From sle-updates at lists.suse.com Wed Oct 1 09:04:50 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 1 Oct 2014 17:04:50 +0200 (CEST) Subject: SUSE-SU-2014:1220-4: important: Security update for mozilla-nss Message-ID: <20141001150450.1E3D53224C@maintenance.suse.de> SUSE Security Update: Security update for mozilla-nss ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1220-4 Rating: important References: #897890 Cross-References: CVE-2014-1568 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery issue. MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, reported an issue in Network Security Services (NSS) libraries affecting all versions. He discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates. The Advanced Threat Research team at Intel Security also independently discovered and reported this issue. Security Issues: * CVE-2014-1568 Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 3.16.5]: mozilla-nss-3.16.5-0.5.1 mozilla-nss-devel-3.16.5-0.5.1 mozilla-nss-tools-3.16.5-0.5.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 3.16.5]: mozilla-nss-32bit-3.16.5-0.5.1 References: http://support.novell.com/security/cve/CVE-2014-1568.html https://bugzilla.suse.com/show_bug.cgi?id=897890 http://download.suse.com/patch/finder/?keywords=1e00d26644326f6d8943bad777904cab From sle-updates at lists.suse.com Thu Oct 2 12:04:47 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 2 Oct 2014 20:04:47 +0200 (CEST) Subject: SUSE-SU-2014:1266-1: moderate: Security update for openstack-dashboard Message-ID: <20141002180447.6378532251@maintenance.suse.de> SUSE Security Update: Security update for openstack-dashboard ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1266-1 Rating: moderate References: #869696 #882866 #885588 #891815 Cross-References: CVE-2014-3473 CVE-2014-3474 CVE-2014-3475 CVE-2014-3594 Affected Products: SUSE Cloud 3 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. It includes one version update. Description: This update for openstack-dashboard provides the following fixes: * Multiple cross-site scripting (XSS) vulnerabilities were fixed in OpenStack Horizon. (bnc#891815, CVE-2014-3594, CVE-2014-3473, CVE-2014-3474, CVE-2014-3475) Additionally, the following non-security issues have been fixed: * Fixed Admin password injection on Horizon Dashboard. (bnc#869696) * Fix neutron's API to return the correct target ID. * Fix display of images in Rebuild Instance. * Get instance networking information from Neutron. * Do not release FIP on disassociate action. Security Issues: * CVE-2014-3473 * CVE-2014-3474 * CVE-2014-3475 * CVE-2014-3594 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 3: zypper in -t patch sleclo30sp3-openstack-dashboard-9673 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 3 (x86_64) [New Version: 2013.2.4.dev18.g15b7c6a]: openstack-dashboard-2013.2.4.dev18.g15b7c6a-0.7.1 python-horizon-2013.2.4.dev18.g15b7c6a-0.7.1 References: http://support.novell.com/security/cve/CVE-2014-3473.html http://support.novell.com/security/cve/CVE-2014-3474.html http://support.novell.com/security/cve/CVE-2014-3475.html http://support.novell.com/security/cve/CVE-2014-3594.html https://bugzilla.suse.com/show_bug.cgi?id=869696 https://bugzilla.suse.com/show_bug.cgi?id=882866 https://bugzilla.suse.com/show_bug.cgi?id=885588 https://bugzilla.suse.com/show_bug.cgi?id=891815 http://download.suse.com/patch/finder/?keywords=5a7ae67e9c94c4d535917137f599a18a From sle-updates at lists.suse.com Mon Oct 6 20:05:29 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 7 Oct 2014 04:05:29 +0200 (CEST) Subject: SUSE-RU-2014:1268-1: moderate: Recommended update for Client Tools 1.7 Message-ID: <20141007020529.F043832249@maintenance.suse.de> SUSE Recommended Update: Recommended update for Client Tools 1.7 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1268-1 Rating: moderate References: #850105 #874634 #875638 #875958 #880936 #889363 Affected Products: SUSE Manager Client Tools for SLE 11 SP2 SLE CLIENT TOOLS 10 for x86_64 SLE CLIENT TOOLS 10 for s390x SLE CLIENT TOOLS 10 for ia64 SLE CLIENT TOOLS 10 for PPC SLE CLIENT TOOLS 10 ______________________________________________________________________________ An update that has 6 recommended fixes can now be installed. Description: This collective update for SUSE Manager Client Tools 1.7 provides the following fixes and enhancements: cobbler: * Add two upstream patches to fix static IP address handling. (bnc#880936) spacewalk-backend: * Find wrong keyids and remove existing associations before updating. * Recognize signature used by Oracle and newer SLES versions. (bnc#874634) * Raise error if channel cannot be subscribed. (bnc#875958) spacewalk-client-tools: * Require OpenSSL version with SHA256 hashing algorithm. (bnc#875638) spacewalk-koan: * Fix provisioning of a registered server on SLES with static IP address. (bnc#880936) zypp-plugin-spacewalk: * Changed the spec file to force usage of the official python VM. (bnc#889363) * Require rhn-client-tools >= 1.7.7 which contains utf8_encode function. (bnc#850105) * Fix package locking on SLE 10. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Client Tools for SLE 11 SP2: zypper in -t patch slesctsp2-client-tools-201408-9668 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Client Tools for SLE 11 SP2 (i586 ia64 ppc64 s390x x86_64): koan-2.2.2-0.37.37.3 zypp-plugin-spacewalk-0.9.8-0.6.2.3 - SUSE Manager Client Tools for SLE 11 SP2 (i586 ppc64 x86_64): spacewalk-backend-libs-1.7.38.33-0.5.4 - SUSE Manager Client Tools for SLE 11 SP2 (ia64 s390x): spacewalk-backend-libs-1.7.38.33-0.5.5 - SUSE Manager Client Tools for SLE 11 SP2 (noarch): spacewalk-check-1.7.14.19-0.5.3 spacewalk-client-setup-1.7.14.19-0.5.3 spacewalk-client-tools-1.7.14.19-0.5.3 spacewalk-koan-1.7.1.7-0.5.3 - SLE CLIENT TOOLS 10 for x86_64 (x86_64): koan-2.2.2-0.36.1 spacewalk-backend-libs-1.7.38.33-0.5.1 zypp-plugin-spacewalk-0.9.8-0.5.1 - SLE CLIENT TOOLS 10 for x86_64 (noarch): spacewalk-check-1.7.14.19-0.5.1 spacewalk-client-setup-1.7.14.19-0.5.1 spacewalk-client-tools-1.7.14.19-0.5.1 spacewalk-koan-1.7.1.7-0.5.2 - SLE CLIENT TOOLS 10 for s390x (noarch): spacewalk-check-1.7.14.19-0.5.1 spacewalk-client-setup-1.7.14.19-0.5.1 spacewalk-client-tools-1.7.14.19-0.5.1 spacewalk-koan-1.7.1.7-0.5.2 - SLE CLIENT TOOLS 10 for s390x (s390x): koan-2.2.2-0.36.1 spacewalk-backend-libs-1.7.38.33-0.5.1 zypp-plugin-spacewalk-0.9.8-0.5.1 - SLE CLIENT TOOLS 10 for ia64 (noarch): spacewalk-check-1.7.14.19-0.5.1 spacewalk-client-setup-1.7.14.19-0.5.1 spacewalk-client-tools-1.7.14.19-0.5.1 spacewalk-koan-1.7.1.7-0.5.2 - SLE CLIENT TOOLS 10 for ia64 (ia64): koan-2.2.2-0.36.1 spacewalk-backend-libs-1.7.38.33-0.5.1 zypp-plugin-spacewalk-0.9.8-0.5.1 - SLE CLIENT TOOLS 10 for PPC (noarch): spacewalk-check-1.7.14.19-0.5.1 spacewalk-client-setup-1.7.14.19-0.5.1 spacewalk-client-tools-1.7.14.19-0.5.1 spacewalk-koan-1.7.1.7-0.5.2 - SLE CLIENT TOOLS 10 for PPC (ppc): koan-2.2.2-0.36.1 spacewalk-backend-libs-1.7.38.33-0.5.1 zypp-plugin-spacewalk-0.9.8-0.5.1 - SLE CLIENT TOOLS 10 (noarch): spacewalk-check-1.7.14.19-0.5.1 spacewalk-client-setup-1.7.14.19-0.5.1 spacewalk-client-tools-1.7.14.19-0.5.1 spacewalk-koan-1.7.1.7-0.5.2 - SLE CLIENT TOOLS 10 (i586): koan-2.2.2-0.36.1 spacewalk-backend-libs-1.7.38.33-0.5.1 zypp-plugin-spacewalk-0.9.8-0.5.1 References: https://bugzilla.suse.com/show_bug.cgi?id=850105 https://bugzilla.suse.com/show_bug.cgi?id=874634 https://bugzilla.suse.com/show_bug.cgi?id=875638 