From sle-security-updates at lists.suse.com Tue Oct 4 05:09:20 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 4 Oct 2016 13:09:20 +0200 (CEST) Subject: SUSE-SU-2016:2430-1: moderate: Security update for java-1_6_0-ibm Message-ID: <20161004110920.C69FCFEB8@maintenance.suse.de> SUSE Security Update: Security update for java-1_6_0-ibm ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2430-1 Rating: moderate References: #992537 Cross-References: CVE-2016-3485 Affected Products: SUSE Linux Enterprise Module for Legacy Software 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: IBM Java 6 was updated to version 6.0-16.30. Following security issue was fixed: CVE-2016-3485 Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Legacy Software 12: zypper in -t patch SUSE-SLE-Module-Legacy-12-2016-1423=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Module for Legacy Software 12 (s390x x86_64): java-1_6_0-ibm-1.6.0_sr16.30-40.1 java-1_6_0-ibm-fonts-1.6.0_sr16.30-40.1 java-1_6_0-ibm-jdbc-1.6.0_sr16.30-40.1 - SUSE Linux Enterprise Module for Legacy Software 12 (x86_64): java-1_6_0-ibm-plugin-1.6.0_sr16.30-40.1 References: https://www.suse.com/security/cve/CVE-2016-3485.html https://bugzilla.suse.com/992537 From sle-security-updates at lists.suse.com Tue Oct 4 05:09:45 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 4 Oct 2016 13:09:45 +0200 (CEST) Subject: SUSE-SU-2016:2431-1: important: Security update for MozillaFirefox Message-ID: <20161004110945.AA8B0FEB8@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2431-1 Rating: important References: #999701 Cross-References: CVE-2016-5250 CVE-2016-5257 CVE-2016-5261 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701): The following security issue were fixed: * MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString * MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin * MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList * MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState * MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick * MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame * MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap * MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength * MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration * MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page * MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel * MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-MozillaFirefox-12771=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-MozillaFirefox-12771=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): MozillaFirefox-45.4.0esr-52.1 MozillaFirefox-translations-45.4.0esr-52.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): MozillaFirefox-debuginfo-45.4.0esr-52.1 MozillaFirefox-debugsource-45.4.0esr-52.1 References: https://www.suse.com/security/cve/CVE-2016-5250.html https://www.suse.com/security/cve/CVE-2016-5257.html https://www.suse.com/security/cve/CVE-2016-5261.html https://www.suse.com/security/cve/CVE-2016-5270.html https://www.suse.com/security/cve/CVE-2016-5272.html https://www.suse.com/security/cve/CVE-2016-5274.html https://www.suse.com/security/cve/CVE-2016-5276.html https://www.suse.com/security/cve/CVE-2016-5277.html https://www.suse.com/security/cve/CVE-2016-5278.html https://www.suse.com/security/cve/CVE-2016-5280.html https://www.suse.com/security/cve/CVE-2016-5281.html https://www.suse.com/security/cve/CVE-2016-5284.html https://bugzilla.suse.com/999701 From sle-security-updates at lists.suse.com Tue Oct 4 05:10:47 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 4 Oct 2016 13:10:47 +0200 (CEST) Subject: SUSE-SU-2016:2434-1: important: Security update for MozillaFirefox Message-ID: <20161004111047.1DF22FF05@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2434-1 Rating: important References: #991344 #999701 Cross-References: CVE-2016-5250 CVE-2016-5257 CVE-2016-5261 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: MozillaFirefox was updated to version 45.4.0 ESR to fix the following issues: Security issues fixed: (bsc#999701 MFSA 2016-86): * CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString * CVE-2016-5272: Bad cast in nsImageGeometryMixin * CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList * CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState * CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick * CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame * CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap * CVE-2016-5281: use-after-free in DOMSVGLength * CVE-2016-5284: Add-on update site certificate pin expiration * CVE-2016-5250: Resource Timing API is storing resources sent by the previous page * CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel * CVE-2016-5257: Memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4 Bug fixed: - Fix for aarch64 Firefox startup crash (bsc#991344) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1421=1 - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1421=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1421=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1421=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1421=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): MozillaFirefox-debuginfo-45.4.0esr-81.1 MozillaFirefox-debugsource-45.4.0esr-81.1 MozillaFirefox-devel-45.4.0esr-81.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): MozillaFirefox-45.4.0esr-81.1 MozillaFirefox-debuginfo-45.4.0esr-81.1 MozillaFirefox-debugsource-45.4.0esr-81.1 MozillaFirefox-translations-45.4.0esr-81.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): MozillaFirefox-45.4.0esr-81.1 MozillaFirefox-debuginfo-45.4.0esr-81.1 MozillaFirefox-debugsource-45.4.0esr-81.1 MozillaFirefox-translations-45.4.0esr-81.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): MozillaFirefox-45.4.0esr-81.1 MozillaFirefox-debuginfo-45.4.0esr-81.1 MozillaFirefox-debugsource-45.4.0esr-81.1 MozillaFirefox-translations-45.4.0esr-81.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): MozillaFirefox-45.4.0esr-81.1 MozillaFirefox-debuginfo-45.4.0esr-81.1 MozillaFirefox-debugsource-45.4.0esr-81.1 MozillaFirefox-translations-45.4.0esr-81.1 References: https://www.suse.com/security/cve/CVE-2016-5250.html https://www.suse.com/security/cve/CVE-2016-5257.html https://www.suse.com/security/cve/CVE-2016-5261.html https://www.suse.com/security/cve/CVE-2016-5270.html https://www.suse.com/security/cve/CVE-2016-5272.html https://www.suse.com/security/cve/CVE-2016-5274.html https://www.suse.com/security/cve/CVE-2016-5276.html https://www.suse.com/security/cve/CVE-2016-5277.html https://www.suse.com/security/cve/CVE-2016-5278.html https://www.suse.com/security/cve/CVE-2016-5280.html https://www.suse.com/security/cve/CVE-2016-5281.html https://www.suse.com/security/cve/CVE-2016-5284.html https://bugzilla.suse.com/991344 https://bugzilla.suse.com/999701 From sle-security-updates at lists.suse.com Tue Oct 4 09:10:01 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 4 Oct 2016 17:10:01 +0200 (CEST) Subject: SUSE-SU-2016:2449-1: moderate: Security update for curl Message-ID: <20161004151001.C51A6FF05@maintenance.suse.de> SUSE Security Update: Security update for curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2449-1 Rating: moderate References: #991389 #991390 #997420 Cross-References: CVE-2016-5419 CVE-2016-5420 CVE-2016-7141 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-SECURITY SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for curl fixes the following issues: - CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389) - CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390) - CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-curl-12772=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-curl-12772=1 - SUSE Manager 2.1: zypper in -t patch sleman21-curl-12772=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-curl-12772=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-curl-12772=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-curl-12772=1 - SUSE Linux Enterprise Server 11-SECURITY: zypper in -t patch secsp3-curl-12772=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-curl-12772=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-curl-12772=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-curl-12772=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): curl-7.19.7-1.61.1 libcurl4-32bit-7.19.7-1.61.1 libcurl4-7.19.7-1.61.1 - SUSE Manager Proxy 2.1 (x86_64): curl-7.19.7-1.61.1 libcurl4-32bit-7.19.7-1.61.1 libcurl4-7.19.7-1.61.1 - SUSE Manager 2.1 (s390x x86_64): curl-7.19.7-1.61.1 libcurl4-32bit-7.19.7-1.61.1 libcurl4-7.19.7-1.61.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libcurl-devel-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): curl-7.19.7-1.61.1 libcurl4-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libcurl4-32bit-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libcurl4-x86-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): curl-7.19.7-1.61.1 libcurl4-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64): libcurl4-32bit-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64): curl-openssl1-7.19.7-1.61.1 libcurl4-openssl1-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64): libcurl4-openssl1-32bit-7.19.7-1.61.1 - SUSE Linux Enterprise Server 11-SECURITY (ia64): libcurl4-openssl1-x86-7.19.7-1.61.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): curl-7.19.7-1.61.1 libcurl4-7.19.7-1.61.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): curl-debuginfo-7.19.7-1.61.1 curl-debugsource-7.19.7-1.61.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): curl-debuginfo-7.19.7-1.61.1 curl-debugsource-7.19.7-1.61.1 References: https://www.suse.com/security/cve/CVE-2016-5419.html https://www.suse.com/security/cve/CVE-2016-5420.html https://www.suse.com/security/cve/CVE-2016-7141.html https://bugzilla.suse.com/991389 https://bugzilla.suse.com/991390 https://bugzilla.suse.com/997420 From sle-security-updates at lists.suse.com Tue Oct 4 13:08:48 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 4 Oct 2016 21:08:48 +0200 (CEST) Subject: SUSE-SU-2016:2453-1: moderate: Security update for wireshark Message-ID: <20161004190848.11EF4FF05@maintenance.suse.de> SUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2453-1 Rating: moderate References: #983671 #991012 #991013 #991015 #991016 #991017 #991018 #991019 #991020 Cross-References: CVE-2016-5350 CVE-2016-5351 CVE-2016-5352 CVE-2016-5353 CVE-2016-5354 CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5358 CVE-2016-5359 CVE-2016-6504 CVE-2016-6505 CVE-2016-6506 CVE-2016-6507 CVE-2016-6508 CVE-2016-6509 CVE-2016-6510 CVE-2016-6511 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: wireshark was updated to version 1.12.13 to fix the following issues: - CVE-2016-6504: wireshark: NDS dissector crash (bnc#991012) - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bnc#991013) - CVE-2016-6506: wireshark: WSP infinite loop (bnc#991015) - CVE-2016-6507: wireshark: MMSE infinite loop (bnc#991016) - CVE-2016-6508: wireshark: RLC long loop (bnc#991017) - CVE-2016-6509: wireshark: LDSS dissector crash (bnc#991018) - CVE-2016-6510: wireshark: RLC dissector crash (bnc#991019) - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020) - CVE-2016-5350: SPOOLS infinite loop (bsc#983671). - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671). - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671). - CVE-2016-5353: UMTS FP crash (bsc#983671). - CVE-2016-5354: USB dissector crash (bsc#983671). - CVE-2016-5355: Toshiba file parser crash (bsc#983671). - CVE-2016-5356: CoSine file parser crash (bsc#983671). - CVE-2016-5357: NetScreen file parser crash (bsc#983671). - CVE-2016-5358: Ethernet dissector crash (bsc#983671). - CVE-2016-5359: WBXML infinite loop (bsc#983671). For more details please see: https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1429=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1429=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1429=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): wireshark-debuginfo-1.12.13-31.1 wireshark-debugsource-1.12.13-31.1 wireshark-devel-1.12.13-31.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): wireshark-1.12.13-31.1 wireshark-debuginfo-1.12.13-31.1 wireshark-debugsource-1.12.13-31.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): wireshark-1.12.13-31.1 wireshark-debuginfo-1.12.13-31.1 wireshark-debugsource-1.12.13-31.1 References: https://www.suse.com/security/cve/CVE-2016-5350.html https://www.suse.com/security/cve/CVE-2016-5351.html https://www.suse.com/security/cve/CVE-2016-5352.html https://www.suse.com/security/cve/CVE-2016-5353.html https://www.suse.com/security/cve/CVE-2016-5354.html https://www.suse.com/security/cve/CVE-2016-5355.html https://www.suse.com/security/cve/CVE-2016-5356.html https://www.suse.com/security/cve/CVE-2016-5357.html https://www.suse.com/security/cve/CVE-2016-5358.html https://www.suse.com/security/cve/CVE-2016-5359.html https://www.suse.com/security/cve/CVE-2016-6504.html https://www.suse.com/security/cve/CVE-2016-6505.html https://www.suse.com/security/cve/CVE-2016-6506.html https://www.suse.com/security/cve/CVE-2016-6507.html https://www.suse.com/security/cve/CVE-2016-6508.html https://www.suse.com/security/cve/CVE-2016-6509.html https://www.suse.com/security/cve/CVE-2016-6510.html https://www.suse.com/security/cve/CVE-2016-6511.html https://bugzilla.suse.com/983671 https://bugzilla.suse.com/991012 https://bugzilla.suse.com/991013 https://bugzilla.suse.com/991015 https://bugzilla.suse.com/991016 https://bugzilla.suse.com/991017 https://bugzilla.suse.com/991018 https://bugzilla.suse.com/991019 https://bugzilla.suse.com/991020 From sle-security-updates at lists.suse.com Wed Oct 5 05:09:12 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 5 Oct 2016 13:09:12 +0200 (CEST) Subject: SUSE-SU-2016:2457-1: moderate: Security update for openstack-horizon-plugin-manila-ui Message-ID: <20161005110912.6EF97FF05@maintenance.suse.de> SUSE Security Update: Security update for openstack-horizon-plugin-manila-ui ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2457-1 Rating: moderate References: #988935 Cross-References: CVE-2016-6519 Affected Products: SUSE OpenStack Cloud 6 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for openstack-horizon-plugin-manila-ui fixes the metadata_to_str function code injection vulnerability. (bsc#988935, CVE-2016-6519) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 6: zypper in -t patch SUSE-OpenStack-Cloud-6-2016-1431=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 6 (noarch): openstack-horizon-plugin-manila-ui-1.2.1~a0~dev2-3.1 python-horizon-plugin-manila-ui-1.2.1~a0~dev2-3.1 References: https://www.suse.com/security/cve/CVE-2016-6519.html https://bugzilla.suse.com/988935 From sle-security-updates at lists.suse.com Wed Oct 5 10:09:39 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 5 Oct 2016 18:09:39 +0200 (CEST) Subject: SUSE-SU-2016:2458-1: important: Security update for openssl Message-ID: <20161005160939.9A74AFF05@maintenance.suse.de> SUSE Security Update: Security update for openssl ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2458-1 Rating: important References: #979475 #982575 #983249 #993819 #994749 #994844 #995075 #995324 #995359 #995377 #998190 #999665 #999666 #999668 Cross-References: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306 Affected Products: SUSE Studio Onsite 1.3 SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has four fixes is now available. Description: This update for openssl fixes the following issues: OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) More information can be found on: https://www.openssl.org/news/secadv/20160922.txt Bugs fixed: * Update expired S/MIME certs (bsc#979475) * Fix crash in print_notice (bsc#998190) * Resume reading from /dev/urandom when interrupted by a signal (bsc#995075) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-openssl-12774=1 - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-openssl-12774=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-openssl-12774=1 - SUSE Manager 2.1: zypper in -t patch sleman21-openssl-12774=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-openssl-12774=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-openssl-12774=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-openssl-12774=1 - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-openssl-12774=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-openssl-12774=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-openssl-12774=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-openssl-12774=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-openssl-12774=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): libopenssl-devel-0.9.8j-0.102.2 - SUSE OpenStack Cloud 5 (x86_64): libopenssl-devel-0.9.8j-0.102.2 libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-32bit-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Manager Proxy 2.1 (x86_64): libopenssl-devel-0.9.8j-0.102.2 libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-32bit-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Manager 2.1 (s390x x86_64): libopenssl-devel-0.9.8j-0.102.2 libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-32bit-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libopenssl-devel-0.9.8j-0.102.2 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libopenssl-devel-32bit-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libopenssl0_9_8-32bit-0.9.8j-0.102.2 libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP4 (ia64): libopenssl0_9_8-x86-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libopenssl-devel-0.9.8j-0.102.2 libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64): libopenssl0_9_8-32bit-0.9.8j-0.102.2 libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): libopenssl-devel-0.9.8j-0.102.2 libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64): libopenssl0_9_8-32bit-0.9.8j-0.102.2 libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libopenssl-devel-0.9.8j-0.102.2 libopenssl0_9_8-0.9.8j-0.102.2 libopenssl0_9_8-hmac-0.9.8j-0.102.2 openssl-0.9.8j-0.102.2 openssl-doc-0.9.8j-0.102.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): openssl-debuginfo-0.9.8j-0.102.2 openssl-debugsource-0.9.8j-0.102.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): openssl-debuginfo-0.9.8j-0.102.2 openssl-debugsource-0.9.8j-0.102.2 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): openssl-debuginfo-0.9.8j-0.102.2 openssl-debugsource-0.9.8j-0.102.2 References: https://www.suse.com/security/cve/CVE-2016-2177.html https://www.suse.com/security/cve/CVE-2016-2178.html https://www.suse.com/security/cve/CVE-2016-2179.html https://www.suse.com/security/cve/CVE-2016-2181.html https://www.suse.com/security/cve/CVE-2016-2182.html https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-6302.html https://www.suse.com/security/cve/CVE-2016-6303.html https://www.suse.com/security/cve/CVE-2016-6304.html https://www.suse.com/security/cve/CVE-2016-6306.html https://bugzilla.suse.com/979475 https://bugzilla.suse.com/982575 https://bugzilla.suse.com/983249 https://bugzilla.suse.com/993819 https://bugzilla.suse.com/994749 https://bugzilla.suse.com/994844 https://bugzilla.suse.com/995075 https://bugzilla.suse.com/995324 https://bugzilla.suse.com/995359 https://bugzilla.suse.com/995377 https://bugzilla.suse.com/998190 https://bugzilla.suse.com/999665 https://bugzilla.suse.com/999666 https://bugzilla.suse.com/999668 From sle-security-updates at lists.suse.com Wed Oct 5 10:12:19 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 5 Oct 2016 18:12:19 +0200 (CEST) Subject: SUSE-SU-2016:2459-1: important: Security update for php53 Message-ID: <20161005161219.9E90AFEB8@maintenance.suse.de> SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2459-1 Rating: important References: #997206 #997207 #997208 #997210 #997211 #997220 #997225 #997230 #997257 #999679 #999680 #999682 #999684 #999685 #999819 #999820 Cross-References: CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 16 vulnerabilities is now available. Description: This update for php53 fixes the following security issues: * CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization * CVE-2016-7125: PHP Session Data Injection Vulnerability * CVE-2016-7126: select_colors write out-of-bounds * CVE-2016-7127: imagegammacorrect allowed arbitrary write access * CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF * CVE-2016-7129: wddx_deserialize allows illegal memory access * CVE-2016-7130: wddx_deserialize null dereference * CVE-2016-7131: wddx_deserialize null dereference with invalid xml * CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element * CVE-2016-7411: php5: Memory corruption when destructing deserialized object * CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field * CVE-2016-7413: Use after free in wddx_deserialize * CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile * CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message * CVE-2016-7417: Missing type check when unserializing SplArray * CVE-2016-7418: Null pointer dereference in php_wddx_push_element Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-php53-12775=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-php53-12775=1 - SUSE Manager 2.1: zypper in -t patch sleman21-php53-12775=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-php53-12775=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-php53-12775=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-php53-12775=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-php53-12775=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-php53-12775=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-php53-12775=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): apache2-mod_php53-5.3.17-84.1 php53-5.3.17-84.1 php53-bcmath-5.3.17-84.1 php53-bz2-5.3.17-84.1 php53-calendar-5.3.17-84.1 php53-ctype-5.3.17-84.1 php53-curl-5.3.17-84.1 php53-dba-5.3.17-84.1 php53-dom-5.3.17-84.1 php53-exif-5.3.17-84.1 php53-fastcgi-5.3.17-84.1 php53-fileinfo-5.3.17-84.1 php53-ftp-5.3.17-84.1 php53-gd-5.3.17-84.1 php53-gettext-5.3.17-84.1 php53-gmp-5.3.17-84.1 php53-iconv-5.3.17-84.1 php53-intl-5.3.17-84.1 php53-json-5.3.17-84.1 php53-ldap-5.3.17-84.1 php53-mbstring-5.3.17-84.1 php53-mcrypt-5.3.17-84.1 php53-mysql-5.3.17-84.1 php53-odbc-5.3.17-84.1 php53-openssl-5.3.17-84.1 php53-pcntl-5.3.17-84.1 php53-pdo-5.3.17-84.1 php53-pear-5.3.17-84.1 php53-pgsql-5.3.17-84.1 php53-pspell-5.3.17-84.1 php53-shmop-5.3.17-84.1 php53-snmp-5.3.17-84.1 php53-soap-5.3.17-84.1 php53-suhosin-5.3.17-84.1 php53-sysvmsg-5.3.17-84.1 php53-sysvsem-5.3.17-84.1 php53-sysvshm-5.3.17-84.1 php53-tokenizer-5.3.17-84.1 php53-wddx-5.3.17-84.1 php53-xmlreader-5.3.17-84.1 php53-xmlrpc-5.3.17-84.1 php53-xmlwriter-5.3.17-84.1 php53-xsl-5.3.17-84.1 php53-zip-5.3.17-84.1 php53-zlib-5.3.17-84.1 - SUSE Manager Proxy 2.1 (x86_64): apache2-mod_php53-5.3.17-84.1 php53-5.3.17-84.1 php53-bcmath-5.3.17-84.1 php53-bz2-5.3.17-84.1 php53-calendar-5.3.17-84.1 php53-ctype-5.3.17-84.1 php53-curl-5.3.17-84.1 php53-dba-5.3.17-84.1 php53-dom-5.3.17-84.1 php53-exif-5.3.17-84.1 php53-fastcgi-5.3.17-84.1 php53-fileinfo-5.3.17-84.1 php53-ftp-5.3.17-84.1 php53-gd-5.3.17-84.1 php53-gettext-5.3.17-84.1 php53-gmp-5.3.17-84.1 php53-iconv-5.3.17-84.1 php53-intl-5.3.17-84.1 php53-json-5.3.17-84.1 php53-ldap-5.3.17-84.1 php53-mbstring-5.3.17-84.1 php53-mcrypt-5.3.17-84.1 php53-mysql-5.3.17-84.1 php53-odbc-5.3.17-84.1 php53-openssl-5.3.17-84.1 php53-pcntl-5.3.17-84.1 php53-pdo-5.3.17-84.1 php53-pear-5.3.17-84.1 php53-pgsql-5.3.17-84.1 php53-pspell-5.3.17-84.1 php53-shmop-5.3.17-84.1 php53-snmp-5.3.17-84.1 php53-soap-5.3.17-84.1 php53-suhosin-5.3.17-84.1 php53-sysvmsg-5.3.17-84.1 php53-sysvsem-5.3.17-84.1 php53-sysvshm-5.3.17-84.1 php53-tokenizer-5.3.17-84.1 php53-wddx-5.3.17-84.1 php53-xmlreader-5.3.17-84.1 php53-xmlrpc-5.3.17-84.1 php53-xmlwriter-5.3.17-84.1 php53-xsl-5.3.17-84.1 php53-zip-5.3.17-84.1 php53-zlib-5.3.17-84.1 - SUSE Manager 2.1 (s390x x86_64): apache2-mod_php53-5.3.17-84.1 php53-5.3.17-84.1 php53-bcmath-5.3.17-84.1 php53-bz2-5.3.17-84.1 php53-calendar-5.3.17-84.1 php53-ctype-5.3.17-84.1 php53-curl-5.3.17-84.1 php53-dba-5.3.17-84.1 php53-dom-5.3.17-84.1 php53-exif-5.3.17-84.1 php53-fastcgi-5.3.17-84.1 php53-fileinfo-5.3.17-84.1 php53-ftp-5.3.17-84.1 php53-gd-5.3.17-84.1 php53-gettext-5.3.17-84.1 php53-gmp-5.3.17-84.1 php53-iconv-5.3.17-84.1 php53-intl-5.3.17-84.1 php53-json-5.3.17-84.1 php53-ldap-5.3.17-84.1 php53-mbstring-5.3.17-84.1 php53-mcrypt-5.3.17-84.1 php53-mysql-5.3.17-84.1 php53-odbc-5.3.17-84.1 php53-openssl-5.3.17-84.1 php53-pcntl-5.3.17-84.1 php53-pdo-5.3.17-84.1 php53-pear-5.3.17-84.1 php53-pgsql-5.3.17-84.1 php53-pspell-5.3.17-84.1 php53-shmop-5.3.17-84.1 php53-snmp-5.3.17-84.1 php53-soap-5.3.17-84.1 php53-suhosin-5.3.17-84.1 php53-sysvmsg-5.3.17-84.1 php53-sysvsem-5.3.17-84.1 php53-sysvshm-5.3.17-84.1 php53-tokenizer-5.3.17-84.1 php53-wddx-5.3.17-84.1 php53-xmlreader-5.3.17-84.1 php53-xmlrpc-5.3.17-84.1 php53-xmlwriter-5.3.17-84.1 php53-xsl-5.3.17-84.1 php53-zip-5.3.17-84.1 php53-zlib-5.3.17-84.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-84.1 php53-imap-5.3.17-84.1 php53-posix-5.3.17-84.1 php53-readline-5.3.17-84.1 php53-sockets-5.3.17-84.1 php53-sqlite-5.3.17-84.1 php53-tidy-5.3.17-84.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-84.1 php53-5.3.17-84.1 php53-bcmath-5.3.17-84.1 php53-bz2-5.3.17-84.1 php53-calendar-5.3.17-84.1 php53-ctype-5.3.17-84.1 php53-curl-5.3.17-84.1 php53-dba-5.3.17-84.1 php53-dom-5.3.17-84.1 php53-exif-5.3.17-84.1 php53-fastcgi-5.3.17-84.1 php53-fileinfo-5.3.17-84.1 php53-ftp-5.3.17-84.1 php53-gd-5.3.17-84.1 php53-gettext-5.3.17-84.1 php53-gmp-5.3.17-84.1 php53-iconv-5.3.17-84.1 php53-intl-5.3.17-84.1 php53-json-5.3.17-84.1 php53-ldap-5.3.17-84.1 php53-mbstring-5.3.17-84.1 php53-mcrypt-5.3.17-84.1 php53-mysql-5.3.17-84.1 php53-odbc-5.3.17-84.1 php53-openssl-5.3.17-84.1 php53-pcntl-5.3.17-84.1 php53-pdo-5.3.17-84.1 php53-pear-5.3.17-84.1 php53-pgsql-5.3.17-84.1 php53-pspell-5.3.17-84.1 php53-shmop-5.3.17-84.1 php53-snmp-5.3.17-84.1 php53-soap-5.3.17-84.1 php53-suhosin-5.3.17-84.1 php53-sysvmsg-5.3.17-84.1 php53-sysvsem-5.3.17-84.1 php53-sysvshm-5.3.17-84.1 php53-tokenizer-5.3.17-84.1 php53-wddx-5.3.17-84.1 php53-xmlreader-5.3.17-84.1 php53-xmlrpc-5.3.17-84.1 php53-xmlwriter-5.3.17-84.1 php53-xsl-5.3.17-84.1 php53-zip-5.3.17-84.1 php53-zlib-5.3.17-84.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): apache2-mod_php53-5.3.17-84.1 php53-5.3.17-84.1 php53-bcmath-5.3.17-84.1 php53-bz2-5.3.17-84.1 php53-calendar-5.3.17-84.1 php53-ctype-5.3.17-84.1 php53-curl-5.3.17-84.1 php53-dba-5.3.17-84.1 php53-dom-5.3.17-84.1 php53-exif-5.3.17-84.1 php53-fastcgi-5.3.17-84.1 php53-fileinfo-5.3.17-84.1 php53-ftp-5.3.17-84.1 php53-gd-5.3.17-84.1 php53-gettext-5.3.17-84.1 php53-gmp-5.3.17-84.1 php53-iconv-5.3.17-84.1 php53-intl-5.3.17-84.1 php53-json-5.3.17-84.1 php53-ldap-5.3.17-84.1 php53-mbstring-5.3.17-84.1 php53-mcrypt-5.3.17-84.1 php53-mysql-5.3.17-84.1 php53-odbc-5.3.17-84.1 php53-openssl-5.3.17-84.1 php53-pcntl-5.3.17-84.1 php53-pdo-5.3.17-84.1 php53-pear-5.3.17-84.1 php53-pgsql-5.3.17-84.1 php53-pspell-5.3.17-84.1 php53-shmop-5.3.17-84.1 php53-snmp-5.3.17-84.1 php53-soap-5.3.17-84.1 php53-suhosin-5.3.17-84.1 php53-sysvmsg-5.3.17-84.1 php53-sysvsem-5.3.17-84.1 php53-sysvshm-5.3.17-84.1 php53-tokenizer-5.3.17-84.1 php53-wddx-5.3.17-84.1 php53-xmlreader-5.3.17-84.1 php53-xmlrpc-5.3.17-84.1 php53-xmlwriter-5.3.17-84.1 php53-xsl-5.3.17-84.1 php53-zip-5.3.17-84.1 php53-zlib-5.3.17-84.