6507.html https://www.suse.com/security/cve/CVE-2014-6520.html https://www.suse.com/security/cve/CVE-2014-6530.html https://www.suse.com/security/cve/CVE-2014-6551.html https://www.suse.com/security/cve/CVE-2014-6555.html https://www.suse.com/security/cve/CVE-2014-6559.html https://www.suse.com/security/cve/CVE-2014-6564.html https://www.suse.com/security/cve/CVE-2014-6568.html https://www.suse.com/security/cve/CVE-2015-0374.html https://www.suse.com/security/cve/CVE-2015-0381.html https://www.suse.com/security/cve/CVE-2015-0382.html https://www.suse.com/security/cve/CVE-2015-0391.html https://www.suse.com/security/cve/CVE-2015-0411.html https://www.suse.com/security/cve/CVE-2015-0432.html https://bugzilla.suse.com/873351 https://bugzilla.suse.com/876282 https://bugzilla.suse.com/880891 https://bugzilla.suse.com/896400 https://bugzilla.suse.com/904627 https://bugzilla.suse.com/906117 https://bugzilla.suse.com/906194 https://bugzilla.suse.com/911442 https://bugzilla.suse.com/911556 https://bugzilla.suse.com/915911 https://bugzilla.suse.com/915912 https://bugzilla.suse.com/915913 https://bugzilla.suse.com/915914 https://bugzilla.suse.com/919229 From sle-security-updates at lists.suse.com Tue Apr 21 12:04:56 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 21 Apr 2015 20:04:56 +0200 (CEST) Subject: SUSE-SU-2015:0744-1: moderate: Security update for Xen Message-ID: <20150421180456.37BD232147@maintenance.suse.de> SUSE Security Update: Security update for Xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0744-1 Rating: moderate References: #918995 #918998 #919464 #922705 Cross-References: CVE-2013-3495 CVE-2014-3615 CVE-2014-5146 CVE-2014-5149 CVE-2014-9065 CVE-2014-9066 CVE-2015-0361 CVE-2015-2044 CVE-2015-2045 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: The Virtualization service XEN was updated to fix various bugs and security issues. The following security issues have been fixed: * XSA-125: Long latency MMIO mapping operations were not preemptible. * CVE-2015-2151: XSA-123: Instructions with register operands ignored eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override could have, however, corrupted a pointer used subsequently to store the result of the instruction. * CVE-2015-2045: XSA-122: The code handling certain sub-operations of the HYPERVISOR_xen_version hypercall failed to fully initialize all fields of structures subsequently copied back to guest memory. Due to this hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. * CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing with certain system devices checked whether the access size by the guest is a supported one. When the access size is unsupported these routines failed to set the data to be returned to the guest for read accesses, so that hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. Security Issues: * CVE-2013-3495 * CVE-2014-5146 * CVE-2014-5149 * CVE-2014-3615 * CVE-2014-9065 * CVE-2014-9066 * CVE-2015-0361 * CVE-2015-2044 * CVE-2015-2045 Special Instructions and Notes: Please reboot the system after installing this update. Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64): xen-3.2.3_17040_46-0.13.1 xen-devel-3.2.3_17040_46-0.13.1 xen-doc-html-3.2.3_17040_46-0.13.1 xen-doc-pdf-3.2.3_17040_46-0.13.1 xen-doc-ps-3.2.3_17040_46-0.13.1 xen-kmp-debug-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-kmp-default-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-kmp-kdump-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-kmp-smp-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-libs-3.2.3_17040_46-0.13.1 xen-tools-3.2.3_17040_46-0.13.1 xen-tools-domU-3.2.3_17040_46-0.13.1 xen-tools-ioemu-3.2.3_17040_46-0.13.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64): xen-libs-32bit-3.2.3_17040_46-0.13.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586): xen-kmp-bigsmp-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-kmp-kdumppae-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-kmp-vmi-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 xen-kmp-vmipae-3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1 References: https://www.suse.com/security/cve/CVE-2013-3495.html https://www.suse.com/security/cve/CVE-2014-3615.html https://www.suse.com/security/cve/CVE-2014-5146.html https://www.suse.com/security/cve/CVE-2014-5149.html https://www.suse.com/security/cve/CVE-2014-9065.html https://www.suse.com/security/cve/CVE-2014-9066.html https://www.suse.com/security/cve/CVE-2015-0361.html https://www.suse.com/security/cve/CVE-2015-2044.html https://www.suse.com/security/cve/CVE-2015-2045.html https://bugzilla.suse.com/918995 https://bugzilla.suse.com/918998 https://bugzilla.suse.com/919464 https://bugzilla.suse.com/922705 https://download.suse.com/patch/finder/?keywords=eb058b67acad47659a336d914d8e2fd0 From sle-security-updates at lists.suse.com Tue Apr 21 12:05:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 21 Apr 2015 20:05:48 +0200 (CEST) Subject: SUSE-SU-2015:0745-1: moderate: Security update for Xen Message-ID: <20150421180548.6005632147@maintenance.suse.de> SUSE Security Update: Security update for Xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0745-1 Rating: moderate References: #918995 #918998 #919464 #922705 #922706 Cross-References: CVE-2015-2044 CVE-2015-2045 CVE-2015-2151 CVE-2015-2756 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves four vulnerabilities and has one errata is now available. Description: The Virtualization service XEN was updated to fix various bugs and security issues. The following security issues have been fixed: * CVE-2015-2756: XSA-126: Unmediated PCI command register access in qemu could have lead to denial of service attacks against the host, if PCI cards are passed through to guests. * XSA-125: Long latency MMIO mapping operations were not preemptible. * CVE-2015-2151: XSA-123: Instructions with register operands ignored eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override could have, however, corrupted a pointer used subsequently to store the result of the instruction. * CVE-2015-2045: XSA-122: The code handling certain sub-operations of the HYPERVISOR_xen_version hypercall failed to fully initialize all fields of structures subsequently copied back to guest memory. Due to this hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. * CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing with certain system devices checked whether the access size by the guest is a supported one. When the access size is unsupported these routines failed to set the data to be returned to the guest for read accesses, so that hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. Security Issues: * CVE-2015-2044 * CVE-2015-2045 * CVE-2015-2151 * CVE-2015-2756 Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xen-201503=10562 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64): xen-4.0.3_21548_18-0.15.1 xen-doc-html-4.0.3_21548_18-0.15.1 xen-doc-pdf-4.0.3_21548_18-0.15.1 xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 xen-libs-4.0.3_21548_18-0.15.1 xen-tools-4.0.3_21548_18-0.15.1 xen-tools-domU-4.0.3_21548_18-0.15.