https://bugzilla.suse.com/show_bug.cgi?id=875958 https://bugzilla.suse.com/show_bug.cgi?id=880936 https://bugzilla.suse.com/show_bug.cgi?id=889363 http://download.suse.com/patch/finder/?keywords=3b535919d13e81a90ae65c130e9a1957 http://download.suse.com/patch/finder/?keywords=805f534cffe9b188c02d247d0b400476 From sle-updates at lists.suse.com Mon Oct 6 21:05:34 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 7 Oct 2014 05:05:34 +0200 (CEST) Subject: SUSE-RU-2014:1269-1: Recommended update for yast2-dns-server Message-ID: <20141007030534.7450B32249@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-dns-server ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1269-1 Rating: low References: #758769 #867596 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. It includes one version update. Description: This update for yast2-dns-server provides the following fixes: * Fixed splitting/joining longer TXT and SPF records. (bnc#867596) * Added support for SPF records. (bnc#758769) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-yast2-dns-server-9829 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-yast2-dns-server-9829 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-yast2-dns-server-9829 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (noarch) [New Version: 2.17.23]: yast2-dns-server-2.17.23-0.5.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (noarch) [New Version: 2.17.23]: yast2-dns-server-2.17.23-0.5.1 - SUSE Linux Enterprise Server 11 SP3 (noarch) [New Version: 2.17.23]: yast2-dns-server-2.17.23-0.5.1 References: https://bugzilla.suse.com/show_bug.cgi?id=758769 https://bugzilla.suse.com/show_bug.cgi?id=867596 http://download.suse.com/patch/finder/?keywords=f27ce3029d2b3b22dcf4cf3e77dc8fa4 From sle-updates at lists.suse.com Mon Oct 6 23:04:45 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 7 Oct 2014 07:04:45 +0200 (CEST) Subject: SUSE-RU-2014:1270-1: moderate: Recommended update for SUSE Manager Server 1.7 Message-ID: <20141007050445.975AF3224C@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager Server 1.7 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1270-1 Rating: moderate References: #873227 #873788 #874634 #875638 #875958 #880936 #881111 #884081 #886391 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 ______________________________________________________________________________ An update that has 9 recommended fixes can now be installed. It includes 7 new package versions. Description: This collective update for SUSE Manager Server 1.7 provides the following fixes and enhancements: cobbler: * Add two upstream patches to fix static IP address handling. (bnc#880936) jabberd: * Fixed duplicate rc_status call in init script. (bnc#873788) spacewalk-backend: * Find wrong keyids and remove existing associations before updating. * Recognize signature used by Oracle and newer SLES versions. (bnc#874634) * Raise error if channel cannot be subscribed. (bnc#875958) spacewalk-certs-tools: * Fix removal of existing host key entries. (bnc#886391) spacewalk-client-tools: * Require OpenSSL version with SHA256 hashing algorithm. (bnc#875638) spacewalk-java: * Pre-require tomcat package for spacewalk-java-config. * Fix logrotate for /var/log/rhn/rhn_web_api.log. (bnc#884081) susemanager-schema: * Allow evr_t to be compared to NULL in Oracle. (bnc#881111) * Add SLE12 GPG Package Key. susemanager: * Add openssl package to the bootstrap repository. * Created mgr-delete-patch script. (bnc#873227) How to apply this update: 1. Log in as root user to the SUSE Manager server. 2. Stop the Spacewalk service: spacewalk-service stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Upgrade the database schema with spacewalk-schema-upgrade 5. Start the Spacewalk service: spacewalk-service start Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-suse-manager-201408-9652 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (x86_64) [New Version: 1.7.29,1.7.38.33 and 2.2.17]: cobbler-2.2.2-0.37.37.2 jabberd-2.2.17-0.4.4.1 jabberd-db-2.2.17-0.4.4.1 spacewalk-backend-1.7.38.33-0.5.3 spacewalk-backend-app-1.7.38.33-0.5.3 spacewalk-backend-applet-1.7.38.33-0.5.3 spacewalk-backend-config-files-1.7.38.33-0.5.3 spacewalk-backend-config-files-common-1.7.38.33-0.5.3 spacewalk-backend-config-files-tool-1.7.38.33-0.5.3 spacewalk-backend-iss-1.7.38.33-0.5.3 spacewalk-backend-iss-export-1.7.38.33-0.5.3 spacewalk-backend-libs-1.7.38.33-0.5.3 spacewalk-backend-package-push-server-1.7.38.33-0.5.3 spacewalk-backend-server-1.7.38.33-0.5.3 spacewalk-backend-sql-1.7.38.33-0.5.3 spacewalk-backend-sql-oracle-1.7.38.33-0.5.3 spacewalk-backend-sql-postgresql-1.7.38.33-0.5.3 spacewalk-backend-tools-1.7.38.33-0.5.3 spacewalk-backend-xml-export-libs-1.7.38.33-0.5.3 spacewalk-backend-xmlrpc-1.7.38.33-0.5.3 spacewalk-backend-xp-1.7.38.33-0.5.3 susemanager-1.7.29-0.5.2 susemanager-tools-1.7.29-0.5.2 - SUSE Manager 1.7 for SLE 11 SP2 (noarch) [New Version: 1.7.14.19,1.7.3.13,1.7.54.32 and 1.7.56.24]: spacewalk-certs-tools-1.7.3.13-0.5.2 spacewalk-check-1.7.14.19-0.5.2 spacewalk-client-tools-1.7.14.19-0.5.2 spacewalk-java-1.7.54.32-0.5.2 spacewalk-java-config-1.7.54.32-0.5.2 spacewalk-java-lib-1.7.54.32-0.5.2 spacewalk-java-oracle-1.7.54.32-0.5.2 spacewalk-java-postgresql-1.7.54.32-0.5.2 spacewalk-taskomatic-1.7.54.32-0.5.2 susemanager-schema-1.7.56.24-0.5.2 References: https://bugzilla.suse.com/show_bug.cgi?id=873227 https://bugzilla.suse.com/show_bug.cgi?id=873788 https://bugzilla.suse.com/show_bug.cgi?id=874634 https://bugzilla.suse.com/show_bug.cgi?id=875638 https://bugzilla.suse.com/show_bug.cgi?id=875958 https://bugzilla.suse.com/show_bug.cgi?id=880936 https://bugzilla.suse.com/show_bug.cgi?id=881111 https://bugzilla.suse.com/show_bug.cgi?id=884081 https://bugzilla.suse.com/show_bug.cgi?id=886391 http://download.suse.com/patch/finder/?keywords=c2f92d9ea579ba40a137250f415883cd From sle-updates at lists.suse.com Mon Oct 6 23:06:30 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 7 Oct 2014 07:06:30 +0200 (CEST) Subject: SUSE-RU-2014:1271-1: moderate: Recommended update for SUSE Manager Proxy 1.7 Message-ID: <20141007050631.005EB3224C@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager Proxy 1.7 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1271-1 Rating: moderate References: #850105 #873788 #874634 #875638 #875958 #886391 #889363 Affected Products: SUSE Manager Proxy 1.7 for SLE 11 SP2 ______________________________________________________________________________ An update that has 7 recommended fixes can now be installed. It includes 5 new package versions. Description: This collective update for the SUSE Manager Proxy 1.7 provides the following fixes and enhancements: jabberd: * Fixed duplicate rc_status call in init. (bnc#873788) spacewalk-backend: * Find wrong keyids and remove existing associations before updating. * Recognize signature used by Oracle and newer SLES versions. (bnc#874634) * Raise error if channel cannot be subscribed. (bnc#875958) spacewalk-certs-tools: * Fix removal of existing host key entries. (bnc#886391) spacewalk-client-tools: * Require OpenSSL version with SHA256 hashing algorithm. (bnc#875638) zypp-plugin-spacewalk: * Changed the spec file to force usage of the official python VM. (bnc#889363) * Require rhn-client-tools >= 1.7.7 which contains utf8_encode function. (bnc#850105) * Fixed package locking. How to apply this update: 1. Log in as root user to the SUSE Manager proxy. 