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): apache2-mod_php53-5.3.17-84.1 php53-5.3.17-84.1 php53-bcmath-5.3.17-84.1 php53-bz2-5.3.17-84.1 php53-calendar-5.3.17-84.1 php53-ctype-5.3.17-84.1 php53-curl-5.3.17-84.1 php53-dba-5.3.17-84.1 php53-dom-5.3.17-84.1 php53-exif-5.3.17-84.1 php53-fastcgi-5.3.17-84.1 php53-fileinfo-5.3.17-84.1 php53-ftp-5.3.17-84.1 php53-gd-5.3.17-84.1 php53-gettext-5.3.17-84.1 php53-gmp-5.3.17-84.1 php53-iconv-5.3.17-84.1 php53-intl-5.3.17-84.1 php53-json-5.3.17-84.1 php53-ldap-5.3.17-84.1 php53-mbstring-5.3.17-84.1 php53-mcrypt-5.3.17-84.1 php53-mysql-5.3.17-84.1 php53-odbc-5.3.17-84.1 php53-openssl-5.3.17-84.1 php53-pcntl-5.3.17-84.1 php53-pdo-5.3.17-84.1 php53-pear-5.3.17-84.1 php53-pgsql-5.3.17-84.1 php53-pspell-5.3.17-84.1 php53-shmop-5.3.17-84.1 php53-snmp-5.3.17-84.1 php53-soap-5.3.17-84.1 php53-suhosin-5.3.17-84.1 php53-sysvmsg-5.3.17-84.1 php53-sysvsem-5.3.17-84.1 php53-sysvshm-5.3.17-84.1 php53-tokenizer-5.3.17-84.1 php53-wddx-5.3.17-84.1 php53-xmlreader-5.3.17-84.1 php53-xmlrpc-5.3.17-84.1 php53-xmlwriter-5.3.17-84.1 php53-xsl-5.3.17-84.1 php53-zip-5.3.17-84.1 php53-zlib-5.3.17-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-debuginfo-5.3.17-84.1 php53-debugsource-5.3.17-84.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): php53-debuginfo-5.3.17-84.1 php53-debugsource-5.3.17-84.1 References: https://www.suse.com/security/cve/CVE-2016-7124.html https://www.suse.com/security/cve/CVE-2016-7125.html https://www.suse.com/security/cve/CVE-2016-7126.html https://www.suse.com/security/cve/CVE-2016-7127.html https://www.suse.com/security/cve/CVE-2016-7128.html https://www.suse.com/security/cve/CVE-2016-7129.html https://www.suse.com/security/cve/CVE-2016-7130.html https://www.suse.com/security/cve/CVE-2016-7131.html https://www.suse.com/security/cve/CVE-2016-7132.html https://www.suse.com/security/cve/CVE-2016-7411.html https://www.suse.com/security/cve/CVE-2016-7412.html https://www.suse.com/security/cve/CVE-2016-7413.html https://www.suse.com/security/cve/CVE-2016-7414.html https://www.suse.com/security/cve/CVE-2016-7416.html https://www.suse.com/security/cve/CVE-2016-7417.html https://www.suse.com/security/cve/CVE-2016-7418.html https://bugzilla.suse.com/997206 https://bugzilla.suse.com/997207 https://bugzilla.suse.com/997208 https://bugzilla.suse.com/997210 https://bugzilla.suse.com/997211 https://bugzilla.suse.com/997220 https://bugzilla.suse.com/997225 https://bugzilla.suse.com/997230 https://bugzilla.suse.com/997257 https://bugzilla.suse.com/999679 https://bugzilla.suse.com/999680 https://bugzilla.suse.com/999682 https://bugzilla.suse.com/999684 https://bugzilla.suse.com/999685 https://bugzilla.suse.com/999819 https://bugzilla.suse.com/999820 From sle-security-updates at lists.suse.com Wed Oct 5 13:08:44 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 5 Oct 2016 21:08:44 +0200 (CEST) Subject: SUSE-SU-2016:2460-1: important: Security update for php7 Message-ID: <20161005190844.ACE56FEB8@maintenance.suse.de> SUSE Security Update: Security update for php7 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2460-1 Rating: important References: #1001950 #987580 #988032 #991422 #991424 #991426 #991427 #991428 #991429 #991430 #991434 #991437 #995512 #997206 #997207 #997208 #997210 #997211 #997220 #997225 #997230 #997247 #997248 #997257 #999313 #999679 #999680 #999684 #999685 #999819 #999820 Cross-References: CVE-2016-4473 CVE-2016-5399 CVE-2016-6128 CVE-2016-6161 CVE-2016-6207 CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6292 CVE-2016-6295 CVE-2016-6296 CVE-2016-6297 CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 CVE-2016-7133 CVE-2016-7134 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that solves 29 vulnerabilities and has two fixes is now available. Description: This update for php7 fixes the following security issues: * CVE-2016-6128: Invalid color index not properly handled [bsc#987580] * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032] * CVE-2016-6292: Null pointer dereference in exif_process_user_comment [bsc#991422] * CVE-2016-6295: Use after free in SNMP with GC and unserialize() [bsc#991424] * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426] * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427] * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428] * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429] * CVE-2016-5399: Improper error handling in bzread() [bsc#991430] * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437] * CVE-2016-6207: Integer overflow error within _gdContributionsAlloc() [bsc#991434] * CVE-2016-4473: Invalid free() instead of efree() in phar_extract_file() * CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization * CVE-2016-7125: PHP Session Data Injection Vulnerability * CVE-2016-7126: select_colors write out-of-bounds * CVE-2016-7127: imagegammacorrect allowed arbitrary write access * CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF * CVE-2016-7129: wddx_deserialize allowed illegal memory access * CVE-2016-7131: wddx_deserialize null dereference with invalid xml * CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element * CVE-2016-7133: memory allocator fails to realloc small block to large one * CVE-2016-7134: Heap overflow in the function curl_escape * CVE-2016-7130: wddx_deserialize null dereference * CVE-2016-7413: Use after free in wddx_deserialize * CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field * CVE-2016-7417: Missing type check when unserializing SplArray * CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message * CVE-2016-7418: Null pointer dereference in php_wddx_push_element * CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1434=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2016-1434=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): php7-debuginfo-7.0.7-15.1 php7-debugsource-7.0.7-15.1 php7-devel-7.0.7-15.1 - SUSE Linux Enterprise Module for Web Scripting 12 (ppc64le s390x x86_64): apache2-mod_php7-7.0.7-15.1 apache2-mod_php7-debuginfo-7.0.7-15.1 php7-7.0.7-15.1 php7-bcmath-7.0.7-15.1 php7-bcmath-debuginfo-7.0.7-15.1 php7-bz2-7.0.7-15.1 php7-bz2-debuginfo-7.0.7-15.1 php7-calendar-7.0.7-15.1 php7-calendar-debuginfo-7.0.7-15.1 php7-ctype-7.0.7-15.1 php7-ctype-debuginfo-7.0.7-15.1 php7-curl-7.0.7-15.1 php7-curl-debuginfo-7.0.7-15.1 php7-dba-7.0.7-15.1 php7-dba-debuginfo-7.0.7-15.1 php7-debuginfo-7.0.7-15.1 php7-debugsource-7.0.7-15.1 php7-dom-7.0.7-15.1 php7-dom-debuginfo-7.0.7-15.1 php7-enchant-7.0.7-15.1 php7-enchant-debuginfo-7.0.7-15.1 php7-exif-7.0.7-15.1 php7-exif-debuginfo-7.0.7-15.1 php7-fastcgi-7.0.7-15.1 php7-fastcgi-debuginfo-7.0.7-15.1 php7-fileinfo-7.0.7-15.1 php7-fileinfo-debuginfo-7.0.7-15.1 php7-fpm-7.0.7-15.1 php7-fpm-debuginfo-7.0.7-15.1 php7-ftp-7.0.7-15.1 php7-ftp-debuginfo-7.0.7-15.1 php7-gd-7.0.7-15.1 php7-gd-debuginfo-7.0.7-15.1 php7-gettext-7.0.7-15.1 php7-gettext-debuginfo-7.0.7-15.1 php7-gmp-7.0.7-15.1 php7-gmp-debuginfo-7.0.7-15.1 php7-iconv-7.0.7-15.1 php7-iconv-debuginfo-7.0.7-15.1 php7-imap-7.0.7-15.1 php7-imap-debuginfo-7.0.7-15.1 php7-intl-7.0.7-15.1 php7-intl-debuginfo-7.0.7-15.1 php7-json-7.0.7-15.1 php7-json-debuginfo-7.0.7-15.1 php7-ldap-7.0.7-15.1 php7-ldap-debuginfo-7.0.7-15.1 php7-mbstring-7.0.7-15.1 php7-mbstring-debuginfo-7.0.7-15.1 php7-mcrypt-7.0.7-15.1 php7-mcrypt-debuginfo-7.0.7-15.1 php7-mysql-7.0.7-15.1 php7-mysql-debuginfo-7.0.7-15.1 php7-odbc-7.0.7-15.1 php7-odbc-debuginfo-7.0.7-15.1 php7-opcache-7.0.7-15.1 php7-opcache-debuginfo-7.0.7-15.1 php7-openssl-7.0.7-15.1 php7-openssl-debuginfo-7.0.7-15.1 php7-pcntl-7.0.7-15.1 php7-pcntl-debuginfo-7.0.7-15.1 php7-pdo-7.0.7-15.1 php7-pdo-debuginfo-7.0.7-15.1 php7-pgsql-7.0.7-15.1 php7-pgsql-debuginfo-7.0.7-15.1 php7-phar-7.0.7-15.1 php7-phar-debuginfo-7.0.7-15.1 php7-posix-7.0.7-15.1 php7-posix-debuginfo-7.0.7-15.1 php7-pspell-7.0.7-15.1 php7-pspell-debuginfo-7.0.7-15.1 php7-shmop-7.0.7-15.1 php7-shmop-debuginfo-7.0.7-15.1 php7-snmp-7.0.7-15.1 php7-snmp-debuginfo-7.0.7-15.1 php7-soap-7.0.7-15.1 php7-soap-debuginfo-7.0.7-15.1 php7-sockets-7.0.7-15.1 php7-sockets-debuginfo-7.0.7-15.1 php7-sqlite-7.0.7-15.1 php7-sqlite-debuginfo-7.0.7-15.1 php7-sysvmsg-7.0.7-15.1 php7-sysvmsg-debuginfo-7.0.7-15.1 php7-sysvsem-7.0.7-15.1 php7-sysvsem-debuginfo-7.0.7-15.1 php7-sysvshm-7.0.7-15.1 php7-sysvshm-debuginfo-7.0.7-15.1 php7-tokenizer-7.0.7-15.1 php7-tokenizer-debuginfo-7.0.7-15.1 php7-wddx-7.0.7-15.1 php7-wddx-debuginfo-7.0.7-15.1 php7-xmlreader-7.0.7-15.1 php7-xmlreader-debuginfo-7.0.7-15.1 php7-xmlrpc-7.0.7-15.1 php7-xmlrpc-debuginfo-7.0.7-15.1 php7-xmlwriter-7.0.7-15.1 php7-xmlwriter-debuginfo-7.0.7-15.1 php7-xsl-7.0.7-15.1 php7-xsl-debuginfo-7.0.7-15.1 php7-zip-7.0.7-15.1 php7-zip-debuginfo-7.0.7-15.1 php7-zlib-7.0.7-15.1 php7-zlib-debuginfo-7.0.7-15.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): php7-pear-7.0.7-15.1 php7-pear-Archive_Tar-7.0.7-15.1 References: https://www.suse.com/security/cve/CVE-2016-4473.html https://www.suse.com/security/cve/CVE-2016-5399.html https://www.suse.com/security/cve/CVE-2016-6128.html https://www.suse.com/security/cve/CVE-2016-6161.html https://www.suse.com/security/cve/CVE-2016-6207.html https://www.suse.com/security/cve/CVE-2016-6289.html https://www.suse.com/security/cve/CVE-2016-6290.html https://www.suse.com/security/cve/CVE-2016-6291.html https://www.suse.com/security/cve/CVE-2016-6292.html https://www.suse.com/security/cve/CVE-2016-6295.html https://www.suse.com/security/cve/CVE-2016-6296.html https://www.suse.com/security/cve/CVE-2016-6297.html https://www.suse.com/security/cve/CVE-2016-7124.html https://www.suse.com/security/cve/CVE-2016-7125.html https://www.suse.com/security/cve/CVE-2016-7126.html https://www.suse.com/security/cve/CVE-2016-7127.html https://www.suse.com/security/cve/CVE-2016-7128.html https://www.suse.com/security/cve/CVE-2016-7129.html https://www.suse.com/security/cve/CVE-2016-7130.html https://www.suse.com/security/cve/CVE-2016-7131.html https://www.suse.com/security/cve/CVE-2016-7132.html https://www.suse.com/security/cve/CVE-2016-7133.html https://www.suse.com/security/cve/CVE-2016-7134.html https://www.suse.com/security/cve/CVE-2016-7412.html https://www.suse.com/security/cve/CVE-2016-7413.html https://www.suse.com/security/cve/CVE-2016-7414.html https://www.suse.com/security/cve/CVE-2016-7416.html https://www.suse.com/security/cve/CVE-2016-7417.html https://www.suse.com/security/cve/CVE-2016-7418.html https://bugzilla.suse.com/1001950 https://bugzilla.suse.com/987580 https://bugzilla.suse.com/988032 https://bugzilla.suse.com/991422 https://bugzilla.suse.com/991424 https://bugzilla.suse.com/991426 https://bugzilla.suse.com/991427 https://bugzilla.suse.com/991428 https://bugzilla.suse.com/991429 https://bugzilla.suse.com/991430 https://bugzilla.suse.com/991434 https://bugzilla.suse.com/991437 https://bugzilla.suse.com/995512 https://bugzilla.suse.com/997206 https://bugzilla.suse.com/997207 https://bugzilla.suse.com/997208 https://bugzilla.suse.com/997210 https://bugzilla.suse.com/997211 https://bugzilla.suse.com/997220 https://bugzilla.suse.com/997225 https://bugzilla.suse.com/997230 https://bugzilla.suse.com/997247 https://bugzilla.suse.com/997248 https://bugzilla.suse.com/997257 https://bugzilla.suse.com/999313 https://bugzilla.suse.com/999679 https://bugzilla.suse.com/999680 https://bugzilla.suse.com/999684 https://bugzilla.suse.com/999685 https://bugzilla.suse.com/999819 https://bugzilla.suse.com/999820 From sle-security-updates at lists.suse.com Wed Oct 5 17:08:30 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 6 Oct 2016 01:08:30 +0200 (CEST) Subject: SUSE-SU-2016:2461-1: important: Security update for php53 Message-ID: <20161005230830.AFEBAFF57@maintenance.suse.de> SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2461-1 Rating: important References: #999679 #999680 #999682 #999684 #999685 #999819 #999820 Cross-References: CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for php53 fixes the following issues: * CVE-2016-7411: php5: Memory corruption when destructing deserialized object * CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field * CVE-2016-7413: Use after free in wddx_deserialize * CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile * CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message * CVE-2016-7417: Missing type check when unserializing SplArray * CVE-2016-7418: Null pointer dereference in php_wddx_push_element Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-php53-12776=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-php53-12776=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): apache2-mod_php53-5.3.17-58.1 php53-5.3.17-58.1 php53-bcmath-5.3.17-58.1 php53-bz2-5.3.17-58.1 php53-calendar-5.3.17-58.1 php53-ctype-5.3.17-58.1 php53-curl-5.3.17-58.1 php53-dba-5.3.17-58.1 php53-dom-5.3.17-58.1 php53-exif-5.3.17-58.1 php53-fastcgi-5.3.17-58.1 php53-fileinfo-5.3.17-58.1 php53-ftp-5.3.17-58.1 php53-gd-5.3.17-58.1 php53-gettext-5.3.17-58.1 php53-gmp-5.3.17-58.1 php53-iconv-5.3.17-58.1 php53-intl-5.3.17-58.1 php53-json-5.3.17-58.1 php53-ldap-5.3.17-58.1 php53-mbstring-5.3.17-58.1 php53-mcrypt-5.3.17-58.1 php53-mysql-5.3.17-58.1 php53-odbc-5.3.17-58.1 php53-openssl-5.3.17-58.1 php53-pcntl-5.3.17-58.1 php53-pdo-5.3.17-58.1 php53-pear-5.3.17-58.1 php53-pgsql-5.3.17-58.1 php53-pspell-5.3.17-58.1 php53-shmop-5.3.17-58.1 php53-snmp-5.3.17-58.1 php53-soap-5.3.17-58.1 php53-suhosin-5.3.17-58.1 php53-sysvmsg-5.3.17-58.1 php53-sysvsem-5.3.17-58.1 php53-sysvshm-5.3.17-58.1 php53-tokenizer-5.3.17-58.1 php53-wddx-5.3.17-58.1 php53-xmlreader-5.3.17-58.1 php53-xmlrpc-5.3.17-58.1 php53-xmlwriter-5.3.17-58.1 php53-xsl-5.3.17-58.1 php53-zip-5.3.17-58.1 php53-zlib-5.3.17-58.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): php53-debuginfo-5.3.17-58.1 php53-debugsource-5.3.17-58.1 References: https://www.suse.com/security/cve/CVE-2016-7411.html https://www.suse.com/security/cve/CVE-2016-7412.html https://www.suse.com/security/cve/CVE-2016-7413.html https://www.suse.com/security/cve/CVE-2016-7414.html https://www.suse.com/security/cve/CVE-2016-7416.html https://www.suse.com/security/cve/CVE-2016-7417.html https://www.suse.com/security/cve/CVE-2016-7418.html https://bugzilla.suse.com/999679 https://bugzilla.suse.com/999680 https://bugzilla.suse.com/999682 https://bugzilla.suse.com/999684 https://bugzilla.suse.com/999685 https://bugzilla.suse.com/999819 https://bugzilla.suse.com/999820 From sle-security-updates at lists.suse.com Thu Oct 6 12:09:27 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 6 Oct 2016 20:09:27 +0200 (CEST) Subject: SUSE-SU-2016:2468-1: important: Security update for compat-openssl098 Message-ID: <20161006180927.AB045FF57@maintenance.suse.de> SUSE Security Update: Security update for compat-openssl098 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2468-1 Rating: important References: #979475 #982575 #983249 #993819 #994749 #994844 #995075 #995324 #995359 #995377 #998190 #999665 #999666 #999668 Cross-References: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Module for Legacy Software 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has four fixes is now available. Description: This update for compat-openssl098 fixes the following issues: OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) More information can be found on: https://www.openssl.org/news/secadv/20160922.txt Bugs fixed: * update expired S/MIME certs (bsc#979475) * fix crash in print_notice (bsc#998190) * resume reading from /dev/urandom when interrupted by a signal (bsc#995075) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2016-1441=1 - SUSE Linux Enterprise Module for Legacy Software 12: zypper in -t patch SUSE-SLE-Module-Legacy-12-2016-1441=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1441=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): compat-openssl098-debugsource-0.9.8j-102.1 libopenssl0_9_8-0.9.8j-102.1 libopenssl0_9_8-debuginfo-0.9.8j-102.1 - SUSE Linux Enterprise Module for Legacy Software 12 (s390x x86_64): compat-openssl098-debugsource-0.9.8j-102.1 libopenssl0_9_8-0.9.8j-102.1 libopenssl0_9_8-32bit-0.9.8j-102.1 libopenssl0_9_8-debuginfo-0.9.8j-102.1 libopenssl0_9_8-debuginfo-32bit-0.9.8j-102.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): compat-openssl098-debugsource-0.9.8j-102.1 libopenssl0_9_8-0.9.8j-102.1 libopenssl0_9_8-32bit-0.9.8j-102.1 libopenssl0_9_8-debuginfo-0.9.8j-102.1 libopenssl0_9_8-debuginfo-32bit-0.9.8j-102.1 References: https://www.suse.com/security/cve/CVE-2016-2177.html https://www.suse.com/security/cve/CVE-2016-2178.html https://www.suse.com/security/cve/CVE-2016-2179.html https://www.suse.com/security/cve/CVE-2016-2181.html https://www.suse.com/security/cve/CVE-2016-2182.html https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-6302.html https://www.suse.com/security/cve/CVE-2016-6303.html https://www.suse.com/security/cve/CVE-2016-6304.html https://www.suse.com/security/cve/CVE-2016-6306.html https://bugzilla.suse.com/979475 https://bugzilla.suse.com/982575 https://bugzilla.suse.com/983249 https://bugzilla.suse.com/993819 https://bugzilla.suse.com/994749 https://bugzilla.suse.com/994844 https://bugzilla.suse.com/995075 https://bugzilla.suse.com/995324 https://bugzilla.suse.com/995359 https://bugzilla.suse.com/995377 https://bugzilla.suse.com/998190 https://bugzilla.suse.com/999665 https://bugzilla.suse.com/999666 https://bugzilla.suse.com/999668 From sle-security-updates at lists.suse.com Thu Oct 6 12:11:43 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 6 Oct 2016 20:11:43 +0200 (CEST) Subject: SUSE-SU-2016:2469-1: important: Security update for openssl1 Message-ID: <20161006181143.1A3ABFF5D@maintenance.suse.de> SUSE Security Update: Security update for openssl1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2469-1 Rating: important References: #979475 #982575 #982745 #983249 #990419 #993819 #994749 #994844 #995075 #995324 #995359 #995377 #998190 #999665 #999666 #999668 Cross-References: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306 Affected Products: SUSE Linux Enterprise Server 11-SECURITY ______________________________________________________________________________ An update that solves 11 vulnerabilities and has 5 fixes is now available. Description: This update for openssl1 fixes the following issues: penSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) More information can be found on: https://www.openssl.org/news/secadv/20160922.txt Also following bugs were fixed: * update expired S/MIME certs (bsc#979475) * improve s390x performance (bsc#982745) * fix crash in print_notice (bsc#998190) * resume reading from /dev/urandom when interrupted by a signal (bsc#995075) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SECURITY: zypper in -t patch secsp3-openssl1-12777=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64): libopenssl1-devel-1.0.1g-0.52.1 libopenssl1_0_0-1.0.1g-0.52.1 openssl1-1.0.1g-0.52.1 openssl1-doc-1.0.1g-0.52.1 - SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64): libopenssl1_0_0-32bit-1.0.1g-0.52.1 - SUSE Linux Enterprise Server 11-SECURITY (ia64): libopenssl1_0_0-x86-1.0.1g-0.52.1 References: https://www.suse.com/security/cve/CVE-2016-2177.html https://www.suse.com/security/cve/CVE-2016-2178.html https://www.suse.com/security/cve/CVE-2016-2179.html https://www.suse.com/security/cve/CVE-2016-2180.html https://www.suse.com/security/cve/CVE-2016-2181.html https://www.suse.com/security/cve/CVE-2016-2182.html https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-6302.html https://www.suse.com/security/cve/CVE-2016-6303.html https://www.suse.com/security/cve/CVE-2016-6304.html https://www.suse.com/security/cve/CVE-2016-6306.html https://bugzilla.suse.com/979475 https://bugzilla.suse.com/982575 https://bugzilla.suse.com/982745 https://bugzilla.suse.com/983249 https://bugzilla.suse.com/990419 https://bugzilla.suse.com/993819 https://bugzilla.suse.com/994749 https://bugzilla.suse.com/994844 https://bugzilla.suse.com/995075 https://bugzilla.suse.com/995324 https://bugzilla.suse.com/995359 https://bugzilla.suse.com/995377 https://bugzilla.suse.com/998190 https://bugzilla.suse.com/999665 https://bugzilla.suse.com/999666 https://bugzilla.suse.com/999668 From sle-security-updates at lists.suse.com Thu Oct 6 12:14:20 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 6 Oct 2016 20:14:20 +0200 (CEST) Subject: SUSE-SU-2016:2470-1: important: Security update for nodejs4 Message-ID: <20161006181420.1954BFF0F@maintenance.suse.de> SUSE Security Update: Security update for nodejs4 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2470-1 Rating: important References: #1001652 #985201 Cross-References: CVE-2016-2178 CVE-2016-2183 CVE-2016-5325 CVE-2016-6304 CVE-2016-6306 CVE-2016-7052 CVE-2016-7099 Affected Products: SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update brings the new upstream nodejs LTS version 4.6.0, fixing bugs and security issues: * Nodejs embedded openssl version update + upgrade to 1.0.2j (CVE-2016-6304, CVE-2016-2183, CVE-2016-2178, CVE-2016-6306, CVE-2016-7052) + remove support for dynamic 3rd party engine modules * http: Properly validate for allowable characters in input user data. This introduces a new case where throw may occur when configuring HTTP responses, users should already be adopting try/catch here. (CVE-2016-5325, bsc#985201) * tls: properly validate wildcard certificates (CVE-2016-7099, bsc#1001652) * buffer: Zero-fill excess bytes in new Buffer objects created with Buffer.concat() Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2016-1439=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Module for Web Scripting 12 (ppc64le x86_64): nodejs4-4.6.0-8.1 nodejs4-debuginfo-4.6.0-8.1 nodejs4-debugsource-4.6.0-8.1 nodejs4-devel-4.6.0-8.1 npm4-4.6.0-8.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): nodejs4-docs-4.6.0-8.1 References: https://www.suse.com/security/cve/CVE-2016-2178.html https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-5325.html https://www.suse.com/security/cve/CVE-2016-6304.html https://www.suse.com/security/cve/CVE-2016-6306.html https://www.suse.com/security/cve/CVE-2016-7052.html https://www.suse.com/security/cve/CVE-2016-7099.html https://bugzilla.suse.com/1001652 https://bugzilla.suse.com/985201 From sle-security-updates at lists.suse.com Thu Oct 6 14:09:30 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 6 Oct 2016 22:09:30 +0200 (CEST) Subject: SUSE-SU-2016:2472-1: Security update for libreoffice Message-ID: <20161006200930.696B9F7BC@maintenance.suse.de> SUSE Security Update: Security update for libreoffice ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2472-1 Rating: low References: #1000102 #987553 Cross-References: CVE-2016-4324 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: LibreOffice was updated to version 5.1.5.2, bringing enhancements and bug fixes. - CVE-2016-4324: Parsing the Rich Text Format character style index was insufficiently checked for validity. Documents could be constructed which dereference an iterator to the first entry of an empty STL container. (bsc#987553) - Don't use "nullable" for introspection, as it isn't available on SLE 12's version of gobject-introspection. This prevents a segmentation fault in gnome-documents. (bsc#1000102) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1442=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1442=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (noarch): libreoffice-icon-theme-galaxy-5.1.5.2-29.4 libreoffice-icon-theme-tango-5.1.5.2-29.4 libreoffice-l10n-af-5.1.5.2-29.4 libreoffice-l10n-ar-5.1.5.2-29.4 libreoffice-l10n-ca-5.1.5.2-29.4 libreoffice-l10n-cs-5.1.5.2-29.4 libreoffice-l10n-da-5.1.5.2-29.4 libreoffice-l10n-de-5.1.5.2-29.4 libreoffice-l10n-en-5.1.5.2-29.4 libreoffice-l10n-es-5.1.5.2-29.4 libreoffice-l10n-fi-5.1.5.2-29.4 libreoffice-l10n-fr-5.1.5.2-29.4 libreoffice-l10n-gu-5.1.5.2-29.4 libreoffice-l10n-hi-5.1.5.2-29.4 libreoffice-l10n-hu-5.1.5.2-29.4 libreoffice-l10n-it-5.1.5.2-29.4 libreoffice-l10n-ja-5.1.5.2-29.4 libreoffice-l10n-ko-5.1.5.2-29.4 libreoffice-l10n-nb-5.1.5.2-29.4 libreoffice-l10n-nl-5.1.5.2-29.4 libreoffice-l10n-nn-5.1.5.2-29.4 libreoffice-l10n-pl-5.1.5.2-29.4 libreoffice-l10n-pt-BR-5.1.5.2-29.4 libreoffice-l10n-pt-PT-5.1.5.2-29.4 libreoffice-l10n-ru-5.1.5.2-29.4 libreoffice-l10n-sk-5.1.5.2-29.4 libreoffice-l10n-sv-5.1.5.2-29.4 libreoffice-l10n-xh-5.1.5.2-29.4 libreoffice-l10n-zh-Hans-5.1.5.2-29.4 libreoffice-l10n-zh-Hant-5.1.5.2-29.4 libreoffice-l10n-zu-5.1.5.2-29.4 - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): libreoffice-5.1.5.2-29.4 libreoffice-base-5.1.5.2-29.4 libreoffice-base-debuginfo-5.1.5.2-29.4 libreoffice-base-drivers-mysql-5.1.5.2-29.4 libreoffice-base-drivers-mysql-debuginfo-5.1.5.2-29.4 libreoffice-base-drivers-postgresql-5.1.5.2-29.4 libreoffice-base-drivers-postgresql-debuginfo-5.1.5.2-29.4 libreoffice-calc-5.1.5.2-29.4 libreoffice-calc-debuginfo-5.1.5.2-29.4 libreoffice-calc-extensions-5.1.5.2-29.4 libreoffice-debuginfo-5.1.5.2-29.4 libreoffice-debugsource-5.1.5.2-29.4 libreoffice-draw-5.1.5.2-29.4 libreoffice-draw-debuginfo-5.1.5.2-29.4 libreoffice-filters-optional-5.1.5.2-29.4 libreoffice-gnome-5.1.5.2-29.4 libreoffice-gnome-debuginfo-5.1.5.2-29.4 libreoffice-impress-5.1.5.2-29.4 libreoffice-impress-debuginfo-5.1.5.2-29.4 libreoffice-mailmerge-5.1.5.2-29.4 libreoffice-math-5.1.5.2-29.4 libreoffice-math-debuginfo-5.1.5.2-29.4 libreoffice-officebean-5.1.5.2-29.4 libreoffice-officebean-debuginfo-5.1.5.2-29.4 libreoffice-pyuno-5.1.5.2-29.4 libreoffice-pyuno-debuginfo-5.1.5.2-29.4 libreoffice-writer-5.1.5.2-29.4 libreoffice-writer-debuginfo-5.1.5.2-29.4 libreoffice-writer-extensions-5.1.5.2-29.4 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libreoffice-5.1.5.2-29.4 libreoffice-base-5.1.5.2-29.4 libreoffice-base-debuginfo-5.1.5.2-29.4 libreoffice-base-drivers-mysql-5.1.5.2-29.4 libreoffice-base-drivers-mysql-debuginfo-5.1.5.2-29.4 libreoffice-base-drivers-postgresql-5.1.5.2-29.4 libreoffice-base-drivers-postgresql-debuginfo-5.1.5.2-29.4 libreoffice-calc-5.1.5.2-29.4 libreoffice-calc-debuginfo-5.1.5.2-29.4 libreoffice-calc-extensions-5.1.5.2-29.4 libreoffice-debuginfo-5.1.5.2-29.4 libreoffice-debugsource-5.1.5.2-29.4 libreoffice-draw-5.1.5.2-29.4 libreoffice-draw-debuginfo-5.1.5.2-29.4 libreoffice-filters-optional-5.1.5.2-29.4 libreoffice-gnome-5.1.5.2-29.4 libreoffice-gnome-debuginfo-5.1.5.2-29.4 libreoffice-impress-5.1.5.2-29.4 libreoffice-impress-debuginfo-5.1.5.2-29.4 libreoffice-mailmerge-5.1.5.2-29.4 libreoffice-math-5.1.5.2-29.4 libreoffice-math-debuginfo-5.1.5.2-29.4 libreoffice-officebean-5.1.5.2-29.4 libreoffice-officebean-debuginfo-5.1.5.2-29.4 libreoffice-pyuno-5.1.5.2-29.4 libreoffice-pyuno-debuginfo-5.1.5.2-29.4 libreoffice-writer-5.1.5.2-29.4 libreoffice-writer-debuginfo-5.1.5.2-29.4 libreoffice-writer-extensions-5.1.5.2-29.4 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): libreoffice-icon-theme-galaxy-5.1.5.2-29.4 libreoffice-icon-theme-tango-5.1.5.2-29.4 libreoffice-l10n-af-5.1.5.2-29.4 libreoffice-l10n-ar-5.1.5.2-29.4 libreoffice-l10n-ca-5.1.5.2-29.4 libreoffice-l10n-cs-5.1.5.2-29.4 libreoffice-l10n-da-5.1.5.2-29.4 libreoffice-l10n-de-5.1.5.2-29.4 libreoffice-l10n-en-5.1.5.2-29.4 libreoffice-l10n-es-5.1.5.2-29.4 libreoffice-l10n-fi-5.1.5.2-29.4 libreoffice-l10n-fr-5.1.5.2-29.4 libreoffice-l10n-gu-5.1.5.2-29.4 libreoffice-l10n-hi-5.1.5.2-29.4 libreoffice-l10n-hu-5.1.5.2-29.4 libreoffice-l10n-it-5.1.5.2-29.4 libreoffice-l10n-ja-5.1.5.2-29.4 libreoffice-l10n-ko-5.1.5.2-29.4 libreoffice-l10n-nb-5.1.5.2-29.4 libreoffice-l10n-nl-5.1.5.2-29.4 libreoffice-l10n-nn-5.1.5.2-29.4 libreoffice-l10n-pl-5.1.5.2-29.4 libreoffice-l10n-pt-BR-5.1.5.2-29.4 libreoffice-l10n-pt-PT-5.1.5.2-29.4 libreoffice-l10n-ru-5.1.5.2-29.4 libreoffice-l10n-sk-5.1.5.2-29.4 libreoffice-l10n-sv-5.1.5.2-29.4 libreoffice-l10n-xh-5.1.5.2-29.4 libreoffice-l10n-zh-Hans-5.1.5.2-29.4 libreoffice-l10n-zh-Hant-5.1.5.2-29.4 libreoffice-l10n-zu-5.1.5.2-29.4 References: https://www.suse.com/security/cve/CVE-2016-4324.html https://bugzilla.suse.com/1000102 https://bugzilla.suse.com/987553 From sle-security-updates at lists.suse.com Fri Oct 7 06:08:58 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 7 Oct 2016 14:08:58 +0200 (CEST) Subject: SUSE-SU-2016:2473-1: important: Security update for xen Message-ID: <20161007120858.F09CEF7BF@maintenance.suse.de> SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2473-1 Rating: important References: #953518 #955104 #959330 #959552 #970135 #971949 #988675 #988676 #990500 #990970 #991934 #992224 #993665 #994421 #994625 #994761 #994772 #994775 #995785 #995789 #995792 Cross-References: CVE-2016-6258 CVE-2016-6259 CVE-2016-6833 CVE-2016-6834 CVE-2016-6835 CVE-2016-6836 CVE-2016-6888 CVE-2016-7092 CVE-2016-7093 CVE-2016-7094 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has 11 fixes is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785). - CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789). - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792). - CVE-2016-6836: Information leakage in vmxnet3_complete_packet (bsc#994761). - CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. Aprivileged user inside guest c... (bsc#994772). - CVE-2016-6833: Use after free while writing (bsc#994775). - CVE-2016-6835: Buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 deviceemulation. (bsc#994625). - CVE-2016-6834: An infinite loop during packet fragmentation (bsc#994421). - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675). - CVE-2016-6259: Xen did not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allowed local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check (bsc#988676). These non-security issues were fixed: - bsc#991934: Hypervisor crash in csched_acct - bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA - bsc#955104: Virsh reports error "one or more references were leaked after disconnect from hypervisor" when "virsh save" failed due to "no response from client after 6 keepalive messages" - bsc#959552: Migration of HVM guest leads into libvirt segmentation fault - bsc#993665: Migration of xen guests finishes in: One or more references were leaked after disconnect from the hypervisor - bsc#959330: Guest migrations using virsh results in error "Internal error: received hangup / error event on socket" - bsc#990500: VM virsh migration fails with keepalive error: ":virKeepAliveTimerInternal:143 : No response from client" - bsc#953518: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol - bsc#953518: xen_platform: unplug also SCSI disks in qemu-xen - bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live - bsc#970135: New virtualization project clock test randomly fails on Xen - bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1444=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1444=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1444=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (x86_64): xen-debugsource-4.5.3_10-20.1 xen-devel-4.5.3_10-20.