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586): xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 References: https://www.suse.com/security/cve/CVE-2015-2044.html https://www.suse.com/security/cve/CVE-2015-2045.html https://www.suse.com/security/cve/CVE-2015-2151.html https://www.suse.com/security/cve/CVE-2015-2756.html https://bugzilla.suse.com/918995 https://bugzilla.suse.com/918998 https://bugzilla.suse.com/919464 https://bugzilla.suse.com/922705 https://bugzilla.suse.com/922706 https://download.suse.com/patch/finder/?keywords=95ca29a75abc84ada300aaa08a5ad840 From sle-security-updates at lists.suse.com Tue Apr 21 12:06:49 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 21 Apr 2015 20:06:49 +0200 (CEST) Subject: SUSE-SU-2015:0746-1: moderate: Security update for Xen Message-ID: <20150421180649.CD01E32147@maintenance.suse.de> SUSE Security Update: Security update for Xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0746-1 Rating: moderate References: #907755 #918995 #918998 #919464 #922705 #922706 Cross-References: CVE-2015-2044 CVE-2015-2045 CVE-2015-2151 CVE-2015-2756 Affected Products: SUSE Linux Enterprise Server 11 SP2 LTSS ______________________________________________________________________________ An update that solves four vulnerabilities and has two fixes is now available. Description: The Virtualization service XEN was updated to fix various bugs and security issues. The following security issues have been fixed: * CVE-2015-2756: XSA-126: Unmediated PCI command register access in qemu could have lead to denial of service attacks against the host, if PCI cards are passed through to guests. * XSA-125: Long latency MMIO mapping operations were not preemptible. * CVE-2015-2151: XSA-123: Instructions with register operands ignored eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override could have, however, corrupted a pointer used subsequently to store the result of the instruction. * CVE-2015-2045: XSA-122: The code handling certain sub-operations of the HYPERVISOR_xen_version hypercall failed to fully initialize all fields of structures subsequently copied back to guest memory. Due to this hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. * CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing with certain system devices checked whether the access size by the guest is a supported one. When the access size is unsupported these routines failed to set the data to be returned to the guest for read accesses, so that hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. Also fixed: * Regular crashes of dom-0 on different servers due to races in MCE access were fixed. bsc#907755 Security Issues: * CVE-2015-2044 * CVE-2015-2045 * CVE-2015-2151 * CVE-2015-2756 Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-xen-201503=10561 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64): xen-devel-4.1.6_08-0.9.1 xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.9.1 xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.9.1 xen-libs-4.1.6_08-0.9.1 xen-tools-domU-4.1.6_08-0.9.1 - SUSE Linux Enterprise Server 11 SP2 LTSS (x86_64): xen-4.1.6_08-0.9.1 xen-doc-html-4.1.6_08-0.9.1 xen-doc-pdf-4.1.6_08-0.9.1 xen-libs-32bit-4.1.6_08-0.9.1 xen-tools-4.1.6_08-0.9.1 - SUSE Linux Enterprise Server 11 SP2 LTSS (i586): xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.9.1 References: https://www.suse.com/security/cve/CVE-2015-2044.html https://www.suse.com/security/cve/CVE-2015-2045.html https://www.suse.com/security/cve/CVE-2015-2151.html https://www.suse.com/security/cve/CVE-2015-2756.html https://bugzilla.suse.com/907755 https://bugzilla.suse.com/918995 https://bugzilla.suse.com/918998 https://bugzilla.suse.com/919464 https://bugzilla.suse.com/922705 https://bugzilla.suse.com/922706 https://download.suse.com/patch/finder/?keywords=31e241c64edec6ef4210d84d3c295d42 From sle-security-updates at lists.suse.com Tue Apr 21 12:08:10 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 21 Apr 2015 20:08:10 +0200 (CEST) Subject: SUSE-SU-2015:0747-1: moderate: Security update for Xen Message-ID: <20150421180810.930F032147@maintenance.suse.de> SUSE Security Update: Security update for Xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0747-1 Rating: moderate References: #918995 #918998 #919341 #919464 #922705 #922706 Cross-References: CVE-2015-2044 CVE-2015-2045 CVE-2015-2151 CVE-2015-2756 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves four vulnerabilities and has two fixes is now available. Description: The Virtualization service XEN was updated to fix various bugs and security issues. The following security issues have been fixed: * CVE-2015-2756: XSA-126: Unmediated PCI command register access in qemu could have lead to denial of service attacks against the host, if PCI cards are passed through to guests. * XSA-125: Long latency MMIO mapping operations were not preemptible. * CVE-2015-2151: XSA-123: Instructions with register operands ignored eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override could have, however, corrupted a pointer used subsequently to store the result of the instruction. * CVE-2015-2045: XSA-122: The code handling certain sub-operations of the HYPERVISOR_xen_version hypercall failed to fully initialize all fields of structures subsequently copied back to guest memory. Due to this hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. * CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing with certain system devices checked whether the access size by the guest is a supported one. When the access size is unsupported these routines failed to set the data to be returned to the guest for read accesses, so that hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. Also fixed: * Fully virtualized