2. Stop the proxy service: spacewalk-proxy stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: spacewalk-proxy start Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Proxy 1.7 for SLE 11 SP2: zypper in -t patch slemap17sp2-suse-manager-proxy-201408-9653 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Proxy 1.7 for SLE 11 SP2 (x86_64) [New Version: 0.9.8,1.7.38.33 and 2.2.17]: jabberd-2.2.17-0.4.4.1 jabberd-db-2.2.17-0.4.4.1 spacewalk-backend-1.7.38.33-0.5.3 spacewalk-backend-libs-1.7.38.33-0.5.3 zypp-plugin-spacewalk-0.9.8-0.6.2.2 - SUSE Manager Proxy 1.7 for SLE 11 SP2 (noarch) [New Version: 1.7.14.19 and 1.7.3.13]: spacewalk-certs-tools-1.7.3.13-0.5.2 spacewalk-check-1.7.14.19-0.5.2 spacewalk-client-setup-1.7.14.19-0.5.2 spacewalk-client-tools-1.7.14.19-0.5.2 References: https://bugzilla.suse.com/show_bug.cgi?id=850105 https://bugzilla.suse.com/show_bug.cgi?id=873788 https://bugzilla.suse.com/show_bug.cgi?id=874634 https://bugzilla.suse.com/show_bug.cgi?id=875638 https://bugzilla.suse.com/show_bug.cgi?id=875958 https://bugzilla.suse.com/show_bug.cgi?id=886391 https://bugzilla.suse.com/show_bug.cgi?id=889363 http://download.suse.com/patch/finder/?keywords=638bc7837a5f414918164f640093525b From sle-updates at lists.suse.com Tue Oct 7 15:04:45 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 7 Oct 2014 23:04:45 +0200 (CEST) Subject: SUSE-SU-2014:1272-1: Security update for rubygem-passenger Message-ID: <20141007210445.5F35E3224F@maintenance.suse.de> SUSE Security Update: Security update for rubygem-passenger ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1272-1 Rating: low References: #828005 Cross-References: CVE-2013-2119 Affected Products: WebYaST 1.3 SUSE Studio Onsite 1.3 SUSE Lifecycle Management Server 1.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update provides a security issue fix: * CVE-2013-2119: incorrect temporary file usage (bnc#828005) Security Issues: * CVE-20132119 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.3: zypper in -t patch slewyst13-rubygem-passenger-9550 - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-rubygem-passenger-9550 - SUSE Lifecycle Management Server 1.3: zypper in -t patch sleslms13-rubygem-passenger-9550 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.3 (i586 ia64 ppc64 s390x x86_64): rubygem-passenger-3.0.14-0.11.1 rubygem-passenger-nginx-3.0.14-0.11.1 - SUSE Studio Onsite 1.3 (x86_64): rubygem-passenger-3.0.14-0.11.1 rubygem-passenger-nginx-3.0.14-0.11.1 - SUSE Lifecycle Management Server 1.3 (x86_64): rubygem-passenger-3.0.14-0.11.1 rubygem-passenger-apache2-3.0.14-0.11.1 rubygem-passenger-nginx-3.0.14-0.11.1 References: http://support.novell.com/security/cve/CVE-2013-2119.html https://bugzilla.suse.com/show_bug.cgi?id=828005 http://download.suse.com/patch/finder/?keywords=cbca4f0fd8b526f8e9a58bcaaf352595 From sle-updates at lists.suse.com Wed Oct 8 11:04:41 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 8 Oct 2014 19:04:41 +0200 (CEST) Subject: SUSE-RU-2014:1275-1: Recommended update for crowbar-barclamp-glance Message-ID: <20141008170441.E68C432253@maintenance.suse.de> SUSE Recommended Update: Recommended update for crowbar-barclamp-glance ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1275-1 Rating: low References: #897815 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for crowbar-barclamp-glance provides stability fixes from the upstream OpenStack project: * Fix VMware spelling * Add Requires on crowbar-barclamp-openstack for the new crowbar-openstack cookbook. * Make glance-scrubber.conf owned by root:glance, instead of glance:root * Use helpers from new crowbar-openstack cookbook Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-crowbar-barclamp-glance-9790 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (noarch): crowbar-barclamp-glance-1.8+git.1409576554.b64f72b-0.7.3 References: https://bugzilla.suse.com/show_bug.cgi?id=897815 http://download.suse.com/patch/finder/?keywords=a315bf0dd6e8e8ed18057ddee54409bd From sle-updates at lists.suse.com Wed Oct 8 11:04:55 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 8 Oct 2014 19:04:55 +0200 (CEST) Subject: SUSE-RU-2014:1276-1: Recommended update for yast2-samba-client Message-ID: <20141008170455.A7E7132255@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-samba-client ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1276-1 Rating: low References: #895319 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update for yast2-samba-client ensures that nmbd is restarted after a nmbstatus lookup. (bnc#895319). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-yast2-samba-client-9832 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-yast2-samba-client-9832 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-yast2-samba-client-9832 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (noarch) [New Version: 2.17.30]: yast2-samba-client-2.17.30-0.7.1 - SUSE Linux Enterprise Server 11 SP3 (noarch) [New Version: 2.17.30]: yast2-samba-client-2.17.30-0.7.1 - SUSE Linux Enterprise Desktop 11 SP3 (noarch) [New Version: 2.17.30]: yast2-samba-client-2.17.30-0.7.1 References: https://bugzilla.suse.com/show_bug.cgi?id=895319 http://download.suse.com/patch/finder/?keywords=070321f781495f701ed39224180b7b5b From sle-updates at lists.suse.com Wed Oct 8 11:05:11 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 8 Oct 2014 19:05:11 +0200 (CEST) Subject: SUSE-RU-2014:1277-1: Recommended update for crowbar, crowbar-barclamp-openstack, crowbar-devel, suse-cloud-upgrade Message-ID: <20141008170511.4CD5732255@maintenance.suse.de> SUSE Recommended Update: Recommended update for crowbar, crowbar-barclamp-openstack, crowbar-devel, suse-cloud-upgrade ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1277-1 Rating: low References: #893877 #897815 #898217 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This update for suse-cloud-upgrade, crowbar and crowbar-barclamp-openstack provides stability fixes from the upstream OpenStack project: * suse-cloud-upgrade: o Use local variables in functions o Make get_allocated_nodes always set get_allocated_nodes_retval as retval o Fix log in get_allocated_nodes to mention role o Check the nodes have packages updated to SUSE Cloud 4 packages o Do not output the result of "rpm -q" in our logs o Fixed barclamp install order (bnc#898217) o fix post step error message o fix test for user answering Y o bnc#893877 - trove not installed after upgrade o Fix crash in post when /etc/crowbar/provisioner.json exists with no repo * crowbar: o Install crowbar-openstack before neutron (bnc#898217) o Relax SLES media check * crowbar-barclamp-openstack: o Add a crowbar-openstack cookbook (bnc#898217) o Avoid search if current node matches what we look for o Change log level to warn when no node is found Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-crowbar-upgrade-201409-9825 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (noarch): crowbar-1.8+git.1411390919.f59b3ae-0.7.1 crowbar-barclamp-openstack-1.8+git.1408354054.3a62e91-0.7.5 suse-cloud-upgrade-4+git.1412073739.1fdd9f4-0.7.1 References: https://bugzilla.suse.com/show_bug.cgi?id=893877 https://bugzilla.suse.com/show_bug.cgi?id=897815 https://bugzilla.suse.com/show_bug.cgi?id=898217 http://download.suse.com/patch/finder/?keywords=c5fb8cedeee3a8be4ae14fe85603e34f From sle-updates at lists.suse.com Wed Oct 8 16:04:41 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 9 Oct 2014 00:04:41 +0200 (CEST) Subject: SUSE-SU-2014:1278-1: moderate: Security update for kvm Message-ID: <20141008220441.541C232253@maintenance.suse.de> SUSE Security Update: Security update for kvm ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1278-1 Rating: moderate References: #876842 #877642 #877645 #878541 #886535 Cross-References: CVE-2014-0222 CVE-2014-0223 CVE-2014-3461 Affected Products: SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves three vulnerabilities and has two fixes is now available. It includes one version update. Description: kvm has been updated to fix issues in the embedded qemu: * CVE-2014-0223: An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could have used this flaw to corrupt QEMU process memory on the host, which could potentially have resulted in arbitrary code execution on the host with the privileges of the QEMU process. * CVE-2014-3461: A user able to alter the savevm data (either on the disk or over the wire during migration) could have used this flaw to to corrupt QEMU process memory on the (destination) host, which could have potentially resulted in arbitrary code execution on the host with the privileges of the QEMU process. * CVE-2014-0222: An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could have used this flaw to corrupt QEMU process memory on the host, which could have potentially resulted in arbitrary code execution on the host with the privileges of the QEMU process. Non-security bugs fixed: * Fix exceeding IRQ routes that could have caused freezes of guests. (bnc#876842) * Fix CPUID emulation bugs that may have broken Windows guests with newer -cpu types (bnc#886535) Security Issues: * CVE-2014-0222 * CVE-2014-0223 * CVE-2014-3461 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kvm-9739 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kvm-9739 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 (i586 s390x x86_64) [New Version: 1.4.2]: kvm-1.4.2-0.17.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 1.4.2]: kvm-1.4.2-0.17.1 References: http://support.novell.com/security/cve/CVE-2014-0222.html http://support.novell.com/security/cve/CVE-2014-0223.html http://support.novell.com/security/cve/CVE-2014-3461.html https://bugzilla.suse.com/show_bug.cgi?id=876842 https://bugzilla.suse.com/show_bug.cgi?id=877642 https://bugzilla.suse.com/show_bug.cgi?id=877645 https://bugzilla.suse.com/show_bug.cgi?id=878541 https://bugzilla.suse.com/show_bug.cgi?id=886535 http://download.suse.com/patch/finder/?keywords=edfe5d595d3bf57ca949f09aec30ca76 From sle-updates at lists.suse.com Fri Oct 10 17:04:44 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 11 Oct 2014 01:04:44 +0200 (CEST) Subject: SUSE-SU-2014:1282-1: moderate: Security update for python-lxml Message-ID: <20141010230444.4E4F132249@maintenance.suse.de> SUSE Security Update: Security update for python-lxml ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1282-1 Rating: moderate References: #877258 Cross-References: CVE-2014-3146 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This security update for python-lxml fixes a input sanitization flaw in clean_html. (CVE-2014-3146) Security Issues: * CVE-2014-3146 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-python-lxml-9821 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-python-lxml-9821 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-python-lxml-9821 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-python-lxml-9821 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): python-lxml-2.3.6-0.13.1 python-lxml-doc-2.3.6-0.13.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): python-lxml-2.3.6-0.13.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): python-lxml-2.3.6-0.13.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): python-lxml-2.3.6-0.13.1 References: http://support.novell.com/security/cve/CVE-2014-3146.html https://bugzilla.suse.com/show_bug.cgi?id=877258 http://download.suse.com/patch/finder/?keywords=3ebd1eeb7866cff283b2681c6297d639 From sle-updates at lists.suse.com Fri Oct 10 19:04:40 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 11 Oct 2014 03:04:40 +0200 (CEST) Subject: SUSE-SU-2014:1283-1: moderate: Security update for libevent Message-ID: <20141011010440.68EA73224A@maintenance.suse.de> SUSE Security Update: Security update for libevent ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1283-1 Rating: moderate References: #897243 Cross-References: CVE-2014-6272 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes a buffer overflow in the buffered event handling in libevent. (CVE-2014-6272) Security Issues: * CVE-2014-6272 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-libevent-9824 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-libevent-9824 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-libevent-9824 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-libevent-9824 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): libevent-devel-1.4.5-24.24.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): libevent-1_4-2-1.4.5-24.24.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): libevent-1_4-2-1.4.5-24.24.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): libevent-1_4-2-1.4.5-24.24.1 References: http://support.novell.com/security/cve/CVE-2014-6272.html https://bugzilla.suse.com/show_bug.cgi?id=897243 http://download.suse.com/patch/finder/?keywords=1467c973e00c4eba0893044be9039245 From sle-updates at lists.suse.com Mon Oct 13 11:04:42 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 13 Oct 2014 19:04:42 +0200 (CEST) Subject: SUSE-OU-2014:1285-1: Optional update for grub2-x86_64-xen Message-ID: <20141013170442.3DC3532253@maintenance.suse.de> SUSE Optional Update: Optional update for grub2-x86_64-xen ______________________________________________________________________________ Announcement ID: SUSE-OU-2014:1285-1 Rating: low References: #882092 #892301 Affected Products: SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has two optional fixes can now be installed. Description: This patch provides grub2-x86_64-xen. This new package should be installed on Xen virtualization servers that host SUSE Linux Enterprise 12 virtual machines. Indications: Users deploying SLE 12 guests should install this package. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-grub2-x86_64-xen-9811 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): grub2-x86_64-xen-2.00-0.45.16 References: https://bugzilla.suse.com/show_bug.cgi?id=882092 https://bugzilla.suse.com/show_bug.cgi?id=892301 http://download.suse.com/patch/finder/?keywords=d4438d488feda93374e831ffd15199b2 From sle-updates at lists.suse.com Mon Oct 13 15:04:39 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 13 Oct 2014 23:04:39 +0200 (CEST) Subject: SUSE-SU-2014:1286-1: moderate: Security update for nginx-1.0 Message-ID: <20141013210439.B6FF932253@maintenance.suse.de> SUSE Security Update: Security update for nginx-1.0 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1286-1 Rating: moderate References: #897029 Cross-References: CVE-2014-3616 Affected Products: WebYaST 1.3 SUSE Studio Onsite 1.3 SUSE Lifecycle Management Server 1.