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): xen-4.5.3_10-20.1 xen-debugsource-4.5.3_10-20.1 xen-doc-html-4.5.3_10-20.1 xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 xen-kmp-default-debuginfo-4.5.3_10_k3.12.62_60.62-20.1 xen-libs-32bit-4.5.3_10-20.1 xen-libs-4.5.3_10-20.1 xen-libs-debuginfo-32bit-4.5.3_10-20.1 xen-libs-debuginfo-4.5.3_10-20.1 xen-tools-4.5.3_10-20.1 xen-tools-debuginfo-4.5.3_10-20.1 xen-tools-domU-4.5.3_10-20.1 xen-tools-domU-debuginfo-4.5.3_10-20.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): xen-4.5.3_10-20.1 xen-debugsource-4.5.3_10-20.1 xen-kmp-default-4.5.3_10_k3.12.62_60.62-20.1 xen-kmp-default-debuginfo-4.5.3_10_k3.12.62_60.62-20.1 xen-libs-32bit-4.5.3_10-20.1 xen-libs-4.5.3_10-20.1 xen-libs-debuginfo-32bit-4.5.3_10-20.1 xen-libs-debuginfo-4.5.3_10-20.1 References: https://www.suse.com/security/cve/CVE-2016-6258.html https://www.suse.com/security/cve/CVE-2016-6259.html https://www.suse.com/security/cve/CVE-2016-6833.html https://www.suse.com/security/cve/CVE-2016-6834.html https://www.suse.com/security/cve/CVE-2016-6835.html https://www.suse.com/security/cve/CVE-2016-6836.html https://www.suse.com/security/cve/CVE-2016-6888.html https://www.suse.com/security/cve/CVE-2016-7092.html https://www.suse.com/security/cve/CVE-2016-7093.html https://www.suse.com/security/cve/CVE-2016-7094.html https://bugzilla.suse.com/953518 https://bugzilla.suse.com/955104 https://bugzilla.suse.com/959330 https://bugzilla.suse.com/959552 https://bugzilla.suse.com/970135 https://bugzilla.suse.com/971949 https://bugzilla.suse.com/988675 https://bugzilla.suse.com/988676 https://bugzilla.suse.com/990500 https://bugzilla.suse.com/990970 https://bugzilla.suse.com/991934 https://bugzilla.suse.com/992224 https://bugzilla.suse.com/993665 https://bugzilla.suse.com/994421 https://bugzilla.suse.com/994625 https://bugzilla.suse.com/994761 https://bugzilla.suse.com/994772 https://bugzilla.suse.com/994775 https://bugzilla.suse.com/995785 https://bugzilla.suse.com/995789 https://bugzilla.suse.com/995792 From sle-security-updates at lists.suse.com Fri Oct 7 13:08:53 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 7 Oct 2016 21:08:53 +0200 (CEST) Subject: SUSE-SU-2016:2475-1: important: Security update for systemd Message-ID: <20161007190853.536A5F7BC@maintenance.suse.de> SUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2475-1 Rating: important References: #1000435 #1001765 #954374 #970293 #982210 #982211 #982251 #987173 #987857 #990074 #996269 Cross-References: CVE-2016-7796 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. Description: This update for systemd fixes the following security issue: - CVE-2016-7796: A zero-length message received over systemd's notification socket could make manager_dispatch_notify_fd() return an error and, as a side effect, disable the notification handler completely. As the notification socket is world-writable, this could have allowed a local user to perform a denial-of-service attack against systemd. (bsc#1001765) Additionally, the following non-security fixes are included: - Fix HMAC calculation when appending a data object to journal. (bsc#1000435) - Never accept file descriptors from file systems with mandatory locking enabled. (bsc#954374) - Do not warn about missing install info with "preset". (bsc#970293) - Save /run/systemd/users/UID before starting user at .service. (bsc#996269) - Make sure that /var/lib/systemd/sysv-convert/database is always initialized. (bsc#982211) - Remove daylight saving time handling and tzfile parser. (bsc#990074) - Make sure directory watch is started before cryptsetup. (bsc#987173) - Introduce sd_pid_notify() and sd_pid_notifyf() APIs. (bsc#987857) - Set KillMode=mixed for our daemons that fork worker processes. - Add nosuid and nodev options to tmp.mount. - Don't start console-getty.service when /dev/console is missing. (bsc#982251) - Correct segmentation fault in udev/path_id due to missing NULL check. (bsc#982210) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1447=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1447=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (noarch): systemd-bash-completion-210-70.58.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): libgudev-1_0-0-210-70.58.1 libgudev-1_0-0-32bit-210-70.58.1 libgudev-1_0-0-debuginfo-210-70.58.1 libgudev-1_0-0-debuginfo-32bit-210-70.58.1 libudev1-210-70.58.1 libudev1-32bit-210-70.58.1 libudev1-debuginfo-210-70.58.1 libudev1-debuginfo-32bit-210-70.58.1 systemd-210-70.58.1 systemd-32bit-210-70.58.1 systemd-debuginfo-210-70.58.1 systemd-debuginfo-32bit-210-70.58.1 systemd-debugsource-210-70.58.1 systemd-sysvinit-210-70.58.1 udev-210-70.58.1 udev-debuginfo-210-70.58.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): libgudev-1_0-0-210-70.58.1 libgudev-1_0-0-debuginfo-210-70.58.1 libudev1-210-70.58.1 libudev1-debuginfo-210-70.58.1 systemd-210-70.58.1 systemd-debuginfo-210-70.58.1 systemd-debugsource-210-70.58.1 systemd-sysvinit-210-70.58.1 udev-210-70.58.1 udev-debuginfo-210-70.58.1 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): libgudev-1_0-0-32bit-210-70.58.1 libgudev-1_0-0-debuginfo-32bit-210-70.58.1 libudev1-32bit-210-70.58.1 libudev1-debuginfo-32bit-210-70.58.1 systemd-32bit-210-70.58.1 systemd-debuginfo-32bit-210-70.58.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): systemd-bash-completion-210-70.58.1 References: https://www.suse.com/security/cve/CVE-2016-7796.html https://bugzilla.suse.com/1000435 https://bugzilla.suse.com/1001765 https://bugzilla.suse.com/954374 https://bugzilla.suse.com/970293 https://bugzilla.suse.com/982210 https://bugzilla.suse.com/982211 https://bugzilla.suse.com/982251 https://bugzilla.suse.com/987173 https://bugzilla.suse.com/987857 https://bugzilla.suse.com/990074 https://bugzilla.suse.com/996269 From sle-security-updates at lists.suse.com Fri Oct 7 13:11:02 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 7 Oct 2016 21:11:02 +0200 (CEST) Subject: SUSE-SU-2016:2476-1: important: Security update for systemd Message-ID: <20161007191102.C7DCAF7BC@maintenance.suse.de> SUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2476-1 Rating: important References: #1000435 #1001765 #954374 #970293 #982210 #982211 #982251 #987173 #987857 #990074 #996269 Cross-References: CVE-2016-7796 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. Description: This update for systemd fixes the following security issue: - CVE-2016-7796: A zero-length message received over systemd's notification socket could make manager_dispatch_notify_fd() return an error and, as a side effect, disable the notification handler completely. As the notification socket is world-writable, this could have allowed a local user to perform a denial-of-service attack against systemd. (bsc#1001765) Additionally, the following non-security fixes are included: - Fix HMAC calculation when appending a data object to journal. (bsc#1000435) - Never accept file descriptors from file systems with mandatory locking enabled. (bsc#954374) - Do not warn about missing install info with "preset". (bsc#970293) - Save /run/systemd/users/UID before starting user at .service. (bsc#996269) - Make sure that /var/lib/systemd/sysv-convert/database is always initialized. (bsc#982211) - Remove daylight saving time handling and tzfile parser. (bsc#990074) - Make sure directory watch is started before cryptsetup. (bsc#987173) - Introduce sd_pid_notify() and sd_pid_notifyf() APIs. (bsc#987857) - Set KillMode=mixed for our daemons that fork worker processes. - Add nosuid and nodev options to tmp.mount. - Don't start console-getty.service when /dev/console is missing. (bsc#982251) - Correct segmentation fault in udev/path_id due to missing NULL check. (bsc#982210) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1448=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1448=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1448=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libgudev-1_0-devel-210-114.1 libudev-devel-210-114.1 systemd-debuginfo-210-114.1 systemd-debugsource-210-114.1 systemd-devel-210-114.1 typelib-1_0-GUdev-1_0-210-114.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libgudev-1_0-0-210-114.1 libgudev-1_0-0-debuginfo-210-114.1 libudev1-210-114.1 libudev1-debuginfo-210-114.1 systemd-210-114.1 systemd-debuginfo-210-114.1 systemd-debugsource-210-114.1 systemd-sysvinit-210-114.1 udev-210-114.1 udev-debuginfo-210-114.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libgudev-1_0-0-32bit-210-114.1 libgudev-1_0-0-debuginfo-32bit-210-114.1 libudev1-32bit-210-114.1 libudev1-debuginfo-32bit-210-114.1 systemd-32bit-210-114.1 systemd-debuginfo-32bit-210-114.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): systemd-bash-completion-210-114.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): systemd-bash-completion-210-114.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libgudev-1_0-0-210-114.1 libgudev-1_0-0-32bit-210-114.1 libgudev-1_0-0-debuginfo-210-114.1 libgudev-1_0-0-debuginfo-32bit-210-114.1 libudev1-210-114.1 libudev1-32bit-210-114.1 libudev1-debuginfo-210-114.1 libudev1-debuginfo-32bit-210-114.1 systemd-210-114.1 systemd-32bit-210-114.1 systemd-debuginfo-210-114.1 systemd-debuginfo-32bit-210-114.1 systemd-debugsource-210-114.1 systemd-sysvinit-210-114.1 udev-210-114.1 udev-debuginfo-210-114.1 References: https://www.suse.com/security/cve/CVE-2016-7796.html https://bugzilla.suse.com/1000435 https://bugzilla.suse.com/1001765 https://bugzilla.suse.com/954374 https://bugzilla.suse.com/970293 https://bugzilla.suse.com/982210 https://bugzilla.suse.com/982211 https://bugzilla.suse.com/982251 https://bugzilla.suse.com/987173 https://bugzilla.suse.com/987857 https://bugzilla.suse.com/990074 https://bugzilla.suse.com/996269 From sle-security-updates at lists.suse.com Fri Oct 7 13:12:50 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 7 Oct 2016 21:12:50 +0200 (CEST) Subject: SUSE-SU-2016:2477-1: important: Security update for php5 Message-ID: <20161007191250.810CDF7BD@maintenance.suse.de> SUSE Security Update: Security update for php5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2477-1 Rating: important References: #999679 #999680 #999682 #999684 #999685 #999819 #999820 Cross-References: CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for php5 fixes the following security issues: * CVE-2016-7411: php5: Memory corruption when destructing deserialized object * CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field * CVE-2016-7413: Use after free in wddx_deserialize * CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile * CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message * CVE-2016-7417: Missing type check when unserializing SplArray * CVE-2016-7418: Null pointer dereference in php_wddx_push_element Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1446=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2016-1446=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): php5-debuginfo-5.5.14-78.1 php5-debugsource-5.5.14-78.1 php5-devel-5.5.14-78.1 - SUSE Linux Enterprise Module for Web Scripting 12 (ppc64le s390x x86_64): apache2-mod_php5-5.5.14-78.1 apache2-mod_php5-debuginfo-5.5.14-78.1 php5-5.5.14-78.1 php5-bcmath-5.5.14-78.1 php5-bcmath-debuginfo-5.5.14-78.1 php5-bz2-5.5.14-78.1 php5-bz2-debuginfo-5.5.14-78.1 php5-calendar-5.5.14-78.1 php5-calendar-debuginfo-5.5.14-78.1 php5-ctype-5.5.14-78.1 php5-ctype-debuginfo-5.5.14-78.1 php5-curl-5.5.14-78.1 php5-curl-debuginfo-5.5.14-78.1 php5-dba-5.5.14-78.1 php5-dba-debuginfo-5.5.14-78.1 php5-debuginfo-5.5.14-78.1 php5-debugsource-5.5.14-78.1 php5-dom-5.5.14-78.1 php5-dom-debuginfo-5.5.14-78.1 php5-enchant-5.5.14-78.1 php5-enchant-debuginfo-5.5.14-78.1 php5-exif-5.5.14-78.1 php5-exif-debuginfo-5.5.14-78.1 php5-fastcgi-5.5.14-78.1 php5-fastcgi-debuginfo-5.5.14-78.1 php5-fileinfo-5.5.14-78.1 php5-fileinfo-debuginfo-5.5.14-78.1 php5-fpm-5.5.14-78.1 php5-fpm-debuginfo-5.5.14-78.1 php5-ftp-5.5.14-78.1 php5-ftp-debuginfo-5.5.14-78.1 php5-gd-5.5.14-78.1 php5-gd-debuginfo-5.5.14-78.1 php5-gettext-5.5.14-78.1 php5-gettext-debuginfo-5.5.14-78.1 php5-gmp-5.5.14-78.1 php5-gmp-debuginfo-5.5.14-78.1 php5-iconv-5.5.14-78.1 php5-iconv-debuginfo-5.5.14-78.1 php5-imap-5.5.14-78.1 php5-imap-debuginfo-5.5.14-78.1 php5-intl-5.5.14-78.1 php5-intl-debuginfo-5.5.14-78.1 php5-json-5.5.14-78.1 php5-json-debuginfo-5.5.14-78.1 php5-ldap-5.5.14-78.1 php5-ldap-debuginfo-5.5.14-78.1 php5-mbstring-5.5.14-78.1 php5-mbstring-debuginfo-5.5.14-78.1 php5-mcrypt-5.5.14-78.1 php5-mcrypt-debuginfo-5.5.14-78.1 php5-mysql-5.5.14-78.1 php5-mysql-debuginfo-5.5.14-78.1 php5-odbc-5.5.14-78.1 php5-odbc-debuginfo-5.5.14-78.1 php5-opcache-5.5.14-78.1 php5-opcache-debuginfo-5.5.14-78.1 php5-openssl-5.5.14-78.1 php5-openssl-debuginfo-5.5.14-78.1 php5-pcntl-5.5.14-78.1 php5-pcntl-debuginfo-5.5.14-78.1 php5-pdo-5.5.14-78.1 php5-pdo-debuginfo-5.5.14-78.1 php5-pgsql-5.5.14-78.1 php5-pgsql-debuginfo-5.5.14-78.1 php5-phar-5.5.14-78.1 php5-phar-debuginfo-5.5.14-78.1 php5-posix-5.5.14-78.1 php5-posix-debuginfo-5.5.14-78.1 php5-pspell-5.5.14-78.1 php5-pspell-debuginfo-5.5.14-78.1 php5-shmop-5.5.14-78.1 php5-shmop-debuginfo-5.5.14-78.1 php5-snmp-5.5.14-78.1 php5-snmp-debuginfo-5.5.14-78.1 php5-soap-5.5.14-78.1 php5-soap-debuginfo-5.5.14-78.1 php5-sockets-5.5.14-78.1 php5-sockets-debuginfo-5.5.14-78.1 php5-sqlite-5.5.14-78.1 php5-sqlite-debuginfo-5.5.14-78.1 php5-suhosin-5.5.14-78.1 php5-suhosin-debuginfo-5.5.14-78.1 php5-sysvmsg-5.5.14-78.1 php5-sysvmsg-debuginfo-5.5.14-78.1 php5-sysvsem-5.5.14-78.1 php5-sysvsem-debuginfo-5.5.14-78.1 php5-sysvshm-5.5.14-78.1 php5-sysvshm-debuginfo-5.5.14-78.1 php5-tokenizer-5.5.14-78.1 php5-tokenizer-debuginfo-5.5.14-78.1 php5-wddx-5.5.14-78.1 php5-wddx-debuginfo-5.5.14-78.1 php5-xmlreader-5.5.14-78.1 php5-xmlreader-debuginfo-5.5.14-78.1 php5-xmlrpc-5.5.14-78.1 php5-xmlrpc-debuginfo-5.5.14-78.1 php5-xmlwriter-5.5.14-78.1 php5-xmlwriter-debuginfo-5.5.14-78.1 php5-xsl-5.5.14-78.1 php5-xsl-debuginfo-5.5.14-78.1 php5-zip-5.5.14-78.1 php5-zip-debuginfo-5.5.14-78.1 php5-zlib-5.5.14-78.1 php5-zlib-debuginfo-5.5.14-78.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): php5-pear-5.5.14-78.1 References: https://www.suse.com/security/cve/CVE-2016-7411.html https://www.suse.com/security/cve/CVE-2016-7412.html https://www.suse.com/security/cve/CVE-2016-7413.html https://www.suse.com/security/cve/CVE-2016-7414.html https://www.suse.com/security/cve/CVE-2016-7416.html https://www.suse.com/security/cve/CVE-2016-7417.html https://www.suse.com/security/cve/CVE-2016-7418.html https://bugzilla.suse.com/999679 https://bugzilla.suse.com/999680 https://bugzilla.suse.com/999682 https://bugzilla.suse.com/999684 https://bugzilla.suse.com/999685 https://bugzilla.suse.com/999819 https://bugzilla.suse.com/999820 From sle-security-updates at lists.suse.com Tue Oct 11 10:09:14 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 11 Oct 2016 18:09:14 +0200 (CEST) Subject: SUSE-SU-2016:2492-1: important: Security update for ghostscript-library Message-ID: <20161011160914.E4801F7BE@maintenance.suse.de> SUSE Security Update: Security update for ghostscript-library ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2492-1 Rating: important References: #1001951 Cross-References: CVE-2013-5653 CVE-2016-7978 CVE-2016-7979 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for ghostscript-library fixes the following issues: - Multiple security vulnerabilities have been discovered where ghostscript's "-dsafer" flag did not provide sufficient protection against unintended access to the file system. Thus, a machine that would process a specially crafted Postscript file would potentially leak sensitive information to an attacker. (CVE-2013-5653, bsc#1001951) - An incorrect reference count was found in .setdevice. This issue lead to a use-after-free scenario, which could have been exploited for denial-of-service or, possibly, arbitrary code execution attacks. (CVE-2016-7978, bsc#1001951) - Insufficient validation of the type of input in .initialize_dsc_parser used to allow remote code execution. (CVE-2016-7979, bsc#1001951) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1458=1 - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1458=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1458=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1458=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1458=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-devel-9.15-11.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): ghostscript-9.15-11.1 ghostscript-debuginfo-9.15-11.1 ghostscript-debugsource-9.15-11.1 ghostscript-x11-9.15-11.1 ghostscript-x11-debuginfo-9.15-11.1 References: https://www.suse.com/security/cve/CVE-2013-5653.html https://www.suse.com/security/cve/CVE-2016-7978.html https://www.suse.com/security/cve/CVE-2016-7979.html https://bugzilla.suse.com/1001951 From sle-security-updates at lists.suse.com Tue Oct 11 10:09:47 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 11 Oct 2016 18:09:47 +0200 (CEST) Subject: SUSE-SU-2016:2493-1: important: Security update for ghostscript-library Message-ID: <20161011160947.A2A7FF7BD@maintenance.suse.de> SUSE Security Update: Security update for ghostscript-library ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2493-1 Rating: important References: #1001951 #939342 Cross-References: CVE-2013-5653 CVE-2015-3228 CVE-2016-7977 CVE-2016-7979 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for ghostscript-library fixes the following issues: - Multiple security vulnerabilities have been discovered where ghostscript's "-dsafer" flag did not provide sufficient protection against unintended access to the file system. Thus, a machine that would process a specially crafted Postscript file would potentially leak sensitive information to an attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951) - Insufficient validation of the type of input in .initialize_dsc_parser used to allow remote code execution. (CVE-2016-7979, bsc#1001951) - An integer overflow in the gs_heap_alloc_bytes function used to allow remote attackers to cause a denial of service (crash) via specially crafted Postscript files. (CVE-2015-3228, boo#939342) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-ghostscript-library-12781=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-ghostscript-library-12781=1 - SUSE Manager 2.1: zypper in -t patch sleman21-ghostscript-library-12781=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-ghostscript-library-12781=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-ghostscript-library-12781=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-ghostscript-library-12781=1 - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-ghostscript-library-12781=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-ghostscript-library-12781=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-ghostscript-library-12781=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-ghostscript-library-12781=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-ghostscript-library-12781=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Manager Proxy 2.1 (x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Manager 2.1 (s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): ghostscript-devel-8.62-32.38.1 ghostscript-ijs-devel-8.62-32.38.1 libgimpprint-devel-4.2.7-32.38.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): ghostscript-fonts-other-8.62-32.38.1 ghostscript-fonts-rus-8.62-32.38.1 ghostscript-fonts-std-8.62-32.38.1 ghostscript-library-8.62-32.38.1 ghostscript-omni-8.62-32.38.1 ghostscript-x11-8.62-32.38.1 libgimpprint-4.2.7-32.38.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): ghostscript-library-debuginfo-8.62-32.38.1 ghostscript-library-debugsource-8.62-32.38.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): ghostscript-library-debuginfo-8.62-32.38.1 ghostscript-library-debugsource-8.62-32.38.