guest install from network source failed with 'cannot find guest domain' in XEN. (bsc#919341) Security Issues: * CVE-2015-2044 * CVE-2015-2045 * CVE-2015-2151 * CVE-2015-2756 Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-xen-201503=10560 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-xen-201503=10560 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-xen-201503=10560 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): xen-devel-4.2.5_04-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64): xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 xen-libs-4.2.5_04-0.9.1 xen-tools-domU-4.2.5_04-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (x86_64): xen-4.2.5_04-0.9.1 xen-doc-html-4.2.5_04-0.9.1 xen-doc-pdf-4.2.5_04-0.9.1 xen-libs-32bit-4.2.5_04-0.9.1 xen-tools-4.2.5_04-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (i586): xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 xen-libs-4.2.5_04-0.9.1 xen-tools-domU-4.2.5_04-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): xen-4.2.5_04-0.9.1 xen-doc-html-4.2.5_04-0.9.1 xen-doc-pdf-4.2.5_04-0.9.1 xen-libs-32bit-4.2.5_04-0.9.1 xen-tools-4.2.5_04-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586): xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 References: https://www.suse.com/security/cve/CVE-2015-2044.html https://www.suse.com/security/cve/CVE-2015-2045.html https://www.suse.com/security/cve/CVE-2015-2151.html https://www.suse.com/security/cve/CVE-2015-2756.html https://bugzilla.suse.com/918995 https://bugzilla.suse.com/918998 https://bugzilla.suse.com/919341 https://bugzilla.suse.com/919464 https://bugzilla.suse.com/922705 https://bugzilla.suse.com/922706 https://download.suse.com/patch/finder/?keywords=aa82c3238c3cf27f4383a113bdf38b8e From sle-security-updates at lists.suse.com Wed Apr 22 11:05:14 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 22 Apr 2015 19:05:14 +0200 (CEST) Subject: SUSE-SU-2015:0751-1: moderate: Security update for mongodb Message-ID: <20150422170514.BC29332148@maintenance.suse.de> SUSE Security Update: Security update for mongodb ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0751-1 Rating: moderate References: #921759 Cross-References: CVE-2015-1609 Affected Products: SUSE Cloud 5 SUSE Cloud 4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The MongoDB database did validate BSON incorrectly, which could have lead to remote attackers being able to crash the database before authentication. (CVE-2015-1609) Security Issues: * CVE-2015-1609 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 5: zypper in -t patch sleclo50sp3-mongodb=10512 - SUSE Cloud 4: zypper in -t patch sleclo40sp3-mongodb=10511 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 5 (x86_64): mongodb-2.4.3-0.25.1 - SUSE Cloud 4 (x86_64): mongodb-2.4.3-0.23.1 References: https://www.suse.com/security/cve/CVE-2015-1609.html https://bugzilla.suse.com/921759 https://download.suse.com/patch/finder/?keywords=43d90777ec1ea3496be5afd67fb2f94c https://download.suse.com/patch/finder/?keywords=8fffcc6a08afff6d39488f8b2b74d61a From sle-security-updates at lists.suse.com Thu Apr 23 14:04:51 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 23 Apr 2015 22:04:51 +0200 (CEST) Subject: SUSE-SU-2015:0758-1: Security update for mutt Message-ID: <20150423200451.63BE332149@maintenance.suse.de> SUSE Security Update: Security update for mutt ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0758-1 Rating: low References: #905481 #907453 Cross-References: CVE-2014-9116 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: The mutt mail client has been updated to fix a heap-based buffer overflow in mutt_substrdup(). (CVE-2014-9116) Additionally, a patch has been added to allow users to override the "From" address when executing mutt in batch mode. Security Issues: * CVE-2014-9116 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-mutt=10435 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-mutt=10435 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-mutt=10435 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): mutt-1.5.17-42.39.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): mutt-1.5.17-42.39.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): mutt-1.5.17-42.39.1 References: https://www.suse.com/security/cve/CVE-2014-9116.html https://bugzilla.suse.com/905481 https://bugzilla.suse.com/907453 https://download.suse.com/patch/finder/?keywords=b208e4994a643330d19b633ebac20ebb From sle-security-updates at lists.suse.com Mon Apr 27 05:06:40 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 Apr 2015 13:06:40 +0200 (CEST) Subject: SUSE-SU-2015:0776-1: moderate: Security update for subversion Message-ID: <20150427110640.52EBE3215D@maintenance.suse.de> SUSE Security Update: Security update for subversion ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0776-1 Rating: moderate References: #923793 #923794 #923795 Cross-References: CVE-2015-0202 CVE-2015-0248 CVE-2015-0251 Affected Products: SUSE Linux Enterprise Software Development Kit 12 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: Apache Subversion was updated to fix three vulnerabilities. The following vulnerabilities were fixed: * Subversion HTTP servers with FSFS repositories were vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. (bsc#923793 CVE-2015-0202) * Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. (bsc#923794 CVE-2015-0248) * Subversion HTTP servers allow spoofing svn:author property values for new revisions (bsc#923795 CVE-2015-0251) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-172=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libsvn_auth_gnome_keyring-1-0-1.8.10-12.1 libsvn_auth_gnome_keyring-1-0-debuginfo-1.8.10-12.1 libsvn_auth_kwallet-1-0-1.8.10-12.1 libsvn_auth_kwallet-1-0-debuginfo-1.8.10-12.1 subversion-1.8.10-12.1 subversion-debuginfo-1.8.10-12.1 subversion-debugsource-1.8.10-12.1 subversion-devel-1.8.10-12.1 subversion-perl-1.8.10-12.1 subversion-perl-debuginfo-1.8.10-12.1 subversion-python-1.8.10-12.1 subversion-python-debuginfo-1.8.10-12.1 subversion-server-1.8.10-12.1 subversion-server-debuginfo-1.8.10-12.1 subversion-tools-1.8.10-12.1 subversion-tools-debuginfo-1.8.10-12.1 - SUSE Linux Enterprise Software Development Kit 12 (noarch): subversion-bash-completion-1.8.10-12.1 References: https://www.suse.com/security/cve/CVE-2015-0202.html https://www.suse.com/security/cve/CVE-2015-0248.html