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for nginx fixes the following security issue: * A virtual host confusion issue in nginx allowed HTTPS connections for one origin to be redirected to the virtual host of a different origin. This could have lead to a variety of issues, such as cookie theft and session hijacking. It could have been triggered from a cross-site scripting flaw, tricking a user into visiting a malicious URL, and so on. (CVE-2014-3616) Security Issues: * CVE-2014-3616 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.3: zypper in -t patch slewyst13-nginx-1.0-9834 - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-nginx-1.0-9834 - SUSE Lifecycle Management Server 1.3: zypper in -t patch sleslms13-nginx-1.0-9834 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.3 (i586 ia64 ppc64 s390x x86_64): nginx-1.0-1.0.15-0.10.1 - SUSE Studio Onsite 1.3 (x86_64): nginx-1.0-1.0.15-0.10.1 - SUSE Lifecycle Management Server 1.3 (x86_64): nginx-1.0-1.0.15-0.10.1 References: http://support.novell.com/security/cve/CVE-2014-3616.html https://bugzilla.suse.com/show_bug.cgi?id=897029 http://download.suse.com/patch/finder/?keywords=a7887f82e639dc3dafe292211d38d77f From sle-updates at lists.suse.com Mon Oct 13 17:04:42 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 14 Oct 2014 01:04:42 +0200 (CEST) Subject: SUSE-RU-2014:1275-2: Recommended update for crowbar-barclamp-swift Message-ID: <20141013230442.B3BEE3224A@maintenance.suse.de> SUSE Recommended Update: Recommended update for crowbar-barclamp-swift ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1275-2 Rating: low References: #897815 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for crowbar-barclamp-swift provides stability fixes from the upstream OpenStack project: * Enable rsync service on boot * Restart rsyslog after creating /etc/rsyslog.d/11-swift.conf * Fix detection of rsyslog version Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-crowbar-barclamp-swift-9797 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (noarch): crowbar-barclamp-swift-1.8+git.1409066227.2a57e17-0.7.3 References: https://bugzilla.suse.com/show_bug.cgi?id=897815 http://download.suse.com/patch/finder/?keywords=38560756b23f0f80990f8eaf3c09b377 From sle-updates at lists.suse.com Mon Oct 13 17:04:57 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 14 Oct 2014 01:04:57 +0200 (CEST) Subject: SUSE-SU-2014:1287-1: important: Security update for Containment-Studio Message-ID: <20141013230457.9F86C32253@maintenance.suse.de> SUSE Security Update: Security update for Containment-Studio ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1287-1 Rating: important References: #898604 Cross-References: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 Affected Products: SUSE Studio Onsite 1.3 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: SUSE Studio uses a pre-built containment RPM for testing purposes. This update contains a rebuild with current security fixes like e.g. bash shellshock fixes included. Security Issues: * CVE-2014-6271 * CVE-2014-7169 * CVE-2014-6277 * CVE-2014-6278 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-Containment-201410-9833 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): Containment-Studio-SLE11_SP3-5.04.108-20141006122525 - SUSE Studio Onsite 1.3 (noarch): Containment-Studio-SLE11_SP1-4.85.108-20141006120850 References: http://support.novell.com/security/cve/CVE-2014-6271.html http://support.novell.com/security/cve/CVE-2014-6277.html http://support.novell.com/security/cve/CVE-2014-6278.html http://support.novell.com/security/cve/CVE-2014-7169.html https://bugzilla.suse.com/show_bug.cgi?id=898604 http://download.suse.com/patch/finder/?keywords=1867dc0f69170864bf05a7d68cec1234 From sle-updates at lists.suse.com Tue Oct 14 16:04:41 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 15 Oct 2014 00:04:41 +0200 (CEST) Subject: SUSE-SU-2014:1294-1: important: Security update for rsyslog Message-ID: <20141014220441.EEE3232255@maintenance.suse.de> SUSE Security Update: Security update for rsyslog ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1294-1 Rating: important References: #890228 #897262 #899756 Cross-References: CVE-2014-3634 CVE-2014-3683 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: rsyslog has been updated to fix a remote denial of service issue: * Under certain configurations, a local or remote attacker able to send syslog messages to the server could have crashed the log server due to an array overread. (CVE-2014-3634, CVE-2014-3683) Security Issues: * CVE-2014-3634 * CVE-2014-3683 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-rsyslog-9840 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-rsyslog-9840 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): rsyslog-5.10.1-0.11.1 rsyslog-diag-tools-5.10.1-0.11.1 rsyslog-doc-5.10.1-0.11.1 rsyslog-module-gssapi-5.10.1-0.11.1 rsyslog-module-gtls-5.10.1-0.11.1 rsyslog-module-mysql-5.10.1-0.11.1 rsyslog-module-pgsql-5.10.1-0.11.1 rsyslog-module-relp-5.10.1-0.11.1 rsyslog-module-snmp-5.10.1-0.11.1 rsyslog-module-udpspoof-5.10.1-0.11.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): rsyslog-5.10.1-0.11.1 rsyslog-diag-tools-5.10.1-0.11.1 rsyslog-doc-5.10.1-0.11.1 rsyslog-module-gssapi-5.10.1-0.11.1 rsyslog-module-gtls-5.10.1-0.11.1 rsyslog-module-mysql-5.10.1-0.11.1 rsyslog-module-pgsql-5.10.1-0.11.1 rsyslog-module-relp-5.10.1-0.11.1 rsyslog-module-snmp-5.10.1-0.11.1 rsyslog-module-udpspoof-5.10.1-0.11.1 References: http://support.novell.com/security/cve/CVE-2014-3634.html http://support.novell.com/security/cve/CVE-2014-3683.html https://bugzilla.suse.com/show_bug.cgi?id=890228 https://bugzilla.suse.com/show_bug.cgi?id=897262 https://bugzilla.suse.com/show_bug.cgi?id=899756 http://download.suse.com/patch/finder/?keywords=bf1479391eaebb0445fd0ffa9182ee43 From sle-updates at lists.suse.com Wed Oct 15 17:04:44 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 16 Oct 2014 01:04:44 +0200 (CEST) Subject: SUSE-RU-2014:1299-1: moderate: Recommended update for at Message-ID: <20141015230444.29D343224A@maintenance.suse.de> SUSE Recommended Update: Recommended update for at ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1299-1 Rating: moderate References: #899160 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP2 LTSS SUSE Linux Enterprise Server 11 SP1 LTSS SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for the at(1) job manager fixes a regression caused by the latest security updates for bash. at(1) now sanitizes the environment it passes to the shell, allowing only variables whose keys are of the form /^[A-Z_][A-Z0-9_]/i. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-at-9835 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-at-9835 - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-at-9836 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-at-9837 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-at-9835 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): at-3.1.8-1069.22.22.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): at-3.1.8-1069.22.22.1 - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64): at-3.1.8-1069.22.22.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): at-3.1.8-1069.22.22.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): at-3.1.8-921.31.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): at-3.1.8-921.25.3.