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): ghostscript-library-debuginfo-8.62-32.38.1 ghostscript-library-debugsource-8.62-32.38.1 References: https://www.suse.com/security/cve/CVE-2013-5653.html https://www.suse.com/security/cve/CVE-2015-3228.html https://www.suse.com/security/cve/CVE-2016-7977.html https://www.suse.com/security/cve/CVE-2016-7979.html https://bugzilla.suse.com/1001951 https://bugzilla.suse.com/939342 From sle-security-updates at lists.suse.com Wed Oct 12 07:08:29 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 15:08:29 +0200 (CEST) Subject: SUSE-SU-2016:2505-1: moderate: Security update for X Window System client libraries Message-ID: <20161012130829.5F3D2F7BF@maintenance.suse.de> SUSE Security Update: Security update for X Window System client libraries ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2505-1 Rating: moderate References: #1002991 #1002995 #1002998 #1003000 #1003002 #1003012 #1003017 #1003023 Cross-References: CVE-2016-5407 CVE-2016-7942 CVE-2016-7944 CVE-2016-7945 CVE-2016-7946 CVE-2016-7947 CVE-2016-7948 CVE-2016-7949 CVE-2016-7950 CVE-2016-7951 CVE-2016-7952 CVE-2016-7953 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: This update for the X Window System client libraries fixes a class of privilege escalation issues. A malicious X Server could send specially crafted data to X clients, which allowed for triggering crashes, or privilege escalation if this relationship was untrusted or crossed user or permission level boundaries. libX11, libXfixes, libXi, libXrandr, libXrender, libXtst, libXv, libXvMC were fixed, specifically: libX11: - CVE-2016-7942: insufficient validation of data from the X server allowed out of boundary memory read (bsc#1002991) libXfixes: - CVE-2016-7944: insufficient validation of data from the X server can cause an integer overflow on 32 bit architectures (bsc#1002995) libXi: - CVE-2016-7945, CVE-2016-7946: insufficient validation of data from the X server can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998) libXtst: - CVE-2016-7951, CVE-2016-7952: insufficient validation of data from the X server can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1003012) libXv: - CVE-2016-5407: insufficient validation of data from the X server can cause out of boundary memory and memory corruption (bsc#1003017) libXvMC: - CVE-2016-7953: insufficient validation of data from the X server can cause a one byte buffer read underrun (bsc#1003023) libXrender: - CVE-2016-7949, CVE-2016-7950: insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003002) libXrandr: - CVE-2016-7947, CVE-2016-7948: insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003000) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1464=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1464=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1464=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libX11-debugsource-1.6.2-6.2 libX11-devel-1.6.2-6.2 libXfixes-debugsource-5.0.1-5.2 libXfixes-devel-5.0.1-5.2 libXi-debugsource-1.7.4-12.2 libXi-devel-1.7.4-12.2 libXrandr-debugsource-1.4.2-5.2 libXrandr-devel-1.4.2-5.2 libXrender-debugsource-0.9.8-5.2 libXrender-devel-0.9.8-5.2 libXtst-debugsource-1.2.2-5.2 libXtst-devel-1.2.2-5.2 libXv-debugsource-1.0.10-5.2 libXv-devel-1.0.10-5.2 libXvMC-debugsource-1.0.8-5.2 libXvMC-devel-1.0.8-5.2 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libX11-6-1.6.2-6.2 libX11-6-debuginfo-1.6.2-6.2 libX11-debugsource-1.6.2-6.2 libX11-xcb1-1.6.2-6.2 libX11-xcb1-debuginfo-1.6.2-6.2 libXfixes-debugsource-5.0.1-5.2 libXfixes3-5.0.1-5.2 libXfixes3-debuginfo-5.0.1-5.2 libXi-debugsource-1.7.4-12.2 libXi6-1.7.4-12.2 libXi6-debuginfo-1.7.4-12.2 libXrandr-debugsource-1.4.2-5.2 libXrandr2-1.4.2-5.2 libXrandr2-debuginfo-1.4.2-5.2 libXrender-debugsource-0.9.8-5.2 libXrender1-0.9.8-5.2 libXrender1-debuginfo-0.9.8-5.2 libXtst-debugsource-1.2.2-5.2 libXtst6-1.2.2-5.2 libXtst6-debuginfo-1.2.2-5.2 libXv-debugsource-1.0.10-5.2 libXv1-1.0.10-5.2 libXv1-debuginfo-1.0.10-5.2 libXvMC-debugsource-1.0.8-5.2 libXvMC1-1.0.8-5.2 libXvMC1-debuginfo-1.0.8-5.2 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libX11-6-32bit-1.6.2-6.2 libX11-6-debuginfo-32bit-1.6.2-6.2 libX11-xcb1-32bit-1.6.2-6.2 libX11-xcb1-debuginfo-32bit-1.6.2-6.2 libXfixes3-32bit-5.0.1-5.2 libXfixes3-debuginfo-32bit-5.0.1-5.2 libXi6-32bit-1.7.4-12.2 libXi6-debuginfo-32bit-1.7.4-12.2 libXrandr2-32bit-1.4.2-5.2 libXrandr2-debuginfo-32bit-1.4.2-5.2 libXrender1-32bit-0.9.8-5.2 libXrender1-debuginfo-32bit-0.9.8-5.2 libXtst6-32bit-1.2.2-5.2 libXtst6-debuginfo-32bit-1.2.2-5.2 libXv1-32bit-1.0.10-5.2 libXv1-debuginfo-32bit-1.0.10-5.2 - SUSE Linux Enterprise Server 12-SP1 (noarch): libX11-data-1.6.2-6.2 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libX11-6-1.6.2-6.2 libX11-6-32bit-1.6.2-6.2 libX11-6-debuginfo-1.6.2-6.2 libX11-6-debuginfo-32bit-1.6.2-6.2 libX11-debugsource-1.6.2-6.2 libX11-xcb1-1.6.2-6.2 libX11-xcb1-32bit-1.6.2-6.2 libX11-xcb1-debuginfo-1.6.2-6.2 libX11-xcb1-debuginfo-32bit-1.6.2-6.2 libXfixes-debugsource-5.0.1-5.2 libXfixes3-32bit-5.0.1-5.2 libXfixes3-5.0.1-5.2 libXfixes3-debuginfo-32bit-5.0.1-5.2 libXfixes3-debuginfo-5.0.1-5.2 libXi-debugsource-1.7.4-12.2 libXi6-1.7.4-12.2 libXi6-32bit-1.7.4-12.2 libXi6-debuginfo-1.7.4-12.2 libXi6-debuginfo-32bit-1.7.4-12.2 libXrandr-debugsource-1.4.2-5.2 libXrandr2-1.4.2-5.2 libXrandr2-32bit-1.4.2-5.2 libXrandr2-debuginfo-1.4.2-5.2 libXrandr2-debuginfo-32bit-1.4.2-5.2 libXrender-debugsource-0.9.8-5.2 libXrender1-0.9.8-5.2 libXrender1-32bit-0.9.8-5.2 libXrender1-debuginfo-0.9.8-5.2 libXrender1-debuginfo-32bit-0.9.8-5.2 libXtst-debugsource-1.2.2-5.2 libXtst6-1.2.2-5.2 libXtst6-32bit-1.2.2-5.2 libXtst6-debuginfo-1.2.2-5.2 libXtst6-debuginfo-32bit-1.2.2-5.2 libXv-debugsource-1.0.10-5.2 libXv1-1.0.10-5.2 libXv1-32bit-1.0.10-5.2 libXv1-debuginfo-1.0.10-5.2 libXv1-debuginfo-32bit-1.0.10-5.2 libXvMC-debugsource-1.0.8-5.2 libXvMC1-1.0.8-5.2 libXvMC1-debuginfo-1.0.8-5.2 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): libX11-data-1.6.2-6.2 References: https://www.suse.com/security/cve/CVE-2016-5407.html https://www.suse.com/security/cve/CVE-2016-7942.html https://www.suse.com/security/cve/CVE-2016-7944.html https://www.suse.com/security/cve/CVE-2016-7945.html https://www.suse.com/security/cve/CVE-2016-7946.html https://www.suse.com/security/cve/CVE-2016-7947.html https://www.suse.com/security/cve/CVE-2016-7948.html https://www.suse.com/security/cve/CVE-2016-7949.html https://www.suse.com/security/cve/CVE-2016-7950.html https://www.suse.com/security/cve/CVE-2016-7951.html https://www.suse.com/security/cve/CVE-2016-7952.html https://www.suse.com/security/cve/CVE-2016-7953.html https://bugzilla.suse.com/1002991 https://bugzilla.suse.com/1002995 https://bugzilla.suse.com/1002998 https://bugzilla.suse.com/1003000 https://bugzilla.suse.com/1003002 https://bugzilla.suse.com/1003012 https://bugzilla.suse.com/1003017 https://bugzilla.suse.com/1003023 From sle-security-updates at lists.suse.com Wed Oct 12 07:10:07 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 15:10:07 +0200 (CEST) Subject: SUSE-SU-2016:2506-1: moderate: Security update for freerdp Message-ID: <20161012131007.C07FCF7BC@maintenance.suse.de> SUSE Security Update: Security update for freerdp ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2506-1 Rating: moderate References: #829013 #857491 #880317 Cross-References: CVE-2013-4118 CVE-2014-0250 CVE-2014-0791 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for freerdp fixes the following issues: - CVE-2013-4118: Added a NULL pointer check to fix a server crash (bsc#829013). - CVE-2014-0791: Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP allowed remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet. (bsc#857491) - CVE-2014-0250: Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allowed remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated. (bsc#880317) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1462=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1462=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1462=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): freerdp-1.0.2-9.1 freerdp-debuginfo-1.0.2-9.1 freerdp-debugsource-1.0.2-9.1 libfreerdp-1_0-1.0.2-9.1 libfreerdp-1_0-debuginfo-1.0.2-9.1 libfreerdp-1_0-plugins-1.0.2-9.1 libfreerdp-1_0-plugins-debuginfo-1.0.2-9.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): freerdp-debuginfo-1.0.2-9.1 freerdp-debugsource-1.0.2-9.1 freerdp-devel-1.0.2-9.1 libfreerdp-1_0-1.0.2-9.1 libfreerdp-1_0-debuginfo-1.0.2-9.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): freerdp-1.0.2-9.1 freerdp-debuginfo-1.0.2-9.1 freerdp-debugsource-1.0.2-9.1 libfreerdp-1_0-1.0.2-9.1 libfreerdp-1_0-debuginfo-1.0.2-9.1 libfreerdp-1_0-plugins-1.0.2-9.1 libfreerdp-1_0-plugins-debuginfo-1.0.2-9.1 References: https://www.suse.com/security/cve/CVE-2013-4118.html https://www.suse.com/security/cve/CVE-2014-0250.html https://www.suse.com/security/cve/CVE-2014-0791.html https://bugzilla.suse.com/829013 https://bugzilla.suse.com/857491 https://bugzilla.suse.com/880317 From sle-security-updates at lists.suse.com Wed Oct 12 07:11:00 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 15:11:00 +0200 (CEST) Subject: SUSE-SU-2016:2507-1: important: Security update for xen Message-ID: <20161012131100.EE712F7BC@maintenance.suse.de> SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2507-1 Rating: important References: #966467 #970135 #971949 #988675 #990970 #991934 #992224 #993507 #994136 #994421 #994625 #994761 #994772 #994775 #995785 #995789 #995792 #997731 Cross-References: CVE-2016-6258 CVE-2016-6833 CVE-2016-6834 CVE-2016-6835 CVE-2016-6836 CVE-2016-6888 CVE-2016-7092 CVE-2016-7093 CVE-2016-7094 CVE-2016-7154 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has 8 fixes is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785) - CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789) - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792) - CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731) - CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761) - CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772) - CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775) - CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625) - CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421) - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675) These non-security issues were fixed: - bsc#993507: virsh detach-disk failing to detach disk - bsc#991934: Xen hypervisor crash in csched_acct - bsc#992224: During boot of Xen Hypervisor, Failed to get contiguous memory for DMA - bsc#970135: New virtualization project clock test randomly fails on Xen - bsc#994136: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol - bsc#994136: xen_platform: unplug also SCSI disks in qemu-xen - bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live - bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79) - bsc#966467: Live Migration SLES 11 SP3 to SP4 on AMD Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-xen-12782=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-xen-12782=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-xen-12782=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64): xen-devel-4.4.4_08-40.2 - SUSE Linux Enterprise Server 11-SP4 (i586 x86_64): xen-kmp-default-4.4.4_08_3.0.101_80-40.2 xen-libs-4.4.4_08-40.2 xen-tools-domU-4.4.4_08-40.2 - SUSE Linux Enterprise Server 11-SP4 (x86_64): xen-4.4.4_08-40.2 xen-doc-html-4.4.4_08-40.2 xen-libs-32bit-4.4.4_08-40.2 xen-tools-4.4.4_08-40.2 - SUSE Linux Enterprise Server 11-SP4 (i586): xen-kmp-pae-4.4.4_08_3.0.101_80-40.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): xen-debuginfo-4.4.4_08-40.2 xen-debugsource-4.4.4_08-40.2 References: https://www.suse.com/security/cve/CVE-2016-6258.html https://www.suse.com/security/cve/CVE-2016-6833.html https://www.suse.com/security/cve/CVE-2016-6834.html https://www.suse.com/security/cve/CVE-2016-6835.html https://www.suse.com/security/cve/CVE-2016-6836.html https://www.suse.com/security/cve/CVE-2016-6888.html https://www.suse.com/security/cve/CVE-2016-7092.html https://www.suse.com/security/cve/CVE-2016-7093.html https://www.suse.com/security/cve/CVE-2016-7094.html https://www.suse.com/security/cve/CVE-2016-7154.html https://bugzilla.suse.com/966467 https://bugzilla.suse.com/970135 https://bugzilla.suse.com/971949 https://bugzilla.suse.com/988675 https://bugzilla.suse.com/990970 https://bugzilla.suse.com/991934 https://bugzilla.suse.com/992224 https://bugzilla.suse.com/993507 https://bugzilla.suse.com/994136 https://bugzilla.suse.com/994421 https://bugzilla.suse.com/994625 https://bugzilla.suse.com/994761 https://bugzilla.suse.com/994772 https://bugzilla.suse.com/994775 https://bugzilla.suse.com/995785 https://bugzilla.suse.com/995789 https://bugzilla.suse.com/995792 https://bugzilla.suse.com/997731 From sle-security-updates at lists.suse.com Wed Oct 12 07:14:44 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 15:14:44 +0200 (CEST) Subject: SUSE-SU-2016:2508-1: moderate: Security update for tiff Message-ID: <20161012131444.F1857F7BD@maintenance.suse.de> SUSE Security Update: Security update for tiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2508-1 Rating: moderate References: #974449 #974614 #974618 #975069 #975070 Cross-References: CVE-2016-3622 CVE-2016-3623 CVE-2016-3945 CVE-2016-3990 CVE-2016-3991 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for tiff fixes the following security issues: - CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449) - Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098) - CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618) - CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614) - CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069) - CVE-2016-3991: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via the tiffcrop tool (bsc#975070) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1461=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1461=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1461=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libtiff-devel-4.0.6-31.1 tiff-debuginfo-4.0.6-31.1 tiff-debugsource-4.0.6-31.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libtiff5-4.0.6-31.1 libtiff5-debuginfo-4.0.6-31.1 tiff-4.0.6-31.1 tiff-debuginfo-4.0.6-31.1 tiff-debugsource-4.0.6-31.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libtiff5-32bit-4.0.6-31.1 libtiff5-debuginfo-32bit-4.0.6-31.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libtiff5-32bit-4.0.6-31.1 libtiff5-4.0.6-31.1 libtiff5-debuginfo-32bit-4.0.6-31.1 libtiff5-debuginfo-4.0.6-31.1 tiff-debuginfo-4.0.6-31.1 tiff-debugsource-4.0.6-31.1 References: https://www.suse.com/security/cve/CVE-2016-3622.html https://www.suse.com/security/cve/CVE-2016-3623.html https://www.suse.com/security/cve/CVE-2016-3945.html https://www.suse.com/security/cve/CVE-2016-3990.html https://www.suse.com/security/cve/CVE-2016-3991.html https://bugzilla.suse.com/974449 https://bugzilla.suse.com/974614 https://bugzilla.suse.com/974618 https://bugzilla.suse.com/975069 https://bugzilla.suse.com/975070 From sle-security-updates at lists.suse.com Wed Oct 12 08:09:12 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 16:09:12 +0200 (CEST) Subject: SUSE-SU-2016:2510-1: moderate: Security update for squidGuard Message-ID: <20161012140912.768BCF7BC@maintenance.suse.de> SUSE Security Update: Security update for squidGuard ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2510-1 Rating: moderate References: #985612 Cross-References: CVE-2015-8936 Affected Products: SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: squidGuard was updated to fix one security issue. This security issue was fixed: - CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-squidGuard-12783=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-squidGuard-12783=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): squidGuard-1.4-13.10.1 squidGuard-doc-1.4-13.10.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): squidGuard-debuginfo-1.4-13.10.1 squidGuard-debugsource-1.4-13.10.1 References: https://www.suse.com/security/cve/CVE-2015-8936.html https://bugzilla.suse.com/985612 From sle-security-updates at lists.suse.com Wed Oct 12 08:09:38 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 16:09:38 +0200 (CEST) Subject: SUSE-SU-2016:2511-1: moderate: Security update for squidGuard Message-ID: <20161012140938.AE80BF7BC@maintenance.suse.de> SUSE Security Update: Security update for squidGuard ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2511-1 Rating: moderate References: #985612 Cross-References: CVE-2015-8936 Affected Products: SUSE Linux Enterprise Server 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: squidGuard was updated to fix one security issue. This security issue was fixed: - CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1465=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): squidGuard-1.4-27.1 squidGuard-debuginfo-1.4-27.1 squidGuard-debugsource-1.4-27.1 squidGuard-doc-1.4-27.1 References: https://www.suse.com/security/cve/CVE-2015-8936.html https://bugzilla.suse.com/985612 From sle-security-updates at lists.suse.com Wed Oct 12 09:08:51 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 17:08:51 +0200 (CEST) Subject: SUSE-SU-2016:2512-1: important: Security update for flash-playerqemu Message-ID: <20161012150851.4FCE3F7BD@maintenance.suse.de> SUSE Security Update: Security update for flash-playerqemu ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2512-1 Rating: important References: #1003993 #1004019 Cross-References: CVE-2016-4273 CVE-2016-4286 CVE-2016-6981 CVE-2016-6982 CVE-2016-6983 CVE-2016-6984 CVE-2016-6985 CVE-2016-6986 CVE-2016-6987 CVE-2016-6989 CVE-2016-6990 CVE-2016-6992 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: flash-player was updated to version 11.2.202.637 to fix the following issues (bsc#1004019): CVE-2016-6992: A type confusion vulnerability that could lead to code execution. CVE-2016-6981, CVE-2016-6987: use-after-free vulnerabilities that could lead to code execution CVE-2016-4286: Security bypass vulnerability CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, CVE-2016-6990: Memory corruption vulnerabilities that could lead to code execution Also the EULA was updated to version 23.0 (bsc#1003993). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1468=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1468=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): flash-player-11.2.202.637-143.1 flash-player-gnome-11.2.202.637-143.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): flash-player-11.2.202.637-143.1 flash-player-gnome-11.2.202.637-143.1 References: https://www.suse.com/security/cve/CVE-2016-4273.html https://www.suse.com/security/cve/CVE-2016-4286.html https://www.suse.com/security/cve/CVE-2016-6981.html https://www.suse.com/security/cve/CVE-2016-6982.html https://www.suse.com/security/cve/CVE-2016-6983.html https://www.suse.com/security/cve/CVE-2016-6984.html https://www.suse.com/security/cve/CVE-2016-6985.html https://www.suse.com/security/cve/CVE-2016-6986.html https://www.suse.com/security/cve/CVE-2016-6987.html https://www.suse.com/security/cve/CVE-2016-6989.html https://www.suse.com/security/cve/CVE-2016-6990.html https://www.suse.com/security/cve/CVE-2016-6992.html https://bugzilla.suse.com/1003993 https://bugzilla.suse.com/1004019 From sle-security-updates at lists.suse.com Wed Oct 12 12:08:53 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 12 Oct 2016 20:08:53 +0200 (CEST) Subject: SUSE-SU-2016:2513-1: important: Security update for MozillaFirefox Message-ID: <20161012180853.32275F7BD@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2513-1 Rating: important References: #999701 Cross-References: CVE-2016-5250 CVE-2016-5257 CVE-2016-5261 CVE-2016-5270 CVE-2016-5272 CVE-2016-5274 CVE-2016-5276 CVE-2016-5277 CVE-2016-5278 CVE-2016-5280 CVE-2016-5281 CVE-2016-5284 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701): The following security issue were fixed: * MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString * MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin * MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList * MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState * MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick * MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame * MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap * MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength * MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration * MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page * MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel * MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-MozillaFirefox-12784=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-MozillaFirefox-12784=1 - SUSE Manager 2.1: zypper in -t patch sleman21-MozillaFirefox-12784=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-MozillaFirefox-12784=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-MozillaFirefox-12784=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-MozillaFirefox-12784=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-MozillaFirefox-12784=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-MozillaFirefox-12784=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-MozillaFirefox-12784=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): MozillaFirefox-45.4.0esr-53.1 MozillaFirefox-translations-45.4.0esr-53.1 - SUSE Manager Proxy 2.1 (x86_64): MozillaFirefox-45.4.0esr-53.1 MozillaFirefox-translations-45.4.0esr-53.1 - SUSE Manager 2.1 (s390x x86_64): MozillaFirefox-45.4.0esr-53.1 MozillaFirefox-translations-45.4.0esr-53.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-devel-45.4.0esr-53.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-45.4.0esr-53.1 MozillaFirefox-translations-45.4.0esr-53.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): MozillaFirefox-45.4.0esr-53.1 MozillaFirefox-translations-45.4.0esr-53.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): MozillaFirefox-45.4.0esr-53.1 MozillaFirefox-translations-45.4.0esr-53.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): MozillaFirefox-debuginfo-45.4.0esr-53.1 MozillaFirefox-debugsource-45.4.0esr-53.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): MozillaFirefox-debuginfo-45.4.0esr-53.1 MozillaFirefox-debugsource-45.4.0esr-53.1 References: https://www.suse.com/security/cve/CVE-2016-5250.html https://www.suse.com/security/cve/CVE-2016-5257.html https://www.suse.com/security/cve/CVE-2016-5261.html https://www.suse.com/security/cve/CVE-2016-5270.html https://www.suse.com/security/cve/CVE-2016-5272.html https://www.suse.com/security/cve/CVE-2016-5274.html https://www.suse.com/security/cve/CVE-2016-5276.html https://www.suse.com/security/cve/CVE-2016-5277.html https://www.suse.com/security/cve/CVE-2016-5278.html https://www.suse.com/security/cve/CVE-2016-5280.html https://www.suse.com/security/cve/CVE-2016-5281.html https://www.suse.com/security/cve/CVE-2016-5284.html https://bugzilla.suse.com/999701 From sle-security-updates at lists.suse.com Thu Oct 13 09:10:47 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 13 Oct 2016 17:10:47 +0200 (CEST) Subject: SUSE-SU-2016:2527-1: moderate: Security update for tiff Message-ID: <20161013151047.D4D3CF7C7@maintenance.suse.de> SUSE Security Update: Security update for tiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2527-1 Rating: moderate References: #973340 #974449 #974614 #974618 #975069 #984808 #984831 #984837 #984842 #987351 Cross-References: CVE-2016-3186 CVE-2016-3622 CVE-2016-3623 CVE-2016-3945 CVE-2016-3990 CVE-2016-5314 CVE-2016-5316 CVE-2016-5317 CVE-2016-5320 CVE-2016-5875 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: This update for tiff fixes the following issues: - CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449) - Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098) - CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831) - CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837) - CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842) - CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808) - CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351) - CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618) - CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614) - CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069) - CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-tiff-12785=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-tiff-12785=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-tiff-12785=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.168.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.168.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.168.1 tiff-3.8.2-141.168.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.168.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libtiff3-x86-3.8.2-141.168.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): tiff-debuginfo-3.8.2-141.168.1 tiff-debugsource-3.8.2-141.168.1 References: https://www.suse.com/security/cve/CVE-2016-3186.html https://www.suse.com/security/cve/CVE-2016-3622.html https://www.suse.com/security/cve/CVE-2016-3623.html https://www.suse.com/security/cve/CVE-2016-3945.html https://www.suse.com/security/cve/CVE-2016-3990.html https://www.suse.com/security/cve/CVE-2016-5314.html https://www.suse.com/security/cve/CVE-2016-5316.html https://www.suse.com/security/cve/CVE-2016-5317.html https://www.suse.com/security/cve/CVE-2016-5320.html https://www.suse.com/security/cve/CVE-2016-5875.html https://bugzilla.suse.com/973340 https://bugzilla.suse.com/974449 https://bugzilla.suse.com/974614 https://bugzilla.suse.com/974618 https://bugzilla.suse.com/975069 https://bugzilla.suse.com/984808 https://bugzilla.suse.com/984831 https://bugzilla.suse.com/984837 https://bugzilla.suse.com/984842 https://bugzilla.suse.com/987351 From sle-security-updates at lists.suse.com Thu Oct 13 12:08:38 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 13 Oct 2016 20:08:38 +0200 (CEST) Subject: SUSE-SU-2016:2528-1: important: Security update for xen Message-ID: <20161013180838.694B5F7C7@maintenance.suse.de> SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2528-1 Rating: important References: #973188 #974038 #975130 #975138 #978164 #978295 #980716 #980724 #981264 #982960 #983984 #988675 #995785 #995792 Cross-References: CVE-2014-3615 CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 CVE-2016-3960 CVE-2016-4001 CVE-2016-4002 CVE-2016-4439 CVE-2016-4441 CVE-2016-4480 CVE-2016-5238 CVE-2016-5338 CVE-2016-6258 CVE-2016-7092 CVE-2016-7094 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS ______________________________________________________________________________ An update that fixes 16 vulnerabilities is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792) - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785) - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675) - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984) - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960) - CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264) - CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724) - CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716) - CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue (bsc#978164) - CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295) - CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038) - CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188) - CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130) - CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-xen-12786=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64): xen-devel-4.1.6_08-29.1 xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1 xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1 xen-libs-4.1.6_08-29.1 xen-tools-domU-4.1.6_08-29.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (x86_64): xen-4.1.6_08-29.1 xen-doc-html-4.1.6_08-29.1 xen-doc-pdf-4.1.6_08-29.1 xen-libs-32bit-4.1.6_08-29.1 xen-tools-4.1.6_08-29.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586): xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1 References: https://www.suse.com/security/cve/CVE-2014-3615.html https://www.suse.com/security/cve/CVE-2014-3672.html https://www.suse.com/security/cve/CVE-2016-3158.html https://www.suse.com/security/cve/CVE-2016-3159.html https://www.suse.com/security/cve/CVE-2016-3710.html https://www.suse.com/security/cve/CVE-2016-3960.html https://www.suse.com/security/cve/CVE-2016-4001.html https://www.suse.com/security/cve/CVE-2016-4002.html https://www.suse.com/security/cve/CVE-2016-4439.html https://www.suse.com/security/cve/CVE-2016-4441.html https://www.suse.com/security/cve/CVE-2016-4480.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-6258.html https://www.suse.com/security/cve/CVE-2016-7092.html https://www.suse.com/security/cve/CVE-2016-7094.html https://bugzilla.suse.com/973188 https://bugzilla.suse.com/974038 https://bugzilla.suse.com/975130 https://bugzilla.suse.com/975138 https://bugzilla.suse.com/978164 https://bugzilla.suse.com/978295 https://bugzilla.suse.com/980716 https://bugzilla.suse.com/980724 https://bugzilla.suse.com/981264 https://bugzilla.suse.com/982960 https://bugzilla.suse.com/983984 https://bugzilla.suse.com/988675 https://bugzilla.suse.com/995785 https://bugzilla.suse.com/995792 From sle-security-updates at lists.suse.com Thu Oct 13 13:08:45 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 13 Oct 2016 21:08:45 +0200 (CEST) Subject: SUSE-SU-2016:2532-1: moderate: Security update for gtk2 Message-ID: <20161013190845.02EDBF7C7@maintenance.suse.de> SUSE Security Update: Security update for gtk2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2532-1 Rating: moderate References: #966682 #988745 #991450 Cross-References: CVE-2013-7447 CVE-2016-6352 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: This update for gtk2 fixes the following security issues: - CVE-2016-6352: Some crashes were fixed, including a out of bounds write in the OneLine32() function that could be used by attackers to crash GTK/GDK programs. - CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-gtk2-12787=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-gtk2-12787=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-gtk2-12787=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): gtk2-devel-2.18.9-0.44.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64): gtk2-devel-32bit-2.18.9-0.44.