https://www.suse.com/security/cve/CVE-2015-0251.html https://bugzilla.suse.com/923793 https://bugzilla.suse.com/923794 https://bugzilla.suse.com/923795 From sle-security-updates at lists.suse.com Mon Apr 27 09:04:49 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 Apr 2015 17:04:49 +0200 (CEST) Subject: SUSE-SU-2015:0777-1: moderate: Security update for python-Pillow Message-ID: <20150427150449.D67A63215D@maintenance.suse.de> SUSE Security Update: Security update for python-Pillow ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0777-1 Rating: moderate References: #921566 Cross-References: CVE-2014-1932 CVE-2014-1933 CVE-2014-3589 CVE-2014-3598 CVE-2014-9601 Affected Products: SUSE Cloud 5 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. It includes one version update. Description: python-pillow has been updated to 2.7.0 to fix three security issues. The following vulnerabilities have been fixed: * CVE-2014-9601: Remote attackers could have caused a denial of service via a compressed text chunk in a PNG image that has a large size when it is decompressed. * CVE-2014-3598: Remote attackers could have caused a denial of service using specially crafted image files via Jpeg2KImagePlugin. * CVE-2014-3589: Remote attackers could have caused a denial of service using specially crafted image files via IcnsImagePlugin. * CVE-2014-1932: A local user could have overwritten arbitrary files and obtain sensitive information via a symlink attack on the temporary file. * CVE-2014-1933: A local user could have gained information helpful for symlink attacks by listing process information which uses the names of temporary files on the command line. Security Issues: * CVE-2014-9601 * CVE-2014-3598 * CVE-2014-3589 * CVE-2014-1932 * CVE-2014-1933 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 5: zypper in -t patch sleclo50sp3-python-Pillow=10630 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 5 (x86_64) [New Version: 2.7.0]: python-Pillow-2.7.0-0.7.1 References: https://www.suse.com/security/cve/CVE-2014-1932.html https://www.suse.com/security/cve/CVE-2014-1933.html https://www.suse.com/security/cve/CVE-2014-3589.html https://www.suse.com/security/cve/CVE-2014-3598.html https://www.suse.com/security/cve/CVE-2014-9601.html https://bugzilla.suse.com/921566 https://download.suse.com/patch/finder/?keywords=acbb43326b3ecd6dec41437a7b4202ac From sle-security-updates at lists.suse.com Tue Apr 28 08:04:57 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 Apr 2015 16:04:57 +0200 (CEST) Subject: SUSE-SU-2015:0787-1: Security update for rubygem-sprockets-2_11 Message-ID: <20150428140457.DE39B3215D@maintenance.suse.de> SUSE Security Update: Security update for rubygem-sprockets-2_11 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0787-1 Rating: low References: #903658 #926549 Cross-References: CVE-2014-7819 Affected Products: SUSE Cloud 5 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for rubygem-sprockets-2_11 provides the following security fix: * Arbitrary file existence disclosure (bnc#903658, CVE-2014-7819) Security Issues: * CVE-2014-7819 Contraindications: Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 5: zypper in -t patch sleclo50sp3-ruby2.1-rubygem-sprockets-2_11=10603 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 5 (x86_64): ruby2.1-rubygem-sprockets-2_11-2.11.0-0.9.1 References: https://www.suse.com/security/cve/CVE-2014-7819.html https://bugzilla.suse.com/903658 https://bugzilla.suse.com/926549 https://download.suse.com/patch/finder/?keywords=6343daaa667ba718f687997732f292bc From sle-security-updates at lists.suse.com Tue Apr 28 08:07:16 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 Apr 2015 16:07:16 +0200 (CEST) Subject: SUSE-SU-2015:0789-1: moderate: Security update for java-1_7_0-openjdk, java-1_7_0-openjdk-bootstrap Message-ID: <20150428140716.23F7F3215D@maintenance.suse.de> SUSE Security Update: Security update for java-1_7_0-openjdk, java-1_7_0-openjdk-bootstrap ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0789-1 Rating: moderate References: #927591 Cross-References: CVE-2015-0458 CVE-2015-0459 CVE-2015-0460 CVE-2015-0469 CVE-2015-0477 CVE-2015-0478 CVE-2015-0480 CVE-2015-0484 CVE-2015-0488 CVE-2015-0491 CVE-2015-0492 Affected Products: SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: OpenJDK was updated to 2.5.5 - OpenJdk 7u79 to fix security issues and bugs: The following vulnerabilities were fixed: * CVE-2015-0458: Deployment: unauthenticated remote attackers could execute arbitrary code via multiple protocols. * CVE-2015-0459: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols. * CVE-2015-0460: Hotspot: unauthenticated remote attackers could execute arbitrary code via multiple protocols. * CVE-2015-0469: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols. * CVE-2015-0477: Beans: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols * CVE-2015-0478: JCE: unauthenticated remote attackers could read some JAVA accessible data via multiple protocols * CVE-2015-0480: Tools: unauthenticated remote attackers could update, insert or delete some JAVA accessible data via multiple protocols and cause a partial denial of service (partial DOS) * CVE-2015-0484: JavaFX: unauthenticated remote attackers could read, update, insert or delete access some Java accessible data via multiple protocols and cause a partial denial of service (partial DOS). * CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a partial denial of service (partial DOS). * CVE-2015-0491: 2D: unauthenticated remote attackers could execute arbitrary code via multiple protocols. * CVE-2015-0492: JavaFX: unauthenticated remote attackers could execute arbitrary code via multiple protocols. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-176=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-176=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): java-1_7_0-openjdk-1.7.0.79-15.1 java-1_7_0-openjdk-debuginfo-1.7.0.79-15.1 java-1_7_0-openjdk-debugsource-1.7.0.79-15.1 java-1_7_0-openjdk-demo-1.7.0.79-15.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-15.1 java-1_7_0-openjdk-devel-1.7.0.79-15.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-15.1 java-1_7_0-openjdk-headless-1.7.0.79-15.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-15.1 - SUSE Linux Enterprise Desktop 12 (x86_64): java-1_7_0-openjdk-1.7.0.79-15.1 java-1_7_0-openjdk-debuginfo-1.7.0.79-15.1 java-1_7_0-openjdk-debugsource-1.7.0.79-15.1 java-1_7_0-openjdk-headless-1.7.0.79-15.