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): at-3.1.8-1069.22.22.1 References: https://bugzilla.suse.com/show_bug.cgi?id=899160 http://download.suse.com/patch/finder/?keywords=6cf22909dc0a01eb5f6af57f6b5286ce http://download.suse.com/patch/finder/?keywords=7c8fe926c78df4d1f830f57b652515ba http://download.suse.com/patch/finder/?keywords=7ee7fc6c28efefba1793208379ea92b4 http://download.suse.com/patch/finder/?keywords=a558fead316e1f6c4b8e18cebbb37ed7 http://download.suse.com/patch/finder/?keywords=b775d18b8887d396d177ab8ba118775f From sle-updates at lists.suse.com Wed Oct 15 17:05:09 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 16 Oct 2014 01:05:09 +0200 (CEST) Subject: SUSE-RU-2014:1300-1: Recommended update for crowbar-barclamp-dns Message-ID: <20141015230509.2A18932253@maintenance.suse.de> SUSE Recommended Update: Recommended update for crowbar-barclamp-dns ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1300-1 Rating: low References: #872547 #897815 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update for crowbar-barclamp-dns provides stability fixes from the upstream OpenStack project: * Unbreak initial chef-client run * Rename variable for clarity * Rename another variable * Minor code cleanup * Rework how we set SOA attributes (bnc#872547) * Reorder code for the two domain zones to be in similar order * Convert the attribute for records to a hash instead of referencing it * Only increment serial for DNS zones when there's a change * Copy SOA fields from zone for reverse zones * Copy nameservers from zone for reverse zones Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-crowbar-barclamp-dns-9789 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (noarch): crowbar-barclamp-dns-1.8+git.1409669074.aade5da-0.7.4 References: https://bugzilla.suse.com/show_bug.cgi?id=872547 https://bugzilla.suse.com/show_bug.cgi?id=897815 http://download.suse.com/patch/finder/?keywords=bb0c322efe53c27c0c54d776e89ee5f4 From sle-updates at lists.suse.com Wed Oct 15 19:05:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 16 Oct 2014 03:05:16 +0200 (CEST) Subject: SUSE-RU-2014:1301-1: Recommended update for psmisc Message-ID: <20141016010516.6203E3224A@maintenance.suse.de> SUSE Recommended Update: Recommended update for psmisc ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1301-1 Rating: low References: #852225 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for psmisc fixes formatting of 6-digit process IDs in fuser(1). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-psmisc-9848 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-psmisc-9848 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-psmisc-9848 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): psmisc-22.7-7.3.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): psmisc-22.7-7.3.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): psmisc-22.7-7.3.1 References: https://bugzilla.suse.com/show_bug.cgi?id=852225 http://download.suse.com/patch/finder/?keywords=9367486d0bb51cbc8d7ecacf354a6834 From sle-updates at lists.suse.com Wed Oct 15 23:04:40 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 16 Oct 2014 07:04:40 +0200 (CEST) Subject: SUSE-RU-2014:1302-1: Recommended update for python-ply Message-ID: <20141016050440.4651032253@maintenance.suse.de> SUSE Recommended Update: Recommended update for python-ply ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1302-1 Rating: low References: #896079 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides python-ply 3.4, which brings many fixes and enhancements. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-python-ply-9873 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.4]: python-ply-3.4-16.2.8.1 python-ply-doc-3.4-16.2.8.1 References: https://bugzilla.suse.com/show_bug.cgi?id=896079 http://download.suse.com/patch/finder/?keywords=1741fda9cc1a104bcc782e5f468abef1 From sle-updates at lists.suse.com Thu Oct 16 11:04:43 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 16 Oct 2014 19:04:43 +0200 (CEST) Subject: SUSE-RU-2014:1303-1: Recommended update for python-heatclient, python-heatclient-doc, python-heatclient-test Message-ID: <20141016170443.0BAFF32253@maintenance.suse.de> SUSE Recommended Update: Recommended update for python-heatclient, python-heatclient-doc, python-heatclient-test ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1303-1 Rating: low References: #897815 #899545 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update for python-heatclient provides the following non-security-fix: * Handle upper cased endpoints (bnc#899545) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-python-heatclient-9856 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (x86_64): python-heatclient-0.2.9-0.9.1 python-heatclient-doc-0.2.9-0.9.1 References: https://bugzilla.suse.com/show_bug.cgi?id=897815 https://bugzilla.suse.com/show_bug.cgi?id=899545 http://download.suse.com/patch/finder/?keywords=0e7189943c17c5cfd2ea38a79dc6e798 From sle-updates at lists.suse.com Thu Oct 16 16:04:42 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 17 Oct 2014 00:04:42 +0200 (CEST) Subject: SUSE-OU-2014:1304-1: Optional update for gcc Message-ID: <20141016220442.6A94432253@maintenance.suse.de> SUSE Optional Update: Optional update for gcc ______________________________________________________________________________ Announcement ID: SUSE-OU-2014:1304-1 Rating: low References: #893829 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has one optional fix can now be installed. Description: This optional update for gcc provides bi-arch variants of packages gcc-c++ and libstdc++-devel, for example: gcc-c++-32bit and libstdc++-devel-32bit on x86_64. Indications: Any user can install this update. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-cpp-9841 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-cpp-9841 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-cpp-9841 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-cpp-9841 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): gcc-fortran-4.3-62.200.2 gcc-gij-4.3-62.200.2 gcc-java-4.3-62.200.2 gcc-obj-c++-4.3-62.200.2 gcc-objc-4.3-62.200.2 libffi-devel-4.3-62.200.2 libgcj-devel-4.3-62.200.2 - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64): gcc-fortran-32bit-4.3-62.200.2 gcc-gij-32bit-4.3-62.200.2 gcc-objc-32bit-4.3-62.200.2 libffi-devel-32bit-4.3-62.200.2 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 x86_64): gcc-ada-4.3-62.200.2 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): libstdc++-devel-4.3-62.200.2 - SUSE Linux Enterprise Software Development Kit 11 SP3 (x86_64): libstdc++-devel-32bit-4.3-62.200.2 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): cpp-4.3-62.200.2 gcc-4.3-62.200.2 gcc-c++-4.3-62.200.2 gcc-info-4.3-62.200.2 gcc-locale-4.3-62.200.2 libstdc++-devel-4.3-62.200.2 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): gcc-32bit-4.3-62.200.2 gcc-c++-32bit-4.3-62.200.2 libstdc++-devel-32bit-4.3-62.200.2 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): cpp-4.3-62.200.2 gcc-4.3-62.200.2 gcc-c++-4.3-62.200.2 gcc-info-4.3-62.200.2 gcc-locale-4.3-62.200.2 libstdc++-devel-4.3-62.200.2 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): gcc-32bit-4.3-62.200.2 gcc-c++-32bit-4.3-62.200.2 libstdc++-devel-32bit-4.3-62.200.2 - SUSE Linux Enterprise Server 11 SP3 (s390x): gcc-z9-4.3-62.200.2 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): cpp-4.3-62.200.2 gcc-4.3-62.200.2 gcc-c++-4.3-62.200.2 gcc-gij-4.3-62.200.2 gcc-info-4.3-62.200.2 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): gcc-32bit-4.3-62.200.2 gcc-c++-32bit-4.3-62.200.2 gcc-gij-32bit-4.3-62.200.2 References: https://bugzilla.suse.com/show_bug.cgi?id=893829 http://download.suse.com/patch/finder/?keywords=f0ee2af468f237d7fe4498fda9511777 From sle-updates at lists.suse.com