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): gtk2-2.18.9-0.44.1 gtk2-doc-2.18.9-0.44.1 gtk2-lang-2.18.9-0.44.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): gtk2-32bit-2.18.9-0.44.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): gtk2-x86-2.18.9-0.44.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): gtk2-debuginfo-2.18.9-0.44.1 gtk2-debugsource-2.18.9-0.44.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64): gtk2-debuginfo-32bit-2.18.9-0.44.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64): gtk2-debuginfo-x86-2.18.9-0.44.1 References: https://www.suse.com/security/cve/CVE-2013-7447.html https://www.suse.com/security/cve/CVE-2016-6352.html https://bugzilla.suse.com/966682 https://bugzilla.suse.com/988745 https://bugzilla.suse.com/991450 From sle-security-updates at lists.suse.com Thu Oct 13 13:09:32 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 13 Oct 2016 21:09:32 +0200 (CEST) Subject: SUSE-SU-2016:2533-1: important: Security update for xen Message-ID: <20161013190932.F12ADF7BD@maintenance.suse.de> SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2533-1 Rating: important References: #953339 #953362 #953518 #954872 #955399 #957986 #958848 #961600 #963161 #964427 #970135 #971949 #973188 #973631 #974038 #975130 #975138 #975907 #976058 #976111 #978164 #978295 #978413 #979035 #979620 #979670 #980716 #980724 #981264 #981276 #982024 #982025 #982026 #982224 #982225 #982286 #982695 #982960 #983973 #983984 #984981 #985503 #986586 #988675 #990843 #990923 #990970 #991934 #992224 #994421 #994625 #994761 #994772 #994775 #995785 #995789 #995792 #997731 Cross-References: CVE-2014-3615 CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 CVE-2016-3712 CVE-2016-3960 CVE-2016-4001 CVE-2016-4002 CVE-2016-4020 CVE-2016-4037 CVE-2016-4439 CVE-2016-4441 CVE-2016-4453 CVE-2016-4454 CVE-2016-4480 CVE-2016-4952 CVE-2016-4962 CVE-2016-4963 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5126 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-5403 CVE-2016-6258 CVE-2016-6351 CVE-2016-6833 CVE-2016-6834 CVE-2016-6835 CVE-2016-6836 CVE-2016-6888 CVE-2016-7092 CVE-2016-7093 CVE-2016-7094 CVE-2016-7154 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves 38 vulnerabilities and has 20 fixes is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264). - CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188). - CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188). - CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue (bsc#978164) - CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038). - CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130). - CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138). - CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907) - CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111) - CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716) - CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724) - CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225) - CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224) - CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295). - CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276) - CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620) - CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670) - CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024) - CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025) - CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026) - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286) - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960) - CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973) - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984) - CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923) - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675) - CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843). - CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775). - CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421). - CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625). - CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761). - CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772). - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785) - CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789) - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792) - CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731). These non-security issues were fixed: - bsc#991934: Hypervisor crash in csched_acct - bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA - bsc#970135: New virtualization project clock test randomly fails on Xen - bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live - bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79) - bsc#985503: vif-route broken - bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. - bsc#986586: Out of memory (oom) during boot on "modprobe xenblk" (non xen kernel) - bsc#953339, bsc#953362, bsc#953518, bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream - bsc#958848: HVM guest crash at /usr/src/packages/BUILD/ xen-4.4.2-testing/obj/default/balloon/balloon.c:407 - bsc#982695: xen-4.5.2 qemu fails to boot HVM guest from xvda - bsc#954872: script block-dmmd not working as expected - bsc#961600: : poor performance when Xen HVM domU configured with max memory > current memory - bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399 - bsc#963161: Windows VM getting stuck during load while a VF is assigned to it - bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu) - bsc#957986: Indirect descriptors are not compatible with Amazon block backend - bsc#973631: AWS EC2 kdump issue - bsc#964427: Discarding device blocks failed with input/output error Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1476=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1476=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): xen-4.4.4_04-22.22.2 xen-debugsource-4.4.4_04-22.22.2 xen-doc-html-4.4.4_04-22.22.2 xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2 xen-kmp-default-debuginfo-4.4.4_04_k3.12.60_52.54-22.22.2 xen-libs-32bit-4.4.4_04-22.22.2 xen-libs-4.4.4_04-22.22.2 xen-libs-debuginfo-32bit-4.4.4_04-22.22.2 xen-libs-debuginfo-4.4.4_04-22.22.2 xen-tools-4.4.4_04-22.22.2 xen-tools-debuginfo-4.4.4_04-22.22.2 xen-tools-domU-4.4.4_04-22.22.2 xen-tools-domU-debuginfo-4.4.4_04-22.22.2 - SUSE Linux Enterprise Server 12-LTSS (x86_64): xen-4.4.4_04-22.22.2 xen-debugsource-4.4.4_04-22.22.2 xen-doc-html-4.4.4_04-22.22.2 xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2 xen-kmp-default-debuginfo-4.4.4_04_k3.12.60_52.54-22.22.2 xen-libs-32bit-4.4.4_04-22.22.2 xen-libs-4.4.4_04-22.22.2 xen-libs-debuginfo-32bit-4.4.4_04-22.22.2 xen-libs-debuginfo-4.4.4_04-22.22.2 xen-tools-4.4.4_04-22.22.2 xen-tools-debuginfo-4.4.4_04-22.22.2 xen-tools-domU-4.4.4_04-22.22.2 xen-tools-domU-debuginfo-4.4.4_04-22.22.2 References: https://www.suse.com/security/cve/CVE-2014-3615.html https://www.suse.com/security/cve/CVE-2014-3672.html https://www.suse.com/security/cve/CVE-2016-3158.html https://www.suse.com/security/cve/CVE-2016-3159.html https://www.suse.com/security/cve/CVE-2016-3710.html https://www.suse.com/security/cve/CVE-2016-3712.html https://www.suse.com/security/cve/CVE-2016-3960.html https://www.suse.com/security/cve/CVE-2016-4001.html https://www.suse.com/security/cve/CVE-2016-4002.html https://www.suse.com/security/cve/CVE-2016-4020.html https://www.suse.com/security/cve/CVE-2016-4037.html https://www.suse.com/security/cve/CVE-2016-4439.html https://www.suse.com/security/cve/CVE-2016-4441.html https://www.suse.com/security/cve/CVE-2016-4453.html https://www.suse.com/security/cve/CVE-2016-4454.html https://www.suse.com/security/cve/CVE-2016-4480.html https://www.suse.com/security/cve/CVE-2016-4952.html https://www.suse.com/security/cve/CVE-2016-4962.html https://www.suse.com/security/cve/CVE-2016-4963.html https://www.suse.com/security/cve/CVE-2016-5105.html https://www.suse.com/security/cve/CVE-2016-5106.html https://www.suse.com/security/cve/CVE-2016-5107.html https://www.suse.com/security/cve/CVE-2016-5126.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5337.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-5403.html https://www.suse.com/security/cve/CVE-2016-6258.html https://www.suse.com/security/cve/CVE-2016-6351.html https://www.suse.com/security/cve/CVE-2016-6833.html https://www.suse.com/security/cve/CVE-2016-6834.html https://www.suse.com/security/cve/CVE-2016-6835.html https://www.suse.com/security/cve/CVE-2016-6836.html https://www.suse.com/security/cve/CVE-2016-6888.html https://www.suse.com/security/cve/CVE-2016-7092.html https://www.suse.com/security/cve/CVE-2016-7093.html https://www.suse.com/security/cve/CVE-2016-7094.html https://www.suse.com/security/cve/CVE-2016-7154.html https://bugzilla.suse.com/953339 https://bugzilla.suse.com/953362 https://bugzilla.suse.com/953518 https://bugzilla.suse.com/954872 https://bugzilla.suse.com/955399 https://bugzilla.suse.com/957986 https://bugzilla.suse.com/958848 https://bugzilla.suse.com/961600 https://bugzilla.suse.com/963161 https://bugzilla.suse.com/964427 https://bugzilla.suse.com/970135 https://bugzilla.suse.com/971949 https://bugzilla.suse.com/973188 https://bugzilla.suse.com/973631 https://bugzilla.suse.com/974038 https://bugzilla.suse.com/975130 https://bugzilla.suse.com/975138 https://bugzilla.suse.com/975907 https://bugzilla.suse.com/976058 https://bugzilla.suse.com/976111 https://bugzilla.suse.com/978164 https://bugzilla.suse.com/978295 https://bugzilla.suse.com/978413 https://bugzilla.suse.com/979035 https://bugzilla.suse.com/979620 https://bugzilla.suse.com/979670 https://bugzilla.suse.com/980716 https://bugzilla.suse.com/980724 https://bugzilla.suse.com/981264 https://bugzilla.suse.com/981276 https://bugzilla.suse.com/982024 https://bugzilla.suse.com/982025 https://bugzilla.suse.com/982026 https://bugzilla.suse.com/982224 https://bugzilla.suse.com/982225 https://bugzilla.suse.com/982286 https://bugzilla.suse.com/982695 https://bugzilla.suse.com/982960 https://bugzilla.suse.com/983973 https://bugzilla.suse.com/983984 https://bugzilla.suse.com/984981 https://bugzilla.suse.com/985503 https://bugzilla.suse.com/986586 https://bugzilla.suse.com/988675 https://bugzilla.suse.com/990843 https://bugzilla.suse.com/990923 https://bugzilla.suse.com/990970 https://bugzilla.suse.com/991934 https://bugzilla.suse.com/992224 https://bugzilla.suse.com/994421 https://bugzilla.suse.com/994625 https://bugzilla.suse.com/994761 https://bugzilla.suse.com/994772 https://bugzilla.suse.com/994775 https://bugzilla.suse.com/995785 https://bugzilla.suse.com/995789 https://bugzilla.suse.com/995792 https://bugzilla.suse.com/997731 From sle-security-updates at lists.suse.com Fri Oct 14 12:08:38 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 14 Oct 2016 20:08:38 +0200 (CEST) Subject: SUSE-SU-2016:2545-1: moderate: Security update for compat-openssl097g Message-ID: <20161014180838.CBE42F7BE@maintenance.suse.de> SUSE Security Update: Security update for compat-openssl097g ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2545-1 Rating: moderate References: #982575 #993819 #995359 #995377 #999665 #999668 Cross-References: CVE-2016-2177 CVE-2016-2182 CVE-2016-2183 CVE-2016-6303 CVE-2016-6306 Affected Products: SUSE Linux Enterprise Server for SAP 11-SP4 SUSE Linux Enterprise Server for SAP 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has one errata is now available. Description: This update for compat-openssl097g fixes the following issues: OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: Low * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 11-SP4: zypper in -t patch slesappsp4-compat-openssl097g-12788=1 - SUSE Linux Enterprise Server for SAP 11-SP3: zypper in -t patch slesappsp3-compat-openssl097g-12788=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-compat-openssl097g-12788=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 11-SP4 (ppc64 x86_64): compat-openssl097g-0.9.7g-146.22.47.1 compat-openssl097g-32bit-0.9.7g-146.22.47.1 - SUSE Linux Enterprise Server for SAP 11-SP3 (x86_64): compat-openssl097g-0.9.7g-146.22.47.1 compat-openssl097g-32bit-0.9.7g-146.22.47.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): compat-openssl097g-debuginfo-0.9.7g-146.22.47.1 compat-openssl097g-debugsource-0.9.7g-146.22.47.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): compat-openssl097g-debuginfo-32bit-0.9.7g-146.22.47.1 References: https://www.suse.com/security/cve/CVE-2016-2177.html https://www.suse.com/security/cve/CVE-2016-2182.html https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-6303.html https://www.suse.com/security/cve/CVE-2016-6306.html https://bugzilla.suse.com/982575 https://bugzilla.suse.com/993819 https://bugzilla.suse.com/995359 https://bugzilla.suse.com/995377 https://bugzilla.suse.com/999665 https://bugzilla.suse.com/999668 From sle-security-updates at lists.suse.com Mon Oct 17 08:09:12 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 17 Oct 2016 16:09:12 +0200 (CEST) Subject: SUSE-SU-2016:2550-1: moderate: Security update for gtk2 Message-ID: <20161017140912.7A63EF7BD@maintenance.suse.de> SUSE Security Update: Security update for gtk2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2550-1 Rating: moderate References: #966682 Cross-References: CVE-2013-7447 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for gtk2 fixes the following issues: - CVE-2013-7447: Avoid an overflow when allocating a cairo pixbuf (bsc#966682). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1490=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1490=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1490=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1490=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): gtk2-debugsource-2.24.24-3.1 typelib-1_0-Gtk-2_0-2.24.24-3.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): gtk2-debugsource-2.24.24-3.1 gtk2-devel-2.24.24-3.1 gtk2-devel-debuginfo-2.24.24-3.1 typelib-1_0-Gtk-2_0-2.24.24-3.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): gtk2-debugsource-2.24.24-3.1 gtk2-tools-2.24.24-3.1 gtk2-tools-debuginfo-2.24.24-3.1 libgtk-2_0-0-2.24.24-3.1 libgtk-2_0-0-debuginfo-2.24.24-3.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): gtk2-tools-32bit-2.24.24-3.1 gtk2-tools-debuginfo-32bit-2.24.24-3.1 libgtk-2_0-0-32bit-2.24.24-3.1 libgtk-2_0-0-debuginfo-32bit-2.24.24-3.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): gtk2-lang-2.24.24-3.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): gtk2-debugsource-2.24.24-3.1 gtk2-tools-2.24.24-3.1 gtk2-tools-32bit-2.24.24-3.1 gtk2-tools-debuginfo-2.24.24-3.1 gtk2-tools-debuginfo-32bit-2.24.24-3.1 libgtk-2_0-0-2.24.24-3.1 libgtk-2_0-0-32bit-2.24.24-3.1 libgtk-2_0-0-debuginfo-2.24.24-3.1 libgtk-2_0-0-debuginfo-32bit-2.24.24-3.1 typelib-1_0-Gtk-2_0-2.24.24-3.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): gtk2-lang-2.24.24-3.1 References: https://www.suse.com/security/cve/CVE-2013-7447.html https://bugzilla.suse.com/966682 From sle-security-updates at lists.suse.com Mon Oct 17 11:09:24 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 17 Oct 2016 19:09:24 +0200 (CEST) Subject: SUSE-SU-2016:2553-1: moderate: Security update for kdump Message-ID: <20161017170924.6FC6FF7C7@maintenance.suse.de> SUSE Security Update: Security update for kdump ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2553-1 Rating: moderate References: #927451 #932339 #943214 #951844 #964206 #970708 #973213 #974270 #976864 #980328 #984799 #987862 #989972 #990200 Cross-References: CVE-2016-5759 Affected Products: SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 13 fixes is now available. Description: This update for kdump provides several fixes and enhancements: - Refresh kdumprd if /etc/hosts or /etc/nsswitch.conf is changed. (bsc#943214) - Add a separate systemd service to rebuild kdumprd at boot. (bsc#943214) - Improve network setup in the kdump environment by reading configuration from wicked by default (system configuration files are used as a fallback). (bsc#980328) - Use the last mount entry in kdump_get_mountpoints(). (bsc#951844) - Remove 'notsc' from the kdump kernel command line. (bsc#973213) - Handle dump files with many program headers. (bsc#932339, bsc#970708) - Fall back to stat() if file type is DT_UNKNOWN. (bsc#964206) - Remove vm. sysctls from kdump initrd. (bsc#927451, bsc#987862) - Use the exit code of kexec, not that of "local". (bsc#984799) - Convert sysroot to a bind mount in kdump initrd. (bsc#976864) - Distinguish between Xenlinux (aka Xenified or SUSE) and pvops Xen kernels, as the latter can run on bare metal. (bsc#974270) - CVE-2016-5759: Use full path to dracut as argument to bash. (bsc#989972, bsc#990200) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1492=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1492=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kdump-0.8.15-29.1 kdump-debuginfo-0.8.15-29.1 kdump-debugsource-0.8.15-29.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kdump-0.8.15-29.1 kdump-debuginfo-0.8.15-29.1 kdump-debugsource-0.8.15-29.1 References: https://www.suse.com/security/cve/CVE-2016-5759.html https://bugzilla.suse.com/927451 https://bugzilla.suse.com/932339 https://bugzilla.suse.com/943214 https://bugzilla.suse.com/951844 https://bugzilla.suse.com/964206 https://bugzilla.suse.com/970708 https://bugzilla.suse.com/973213 https://bugzilla.suse.com/974270 https://bugzilla.suse.com/976864 https://bugzilla.suse.com/980328 https://bugzilla.suse.com/984799 https://bugzilla.suse.com/987862 https://bugzilla.suse.com/989972 https://bugzilla.suse.com/990200 From sle-security-updates at lists.suse.com Mon Oct 17 12:09:16 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 17 Oct 2016 20:09:16 +0200 (CEST) Subject: SUSE-SU-2016:2555-1: moderate: Security update for openssh-openssl1 Message-ID: <20161017180916.F10EBF7C7@maintenance.suse.de> SUSE Security Update: Security update for openssh-openssl1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2555-1 Rating: moderate References: #729190 #932483 #948902 #960414 #961368 #961494 #962313 #965576 #970632 #975865 #981654 #989363 #992533 Cross-References: CVE-2015-8325 CVE-2016-1908 CVE-2016-3115 CVE-2016-6210 CVE-2016-6515 Affected Products: SUSE Linux Enterprise Server 11-SECURITY ______________________________________________________________________________ An update that solves 5 vulnerabilities and has 8 fixes is now available. Description: This update for openssh-openssl1 fixes the following issues: Security issues fixed: - CVE-2016-6210: Prevent user enumeration through the timing of password processing (bsc#989363) - CVE-2016-6515: limit accepted password length (prevents possible DoS) (bsc#992533) - CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632) - CVE-2016-1908: prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313) - CVE-2015-8325: ignore PAM environment when using login (bsc#975865) - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902) - Allow lowering the DH groups parameter limit in server as well as when GSSAPI key exchange is used (bsc#948902) Bugs fixed: - avoid complaining about unset DISPLAY variable (bsc#981654) - Correctly parse GSSAPI KEX algorithms (bsc#961368) - more verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414) - fix PRNG re-seeding (bsc#960414, bsc#729190) - Allow empty Match blocks (bsc#961494) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SECURITY: zypper in -t patch secsp3-openssh-openssl1-12794=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64): openssh-openssl1-6.6p1-15.1 openssh-openssl1-helpers-6.6p1-15.1 References: https://www.suse.com/security/cve/CVE-2015-8325.html https://www.suse.com/security/cve/CVE-2016-1908.html https://www.suse.com/security/cve/CVE-2016-3115.html https://www.suse.com/security/cve/CVE-2016-6210.html https://www.suse.com/security/cve/CVE-2016-6515.html https://bugzilla.suse.com/729190 https://bugzilla.suse.com/932483 https://bugzilla.suse.com/948902 https://bugzilla.suse.com/960414 https://bugzilla.suse.com/961368 https://bugzilla.suse.com/961494 https://bugzilla.suse.com/962313 https://bugzilla.suse.com/965576 https://bugzilla.suse.com/970632 https://bugzilla.suse.com/975865 https://bugzilla.suse.com/981654 https://bugzilla.suse.com/989363 https://bugzilla.suse.com/992533 From sle-security-updates at lists.suse.com Wed Oct 19 08:08:31 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 19 Oct 2016 16:08:31 +0200 (CEST) Subject: SUSE-SU-2016:2565-1: moderate: Security update for dbus-1 Message-ID: <20161019140831.CFDD1F7C7@maintenance.suse.de> SUSE Security Update: Security update for dbus-1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2565-1 Rating: moderate References: #1003898 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for dbus-1 to version 1.8.22 fixes one security issue and bugs. The following security issue was fixed: - bsc#1003898: Do not treat ActivationFailure message received from root-owned systemd name as a format string. The following upstream changes are included: - Change the default configuration for the session bus to only allow EXTERNAL authentication (secure kernel-mediated credentials-passing), as was already done for the system bus. - Fix a memory leak when GetConnectionCredentials() succeeds (fdo#91008) - Ensure that dbus-monitor does not reply to messages intended for others (fdo#90952) - Add locking to DBusCounter's reference count and notify function (fdo#89297) - Ensure that DBusTransport's reference count is protected by the corresponding DBusConnection's lock (fdo#90312) - Correctly release DBusServer mutex before early-return if we run out of memory while copying authentication mechanisms (fdo#90021) - Correctly initialize all fields of DBusTypeReader (fdo#90021) - Fix some missing \n in verbose (debug log) messages (fdo#90004) - Clean up some memory leaks in test code (fdo#90021) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1502=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1502=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1502=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): dbus-1-debuginfo-1.8.22-22.2 dbus-1-debugsource-1.8.22-22.2 dbus-1-devel-1.8.22-22.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): dbus-1-devel-doc-1.8.22-22.2 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): dbus-1-1.8.22-22.2 dbus-1-debuginfo-1.8.22-22.2 dbus-1-debugsource-1.8.22-22.2 dbus-1-x11-1.8.22-22.2 dbus-1-x11-debuginfo-1.8.22-22.2 dbus-1-x11-debugsource-1.8.22-22.2 libdbus-1-3-1.8.22-22.2 libdbus-1-3-debuginfo-1.8.22-22.2 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): dbus-1-debuginfo-32bit-1.8.22-22.2 libdbus-1-3-32bit-1.8.22-22.2 libdbus-1-3-debuginfo-32bit-1.8.22-22.2 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): dbus-1-1.8.22-22.2 dbus-1-debuginfo-1.8.22-22.2 dbus-1-debuginfo-32bit-1.8.22-22.2 dbus-1-debugsource-1.8.22-22.2 dbus-1-x11-1.8.22-22.2 dbus-1-x11-debuginfo-1.8.22-22.2 dbus-1-x11-debugsource-1.8.22-22.2 libdbus-1-3-1.8.22-22.2 libdbus-1-3-32bit-1.8.22-22.2 libdbus-1-3-debuginfo-1.8.22-22.2 libdbus-1-3-debuginfo-32bit-1.8.22-22.2 References: https://bugzilla.suse.com/1003898 From sle-security-updates at lists.suse.com Wed Oct 19 14:08:31 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 19 Oct 2016 22:08:31 +0200 (CEST) Subject: SUSE-SU-2016:2569-1: important: Security update for quagga Message-ID: <20161019200831.97C6CF7BD@maintenance.suse.de> SUSE Security Update: Security update for quagga ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2569-1 Rating: important References: #1005258 Cross-References: CVE-2016-1245 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for quagga fixes the following issues: - CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-quagga-12800=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-quagga-12800=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-quagga-12800=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): quagga-devel-0.99.15-0.29.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64): quagga-0.99.15-0.29.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): quagga-0.99.15-0.29.