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-15.1 References: https://www.suse.com/security/cve/CVE-2015-0458.html https://www.suse.com/security/cve/CVE-2015-0459.html https://www.suse.com/security/cve/CVE-2015-0460.html https://www.suse.com/security/cve/CVE-2015-0469.html https://www.suse.com/security/cve/CVE-2015-0477.html https://www.suse.com/security/cve/CVE-2015-0478.html https://www.suse.com/security/cve/CVE-2015-0480.html https://www.suse.com/security/cve/CVE-2015-0484.html https://www.suse.com/security/cve/CVE-2015-0488.html https://www.suse.com/security/cve/CVE-2015-0491.html https://www.suse.com/security/cve/CVE-2015-0492.html https://bugzilla.suse.com/927591 From sle-security-updates at lists.suse.com Tue Apr 28 11:05:33 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 Apr 2015 19:05:33 +0200 (CEST) Subject: SUSE-SU-2015:0792-1: moderate: Security update for coreutils Message-ID: <20150428170533.75C6D3215D@maintenance.suse.de> SUSE Security Update: Security update for coreutils ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0792-1 Rating: moderate References: #911832 #919809 Cross-References: CVE-2014-9471 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: Coreutils was updated to fix one security issue and one non-security bug. The following vulnerability was fixed: * Commands such as date, touch or using parse_datetime() could, when accepting untrusted input, allow an attacker to crash the application or, potentially, execute arbitrary code. (bnc#911832, CVE-2014-9471) The following non-security bug was fixed: * df(1) executed against a bind mounted path which resided on a different file system could issue many unnecessary stat calls, causing unwanted performance issues. (bnc#919809) Security Issues: * CVE-2014-9471 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-coreutils=10620 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-coreutils=10620 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-coreutils=10620 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): coreutils-8.12-6.25.32.33.1 coreutils-lang-8.12-6.25.32.33.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): coreutils-8.12-6.25.32.33.1 coreutils-lang-8.12-6.25.32.33.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): coreutils-x86-8.12-6.25.32.33.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): coreutils-8.12-6.25.32.33.1 coreutils-lang-8.12-6.25.32.33.1 References: https://www.suse.com/security/cve/CVE-2014-9471.html https://bugzilla.suse.com/911832 https://bugzilla.suse.com/919809 https://download.suse.com/patch/finder/?keywords=4ffcdcdccb637f20fedffad57575a514 From sle-security-updates at lists.suse.com Tue Apr 28 12:04:48 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 Apr 2015 20:04:48 +0200 (CEST) Subject: SUSE-SU-2015:0795-1: moderate: Security update for rubygem-bundler Message-ID: <20150428180448.A494F3215D@maintenance.suse.de> SUSE Security Update: Security update for rubygem-bundler ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0795-1 Rating: moderate References: #898205 Cross-References: CVE-2013-0334 Affected Products: WebYaST 1.3 SUSE Studio Onsite 1.3 SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Lifecycle Management Server 1.3 SUSE Cloud 4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: The rubygem bundler has been updated to 1.7.0 to fix an issue where it downloaded ruby gems from a different servers than the intended one. (CVE-2013-0334) Bundler 1.7 is a security-only release to address CVE-2013-0334, a vulnerability where a gem might have been installed from an unintended source server, particularly while using both rubygems.org and gems.github.com. Upstream changes entry with more explanations: Any Gemfile with multiple top-level source lines cannot reliably control the gem server that a particular gem is fetched from. As a result, Bundler might install the wrong gem if more than one source provides a gem with the same name. This is especially possible in the case of Github's legacy gem server, hosted at gems.github.com. An attacker might create a malicious gem on Rubygems.org with the same name as a commonly-used Github gem. From that point forward, running bundle install might result in the malicious gem being used instead of the expected gem. To mitigate this, the Bundler and Rubygems.org teams worked together to copy almost every gem hosted on gems.github.com to rubygems.org, reducing the number of gems that can be used for such an attack. Resolution To resolve this issue, upgrade to Bundler 1.7 by running gem install bundler. The next time you run bundle install for any Gemfile that contains multiple sources, each gem available from multiple sources will print a warning. For every warning printed, edit the Gemfile to either specify a :source option for that gem, or move the gem line into a block that is passed to a source method call. For detailed information about the changes to how sources are handled in Bundler version 1.7, see the release announcement. Security Issues: * CVE-2013-0334 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.3: zypper in -t patch slewyst13-rubygem-bundler=10449 - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-rubygem-bundler19=10451 slestso13-rubygem-bundler=10449 - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-rubygem-bundler=10450 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-rubygem-bundler=10450 - SUSE Lifecycle Management Server 1.3: zypper in -t patch sleslms13-rubygem-bundler=10449 - SUSE Cloud 4: zypper in -t patch sleclo40sp3-rubygem-bundler=10448 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.7.0]: rubygem-bundler-1.7.0-0.7.1 - SUSE Studio Onsite 1.3 (x86_64) [New Version: 1.7.0]: rubygem-bundler-1.7.0-0.7.1 rubygem-bundler19-1.7.0-0.12.