Fri Oct 17 11:04:41 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 17 Oct 2014 19:04:41 +0200 (CEST) Subject: SUSE-RU-2014:1305-1: Recommended update for openstack-ceilometer Message-ID: <20141017170441.16C8D32256@maintenance.suse.de> SUSE Recommended Update: Recommended update for openstack-ceilometer ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1305-1 Rating: low References: #893770 #896217 #897815 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. It includes one version update. Description: This update for openstack-ceilometer provides stability fixes from the upstream OpenStack project: * fix start/stop logic (bnc#893770) * fix statistics query in postgres (bnc#896217) * VMware: Support secret host_password option * Fix tests with testtools>=0.9.39 * update default_log_levels set by ceilometer * fix StringIO errors in unit test * use %_rundir if available, otherwise /var/run Indications: Consolidated bugfix maintenance update for Cloud 4 Contraindications: Indications: Consolidated bugfix maintenance update for Cloud 4 Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-openstack-ceilometer-9800 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (x86_64) [New Version: 2014.1.3.dev7.gccd6b98]: openstack-ceilometer-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-agent-central-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-agent-compute-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-agent-notification-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-alarm-evaluator-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-alarm-notifier-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-api-2014.1.3.dev7.gccd6b98-0.7.1 openstack-ceilometer-collector-2014.1.3.dev7.gccd6b98-0.7.1 python-ceilometer-2014.1.3.dev7.gccd6b98-0.7.1 - SUSE Cloud 4 (noarch) [New Version: 2014.1.3.dev7.gccd6b98]: openstack-ceilometer-doc-2014.1.3.dev7.gccd6b98-0.7.3 References: https://bugzilla.suse.com/show_bug.cgi?id=893770 https://bugzilla.suse.com/show_bug.cgi?id=896217 https://bugzilla.suse.com/show_bug.cgi?id=897815 http://download.suse.com/patch/finder/?keywords=142f582adefc81a90d5bf34413280336 From sle-updates at lists.suse.com Fri Oct 17 19:04:38 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 18 Oct 2014 03:04:38 +0200 (CEST) Subject: SUSE-RU-2014:1306-1: moderate: Recommended update for yast2-instserver Message-ID: <20141018010438.AB6653224A@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-instserver ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1306-1 Rating: moderate References: #882849 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update for yast2-instserver adds support for the SLE 12 product family: * Write "cpeid" attribute to SLP configuration (SLE12 products). * Save FTP firewall port configuration option. * Install "nfs-kernel-server" package when NFS server is selected. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-yast2-instserver-9874 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-yast2-instserver-9874 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-yast2-instserver-9874 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (noarch) [New Version: 2.17.7]: yast2-instserver-2.17.7-0.2.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (noarch) [New Version: 2.17.7]: yast2-instserver-2.17.7-0.2.1 - SUSE Linux Enterprise Server 11 SP3 (noarch) [New Version: 2.17.7]: yast2-instserver-2.17.7-0.2.1 References: https://bugzilla.suse.com/show_bug.cgi?id=882849 http://download.suse.com/patch/finder/?keywords=91c3dd0c7f744b1cd4e351c0de85ba2e From sle-updates at lists.suse.com Mon Oct 20 23:04:39 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 21 Oct 2014 07:04:39 +0200 (CEST) Subject: SUSE-RU-2014:1311-1: important: Recommended update for apache2 Message-ID: <20141021050439.86CDC32256@maintenance.suse.de> SUSE Recommended Update: Recommended update for apache2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1311-1 Rating: important References: #900183 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for Apache moves function ap_timeout_parameter_parse() to the public API that can be used by modules. This fixes a regression in mod_cgid introduced by the previous update. Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): apache2-2.2.3-16.52.1 apache2-devel-2.2.3-16.52.1 apache2-doc-2.2.3-16.52.1 apache2-example-pages-2.2.3-16.52.1 apache2-prefork-2.2.3-16.52.1 apache2-worker-2.2.3-16.52.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): apache2-2.2.3-16.32.53.1 apache2-devel-2.2.3-16.32.53.1 apache2-doc-2.2.3-16.32.53.1 apache2-example-pages-2.2.3-16.32.53.1 apache2-prefork-2.2.3-16.32.53.1 apache2-worker-2.2.3-16.32.53.1 References: https://bugzilla.suse.com/show_bug.cgi?id=900183 http://download.suse.com/patch/finder/?keywords=0c286754f3d72329af0ac480783335f7 http://download.suse.com/patch/finder/?keywords=c912e052bac476baded5191851446318 From sle-updates at lists.suse.com Wed Oct 22 13:04:40 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 22 Oct 2014 21:04:40 +0200 (CEST) Subject: SUSE-SU-2014:1316-1: important: Security update for Linux kernel Message-ID: <20141022190440.D4B2F32257@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1316-1 Rating: important References: #774818 #806990 #816708 #826486 #832309 #849123 #855657 #859840 #860441 #860593 #863586 #866130 #866615 #866864 #866911 #869055 #869934 #870161 #871797 #876017 #876055 #876114 #876590 #879921 #880344 #880370 #881051 #881759 #882317 #882639 #882804 #882900 #883376 #883518 #883724 #884333 #884582 #884725 #884767 #885262 #885382 #885422 #885509 #886840 #887082 #887503 #887608 #887645 #887680 #888058 #888105 #888591 #888607 #888847 #888849 #888968 #889061 #889173 #889451 #889614 #889727 #890297 #890426 #890513 #890526 #891087 #891259 #891619 #892200 #892490 #892723 #893064 #893496 #893596 #894200 Cross-References: CVE-2013-1979 CVE-2014-1739 CVE-2014-2706 CVE-2014-4027 CVE-2014-4171 CVE-2014-4508 CVE-2014-4667 CVE-2014-4943 CVE-2014-5077 CVE-2014-5471 CVE-2014-5472 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 11 vulnerabilities and has 64 fixes is now available. Description: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). * CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). * CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). * CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). * CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) * CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) * CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) * CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) * CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892) * CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689) The following non-security bugs have been fixed: * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). * ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). * ACPI: Limit access to custom_method (bnc#884333). * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). * Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). * Add secure_modules() call (bnc#884333). * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). * Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. * Btrfs: Return EXDEV for cross file system snapshot. * Btrfs: abort the transaction when we does not find our extent ref. * Btrfs: avoid warning bomb of btrfs_invalidate_inodes. * Btrfs: cancel scrub on transaction abortion. * Btrfs: correctly set