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): quagga-debuginfo-0.99.15-0.29.1 quagga-debugsource-0.99.15-0.29.1 References: https://www.suse.com/security/cve/CVE-2016-1245.html https://bugzilla.suse.com/1005258 From sle-security-updates at lists.suse.com Wed Oct 19 14:08:54 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 19 Oct 2016 22:08:54 +0200 (CEST) Subject: SUSE-SU-2016:2570-1: moderate: Security update for samba Message-ID: <20161019200854.0CC24F7BD@maintenance.suse.de> SUSE Security Update: Security update for samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2570-1 Rating: moderate References: #1005065 #969522 #975131 #981566 #986228 #986869 #991564 Cross-References: CVE-2016-2119 Affected Products: SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has 6 fixes is now available. Description: This update for samba provides the following fix: Following security issue was fixed: - CVE-2016-2119: Prevent client-side SMB2 signing downgrade. (bsc#986869) Also the following bugs were fixed: - Fix possible ctdb crash when opening sockets with htons(IPPROTO_RAW). (bsc#969522) - Honor smb.conf socket options in winbind. (bsc#975131) - Fix ntlm-auth segmentation fault with squid. (bsc#986228) - Implement new "--no-dns-updates" option in "net ads" command. (bsc#991564) - Fix population of ctdb sysconfig after source merge. (bsc#981566) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1506=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): ctdb-4.2.4-18.27.9 ctdb-debuginfo-4.2.4-18.27.9 libdcerpc-binding0-4.2.4-18.27.9 libdcerpc-binding0-debuginfo-4.2.4-18.27.9 libdcerpc0-4.2.4-18.27.9 libdcerpc0-debuginfo-4.2.4-18.27.9 libgensec0-4.2.4-18.27.9 libgensec0-debuginfo-4.2.4-18.27.9 libndr-krb5pac0-4.2.4-18.27.9 libndr-krb5pac0-debuginfo-4.2.4-18.27.9 libndr-nbt0-4.2.4-18.27.9 libndr-nbt0-debuginfo-4.2.4-18.27.9 libndr-standard0-4.2.4-18.27.9 libndr-standard0-debuginfo-4.2.4-18.27.9 libndr0-4.2.4-18.27.9 libndr0-debuginfo-4.2.4-18.27.9 libnetapi0-4.2.4-18.27.9 libnetapi0-debuginfo-4.2.4-18.27.9 libregistry0-4.2.4-18.27.9 libregistry0-debuginfo-4.2.4-18.27.9 libsamba-credentials0-4.2.4-18.27.9 libsamba-credentials0-debuginfo-4.2.4-18.27.9 libsamba-hostconfig0-4.2.4-18.27.9 libsamba-hostconfig0-debuginfo-4.2.4-18.27.9 libsamba-passdb0-4.2.4-18.27.9 libsamba-passdb0-debuginfo-4.2.4-18.27.9 libsamba-util0-4.2.4-18.27.9 libsamba-util0-debuginfo-4.2.4-18.27.9 libsamdb0-4.2.4-18.27.9 libsamdb0-debuginfo-4.2.4-18.27.9 libsmbclient-raw0-4.2.4-18.27.9 libsmbclient-raw0-debuginfo-4.2.4-18.27.9 libsmbclient0-4.2.4-18.27.9 libsmbclient0-debuginfo-4.2.4-18.27.9 libsmbconf0-4.2.4-18.27.9 libsmbconf0-debuginfo-4.2.4-18.27.9 libsmbldap0-4.2.4-18.27.9 libsmbldap0-debuginfo-4.2.4-18.27.9 libtevent-util0-4.2.4-18.27.9 libtevent-util0-debuginfo-4.2.4-18.27.9 libwbclient0-4.2.4-18.27.9 libwbclient0-debuginfo-4.2.4-18.27.9 samba-4.2.4-18.27.9 samba-client-4.2.4-18.27.9 samba-client-debuginfo-4.2.4-18.27.9 samba-debuginfo-4.2.4-18.27.9 samba-debugsource-4.2.4-18.27.9 samba-libs-4.2.4-18.27.9 samba-libs-debuginfo-4.2.4-18.27.9 samba-winbind-4.2.4-18.27.9 samba-winbind-debuginfo-4.2.4-18.27.9 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): libdcerpc-binding0-32bit-4.2.4-18.27.9 libdcerpc-binding0-debuginfo-32bit-4.2.4-18.27.9 libdcerpc0-32bit-4.2.4-18.27.9 libdcerpc0-debuginfo-32bit-4.2.4-18.27.9 libgensec0-32bit-4.2.4-18.27.9 libgensec0-debuginfo-32bit-4.2.4-18.27.9 libndr-krb5pac0-32bit-4.2.4-18.27.9 libndr-krb5pac0-debuginfo-32bit-4.2.4-18.27.9 libndr-nbt0-32bit-4.2.4-18.27.9 libndr-nbt0-debuginfo-32bit-4.2.4-18.27.9 libndr-standard0-32bit-4.2.4-18.27.9 libndr-standard0-debuginfo-32bit-4.2.4-18.27.9 libndr0-32bit-4.2.4-18.27.9 libndr0-debuginfo-32bit-4.2.4-18.27.9 libnetapi0-32bit-4.2.4-18.27.9 libnetapi0-debuginfo-32bit-4.2.4-18.27.9 libsamba-credentials0-32bit-4.2.4-18.27.9 libsamba-credentials0-debuginfo-32bit-4.2.4-18.27.9 libsamba-hostconfig0-32bit-4.2.4-18.27.9 libsamba-hostconfig0-debuginfo-32bit-4.2.4-18.27.9 libsamba-passdb0-32bit-4.2.4-18.27.9 libsamba-passdb0-debuginfo-32bit-4.2.4-18.27.9 libsamba-util0-32bit-4.2.4-18.27.9 libsamba-util0-debuginfo-32bit-4.2.4-18.27.9 libsamdb0-32bit-4.2.4-18.27.9 libsamdb0-debuginfo-32bit-4.2.4-18.27.9 libsmbclient-raw0-32bit-4.2.4-18.27.9 libsmbclient-raw0-debuginfo-32bit-4.2.4-18.27.9 libsmbclient0-32bit-4.2.4-18.27.9 libsmbclient0-debuginfo-32bit-4.2.4-18.27.9 libsmbconf0-32bit-4.2.4-18.27.9 libsmbconf0-debuginfo-32bit-4.2.4-18.27.9 libsmbldap0-32bit-4.2.4-18.27.9 libsmbldap0-debuginfo-32bit-4.2.4-18.27.9 libtevent-util0-32bit-4.2.4-18.27.9 libtevent-util0-debuginfo-32bit-4.2.4-18.27.9 libwbclient0-32bit-4.2.4-18.27.9 libwbclient0-debuginfo-32bit-4.2.4-18.27.9 samba-32bit-4.2.4-18.27.9 samba-client-32bit-4.2.4-18.27.9 samba-client-debuginfo-32bit-4.2.4-18.27.9 samba-debuginfo-32bit-4.2.4-18.27.9 samba-libs-32bit-4.2.4-18.27.9 samba-libs-debuginfo-32bit-4.2.4-18.27.9 samba-winbind-32bit-4.2.4-18.27.9 samba-winbind-debuginfo-32bit-4.2.4-18.27.9 - SUSE Linux Enterprise Server 12-LTSS (noarch): samba-doc-4.2.4-18.27.9 References: https://www.suse.com/security/cve/CVE-2016-2119.html https://bugzilla.suse.com/1005065 https://bugzilla.suse.com/969522 https://bugzilla.suse.com/975131 https://bugzilla.suse.com/981566 https://bugzilla.suse.com/986228 https://bugzilla.suse.com/986869 https://bugzilla.suse.com/991564 From sle-security-updates at lists.suse.com Thu Oct 20 11:08:15 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 20 Oct 2016 19:08:15 +0200 (CEST) Subject: SUSE-SU-2016:2579-1: moderate: Security update for sssd Message-ID: <20161020170815.A91FEF7C7@maintenance.suse.de> SUSE Security Update: Security update for sssd ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2579-1 Rating: moderate References: #1002973 #1004220 #880245 #993582 Cross-References: CVE-2014-0249 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has three fixes is now available. Description: This update for sssd fixes one security issue and three bugs. The following vulnerability was fixed: - CVE-2014-0249: Incorrect expansion of group membership when encountering a non-POSIX group. (bsc#880245) The following non-security fixes were also included: - Prevent crashes of statically linked binaries using getpwuid when sssd is used and nscd is turned off or has caching disabled. (bsc#993582) - Add logrotate configuration to prevent log files from growing too large when running with debug mode enabled. (bsc#1004220) - Order sudo rules by the same logic used by the native LDAP support from sudo. (bsc#1002973) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1513=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1513=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1513=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libipa_hbac-devel-1.11.5.1-28.1 libsss_idmap-devel-1.11.5.1-28.1 libsss_nss_idmap-devel-1.11.5.1-28.1 libsss_nss_idmap0-1.11.5.1-28.1 libsss_nss_idmap0-debuginfo-1.11.5.1-28.1 sssd-debuginfo-1.11.5.1-28.1 sssd-debugsource-1.11.5.1-28.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libipa_hbac0-1.11.5.1-28.1 libipa_hbac0-debuginfo-1.11.5.1-28.1 libsss_idmap0-1.11.5.1-28.1 libsss_idmap0-debuginfo-1.11.5.1-28.1 libsss_sudo-1.11.5.1-28.1 libsss_sudo-debuginfo-1.11.5.1-28.1 python-sssd-config-1.11.5.1-28.1 python-sssd-config-debuginfo-1.11.5.1-28.1 sssd-1.11.5.1-28.1 sssd-ad-1.11.5.1-28.1 sssd-ad-debuginfo-1.11.5.1-28.1 sssd-debuginfo-1.11.5.1-28.1 sssd-debugsource-1.11.5.1-28.1 sssd-ipa-1.11.5.1-28.1 sssd-ipa-debuginfo-1.11.5.1-28.1 sssd-krb5-1.11.5.1-28.1 sssd-krb5-common-1.11.5.1-28.1 sssd-krb5-common-debuginfo-1.11.5.1-28.1 sssd-krb5-debuginfo-1.11.5.1-28.1 sssd-ldap-1.11.5.1-28.1 sssd-ldap-debuginfo-1.11.5.1-28.1 sssd-proxy-1.11.5.1-28.1 sssd-proxy-debuginfo-1.11.5.1-28.1 sssd-tools-1.11.5.1-28.1 sssd-tools-debuginfo-1.11.5.1-28.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): sssd-32bit-1.11.5.1-28.1 sssd-debuginfo-32bit-1.11.5.1-28.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libipa_hbac0-1.11.5.1-28.1 libipa_hbac0-debuginfo-1.11.5.1-28.1 libsss_idmap0-1.11.5.1-28.1 libsss_idmap0-debuginfo-1.11.5.1-28.1 libsss_sudo-1.11.5.1-28.1 libsss_sudo-debuginfo-1.11.5.1-28.1 python-sssd-config-1.11.5.1-28.1 python-sssd-config-debuginfo-1.11.5.1-28.1 sssd-1.11.5.1-28.1 sssd-32bit-1.11.5.1-28.1 sssd-ad-1.11.5.1-28.1 sssd-ad-debuginfo-1.11.5.1-28.1 sssd-debuginfo-1.11.5.1-28.1 sssd-debuginfo-32bit-1.11.5.1-28.1 sssd-debugsource-1.11.5.1-28.1 sssd-ipa-1.11.5.1-28.1 sssd-ipa-debuginfo-1.11.5.1-28.1 sssd-krb5-1.11.5.1-28.1 sssd-krb5-common-1.11.5.1-28.1 sssd-krb5-common-debuginfo-1.11.5.1-28.1 sssd-krb5-debuginfo-1.11.5.1-28.1 sssd-ldap-1.11.5.1-28.1 sssd-ldap-debuginfo-1.11.5.1-28.1 sssd-proxy-1.11.5.1-28.1 sssd-proxy-debuginfo-1.11.5.1-28.1 sssd-tools-1.11.5.1-28.1 sssd-tools-debuginfo-1.11.5.1-28.1 References: https://www.suse.com/security/cve/CVE-2014-0249.html https://bugzilla.suse.com/1002973 https://bugzilla.suse.com/1004220 https://bugzilla.suse.com/880245 https://bugzilla.suse.com/993582 From sle-security-updates at lists.suse.com Fri Oct 21 09:17:08 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 21 Oct 2016 17:17:08 +0200 (CEST) Subject: SUSE-SU-2016:2585-1: important: Security update for the Linux Kernel Message-ID: <20161021151708.BA3B5F7C8@maintenance.suse.de> SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2585-1 Rating: important References: #1004418 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-EXTRA SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-kernel-source-12804=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-kernel-source-12804=1 - SUSE Linux Enterprise Server 11-EXTRA: zypper in -t patch slexsp3-kernel-source-12804=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-kernel-source-12804=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch): kernel-docs-3.0.101-84.2 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-3.0.101-84.1 kernel-default-base-3.0.101-84.1 kernel-default-devel-3.0.101-84.1 kernel-source-3.0.101-84.1 kernel-syms-3.0.101-84.1 kernel-trace-3.0.101-84.1 kernel-trace-base-3.0.101-84.1 kernel-trace-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (i586 x86_64): kernel-ec2-3.0.101-84.1 kernel-ec2-base-3.0.101-84.1 kernel-ec2-devel-3.0.101-84.1 kernel-xen-3.0.101-84.1 kernel-xen-base-3.0.101-84.1 kernel-xen-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (s390x): kernel-default-man-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64): kernel-ppc64-3.0.101-84.1 kernel-ppc64-base-3.0.101-84.1 kernel-ppc64-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (i586): kernel-pae-3.0.101-84.1 kernel-pae-base-3.0.101-84.1 kernel-pae-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64): kernel-xen-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (x86_64): kernel-trace-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (ppc64): kernel-ppc64-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (i586): kernel-pae-extra-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-debuginfo-3.0.101-84.1 kernel-default-debugsource-3.0.101-84.1 kernel-trace-debuginfo-3.0.101-84.1 kernel-trace-debugsource-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 s390x x86_64): kernel-default-devel-debuginfo-3.0.101-84.1 kernel-trace-devel-debuginfo-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-84.1 kernel-ec2-debugsource-3.0.101-84.1 kernel-xen-debuginfo-3.0.101-84.1 kernel-xen-debugsource-3.0.101-84.1 kernel-xen-devel-debuginfo-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64): kernel-ppc64-debuginfo-3.0.101-84.1 kernel-ppc64-debugsource-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586): kernel-pae-debuginfo-3.0.101-84.1 kernel-pae-debugsource-3.0.101-84.1 kernel-pae-devel-debuginfo-3.0.101-84.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004418 From sle-security-updates at lists.suse.com Fri Oct 21 11:08:49 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 21 Oct 2016 19:08:49 +0200 (CEST) Subject: SUSE-SU-2016:2589-1: important: Security update for qemu Message-ID: <20161021170849.E131CF7CC@maintenance.suse.de> SUSE Security Update: Security update for qemu ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2589-1 Rating: important References: #1000048 #967012 #967013 #982017 #982018 #982019 #982222 #982223 #982285 #982959 #983961 #983982 #991080 #991466 #994760 #994771 #994774 #996441 #997858 #997859 Cross-References: CVE-2016-2391 CVE-2016-2392 CVE-2016-4453 CVE-2016-4454 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5126 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-5403 CVE-2016-6490 CVE-2016-6833 CVE-2016-6836 CVE-2016-6888 CVE-2016-7116 CVE-2016-7155 CVE-2016-7156 Affected Products: SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 19 vulnerabilities and has one errata is now available. Description: qemu was updated to fix 19 security issues. These security issues were fixed: - CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012) - CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013) - CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018) - CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017) - CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019) - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285) - CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222) - CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223) - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982) - CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961) - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959) - CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080) - CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466) - CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771) - CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774) - CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441) - CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760) - CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858) - CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859) This non-security issue was fixed: - bsc#1000048: Fix migration failure where target host is a soon to be released SLES 12 SP2. Qemu's spice code gets an assertion. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1523=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1523=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): qemu-2.3.1-21.1 qemu-block-curl-2.3.1-21.1 qemu-block-curl-debuginfo-2.3.1-21.1 qemu-debugsource-2.3.1-21.1 qemu-guest-agent-2.3.1-21.1 qemu-guest-agent-debuginfo-2.3.1-21.1 qemu-lang-2.3.1-21.1 qemu-tools-2.3.1-21.1 qemu-tools-debuginfo-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): qemu-kvm-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le): qemu-ppc-2.3.1-21.1 qemu-ppc-debuginfo-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): qemu-ipxe-1.0.0-21.1 qemu-seabios-1.8.1-21.1 qemu-sgabios-8-21.1 qemu-vgabios-1.8.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): qemu-block-rbd-2.3.1-21.1 qemu-block-rbd-debuginfo-2.3.1-21.1 qemu-x86-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): qemu-s390-2.3.1-21.1 qemu-s390-debuginfo-2.3.1-21.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): qemu-ipxe-1.0.0-21.1 qemu-seabios-1.8.1-21.1 qemu-sgabios-8-21.1 qemu-vgabios-1.8.1-21.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): qemu-2.3.1-21.1 qemu-block-curl-2.3.1-21.1 qemu-block-curl-debuginfo-2.3.1-21.1 qemu-debugsource-2.3.1-21.1 qemu-kvm-2.3.1-21.1 qemu-tools-2.3.1-21.1 qemu-tools-debuginfo-2.3.1-21.1 qemu-x86-2.3.1-21.1 References: https://www.suse.com/security/cve/CVE-2016-2391.html https://www.suse.com/security/cve/CVE-2016-2392.html https://www.suse.com/security/cve/CVE-2016-4453.html https://www.suse.com/security/cve/CVE-2016-4454.html https://www.suse.com/security/cve/CVE-2016-5105.html https://www.suse.com/security/cve/CVE-2016-5106.html https://www.suse.com/security/cve/CVE-2016-5107.html https://www.suse.com/security/cve/CVE-2016-5126.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5337.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-5403.html https://www.suse.com/security/cve/CVE-2016-6490.html https://www.suse.com/security/cve/CVE-2016-6833.html https://www.suse.com/security/cve/CVE-2016-6836.html https://www.suse.com/security/cve/CVE-2016-6888.html https://www.suse.com/security/cve/CVE-2016-7116.html https://www.suse.com/security/cve/CVE-2016-7155.html https://www.suse.com/security/cve/CVE-2016-7156.html https://bugzilla.suse.com/1000048 https://bugzilla.suse.com/967012 https://bugzilla.suse.com/967013 https://bugzilla.suse.com/982017 https://bugzilla.suse.com/982018 https://bugzilla.suse.com/982019 https://bugzilla.suse.com/982222 https://bugzilla.suse.com/982223 https://bugzilla.suse.com/982285 https://bugzilla.suse.com/982959 https://bugzilla.suse.com/983961 https://bugzilla.suse.com/983982 https://bugzilla.suse.com/991080 https://bugzilla.suse.com/991466 https://bugzilla.suse.com/994760 https://bugzilla.suse.com/994771 https://bugzilla.suse.com/994774 https://bugzilla.suse.com/996441 https://bugzilla.suse.com/997858 https://bugzilla.suse.com/997859 From sle-security-updates at lists.suse.com Fri Oct 21 11:14:23 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 21 Oct 2016 19:14:23 +0200 (CEST) Subject: SUSE-SU-2016:2592-1: important: Security update for the Linux Kernel Message-ID: <20161021171423.6D674F7CA@maintenance.suse.de> SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2592-1 Rating: important References: #1001419 #1002165 #1004418 #904970 #907150 #920615 #920633 #930408 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 7 fixes is now available. Description: The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). This non-security bug was fixed: - sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1522=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1522=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1522=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1522=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1522=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1522=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-extra-3.12.62-60.64.8.2 kernel-default-extra-debuginfo-3.12.62-60.64.8.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.62-60.64.8.3 kernel-obs-build-debugsource-3.12.62-60.64.8.3 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.62-60.64.8.5 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.62-60.64.8.2 kernel-default-base-3.12.62-60.64.8.2 kernel-default-base-debuginfo-3.12.62-60.64.8.2 kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-devel-3.12.62-60.64.8.2 kernel-syms-3.12.62-60.64.8.2 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.62-60.64.8.2 kernel-macros-3.12.62-60.64.8.2 kernel-source-3.12.62-60.64.8.2 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.62-60.64.8.2 kernel-xen-base-3.12.62-60.64.8.2 kernel-xen-base-debuginfo-3.12.62-60.64.8.2 kernel-xen-debuginfo-3.12.62-60.64.8.2 kernel-xen-debugsource-3.12.62-60.64.8.2 kernel-xen-devel-3.12.62-60.64.8.2 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.62-60.64.8.2 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.62-60.64.8.2 kernel-ec2-debuginfo-3.12.62-60.64.8.2 kernel-ec2-debugsource-3.12.62-60.64.8.2 kernel-ec2-devel-3.12.62-60.64.8.2 kernel-ec2-extra-3.12.62-60.64.8.2 kernel-ec2-extra-debuginfo-3.12.62-60.64.8.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_62-60_64_8-default-1-2.2 kgraft-patch-3_12_62-60_64_8-xen-1-2.2 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.62-60.64.8.2 kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-devel-3.12.62-60.64.8.2 kernel-default-extra-3.12.62-60.64.8.2 kernel-default-extra-debuginfo-3.12.62-60.64.8.2 kernel-syms-3.12.62-60.64.8.2 kernel-xen-3.12.62-60.64.8.2 kernel-xen-debuginfo-3.12.62-60.64.8.2 kernel-xen-debugsource-3.12.62-60.64.8.2 kernel-xen-devel-3.12.62-60.64.8.2 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.62-60.64.8.2 kernel-macros-3.12.62-60.64.8.2 kernel-source-3.12.62-60.64.8.2 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1004418 https://bugzilla.suse.com/904970 https://bugzilla.suse.com/907150 https://bugzilla.suse.com/920615 https://bugzilla.suse.com/920633 https://bugzilla.suse.com/930408 From sle-security-updates at lists.suse.com Fri Oct 21 13:08:19 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 21 Oct 2016 21:08:19 +0200 (CEST) Subject: SUSE-SU-2016:2593-1: important: Security update for the Linux Kernel Message-ID: <20161021190819.F244DFFCE@maintenance.suse.de> SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2593-1 Rating: important References: #1001419 #1002165 #1004418 #904970 #907150 #920615 #920633 #930408 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Module for Public Cloud 12 ______________________________________________________________________________ An update that solves one vulnerability and has 7 fixes is now available. Description: The SUSE Linux Enterprise 12 GA LTSS kernel was updated to fix two issues. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). This non-security bug was fixed: - sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1524=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1524=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1524=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (noarch): kernel-devel-3.12.60-52.57.1 kernel-macros-3.12.60-52.57.1 kernel-source-3.12.60-52.57.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): kernel-default-3.12.60-52.57.1 kernel-default-base-3.12.60-52.57.1 kernel-default-base-debuginfo-3.12.60-52.57.1 kernel-default-debuginfo-3.12.60-52.57.1 kernel-default-debugsource-3.12.60-52.57.1 kernel-default-devel-3.12.60-52.57.1 kernel-syms-3.12.60-52.57.1 kernel-xen-3.12.60-52.57.1 kernel-xen-base-3.12.60-52.57.1 kernel-xen-base-debuginfo-3.12.60-52.57.1 kernel-xen-debuginfo-3.12.60-52.57.1 kernel-xen-debugsource-3.12.60-52.57.1 kernel-xen-devel-3.12.60-52.57.1 kgraft-patch-3_12_60-52_57-default-1-2.1 kgraft-patch-3_12_60-52_57-xen-1-2.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): kernel-default-3.12.60-52.57.1 kernel-default-base-3.12.60-52.57.1 kernel-default-base-debuginfo-3.12.60-52.57.1 kernel-default-debuginfo-3.12.60-52.57.1 kernel-default-debugsource-3.12.60-52.57.1 kernel-default-devel-3.12.60-52.57.1 kernel-syms-3.12.60-52.57.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): kernel-devel-3.12.60-52.57.1 kernel-macros-3.12.60-52.57.1 kernel-source-3.12.60-52.57.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kernel-xen-3.12.60-52.57.1 kernel-xen-base-3.12.60-52.57.1 kernel-xen-base-debuginfo-3.12.60-52.57.1 kernel-xen-debuginfo-3.12.60-52.57.1 kernel-xen-debugsource-3.12.60-52.57.1 kernel-xen-devel-3.12.60-52.57.1 kgraft-patch-3_12_60-52_57-default-1-2.1 kgraft-patch-3_12_60-52_57-xen-1-2.1 - SUSE Linux Enterprise Server 12-LTSS (s390x): kernel-default-man-3.12.60-52.57.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.60-52.57.1 kernel-ec2-debuginfo-3.12.60-52.57.1 kernel-ec2-debugsource-3.12.60-52.57.1 kernel-ec2-devel-3.12.60-52.57.1 kernel-ec2-extra-3.12.60-52.57.1 kernel-ec2-extra-debuginfo-3.12.60-52.57.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1004418 https://bugzilla.suse.com/904970 https://bugzilla.suse.com/907150 https://bugzilla.suse.com/920615 https://bugzilla.suse.com/920633 https://bugzilla.suse.com/930408 From sle-security-updates at lists.suse.com Fri Oct 21 16:10:22 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 22 Oct 2016 00:10:22 +0200 (CEST) Subject: SUSE-SU-2016:2596-1: important: Security update for the Linux Kernel Message-ID: <20161021221022.02FC8FFCE@maintenance.suse.de> SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2596-1 Rating: important References: #1004418 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-kernel-source-12807=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-kernel-source-12807=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): kernel-default-3.0.101-0.7.44.1 kernel-default-base-3.0.101-0.7.44.1 kernel-default-devel-3.0.101-0.7.44.1 kernel-source-3.0.101-0.7.44.1 kernel-syms-3.0.101-0.7.44.1 kernel-trace-3.0.101-0.7.44.1 kernel-trace-base-3.0.101-0.7.44.1 kernel-trace-devel-3.0.101-0.7.44.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64): kernel-ec2-3.0.101-0.7.44.1 kernel-ec2-base-3.0.101-0.7.44.1 kernel-ec2-devel-3.0.101-0.7.44.1 kernel-xen-3.0.101-0.7.44.1 kernel-xen-base-3.0.101-0.7.44.1 kernel-xen-devel-3.0.101-0.7.44.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x): kernel-default-man-3.0.101-0.7.44.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586): kernel-pae-3.0.101-0.7.44.1 kernel-pae-base-3.0.101-0.7.44.1 kernel-pae-devel-3.0.101-0.7.44.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): kernel-default-debuginfo-3.0.101-0.7.44.1 kernel-default-debugsource-3.0.101-0.7.44.1 kernel-default-devel-debuginfo-3.0.101-0.7.44.1 kernel-trace-debuginfo-3.0.101-0.7.44.1 kernel-trace-debugsource-3.0.101-0.7.44.1 kernel-trace-devel-debuginfo-3.0.101-0.7.44.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-0.7.44.1 kernel-ec2-debugsource-3.0.101-0.7.44.1 kernel-xen-debuginfo-3.0.101-0.7.44.1 kernel-xen-debugsource-3.0.101-0.7.44.1 kernel-xen-devel-debuginfo-3.0.101-0.7.44.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586): kernel-pae-debuginfo-3.0.101-0.7.44.1 kernel-pae-debugsource-3.0.101-0.7.44.1 kernel-pae-devel-debuginfo-3.0.101-0.7.44.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004418 From sle-security-updates at lists.suse.com Sun Oct 23 13:08:40 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sun, 23 Oct 2016 21:08:40 +0200 (CEST) Subject: SUSE-SU-2016:2598-1: important: Security update for Chromium Message-ID: <20161023190840.E537FFFC5@maintenance.suse.de> SUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2598-1 Rating: important References: #1000019 #1004465 Cross-References: CVE-2016-5181 CVE-2016-5182 CVE-2016-5183 CVE-2016-5184 CVE-2016-5185 CVE-2016-5186 CVE-2016-5187 CVE-2016-5188 CVE-2016-5189 CVE-2016-5190 CVE-2016-5191 CVE-2016-5192 CVE-2016-5193 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: Chromium was updated to 54.0.2840.59 to fix security issues and bugs. The following security issues are fixed (bnc#1004465): - CVE-2016-5181: Universal XSS in Blink - CVE-2016-5182: Heap overflow in Blink - CVE-2016-5183: Use after free in PDFium - CVE-2016-5184: Use after free in PDFium - CVE-2016-5185: Use after free in Blink - CVE-2016-5187: URL spoofing - CVE-2016-5188: UI spoofing - CVE-2016-5192: Cross-origin bypass in Blink - CVE-2016-5189: URL spoofing - CVE-2016-5186: Out of bounds read in DevTools - CVE-2016-5191: Universal XSS in Bookmarks - CVE-2016-5190: Use after free in Internals - CVE-2016-5193: Scheme bypass The following bugs were fixed: - bnc#1000019: display issues in full screen mode, add --ui-disable-partial-swap to the launcher The following packaging changes are included: - The desktop sub-packages are no obsolete - The package now uses the system variants of some bundled libraries - The hangouts extension is now built Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch 5717=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-54.0.2840.59-109.1 chromedriver-debuginfo-54.0.2840.59-109.1 chromium-54.0.2840.59-109.1 chromium-debuginfo-54.0.2840.59-109.1 chromium-debugsource-54.0.2840.59-109.1 chromium-ffmpegsumo-54.0.2840.59-109.1 chromium-ffmpegsumo-debuginfo-54.0.2840.59-109.1 References: https://www.suse.com/security/cve/CVE-2016-5181.html https://www.suse.com/security/cve/CVE-2016-5182.html https://www.suse.com/security/cve/CVE-2016-5183.html https://www.suse.com/security/cve/CVE-2016-5184.html https://www.suse.com/security/cve/CVE-2016-5185.html https://www.suse.com/security/cve/CVE-2016-5186.html https://www.suse.com/security/cve/CVE-2016-5187.html https://www.suse.com/security/cve/CVE-2016-5188.html https://www.suse.com/security/cve/CVE-2016-5189.html https://www.suse.com/security/cve/CVE-2016-5190.html https://www.suse.com/security/cve/CVE-2016-5191.html https://www.suse.com/security/cve/CVE-2016-5192.html https://www.suse.com/security/cve/CVE-2016-5193.html https://bugzilla.suse.com/1000019 https://bugzilla.suse.com/1004465 From sle-security-updates at lists.suse.com Mon Oct 24 09:08:22 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 24 Oct 2016 17:08:22 +0200 (CEST) Subject: SUSE-SU-2016:2614-1: important: Security update for the Linux Kernel Message-ID: <20161024150822.8AB1DFFCE@maintenance.suse.de> SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2614-1 Rating: important References: #1004418 Cross-References: CVE-2016-5195 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-EXTRA SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-kernel-source-12809=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-kernel-source-12809=1 - SUSE Manager 2.1: zypper in -t patch sleman21-kernel-source-12809=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-kernel-source-12809=1 - SUSE Linux Enterprise Server 11-EXTRA: zypper in -t patch slexsp3-kernel-source-12809=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-kernel-source-12809=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-kernel-source-12809=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): kernel-bigsmp-3.0.101-0.47.90.1 kernel-bigsmp-base-3.0.101-0.47.90.1 kernel-bigsmp-devel-3.0.101-0.47.90.1 kernel-default-3.0.101-0.47.90.1 kernel-default-base-3.0.101-0.47.90.1 kernel-default-devel-3.0.101-0.47.90.1 kernel-ec2-3.0.101-0.47.90.1 kernel-ec2-base-3.0.101-0.47.90.1 kernel-ec2-devel-3.0.101-0.47.90.1 kernel-source-3.0.101-0.47.90.1 kernel-syms-3.0.101-0.47.90.1 kernel-trace-3.0.101-0.47.90.1 kernel-trace-base-3.0.101-0.47.90.1 kernel-trace-devel-3.0.101-0.47.90.1 kernel-xen-3.0.101-0.47.90.1 kernel-xen-base-3.0.101-0.47.90.1 kernel-xen-devel-3.0.101-0.47.90.1 - SUSE Manager Proxy 2.1 (x86_64): kernel-bigsmp-3.0.101-0.47.90.1 kernel-bigsmp-base-3.0.101-0.47.90.1 kernel-bigsmp-devel-3.0.101-0.47.90.1 kernel-default-3.0.101-0.47.90.1 kernel-default-base-3.0.101-0.47.90.1 kernel-default-devel-3.0.101-0.47.90.1 kernel-ec2-3.0.101-0.47.90.1 kernel-ec2-base-3.0.101-0.47.90.1 kernel-ec2-devel-3.0.101-0.47.90.1 kernel-source-3.0.101-0.47.90.1 kernel-syms-3.0.101-0.47.90.1 kernel-trace-3.0.101-0.47.90.1 kernel-trace-base-3.0.101-0.47.90.1 kernel-trace-devel-3.0.101-0.47.90.1 kernel-xen-3.0.101-0.47.90.1 kernel-xen-base-3.0.101-0.47.90.1 kernel-xen-devel-3.0.101-0.47.90.1 - SUSE Manager 2.1 (s390x x86_64): kernel-default-3.0.101-0.47.90.1 kernel-default-base-3.0.101-0.47.90.1 kernel-default-devel-3.0.101-0.47.90.1 kernel-source-3.0.101-0.47.90.1 kernel-syms-3.0.101-0.47.90.1 kernel-trace-3.0.101-0.47.90.1 kernel-trace-base-3.0.101-0.47.90.1 kernel-trace-devel-3.0.101-0.47.90.1 - SUSE Manager 2.1 (x86_64): kernel-bigsmp-3.0.101-0.47.90.1 kernel-bigsmp-base-3.0.101-0.47.90.1 kernel-bigsmp-devel-3.0.101-0.47.90.1 kernel-ec2-3.0.101-0.47.90.1 kernel-ec2-base-3.0.101-0.47.90.1 kernel-ec2-devel-3.0.101-0.47.90.1 kernel-xen-3.0.101-0.47.90.1 kernel-xen-base-3.0.101-0.47.90.1 kernel-xen-devel-3.0.101-0.47.90.1 - SUSE Manager 2.1 (s390x): kernel-default-man-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): kernel-default-3.0.101-0.47.90.1 kernel-default-base-3.0.101-0.47.90.1 kernel-default-devel-3.0.101-0.47.90.1 kernel-source-3.0.101-0.47.90.1 kernel-syms-3.0.101-0.47.90.1 kernel-trace-3.0.101-0.47.90.1 kernel-trace-base-3.0.101-0.47.90.1 kernel-trace-devel-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64): kernel-ec2-3.0.101-0.47.90.1 kernel-ec2-base-3.0.101-0.47.90.1 kernel-ec2-devel-3.0.101-0.47.90.1 kernel-xen-3.0.101-0.47.90.1 kernel-xen-base-3.0.101-0.47.90.1 kernel-xen-devel-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64): kernel-bigsmp-3.0.101-0.47.90.1 kernel-bigsmp-base-3.0.101-0.47.90.1 kernel-bigsmp-devel-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x): kernel-default-man-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586): kernel-pae-3.0.101-0.47.90.1 kernel-pae-base-3.0.101-0.47.90.1 kernel-pae-devel-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 s390x x86_64): kernel-default-extra-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64): kernel-xen-extra-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-EXTRA (x86_64): kernel-bigsmp-extra-3.0.101-0.47.90.1 kernel-trace-extra-3.0.101-0.47.90.1 - SUSE Linux Enterprise Server 11-EXTRA (i586): kernel-pae-extra-3.0.101-0.47.90.