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.7.0]: rubygem-bundler-1.7.0-0.7.1 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.7.0]: rubygem-bundler-1.7.0-0.7.1 - SUSE Lifecycle Management Server 1.3 (x86_64) [New Version: 1.7.0]: rubygem-bundler-1.7.0-0.7.1 - SUSE Cloud 4 (x86_64) [New Version: 1.7.0]: rubygem-bundler-1.7.0-0.7.1 References: https://www.suse.com/security/cve/CVE-2013-0334.html https://bugzilla.suse.com/898205 https://download.suse.com/patch/finder/?keywords=12083e22b331c4ebbb397c33df209d72 https://download.suse.com/patch/finder/?keywords=3bf8889ebbe831feae77fdcdac5e040d https://download.suse.com/patch/finder/?keywords=6f965f320be4e2e34128abad27d1693f https://download.suse.com/patch/finder/?keywords=ebabd5437da1b30f06ea1b1d962e5995 From sle-security-updates at lists.suse.com Wed Apr 29 10:05:12 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 29 Apr 2015 18:05:12 +0200 (CEST) Subject: SUSE-SU-2015:0803-1: Security update for gdm Message-ID: <20150429160512.6535C3215D@maintenance.suse.de> SUSE Security Update: Security update for gdm ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0803-1 Rating: low References: #900836 #919723 Affected Products: SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: The GNOME Display Manager was updated to fix several bugs: Security issue fixed: - Removed gdm-fingerprint and gdm-smartcard pamfiles that allowed unlocking the screen without password or fingerprint if fingerprint reader support was enabled. (boo#900836). Bugs fixed: - Fix support for DISPLAYMANAGER_STARTS_XSERVER from /etc/sysconfig/displaymanager (bsc#919723). - Ensure ShowLocalGreeter configuration key is properly handled (bgo#743440). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-178=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-178=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-178=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): gdm-debuginfo-3.10.0.1-16.1 gdm-debugsource-3.10.0.1-16.1 gdm-devel-3.10.0.1-16.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): gdm-3.10.0.1-16.1 gdm-debuginfo-3.10.0.1-16.1 gdm-debugsource-3.10.0.1-16.1 libgdm1-3.10.0.1-16.1 libgdm1-debuginfo-3.10.0.1-16.1 typelib-1_0-Gdm-1_0-3.10.0.1-16.1 - SUSE Linux Enterprise Server 12 (noarch): gdm-branding-upstream-3.10.0.1-16.1 gdm-lang-3.10.0.1-16.1 gdmflexiserver-3.10.0.1-16.1 - SUSE Linux Enterprise Desktop 12 (x86_64): gdm-3.10.0.1-16.1 gdm-debuginfo-3.10.0.1-16.1 gdm-debugsource-3.10.0.1-16.1 libgdm1-3.10.0.1-16.1 libgdm1-debuginfo-3.10.0.1-16.1 typelib-1_0-Gdm-1_0-3.10.0.1-16.1 - SUSE Linux Enterprise Desktop 12 (noarch): gdm-branding-upstream-3.10.0.1-16.1 gdm-lang-3.10.0.1-16.1 gdmflexiserver-3.10.0.1-16.1 References: https://bugzilla.suse.com/900836 https://bugzilla.suse.com/919723 From sle-security-updates at lists.suse.com Wed Apr 29 10:06:18 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 29 Apr 2015 18:06:18 +0200 (CEST) Subject: SUSE-SU-2015:0805-1: moderate: Security update for cups-filters Message-ID: <20150429160618.10F703215D@maintenance.suse.de> SUSE Security Update: Security update for cups-filters ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0805-1 Rating: moderate References: #915545 #921753 Cross-References: CVE-2015-2265 Affected Products: SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: cups-filters was updated to fix one security issue. This security issue was fixed: - CVE-2015-2265: Remote command execution in remove_bad_chars() (bnc#921753). This non-security issue was fixed: - LSB compliance of foomatic-rip (bnc#915545). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-177=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-177=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): cups-filters-1.0.58-5.1 cups-filters-cups-browsed-1.0.58-5.1 cups-filters-cups-browsed-debuginfo-1.0.58-5.1 cups-filters-debuginfo-1.0.58-5.1 cups-filters-debugsource-1.0.58-5.1 cups-filters-foomatic-rip-1.0.58-5.1 cups-filters-foomatic-rip-debuginfo-1.0.58-5.1 cups-filters-ghostscript-1.0.58-5.1 cups-filters-ghostscript-debuginfo-1.0.58-5.1 - SUSE Linux Enterprise Desktop 12 (x86_64): cups-filters-1.0.58-5.1 cups-filters-cups-browsed-1.0.58-5.1 cups-filters-cups-browsed-debuginfo-1.0.58-5.1 cups-filters-debuginfo-1.0.58-5.1 cups-filters-debugsource-1.0.58-5.1 cups-filters-foomatic-rip-1.0.58-5.1 cups-filters-foomatic-rip-debuginfo-1.0.58-5.1 cups-filters-ghostscript-1.0.58-5.1 cups-filters-ghostscript-debuginfo-1.0.58-5.1 References: https://www.suse.com/security/cve/CVE-2015-2265.html https://bugzilla.suse.com/915545 https://bugzilla.suse.com/921753 From sle-security-updates at lists.suse.com Thu Apr 30 13:04:51 2015 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 30 Apr 2015 21:04:51 +0200 (CEST) Subject: SUSE-SU-2015:0812-1: important: Security update for Linux Kernel Message-ID: <20150430190451.D0F6F3215B@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:0812-1 Rating: important References: #677286 #679812 #681175 #681999 #683282 #685402 #687812 #730118 #730200 #738400 #758813 #760902 #769784 #823260 #846404 #853040 #854722 #863335 #874307 #875051 #880484 #883223 #883795 #885422 #891844 #892490 #896390 #896391 #896779 #902346 #907818 #908382 #910251 #911325 Cross-References: CVE-2011-1090 CVE-2011-1163 CVE-2011-1476 CVE-2011-1477 CVE-2011-1493 CVE-2011-1494 CVE-2011-1495 CVE-2011-1585 CVE-2011-4127 CVE-2011-4132 CVE-2011-4913 CVE-2011-4914 CVE-2012-2313 CVE-2012-2319 CVE-2012-3400 CVE-2012-6657 CVE-2013-2147 CVE-2013-4299 CVE-2013-6405 CVE-2013-6463 CVE-2014-0181 CVE-2014-1874 CVE-2014-3184 CVE-2014-3185 CVE-2014-3673 CVE-2014-3917 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4667 CVE-2014-5471 CVE-2014-5472 CVE-2014-9090 CVE-2014-9322 CVE-2014-9420 CVE-2014-9584 CVE-2015-2041 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________ An update that fixes 39 vulnerabilities is now available. Description: The SUSE Linux Enterprise 10 SP4 LTSS kernel was updated to receive various security and bugfixes. The following security bugs have been fixed: * CVE-2015-2041: A information leak in the llc2_timeout_table was fixed (bnc#919007). * CVE-2014-9322: arch/x86/kernel/entry_64.S in the Linux kernel did not properly handle faults associated with the Stack Segment (SS) segment register, which allowed local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space (bnc#910251). * CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel did not properly handle faults associated with the Stack Segment (SS) segment register, which allowed local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the 1-clock-tests test suite (bnc#907818). * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel did not properly manage a certain backlog value, which allowed remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). * CVE-2014-3673: The SCTP implementation in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346). * CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel allowed physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response (bnc#896391). * CVE-2014-3184: The