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): kernel-default-3.0.101-0.47.90.1 kernel-default-base-3.0.101-0.47.90.1 kernel-default-devel-3.0.101-0.47.90.1 kernel-ec2-3.0.101-0.47.90.1 kernel-ec2-base-3.0.101-0.47.90.1 kernel-ec2-devel-3.0.101-0.47.90.1 kernel-pae-3.0.101-0.47.90.1 kernel-pae-base-3.0.101-0.47.90.1 kernel-pae-devel-3.0.101-0.47.90.1 kernel-source-3.0.101-0.47.90.1 kernel-syms-3.0.101-0.47.90.1 kernel-trace-3.0.101-0.47.90.1 kernel-trace-base-3.0.101-0.47.90.1 kernel-trace-devel-3.0.101-0.47.90.1 kernel-xen-3.0.101-0.47.90.1 kernel-xen-base-3.0.101-0.47.90.1 kernel-xen-devel-3.0.101-0.47.90.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): kernel-default-debuginfo-3.0.101-0.47.90.1 kernel-default-debugsource-3.0.101-0.47.90.1 kernel-trace-debuginfo-3.0.101-0.47.90.1 kernel-trace-debugsource-3.0.101-0.47.90.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-0.47.90.1 kernel-ec2-debugsource-3.0.101-0.47.90.1 kernel-xen-debuginfo-3.0.101-0.47.90.1 kernel-xen-debugsource-3.0.101-0.47.90.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (x86_64): kernel-bigsmp-debuginfo-3.0.101-0.47.90.1 kernel-bigsmp-debugsource-3.0.101-0.47.90.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586): kernel-pae-debuginfo-3.0.101-0.47.90.1 kernel-pae-debugsource-3.0.101-0.47.90.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004418 From sle-security-updates at lists.suse.com Mon Oct 24 10:17:32 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 24 Oct 2016 18:17:32 +0200 (CEST) Subject: SUSE-SU-2016:2618-1: important: Security update for quagga Message-ID: <20161024161732.81341FFC4@maintenance.suse.de> SUSE Security Update: Security update for quagga ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2618-1 Rating: important References: #1005258 Cross-References: CVE-2016-1245 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for quagga fixes the following issue: - CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1537=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1537=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): quagga-debuginfo-0.99.22.1-15.1 quagga-debugsource-0.99.22.1-15.1 quagga-devel-0.99.22.1-15.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): quagga-0.99.22.1-15.1 quagga-debuginfo-0.99.22.1-15.1 quagga-debugsource-0.99.22.1-15.1 References: https://www.suse.com/security/cve/CVE-2016-1245.html https://bugzilla.suse.com/1005258 From sle-security-updates at lists.suse.com Tue Oct 25 12:08:52 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 25 Oct 2016 20:08:52 +0200 (CEST) Subject: SUSE-SU-2016:2627-1: moderate: Security update for POS_Image3, POS_Server3 Message-ID: <20161025180852.426A6FFC1@maintenance.suse.de> SUSE Security Update: Security update for POS_Image3, POS_Server3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2627-1 Rating: moderate References: #1003374 #1003376 #1003383 #840279 #883017 #887607 #889665 #890002 #927232 #944292 #946740 #979925 #985979 #989247 Affected Products: SUSE Linux Enterprise Point of Sale 11-SP3 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update provides POS_Image3 and POS_Server3 version 3.5.5, which bring many fixes and enhancements: - Fixed potential security issues (bsc#946740) * use three argument perl open function consistently * use array in perl system call everywhere * use preferably perl built-in functions instead of external shell commands * improved validation of uploaded files from terminals to BS * improved runcmd code used for calling external commands - Auto-registration should not start before dhcpd is ready (bsc#1003383) - Fixed handling of HTTP redirects in registerImages (bsc#1003376) - Fixed handling x86_64 images (bsc#1003374) - Do not limit number of entries for BS LDAP (bsc#985979) - Increase max wait time to 10mins (bsc#989247) - Infer service IP when only one BS NIC is specified in LDAP (bsc#927232) - Fixed regression in directly referenced image in scWorkstation object (bsc#979925) - Fixed handling deltas of compressed images in registerImages (bsc#887607) - Fixed posleases to handle stop event correctly (bsc#883017) - Fixed save_poslogs utility to dump LDAP content on BS (bsc#890002) - Do not configure authoritative DNS outside netmask (bsc#889665) - Add ipHostNumber field to services in posAdmin-GUI (bsc#944292) - Fixed multival modification in posAdmin (bsc#840279) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-POS_Image3-12817=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Point of Sale 11-SP3 (i586 x86_64): POS_Migration-3.5.5-18.1 POS_Server-Admin3-3.5.5-18.1 POS_Server-AdminGUI-3.5.5-18.1 POS_Server-AdminTools3-3.5.5-18.1 POS_Server-BranchTools3-3.5.5-18.1 POS_Server-Modules3-3.5.5-18.1 POS_Server3-3.5.5-18.1 admind-1.9-18.1 admind-client-1.9-18.1 posbios-1.0-18.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (noarch): POS_Image-Minimal3-3.4.0-18.1 POS_Image-Netboot-hooks-3.4.0-18.1 POS_Image-Tools-3.4.0-18.1 POS_Image3-3.5.5-18.1 References: https://bugzilla.suse.com/1003374 https://bugzilla.suse.com/1003376 https://bugzilla.suse.com/1003383 https://bugzilla.suse.com/840279 https://bugzilla.suse.com/883017 https://bugzilla.suse.com/887607 https://bugzilla.suse.com/889665 https://bugzilla.suse.com/890002 https://bugzilla.suse.com/927232 https://bugzilla.suse.com/944292 https://bugzilla.suse.com/946740 https://bugzilla.suse.com/979925 https://bugzilla.suse.com/985979 https://bugzilla.suse.com/989247 From sle-security-updates at lists.suse.com Tue Oct 25 12:12:29 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 25 Oct 2016 20:12:29 +0200 (CEST) Subject: SUSE-SU-2016:2628-1: moderate: Security update for kvm Message-ID: <20161025181229.C0E85FFC1@maintenance.suse.de> SUSE Security Update: Security update for kvm ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2628-1 Rating: moderate References: #902737 #944697 #967012 #967013 #982017 #982018 #982019 #982222 #982223 #982285 #982959 #983961 #983982 #991080 #991466 #996441 Cross-References: CVE-2014-7815 CVE-2015-6815 CVE-2016-2391 CVE-2016-2392 CVE-2016-4453 CVE-2016-4454 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5126 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-5403 CVE-2016-6490 CVE-2016-7116 Affected Products: SUSE Linux Enterprise Server 11-SP4 ______________________________________________________________________________ An update that fixes 16 vulnerabilities is now available. Description: kvm was updated to fix 16 security issues. These security issues were fixed: - CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS. (bsc#944697). - CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013). - CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012). - CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223). - CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222). - CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017). - CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018). - CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019). - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285). - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959). - CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961). - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982). - CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080). - CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466). - CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441). - CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-kvm-12816=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP4 (i586 s390x x86_64): kvm-1.4.2-47.1 References: https://www.suse.com/security/cve/CVE-2014-7815.html https://www.suse.com/security/cve/CVE-2015-6815.html https://www.suse.com/security/cve/CVE-2016-2391.html https://www.suse.com/security/cve/CVE-2016-2392.html https://www.suse.com/security/cve/CVE-2016-4453.html https://www.suse.com/security/cve/CVE-2016-4454.html https://www.suse.com/security/cve/CVE-2016-5105.html https://www.suse.com/security/cve/CVE-2016-5106.html https://www.suse.com/security/cve/CVE-2016-5107.html https://www.suse.com/security/cve/CVE-2016-5126.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5337.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-5403.html https://www.suse.com/security/cve/CVE-2016-6490.html https://www.suse.com/security/cve/CVE-2016-7116.html https://bugzilla.suse.com/902737 https://bugzilla.suse.com/944697 https://bugzilla.suse.com/967012 https://bugzilla.suse.com/967013 https://bugzilla.suse.com/982017 https://bugzilla.suse.com/982018 https://bugzilla.suse.com/982019 https://bugzilla.suse.com/982222 https://bugzilla.suse.com/982223 https://bugzilla.suse.com/982285 https://bugzilla.suse.com/982959 https://bugzilla.suse.com/983961 https://bugzilla.suse.com/983982 https://bugzilla.suse.com/991080 https://bugzilla.suse.com/991466 https://bugzilla.suse.com/996441 From sle-security-updates at lists.suse.com Tue Oct 25 13:06:16 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 25 Oct 2016 21:06:16 +0200 (CEST) Subject: SUSE-SU-2016:2629-1: important: Security update for Linux Kernel Live Patch 2 for SLE 12 SP1 Message-ID: <20161025190616.1BC86FFC1@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 2 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2629-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.51-60_25 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1546=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_51-60_25-default-6-2.1 kgraft-patch-3_12_51-60_25-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Tue Oct 25 13:06:49 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 25 Oct 2016 21:06:49 +0200 (CEST) Subject: SUSE-SU-2016:2630-1: important: Security update for Linux Kernel Live Patch 1 for SLE 12 SP1 Message-ID: <20161025190649.D1377FFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2630-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.51-60_20 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1547=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_51-60_20-default-7-2.1 kgraft-patch-3_12_51-60_20-xen-7-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Tue Oct 25 13:07:35 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 25 Oct 2016 21:07:35 +0200 (CEST) Subject: SUSE-SU-2016:2631-1: important: Security update for Linux Kernel Live Patch 0 for SLE 12 SP1 Message-ID: <20161025190735.39161FFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 0 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2631-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.49-11 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1545=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_49-11-default-7-20.2 kgraft-patch-3_12_49-11-xen-7-20.2 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Tue Oct 25 19:06:28 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:06:28 +0200 (CEST) Subject: SUSE-SU-2016:2632-1: important: Security update for Linux Kernel Live Patch 10 for SLE 12 Message-ID: <20161026010628.C9A7DFFC1@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2632-1 Rating: important References: #1004418 #986362 Cross-References: CVE-2016-4997 CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.51-52_34 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1554=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1554=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_51-52_34-default-6-2.1 kgraft-patch-3_12_51-52_34-xen-6-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_51-52_34-default-6-2.1 kgraft-patch-3_12_51-52_34-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004418 https://bugzilla.suse.com/986362 From sle-security-updates at lists.suse.com Tue Oct 25 19:07:21 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:07:21 +0200 (CEST) Subject: SUSE-SU-2016:2633-1: important: Security update for Linux Kernel Live Patch 11 for SLE 12 Message-ID: <20161026010721.9CCB6FFC1@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2633-1 Rating: important References: #1004419 #986377 Cross-References: CVE-2016-4997 CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.51-52_39 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1548=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1548=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_51-52_39-default-5-2.1 kgraft-patch-3_12_51-52_39-xen-5-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_51-52_39-default-5-2.1 kgraft-patch-3_12_51-52_39-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004419 https://bugzilla.suse.com/986377 From sle-security-updates at lists.suse.com Tue Oct 25 19:07:54 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:07:54 +0200 (CEST) Subject: SUSE-SU-2016:2634-1: important: Security update for Linux Kernel Live Patch 3 for SLE 12 SP1 Message-ID: <20161026010754.E87D8FFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 3 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2634-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.53-60_30 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1550=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_53-60_30-default-5-2.1 kgraft-patch-3_12_53-60_30-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Tue Oct 25 19:08:28 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:08:28 +0200 (CEST) Subject: SUSE-SU-2016:2635-1: important: Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 Message-ID: <20161026010828.5D4D7FFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2635-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.59-60_41 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1549=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_41-default-4-2.1 kgraft-patch-3_12_59-60_41-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Tue Oct 25 19:09:01 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:09:01 +0200 (CEST) Subject: SUSE-SU-2016:2636-1: important: Security update for Linux Kernel Live Patch 9 for SLE 12 Message-ID: <20161026010901.557C4FFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 9 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2636-1 Rating: important References: #1004419 #986377 Cross-References: CVE-2016-4997 CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.51-52_31 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1553=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1553=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_51-52_31-default-6-5.1 kgraft-patch-3_12_51-52_31-xen-6-5.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_51-52_31-default-6-5.1 kgraft-patch-3_12_51-52_31-xen-6-5.1 References: https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004419 https://bugzilla.suse.com/986377 From sle-security-updates at lists.suse.com Tue Oct 25 19:09:35 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:09:35 +0200 (CEST) Subject: SUSE-SU-2016:2637-1: important: Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 Message-ID: <20161026010935.54B5EFFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2637-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.59-60_45 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1552=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_45-default-4-2.1 kgraft-patch-3_12_59-60_45-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Tue Oct 25 19:10:08 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 03:10:08 +0200 (CEST) Subject: SUSE-SU-2016:2638-1: important: Security update for Linux Kernel Live Patch 4 for SLE 12 SP1 Message-ID: <20161026011008.94994FFBC@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 4 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2638-1 Rating: important References: #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.57-60_35 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1551=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_57-60_35-default-4-2.1 kgraft-patch-3_12_57-60_35-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Wed Oct 26 10:23:49 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 18:23:49 +0200 (CEST) Subject: SUSE-SU-2016:2650-1: moderate: Security update for libxml2 Message-ID: <20161026162349.125E0FFC2@maintenance.suse.de> SUSE Security Update: Security update for libxml2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2650-1 Rating: moderate References: #1005544 Cross-References: CVE-2016-4658 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libxml2 fixes the following issues: - CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1555=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1555=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1555=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libxml2-debugsource-2.9.1-26.3.1 libxml2-devel-2.9.1-26.3.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libxml2-2-2.9.1-26.3.1 libxml2-2-debuginfo-2.9.1-26.3.1 libxml2-debugsource-2.9.1-26.3.1 libxml2-tools-2.9.1-26.3.1 libxml2-tools-debuginfo-2.9.1-26.3.1 python-libxml2-2.9.1-26.3.1 python-libxml2-debuginfo-2.9.1-26.3.1 python-libxml2-debugsource-2.9.1-26.3.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libxml2-2-32bit-2.9.1-26.3.1 libxml2-2-debuginfo-32bit-2.9.1-26.3.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): libxml2-doc-2.9.1-26.3.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libxml2-2-2.9.1-26.3.1 libxml2-2-32bit-2.9.1-26.3.1 libxml2-2-debuginfo-2.9.1-26.3.1 libxml2-2-debuginfo-32bit-2.9.1-26.3.1 libxml2-debugsource-2.9.1-26.3.1 libxml2-tools-2.9.1-26.3.1 libxml2-tools-debuginfo-2.9.1-26.3.1 python-libxml2-2.9.1-26.3.1 python-libxml2-debuginfo-2.9.1-26.3.1 python-libxml2-debugsource-2.9.1-26.3.1 References: https://www.suse.com/security/cve/CVE-2016-4658.html https://bugzilla.suse.com/1005544 From sle-security-updates at lists.suse.com Wed Oct 26 10:25:07 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 18:25:07 +0200 (CEST) Subject: SUSE-SU-2016:2652-1: moderate: Security update for libxml2 Message-ID: <20161026162507.91621FFBC@maintenance.suse.de> SUSE Security Update: Security update for libxml2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2652-1 Rating: moderate References: #1005544 Cross-References: CVE-2016-4658 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libxml2 fixes the following issues: - CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-libxml2-12818=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-libxml2-12818=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libxml2-12818=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libxml2-devel-2.7.6-0.50.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libxml2-devel-32bit-2.7.6-0.50.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libxml2-2.7.6-0.50.1 libxml2-doc-2.7.6-0.50.1 libxml2-python-2.7.6-0.50.4 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libxml2-32bit-2.7.6-0.50.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libxml2-x86-2.7.6-0.50.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): libxml2-debuginfo-2.7.6-0.50.1 libxml2-debugsource-2.7.6-0.50.1 libxml2-python-debuginfo-2.7.6-0.50.4 libxml2-python-debugsource-2.7.6-0.50.4 References: https://www.suse.com/security/cve/CVE-2016-4658.html https://bugzilla.suse.com/1005544 From sle-security-updates at lists.suse.com Wed Oct 26 10:25:39 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 18:25:39 +0200 (CEST) Subject: SUSE-SU-2016:2653-1: moderate: Security update for python3 Message-ID: <20161026162539.CFB39FFC2@maintenance.suse.de> SUSE Security Update: Security update for python3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2653-1 Rating: moderate References: #951166 #983582 #984751 #985177 #985348 #989523 #991069 Cross-References: CVE-2016-0772 CVE-2016-1000110 CVE-2016-5636 CVE-2016-5699 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Web Scripting 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves four vulnerabilities and has three fixes is now available. Description: This update provides Python 3.4.5, which brings many fixes and enhancements. The following security issues have been fixed: - CVE-2016-1000110: CGIHandler could have allowed setting of HTTP_PROXY environment variable based on user supplied Proxy request header. (bsc#989523) - CVE-2016-0772: A vulnerability in smtplib could have allowed a MITM attacker to perform a startTLS stripping attack. (bsc#984751) - CVE-2016-5636: A heap overflow in Python's zipimport module. (bsc#985177) - CVE-2016-5699: A header injection flaw in urrlib2/urllib/httplib/http.client. (bsc#985348) The update also includes the following non-security fixes: - Don't force 3rd party C extensions to be built with -Werror=declaration-after-statement. (bsc#951166) - Make urllib proxy var handling behave as usual on POSIX. (bsc#983582) For a comprehensive list of changes please refer to the upstream change log: https://docs.python.org/3.4/whatsnew/changelog.html Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1558=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1558=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2016-1558=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1558=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): python3-base-debuginfo-3.4.5-17.1 python3-base-debugsource-3.4.5-17.1 python3-devel-3.4.5-17.1 python3-devel-debuginfo-3.4.5-17.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libpython3_4m1_0-3.4.5-17.1 libpython3_4m1_0-debuginfo-3.4.5-17.1 python3-3.4.5-17.1 python3-base-3.4.5-17.1 python3-base-debuginfo-3.4.5-17.1 python3-base-debugsource-3.4.5-17.1 python3-debuginfo-3.4.5-17.1 python3-debugsource-3.4.5-17.1 - SUSE Linux Enterprise Module for Web Scripting 12 (ppc64le s390x x86_64): libpython3_4m1_0-3.4.5-17.1 libpython3_4m1_0-debuginfo-3.4.5-17.1 python3-3.4.5-17.1 python3-base-3.4.5-17.1 python3-base-debuginfo-3.4.5-17.1 python3-base-debugsource-3.4.5-17.1 python3-debuginfo-3.4.5-17.1 python3-debugsource-3.4.5-17.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libpython3_4m1_0-3.4.5-17.1 libpython3_4m1_0-debuginfo-3.4.5-17.1 python3-3.4.5-17.1 python3-base-3.4.5-17.1 python3-base-debuginfo-3.4.5-17.1 python3-base-debugsource-3.4.5-17.1 python3-debuginfo-3.4.5-17.1 python3-debugsource-3.4.5-17.1 References: https://www.suse.com/security/cve/CVE-2016-0772.html https://www.suse.com/security/cve/CVE-2016-1000110.html https://www.suse.com/security/cve/CVE-2016-5636.html https://www.suse.com/security/cve/CVE-2016-5699.html https://bugzilla.suse.com/951166 https://bugzilla.suse.com/983582 https://bugzilla.suse.com/984751 https://bugzilla.suse.com/985177 https://bugzilla.suse.com/985348 https://bugzilla.suse.com/989523 https://bugzilla.suse.com/991069 From sle-security-updates at lists.suse.com Wed Oct 26 10:27:16 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 18:27:16 +0200 (CEST) Subject: SUSE-SU-2016:2654-1: moderate: Security update for ghostscript Message-ID: <20161026162716.A5B09FFBC@maintenance.suse.de> SUSE Security Update: Security update for ghostscript ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2654-1 Rating: moderate References: #1004237 Cross-References: CVE-2016-8602 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for ghostscript fixes the following issues: - CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1557=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1557=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1557=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): ghostscript-debuginfo-9.15-14.1 ghostscript-debugsource-9.15-14.1 ghostscript-devel-9.15-14.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): ghostscript-9.15-14.1 ghostscript-debuginfo-9.15-14.1 ghostscript-debugsource-9.15-14.1 ghostscript-x11-9.15-14.1 ghostscript-x11-debuginfo-9.15-14.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): ghostscript-9.15-14.1 ghostscript-debuginfo-9.15-14.1 ghostscript-debugsource-9.15-14.1 ghostscript-x11-9.15-14.1 ghostscript-x11-debuginfo-9.15-14.1 References: https://www.suse.com/security/cve/CVE-2016-8602.html https://bugzilla.suse.com/1004237 From sle-security-updates at lists.suse.com Wed Oct 26 12:06:25 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 26 Oct 2016 20:06:25 +0200 (CEST) Subject: SUSE-SU-2016:2655-1: important: Security update for Linux Kernel Live Patch 12 for SLE 12 Message-ID: <20161026180625.26878FFBA@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 12 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2655-1 Rating: important References: #1004419 #986377 Cross-References: CVE-2016-4997 CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.55-52_42 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1559=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1559=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_55-52_42-default-3-2.1 kgraft-patch-3_12_55-52_42-xen-3-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_55-52_42-default-3-2.1 kgraft-patch-3_12_55-52_42-xen-3-2.1 References: https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004419 https://bugzilla.suse.com/986377 From sle-security-updates at lists.suse.com Wed Oct 26 17:06:18 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 27 Oct 2016 01:06:18 +0200 (CEST) Subject: SUSE-SU-2016:2657-1: important: Security update for Linux Kernel Live Patch 15 for SLE 12 Message-ID: <20161026230618.B5B33FFC1@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2657-1 Rating: important References: #1004419 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.60-52_54 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1562=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1562=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_54-default-3-2.1 kgraft-patch-3_12_60-52_54-xen-3-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_54-default-3-2.1 kgraft-patch-3_12_60-52_54-xen-3-2.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Wed Oct 26 17:06:43 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 27 Oct 2016 01:06:43 +0200 (CEST) Subject: SUSE-SU-2016:2658-1: important: Security update for Linux Kernel Live Patch 14 for SLE 12 Message-ID: <20161026230643.7AD9BFFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 14 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2658-1 Rating: important References: #1004419 #986377 Cross-References: CVE-2016-4997 CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.60-52_49 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1561=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1561=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_49-default-3-2.1 kgraft-patch-3_12_60-52_49-xen-3-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_49-default-3-2.1 kgraft-patch-3_12_60-52_49-xen-3-2.1 References: https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004419 https://bugzilla.suse.com/986377 From sle-security-updates at lists.suse.com Wed Oct 26 17:07:16 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 27 Oct 2016 01:07:16 +0200 (CEST) Subject: SUSE-SU-2016:2659-1: important: Security update for Linux Kernel Live Patch 13 for SLE 12 Message-ID: <20161026230716.C4660FFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 13 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2659-1 Rating: important References: #1004419 #986377 Cross-References: CVE-2016-4997 CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.55-52_45 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1563=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1563=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_55-52_45-default-3-2.1 kgraft-patch-3_12_55-52_45-xen-3-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_55-52_45-default-3-2.1 kgraft-patch-3_12_55-52_45-xen-3-2.1 References: https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004419 https://bugzilla.suse.com/986377 From sle-security-updates at lists.suse.com Thu Oct 27 08:08:17 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 27 Oct 2016 16:08:17 +0200 (CEST) Subject: SUSE-SU-2016:2661-1: moderate: Security update for openslp Message-ID: <20161027140817.1A198FFC1@maintenance.suse.de> SUSE Security Update: Security update for openslp ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2661-1 Rating: moderate References: #1001600 #974655 #980722 #994989 Cross-References: CVE-2016-4912 CVE-2016-7567 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for openslp fixes two security issues and two bugs. The following vulnerabilities were fixed: - CVE-2016-4912: A remote attacker could have crashed the server with a large number of packages (bsc#980722) - CVE-2016-7567: A remote attacker could cause a memory corruption having unspecified impact (bsc#1001600) The following bugfix changes are included: - bsc#994989: Removed convenience code as changes bytes in the message buffer breaking the verification code - bsc#974655: Removed no longer needed slpd init file Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1565=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1565=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1565=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): openslp-debuginfo-2.0.0-17.1 openslp-debugsource-2.0.0-17.1 openslp-devel-2.0.0-17.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): openslp-2.0.0-17.1 openslp-debuginfo-2.0.0-17.1 openslp-debugsource-2.0.0-17.1 openslp-server-2.0.0-17.1 openslp-server-debuginfo-2.0.0-17.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): openslp-32bit-2.0.0-17.1 openslp-debuginfo-32bit-2.0.0-17.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): openslp-2.0.0-17.1 openslp-32bit-2.0.0-17.1 openslp-debuginfo-2.0.0-17.1 openslp-debuginfo-32bit-2.0.0-17.1 openslp-debugsource-2.0.0-17.1 References: https://www.suse.com/security/cve/CVE-2016-4912.html https://www.suse.com/security/cve/CVE-2016-7567.html https://bugzilla.suse.com/1001600 https://bugzilla.suse.com/974655 https://bugzilla.suse.com/980722 https://bugzilla.suse.com/994989 From sle-security-updates at lists.suse.com Thu Oct 27 10:06:56 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 27 Oct 2016 18:06:56 +0200 (CEST) Subject: SUSE-SU-2016:2662-1: critical: Security update for flash-player Message-ID: <20161027160656.81555FFC1@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2662-1 Rating: critical References: #1007098 Cross-References: CVE-2016-7855 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for flash-player to version 11.2.202.643 fixes one security issue. This security issue was fixed: - CVE-2016-7855: Use-after-free vulnerability that could lead to code execution (bsc#1007098). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1566=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1566=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): flash-player-11.2.202.643-146.1 flash-player-gnome-11.2.202.643-146.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): flash-player-11.2.202.643-146.1 flash-player-gnome-11.2.202.643-146.1 References: https://www.suse.com/security/cve/CVE-2016-7855.html https://bugzilla.suse.com/1007098 From sle-security-updates at lists.suse.com Fri Oct 28 10:07:21 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 28 Oct 2016 18:07:21 +0200 (CEST) Subject: SUSE-SU-2016:2667-1: moderate: Security update for ImageMagick Message-ID: <20161028160721.24D30FFC1@maintenance.suse.de> SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2667-1 Rating: moderate References: #1000394 #1000399 #1000434 #1000436 #1000686 #1000688 #1000689 #1000690 #1000691 #1000692 #1000693 #1000694 #1000695 #1000696 #1000697 #1000698 #1000699 #1000700 #1000701 #1000702 #1000703 #1000704 #1000706 #1000707 #1000708 #1000709 #1000711 #1000712 #1000713 #1000714 #1000715 #1001066 #1001221 #1002206 #1002209 #1002421 #1002422 #1003629 #1005123 #1005125 #1005127 #1005328 Cross-References: CVE-2014-9907 CVE-2015-8957 CVE-2015-8958 CVE-2015-8959 CVE-2016-6823 CVE-2016-7101 CVE-2016-7513 CVE-2016-7514 CVE-2016-7515 CVE-2016-7516 CVE-2016-7517 CVE-2016-7518 CVE-2016-7519 CVE-2016-7520 CVE-2016-7521 CVE-2016-7522 CVE-2016-7523 CVE-2016-7524 CVE-2016-7525 CVE-2016-7526 CVE-2016-7527 CVE-2016-7528 CVE-2016-7529 CVE-2016-7530 CVE-2016-7531 CVE-2016-7532 CVE-2016-7533 CVE-2016-7534 CVE-2016-7535 CVE-2016-7537 CVE-2016-7538 CVE-2016-7539 CVE-2016-7540 CVE-2016-7799 CVE-2016-7800 CVE-2016-7996 CVE-2016-7997 CVE-2016-8677 CVE-2016-8682 CVE-2016-8683 CVE-2016-8684 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 41 vulnerabilities and has one errata is now available. Description: This update for ImageMagick fixes the following issues: These vulnerabilities could be triggered by processing specially crafted image files, which could lead to a process crash or resource consumtion, or potentially have unspecified futher impact. - CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123) - CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127) - CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125) - CVE-2016-8677: Memory allocation failure in AcquireQuantumPixels (bsc#1005328) - CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629) - CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422) - CVE-2016-7799: mogrify global buffer overflow (bsc#1002421) - CVE-2016-7540: writing to RGF format aborts (bsc#1000394) - CVE-2016-7539: Potential DOS by not releasing memory (bsc#1000715) - CVE-2016-7538: SIGABRT for corrupted pdb file (bsc#1000712) - CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711) - CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709) - CVE-2016-7534: Out of bound access in generic decoder (bsc#1000708) - CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707) - CVE-2016-7532: fix handling of corrupted psd file (bsc#1000706) - CVE-2016-7531: Pbd file out of bound access (bsc#1000704) - CVE-2016-7530: Out of bound in quantum handling (bsc#1000703) - CVE-2016-7529: Out-of-bound in quantum handling (bsc#1000399) - CVE-2016-7528: Out-of-bound access in xcf file coder (bsc#1000434) - CVE-2016-7527: Out-of-bound access in wpg file coder: (bsc#1000436) - CVE-2016-7526: out-of-bounds write in ./MagickCore/pixel-accessor.h (bsc#1000702) - CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701) - CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700) - CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699) - CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698) - CVE-2016-7521: Heap buffer overflow in psd file handling (bsc#1000697) - CVE-2016-7520: Heap overflow in hdr file handling (bsc#1000696) - CVE-2016-7519: Out-of-bounds read in coders/rle.c (bsc#1000695) - CVE-2016-7518: Out-of-bounds read in coders/sun.c (bsc#1000694) - CVE-2016-7517: Out-of-bounds read in coders/pict.c (bsc#1000693) - CVE-2016-7516: Out-of-bounds problem in rle, pict, viff and sun files (bsc#1000692) - CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689) - CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688) - CVE-2016-7513: Off-by-one error leading to segfault (bsc#1000686) - CVE-2016-7101: raphicsMagick: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221) - CVE-2016-6823: raphicsMagick: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066) - CVE-2015-8959: dOS due to corrupted DDS files (bsc#1000713) - CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691) - CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690) - CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714) - Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209) - Divide by zero in WriteTIFFImage (bsc#1002206) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1572=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1572=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1572=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1572=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): ImageMagick-6.8.8.1-40.1 ImageMagick-debuginfo-6.8.8.1-40.1 ImageMagick-debugsource-6.8.8.1-40.1 libMagick++-6_Q16-3-6.8.8.1-40.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-40.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-40.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): ImageMagick-6.8.8.1-40.1 ImageMagick-debuginfo-6.8.8.1-40.1 ImageMagick-debugsource-6.8.8.1-40.1 ImageMagick-devel-6.8.8.1-40.1 libMagick++-6_Q16-3-6.8.8.1-40.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-40.1 libMagick++-devel-6.8.8.1-40.1 perl-PerlMagick-6.8.8.1-40.1 perl-PerlMagick-debuginfo-6.8.8.1-40.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): ImageMagick-debuginfo-6.8.8.1-40.1 ImageMagick-debugsource-6.8.8.1-40.1 libMagickCore-6_Q16-1-6.8.8.1-40.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-40.1 libMagickWand-6_Q16-1-6.8.8.1-40.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-40.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): ImageMagick-6.8.8.1-40.1 ImageMagick-debuginfo-6.8.8.1-40.1 ImageMagick-debugsource-6.8.8.1-40.1 libMagick++-6_Q16-3-6.8.8.1-40.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-40.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 libMagickCore-6_Q16-1-6.8.8.1-40.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-40.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-40.1 libMagickWand-6_Q16-1-6.8.8.1-40.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-40.1 References: https://www.suse.com/security/cve/CVE-2014-9907.html https://www.suse.com/security/cve/CVE-2015-8957.html https://www.suse.com/security/cve/CVE-2015-8958.html https://www.suse.com/security/cve/CVE-2015-8959.html https://www.suse.com/security/cve/CVE-2016-6823.html https://www.suse.com/security/cve/CVE-2016-7101.html https://www.suse.com/security/cve/CVE-2016-7513.html https://www.suse.com/security/cve/CVE-2016-7514.html https://www.suse.com/security/cve/CVE-2016-7515.html https://www.suse.com/security/cve/CVE-2016-7516.html https://www.suse.com/security/cve/CVE-2016-7517.html https://www.suse.com/security/cve/CVE-2016-7518.html https://www.suse.com/security/cve/CVE-2016-7519.html https://www.suse.com/security/cve/CVE-2016-7520.html https://www.suse.com/security/cve/CVE-2016-7521.html https://www.suse.com/security/cve/CVE-2016-7522.html https://www.suse.com/security/cve/CVE-2016-7523.html https://www.suse.com/security/cve/CVE-2016-7524.html https://www.suse.com/security/cve/CVE-2016-7525.html https://www.suse.com/security/cve/CVE-2016-7526.html https://www.suse.com/security/cve/CVE-2016-7527.html https://www.suse.com/security/cve/CVE-2016-7528.html https://www.suse.com/security/cve/CVE-2016-7529.html https://www.suse.com/security/cve/CVE-2016-7530.html https://www.suse.com/security/cve/CVE-2016-7531.html https://www.suse.com/security/cve/CVE-2016-7532.html https://www.suse.com/security/cve/CVE-2016-7533.html https://www.suse.com/security/cve/CVE-2016-7534.html https://www.suse.com/security/cve/CVE-2016-7535.html https://www.suse.com/security/cve/CVE-2016-7537.html https://www.suse.com/security/cve/CVE-2016-7538.html https://www.suse.com/security/cve/CVE-2016-7539.html https://www.suse.com/security/cve/CVE-2016-7540.html https://www.suse.com/security/cve/CVE-2016-7799.html https://www.suse.com/security/cve/CVE-2016-7800.html https://www.suse.com/security/cve/CVE-2016-7996.html https://www.suse.com/security/cve/CVE-2016-7997.html https://www.suse.com/security/cve/CVE-2016-8677.html https://www.suse.com/security/cve/CVE-2016-8682.html https://www.suse.com/security/cve/CVE-2016-8683.html https://www.suse.com/security/cve/CVE-2016-8684.html https://bugzilla.suse.com/1000394 https://bugzilla.suse.com/1000399 https://bugzilla.suse.com/1000434 https://bugzilla.suse.com/1000436 https://bugzilla.suse.com/1000686 https://bugzilla.suse.com/1000688 https://bugzilla.suse.com/1000689 https://bugzilla.suse.com/1000690 https://bugzilla.suse.com/1000691 https://bugzilla.suse.com/1000692 https://bugzilla.suse.com/1000693 https://bugzilla.suse.com/1000694 https://bugzilla.suse.com/1000695 https://bugzilla.suse.com/1000696 https://bugzilla.suse.com/1000697 https://bugzilla.suse.com/1000698 https://bugzilla.suse.com/1000699 https://bugzilla.suse.com/1000700 https://bugzilla.suse.com/1000701 https://bugzilla.suse.com/1000702 https://bugzilla.suse.com/1000703 https://bugzilla.suse.com/1000704 https://bugzilla.suse.com/1000706 https://bugzilla.suse.com/1000707 https://bugzilla.suse.com/1000708 https://bugzilla.suse.com/1000709 https://bugzilla.suse.com/1000711 https://bugzilla.suse.com/1000712 https://bugzilla.suse.com/1000713 https://bugzilla.suse.com/1000714 https://bugzilla.suse.com/1000715 https://bugzilla.suse.com/1001066 https://bugzilla.suse.com/1001221 https://bugzilla.suse.com/1002206 https://bugzilla.suse.com/1002209 https://bugzilla.suse.com/1002421 https://bugzilla.suse.com/1002422 https://bugzilla.suse.com/1003629 https://bugzilla.suse.com/1005123 https://bugzilla.suse.com/1005125 https://bugzilla.suse.com/1005127 https://bugzilla.suse.com/1005328 From sle-security-updates at lists.suse.com Fri Oct 28 10:13:38 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 28 Oct 2016 18:13:38 +0200 (CEST) Subject: SUSE-SU-2016:2668-1: important: Security update for gd Message-ID: <20161028161338.EC116FFC2@maintenance.suse.de> SUSE Security Update: Security update for gd ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2668-1 Rating: important References: #1001900 #1004924 #1005274 Cross-References: CVE-2016-6911 CVE-2016-7568 CVE-2016-8670 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for gd fixes the following security issues: - CVE-2016-7568: A specially crafted image file could cause an application crash or potentially execute arbitrary code when the image is converted to webp (bsc#1001900) - CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924) - CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1571=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1571=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1571=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1571=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): gd-32bit-2.1.0-17.1 gd-debuginfo-32bit-2.1.0-17.1 gd-debugsource-2.1.0-17.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): gd-debuginfo-2.1.0-17.1 gd-debugsource-2.1.0-17.1 gd-devel-2.1.0-17.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): gd-2.1.0-17.1 gd-debuginfo-2.1.0-17.1 gd-debugsource-2.1.0-17.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): gd-2.1.0-17.1 gd-32bit-2.1.0-17.1 gd-debuginfo-2.1.0-17.1 gd-debuginfo-32bit-2.1.0-17.1 gd-debugsource-2.1.0-17.1 References: https://www.suse.com/security/cve/CVE-2016-6911.html https://www.suse.com/security/cve/CVE-2016-7568.html https://www.suse.com/security/cve/CVE-2016-8670.html https://bugzilla.suse.com/1001900 https://bugzilla.suse.com/1004924 https://bugzilla.suse.com/1005274 From sle-security-updates at lists.suse.com Fri Oct 28 10:21:22 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 28 Oct 2016 18:21:22 +0200 (CEST) Subject: SUSE-SU-2016:2670-1: moderate: Security update for gd Message-ID: <20161028162122.9B215FFC1@maintenance.suse.de> SUSE Security Update: Security update for gd ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2670-1 Rating: moderate References: #1004924 #1005274 Cross-References: CVE-2016-6911 CVE-2016-8670 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for gd fixes the following issues: - CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924) - CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-gd-12820=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-gd-12820=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-gd-12820=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): gd-devel-2.0.36.RC1-52.25.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): gd-2.0.36.RC1-52.25.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): gd-debuginfo-2.0.36.RC1-52.25.1 gd-debugsource-2.0.36.RC1-52.25.1 References: https://www.suse.com/security/cve/CVE-2016-6911.html https://www.suse.com/security/cve/CVE-2016-8670.html https://bugzilla.suse.com/1004924 https://bugzilla.suse.com/1005274 From sle-security-updates at lists.suse.com Mon Oct 31 04:08:36 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 31 Oct 2016 11:08:36 +0100 (CET) Subject: SUSE-SU-2016:2673-1: important: Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 Message-ID: <20161031100836.8AC17FFC1@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2673-1 Rating: important References: #1001486 #1001487 #1004419 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: This update for the Linux Kernel 3.12.62-60_62 fixes several issues. The following security bugs were fixed: - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1574=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_62-60_62-default-3-5.1 kgraft-patch-3_12_62-60_62-xen-3-5.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001486 https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1004419 From sle-security-updates at lists.suse.com Mon Oct 31 04:09:23 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 31 Oct 2016 11:09:23 +0100 (CET) Subject: SUSE-SU-2016:2674-1: important: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 Message-ID: <20161031100923.8A8CEFFBB@maintenance.suse.de> SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2674-1 Rating: important References: #1001487 #991667 Cross-References: CVE-2016-6480 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues. The following security bugs were fixed: - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487). - CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability (bsc#991667). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1573=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_62-60_64_8-default-2-2.1 kgraft-patch-3_12_62-60_64_8-xen-2-2.1 References: https://www.suse.com/security/cve/CVE-2016-6480.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/991667 From sle-security-updates at lists.suse.com Mon Oct 31 05:08:03 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 31 Oct 2016 12:08:03 +0100 (CET) Subject: SUSE-SU-2016:2681-1: moderate: Security update for php53 Message-ID: <20161031110803.36733FFBB@maintenance.suse.de> SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2681-1 Rating: moderate References: #1004924 #1005274 Cross-References: CVE-2016-6911 CVE-2016-8670 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for php53 fixes the following issues: - CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924) - CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-php53-12821=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-php53-12821=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-php53-12821=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-87.1 php53-imap-5.3.17-87.1 php53-posix-5.3.17-87.1 php53-readline-5.3.17-87.1 php53-sockets-5.3.17-87.1 php53-sqlite-5.3.17-87.1 php53-tidy-5.3.17-87.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-87.1 php53-5.3.17-87.1 php53-bcmath-5.3.17-87.1 php53-bz2-5.3.17-87.1 php53-calendar-5.3.17-87.1 php53-ctype-5.3.17-87.1 php53-curl-5.3.17-87.1 php53-dba-5.3.17-87.1 php53-dom-5.3.17-87.1 php53-exif-5.3.17-87.1 php53-fastcgi-5.3.17-87.1 php53-fileinfo-5.3.17-87.1 php53-ftp-5.3.17-87.1 php53-gd-5.3.17-87.1 php53-gettext-5.3.17-87.1 php53-gmp-5.3.17-87.1 php53-iconv-5.3.17-87.1 php53-intl-5.3.17-87.1 php53-json-5.3.17-87.1 php53-ldap-5.3.17-87.1 php53-mbstring-5.3.17-87.1 php53-mcrypt-5.3.17-87.1 php53-mysql-5.3.17-87.1 php53-odbc-5.3.17-87.1 php53-openssl-5.3.17-87.1 php53-pcntl-5.3.17-87.1 php53-pdo-5.3.17-87.1 php53-pear-5.3.17-87.1 php53-pgsql-5.3.17-87.1 php53-pspell-5.3.17-87.1 php53-shmop-5.3.17-87.1 php53-snmp-5.3.17-87.1 php53-soap-5.3.17-87.1 php53-suhosin-5.3.17-87.1 php53-sysvmsg-5.3.17-87.1 php53-sysvsem-5.3.17-87.1 php53-sysvshm-5.3.17-87.1 php53-tokenizer-5.3.17-87.1 php53-wddx-5.3.17-87.1 php53-xmlreader-5.3.17-87.1 php53-xmlrpc-5.3.17-87.1 php53-xmlwriter-5.3.17-87.1 php53-xsl-5.3.17-87.1 php53-zip-5.3.17-87.1 php53-zlib-5.3.17-87.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): php53-debuginfo-5.3.17-87.1 php53-debugsource-5.3.17-87.1 References: https://www.suse.com/security/cve/CVE-2016-6911.html https://www.suse.com/security/cve/CVE-2016-8670.html https://bugzilla.suse.com/1004924 https://bugzilla.suse.com/1005274 From sle-security-updates at lists.suse.com Mon Oct 31 05:09:40 2016 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 31 Oct 2016 12:09:40 +0100 (CET) Subject: SUSE-SU-2016:2683-1: important: Security update for php7 Message-ID: <20161031110940.1DF0AFFBB@maintenance.suse.de> SUSE Security Update: Security update for php7 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2683-1 Rating: important References: #1001900 #1004924 #1005274 Cross-References: CVE-2016-6911 CVE-2016-7568 CVE-2016-8670 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for php7 fixes the following security issue: - CVE-2016-7568: A specially crafted image file could cause an application crash or potentially execute arbitrary code when the image is converted to webp (bsc#1001900) - CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924) - CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1576=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2016-1576=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): php7-debuginfo-7.0.7-20.1 php7-debugsource-7.0.7-20.1 php7-devel-7.0.7-20.1 - SUSE Linux Enterprise Module for Web Scripting 12 (ppc64le s390x x86_64): apache2-mod_php7-7.0.7-20.1 apache2-mod_php7-debuginfo-7.0.7-20.1 php7-7.0.7-20.1 php7-bcmath-7.0.7-20.1 php7-bcmath-debuginfo-7.0.7-20.1 php7-bz2-7.0.7-20.1 php7-bz2-debuginfo-7.0.7-20.1 php7-calendar-7.0.7-20.1 php7-calendar-debuginfo-7.0.7-20.1 php7-ctype-7.0.7-20.1 php7-ctype-debuginfo-7.0.7-20.1 php7-curl-7.0.7-20.1 php7-curl-debuginfo-7.0.7-20.1 php7-dba-7.0.7-20.1 php7-dba-debuginfo-7.0.7-20.1 php7-debuginfo-7.0.7-20.1 php7-debugsource-7.0.7-20.1 php7-dom-7.0.7-20.1 php7-dom-debuginfo-7.0.7-20.1 php7-enchant-7.0.7-20.1 php7-enchant-debuginfo-7.0.7-20.1 php7-exif-7.0.7-20.1 php7-exif-debuginfo-7.0.7-20.1 php7-fastcgi-7.0.7-20.1 php7-fastcgi-debuginfo-7.0.7-20.1 php7-fileinfo-7.0.7-20.1 php7-fileinfo-debuginfo-7.0.7-20.1 php7-fpm-7.0.7-20.1 php7-fpm-debuginfo-7.0.7-20.1 php7-ftp-7.0.7-20.1 php7-ftp-debuginfo-7.0.7-20.1 php7-gd-7.0.7-20.1 php7-gd-debuginfo-7.0.7-20.1 php7-gettext-7.0.7-20.1 php7-gettext-debuginfo-7.0.7-20.1 php7-gmp-7.0.7-20.1 php7-gmp-debuginfo-7.0.7-20.1 php7-iconv-7.0.7-20.1 php7-iconv-debuginfo-7.0.7-20.1 php7-imap-7.0.7-20.1 php7-imap-debuginfo-7.0.7-20.1 php7-intl-7.0.7-20.1 php7-intl-debuginfo-7.0.7-20.1 php7-json-7.0.7-20.1 php7-json-debuginfo-7.0.7-20.1 php7-ldap-7.0.7-20.1 php7-ldap-debuginfo-7.0.7-20.1 php7-mbstring-7.0.7-20.1 php7-mbstring-debuginfo-7.0.7-20.1 php7-mcrypt-7.0.7-20.1 php7-mcrypt-debuginfo-7.0.7-20.1 php7-mysql-7.0.7-20.1 php7-mysql-debuginfo-7.0.7-20.1 php7-odbc-7.0.7-20.1 php7-odbc-debuginfo-7.0.7-20.1 php7-opcache-7.0.7-20.1 php7-opcache-debuginfo-7.0.7-20.1 php7-openssl-7.0.7-20.1 php7-openssl-debuginfo-7.0.7-20.1 php7-pcntl-7.0.7-20.1 php7-pcntl-debuginfo-7.0.7-20.1 php7-pdo-7.0.7-20.1 php7-pdo-debuginfo-7.0.7-20.1 php7-pgsql-7.0.7-20.1 php7-pgsql-debuginfo-7.0.7-20.1 php7-phar-7.0.7-20.1 php7-phar-debuginfo-7.0.7-20.1 php7-posix-7.0.7-20.1 php7-posix-debuginfo-7.0.7-20.1 php7-pspell-7.0.7-20.1 php7-pspell-debuginfo-7.0.7-20.1 php7-shmop-7.0.7-20.1 php7-shmop-debuginfo-7.0.7-20.1 php7-snmp-7.0.7-20.1 php7-snmp-debuginfo-7.0.7-20.1 php7-soap-7.0.7-20.1 php7-soap-debuginfo-7.0.7-20.1 php7-sockets-7.0.7-20.1 php7-sockets-debuginfo-7.0.7-20.1 php7-sqlite-7.0.7-20.1 php7-sqlite-debuginfo-7.0.7-20.1 php7-sysvmsg-7.0.7-20.1 php7-sysvmsg-debuginfo-7.0.7-20.1 php7-sysvsem-7.0.7-20.1 php7-sysvsem-debuginfo-7.0.7-20.1 php7-sysvshm-7.0.7-20.1 php7-sysvshm-debuginfo-7.0.7-20.1 php7-tokenizer-7.0.7-20.1 php7-tokenizer-debuginfo-7.0.7-20.1 php7-wddx-7.0.7-20.1 php7-wddx-debuginfo-7.0.7-20.1 php7-xmlreader-7.0.7-20.1 php7-xmlreader-debuginfo-7.0.7-20.1 php7-xmlrpc-7.0.7-20.1 php7-xmlrpc-debuginfo-7.0.7-20.1 php7-xmlwriter-7.0.7-20.1 php7-xmlwriter-debuginfo-7.0.7-20.1 php7-xsl-7.0.7-20.1 php7-xsl-debuginfo-7.0.7-20.1 php7-zip-7.0.7-20.1 php7-zip-debuginfo-7.0.7-20.1 php7-zlib-7.0.7-20.1 php7-zlib-debuginfo-7.0.7-20.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): php7-pear-7.0.7-20.1 php7-pear-Archive_Tar-7.0.7-20.1 References: https://www.suse.com/security/cve/CVE-2016-6911.html https://www.suse.com/security/cve/CVE-2016-7568.html https://www.suse.com/security/cve/CVE-2016-8670.html https://bugzilla.suse.com/1001900 https://bugzilla.suse.com/1004924 https://bugzilla.suse.com/1005274