report_fixup functions in the HID subsystem in the Linux kernel might have allowed physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c (bnc#896390). * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel allowed local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context (bnc#863335). * CVE-2014-0181: The Netlink implementation in the Linux kernel did not provide a mechanism for authorizing socket operations based on the opener of a socket, which allowed local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program (bnc#875051). * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel allowed remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device (bnc#846404). * CVE-2013-2147: The HP Smart Array controller disk-array driver and Compaq SMART2 controller disk-array driver in the Linux kernel did not initialize certain data structures, which allowed local users to obtain sensitive information from kernel memory via (1) a crafted IDAGETPCIINFO command for a /dev/ida device, related to the ida_locked_ioctl function in drivers/block/cpqarray.c or (2) a crafted CCISS_PASSTHRU32 command for a /dev/cciss device, related to the cciss_ioctl32_passthru function in drivers/block/cciss.c (bnc#823260). * CVE-2012-6657: The sock_setsockopt function in net/core/sock.c in the Linux kernel did not ensure that a keepalive action is associated with a stream socket, which allowed local users to cause a denial of service (system crash) by leveraging the ability to create a raw socket (bnc#896779). * CVE-2012-3400: Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel allowed remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem (bnc#769784). * CVE-2012-2319: Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel allowed local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020 (bnc#760902). * CVE-2012-2313: The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel did not restrict access to the SIOCSMIIREG command, which allowed local users to write data to an Ethernet adapter via an ioctl call (bnc#758813). * CVE-2011-4132: The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allowed local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value" (bnc#730118). * CVE-2011-4127: The Linux kernel did not properly restrict SG_IO ioctl calls, which allowed local users to bypass intended restrictions on disk read and write operations by sending a SCSI command to (1) a partition block device or (2) an LVM volume (bnc#738400). * CVE-2011-1585: The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel did not properly determine the associations between users and sessions, which allowed local users to bypass CIFS share authentication by leveraging a mount of a share by a different user (bnc#687812). * CVE-2011-1494: Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel might have allowed local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow (bnc#685402). * CVE-2011-1495: drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel did not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions (bnc#685402). * CVE-2011-1493: Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel allowed remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data that specifies a large number of digipeaters, and then sending this data to a ROSE socket (bnc#681175). * CVE-2011-4913: The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel did not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allowed remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to a ROSE socket, or (2) conduct stack-based buffer overflow attacks via a large length value in data sent to a ROSE socket (bnc#681175). * CVE-2011-4914: The ROSE protocol implementation in the Linux kernel did not verify that certain data-length values are consistent with the amount of data sent, which might allow remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) via crafted data to a ROSE socket (bnc#681175). * CVE-2011-1476: Integer underflow in the Open Sound System (OSS) subsystem in the Linux kernel on unspecified non-x86 platforms allowed local users to cause a denial of service (memory corruption) by leveraging write access to /dev/sequencer (bnc#681999). * CVE-2011-1477: Multiple array index errors in sound/oss/opl3.c in the Linux kernel allowed local users to cause a denial of service (heap memory corruption) or possibly gain privileges by leveraging write access to /dev/sequencer (bnc#681999). * CVE-2011-1163: The osf_partition function in fs/partitions/osf.c in the Linux kernel did not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing (bnc#679812). * CVE-2011-1090: The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel stored NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allowed local users to cause a denial of service (panic) via a crafted attempt to set an ACL (bnc#677286). * CVE-2014-9584: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel did not validate a length value in the Extensions Reference (ER) System Use Field, which allowed local users to obtain sensitive information from kernel memory via a crafted iso9660 image (bnc#912654). * CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the Linux kernel did not restrict the number of Rock Ridge continuation entries, which allowed local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image (bnc#911325). * CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel allowed local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry (bnc#892490). * CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel allowed local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry (bnc#892490). * CVE-2014-3917: kernel/auditsc.c in the Linux kernel, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allowed local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number (bnc#880484). * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel allowed local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access (bnc#883795). * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel did not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allowed local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call (bnc#883795). * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel did not properly maintain the user_ctl_count value, which allowed local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls (bnc#883795). * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel did not ensure possession of a read/write lock, which allowed local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access (bnc#883795). * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel allowed local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function (bnc#883795). The following non-security bugs have been fixed: * usb: class: cdc-acm: Be careful with bInterval (bnc#891844). * Fix BUG due to racing lookups with reiserfs extended attribute backing directories (bnc#908382). * reiserfs: eliminate per-super xattr lock (bnc#908382). * reiserfs: eliminate private use of struct file in xattr (bnc#908382). * reiserfs: Expand i_mutex to enclose lookup_one_len (bnc#908382). * reiserfs: fix up lockdep warnings (bnc#908382). * reiserfs: fix xattr root locking/refcount bug (bnc#908382). * reiserfs: make per-inode xattr locking more fine grained (bnc#908382). * reiserfs: remove IS_PRIVATE helpers (bnc#908382). * reiserfs: simplify xattr internal file lookups/opens (bnc#908382). * netfilter: TCP conntrack: improve dead connection detection (bnc#874307). * Fix kABI breakage due to addition of user_ctl_lock (bnc#883795). * isofs: Fix unchecked printing of ER records. * kabi: protect struct ip_ct_tcp for bnc#874307 fix (bnc#874307). * s390: fix system hang on shutdown because of sclp_con (bnc#883223). * udf: Check component length before reading it. * udf: Check path length when reading symlink. * udf: Verify i_size when loading inode. * udf: Verify symlink size before loading it. * x86, 64-bit: Move K8 B step iret fixup to fault entry asm (preparatory patch). * x86, asm: Flip RESTORE_ARGS arguments logic (preparatory patch). * x86, asm: Thin down SAVE/RESTORE_* asm macros (preparatory patch). * x86: move dwarf2 related macro to dwarf2.h (preparatory patch). * xen: x86, asm: Flip RESTORE_ARGS arguments logic (preparatory patch). Security Issues: * CVE-2011-1090 * CVE-2011-1163 * CVE-2011-1476 * CVE-2011-1477 * CVE-2011-1493 * CVE-2011-1494 * CVE-2011-1495 * CVE-2011-1585 * CVE-2011-4127 * CVE-2011-4132 * CVE-2011-4913 * CVE-2011-4914 * CVE-2012-2313 * CVE-2012-2319 * CVE-2012-3400 * CVE-2012-6657 * CVE-2013-2147 * CVE-2013-4299 * CVE-2013-6405 * CVE-2013-6463 * CVE-2014-0181 * CVE-2014-1874 * CVE-2014-3184 * CVE-2014-3185 * CVE-2014-3673 * CVE-2014-3917 * CVE-2014-4652 * CVE-2014-4653 * CVE-2014-4654 * CVE-2014-4655 * CVE-2014-4656 * CVE-2014-4667 * CVE-2014-5471 * CVE-2014-5472 * CVE-2014-9090 * CVE-2014-9322 * CVE-2014-9420 * CVE-2014-9584 * CVE-2015-2041 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): kernel-default-2.6.16.60-0.132.1 kernel-source-2.6.16.60-0.132.1 kernel-syms-2.6.16.60-0.132.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64): kernel-debug-2.6.16.60-0.132.1 kernel-kdump-2.6.16.60-0.132.1 kernel-smp-2.6.16.60-0.132.1 kernel-xen-2.6.16.60-0.132.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586): kernel-bigsmp-2.6.16.60-0.132.1 kernel-kdumppae-2.6.16.60-0.132.1 kernel-vmi-2.6.16.60-0.132.1 kernel-vmipae-2.6.16.60-0.132.1 kernel-xenpae-2.6.16.60-0.132.1 References: https://www.suse.com/security/cve/CVE-2011-1090.html https://www.suse.com/security/cve/CVE-2011-1163.html https://www.suse.com/security/cve/CVE-2011-1476.html https://www.suse.com/security/cve/CVE-2011-1477.html https://www.suse.com/security/cve/CVE-2011-1493.html https://www.suse.com/security/cve/CVE-2011-1494.html https://www.suse.com/security/cve/CVE-2011-1495.html https://www.suse.com/security/cve/CVE-2011-1585.html https://www.suse.com/security/cve/CVE-2011-4127.html https://www.suse.com/security/cve/CVE-2011-4132.html https://www.suse.com/security/cve/CVE-2011-4913.html https://www.suse.com/security/cve/CVE-2011-4914.html https://www.suse.com/security/cve/CVE-2012-2313.html https://www.suse.com/security/cve/CVE-2012-2319.html https://www.suse.com/security/cve/CVE-2012-3400.html https://www.suse.com/security/cve/CVE-2012-6657.html https://www.suse.com/security/cve/CVE-2013-2147.html https://www.suse.com/security/cve/CVE-2013-4299.html https://www.suse.com/security/cve/CVE-2013-6405.html https://www.suse.com/security/cve/CVE-2013-6463.html https://www.suse.com/security/cve/CVE-2014-0181.html https://www.suse.com/security/cve/CVE-2014-1874.html https://www.suse.com/security/cve/CVE-2014-3184.html https://www.suse.com/security/cve/CVE-2014-3185.html https://www.suse.com/security/cve/CVE-2014-3673.html https://www.suse.com/security/cve/CVE-2014-3917.html https://www.suse.com/security/cve/CVE-2014-4652.html https://www.suse.com/security/cve/CVE-2014-4653.html https://www.suse.com/security/cve/CVE-2014-4654.html https://www.suse.com/security/cve/CVE-2014-4655.html https://www.suse.com/security/cve/CVE-2014-4656.html https://www.suse.com/security/cve/CVE-2014-4667.html https://www.suse.com/security/cve/CVE-2014-5471.html https://www.suse.com/security/cve/CVE-2014-5472.html https://www.suse.com/security/cve/CVE-2014-9090.html https://www.suse.com/security/cve/CVE-2014-9322.html https://www.suse.com/security/cve/CVE-2014-9420.html https://www.suse.com/security/cve/CVE-2014-9584.html https://www.suse.com/security/cve/CVE-2015-2041.html https://bugzilla.suse.com/677286 https://bugzilla.suse.com/679812 https://bugzilla.suse.com/681175 https://bugzilla.suse.com/681999 https://bugzilla.suse.com/683282 https://bugzilla.suse.com/685402 https://bugzilla.suse.com/687812 https://bugzilla.suse.com/730118 https://bugzilla.suse.com/730200 https://bugzilla.suse.com/738400 https://bugzilla.suse.com/758813 https://bugzilla.suse.com/760902 https://bugzilla.suse.com/769784 https://bugzilla.suse.com/823260 https://bugzilla.suse.com/846404 https://bugzilla.suse.com/853040 https://bugzilla.suse.com/854722 https://bugzilla.suse.com/863335 https://bugzilla.suse.com/874307 https://bugzilla.suse.com/875051 https://bugzilla.suse.com/880484 https://bugzilla.suse.com/883223 https://bugzilla.suse.com/883795 https://bugzilla.suse.com/885422 https://bugzilla.suse.com/891844 https://bugzilla.suse.com/892490 https://bugzilla.suse.com/896390 https://bugzilla.suse.com/896391 https://bugzilla.suse.com/896779 https://bugzilla.suse.com/902346 https://bugzilla.suse.com/907818 https://bugzilla.suse.com/908382 https://bugzilla.suse.com/910251 https://bugzilla.suse.com/911325 https://download.suse.com/patch/finder/?keywords=15c960abc4733df91b510dfe4ba2ac6d https://download.suse.com/patch/finder/?keywords=2a99948c9c3be4a024a9fa4d408002be https://download.suse.com/patch/finder/?keywords=53c468d2b277f3335fcb5ddb08bda2e4