profile flags on seqlock retry. * Btrfs: does not check nodes for extent items. * Btrfs: fix a possible deadlock between scrub and transaction committing. * Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). * Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). * Btrfs: fix double free in find_lock_delalloc_range. * Btrfs: fix possible memory leak in btrfs_create_tree(). * Btrfs: fix use of uninit "ret" in end_extent_writepage(). * Btrfs: free delayed node outside of root->inode_lock (bnc#866864). * Btrfs: make DEV_INFO ioctl available to anyone. * Btrfs: make FS_INFO ioctl available to anyone. * Btrfs: make device scan less noisy. * Btrfs: make sure there are not any read requests before stopping workers. * Btrfs: more efficient io tree navigation on wait_extent_bit. * Btrfs: output warning instead of error when loading free space cache failed. * Btrfs: retrieve more info from FS_INFO ioctl. * Btrfs: return EPERM when deleting a default subvolume (bnc#869934). * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * Btrfs: use right type to get real comparison. * Btrfs: wake up @scrub_pause_wait as much as we can. * Btrfs: wake up transaction thread upon remount. * CacheFiles: Add missing retrieval completions (bnc#880344). * CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). * CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). * CacheFiles: Fix the marking of cached pages (bnc#880344). * CacheFiles: Implement invalidation (bnc#880344). * CacheFiles: Make some debugging statements conditional (bnc#880344). * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). * FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). * FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). * FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). * FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). * FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). * FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). * FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). * FS-Cache: Fix operation state management and accounting (bnc#880344). * FS-Cache: Fix signal handling during waits (bnc#880344). * FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). * FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). * FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). * FS-Cache: Mark cancellation of in-progress operation (bnc#880344). * FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). * FS-Cache: Provide proper invalidation (bnc#880344). * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). * FS-Cache: Uninline fscache_object_init() (bnc#880344). * FS-Cache: Wrap checks on object state (bnc#880344). * HID: usbhid: add always-poll quirk (bnc#888607). * HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). * Ignore "flags" change to event_constraint (bnc#876114). * Ignore data_src/weight changes to perf_sample_data (bnc#876114). * NFS: Allow more operations in an NFSv4.1 request (bnc#890513). * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). * NFS: Does not copy read delegation stateids in setattr (bnc#888968). * NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) * NFS: Fixes for NFS RCU-walk support in line with code going upstream * NFS: Use FS-Cache invalidation (bnc#880344). * NFS: allow lockless access to access_cache (bnc#866130). * NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts (bnc#888591). * NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). * NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). * NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). * NFS: support RCU_WALK in nfs_permission() (bnc#866130). * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). * NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). * NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). * NFSv4: Add a helper for encoding opaque data (bnc#888968). * NFSv4: Add a helper for encoding stateids (bnc#888968). * NFSv4: Add helpers for basic copying of stateids (bnc#888968). * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). * NFSv4: Rename nfs4_copy_stateid() (bnc#888968). * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). * NFSv4: Simplify the struct nfs4_stateid (bnc#888968). * NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). * NFSv4: nfs4_stateid_is_current should return "true" for an invalid stateid (bnc#888968). * One more fix for kABI breakage. * PCI: Lock down BAR access when module security is enabled (bnc#884333). * PCI: enable MPS "performance" setting to properly handle bridge MPS (bnc#883376). * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). * PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). * PM / Hibernate: Implement position keeping in radix tree (bnc#860441). * PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). * PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). * Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). * Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). * USB: handle LPM errors during device suspend correctly (bnc#849123). * Update kabi files to reflect fscache change (bnc#880344) * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) * VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). * acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). * af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). * asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). * autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). * autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). * autofs4: make "autofs4_can_expire" idempotent (bnc#866130). * autofs4: remove a redundant assignment (bnc#866130). * autofs: fix lockref lookup (bnc#888591). * be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). * block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). * block: fix race between request completion and timeout handling (bnc#881051). * cdc-ether: clean packet filter upon probe (bnc#876017). * cpuset: Fix memory allocator deadlock (bnc#876590). * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. * crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). * dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). * dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). * dm-mpath: fix panic on deleting sg device (bnc#870161). * drm/ast: AST2000 cannot be detected correctly (bnc#895983). * drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). * drm/ast: Add missing entry to dclk_table[]. * drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). * drm/ast: initial DP501 support (v0.2) (bnc#871134). * drm/ast: open key before detect chips (bnc#895983). * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). * drm/i915: create functions for the "unclaimed register" checks (bnc#869055). * drm/i915: use FPGA_DBG for the "unclaimed register" checks (bnc#869055). * drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). * e1000e: enable support for new device IDs (bnc#885509). * fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). * hibernate: Disable in a signed modules environment (bnc#884333). * hugetlb: does not use ERR_PTR with VM_FAULT* values * ibmvscsi: Abort init sequence during error recovery (bnc#885382). * ibmvscsi: Add memory barriers for send / receive (bnc#885382). * inet: add a redirect generation id in inetpeer (bnc#860593). * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). * kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). * kernel: 3215 tty hang (bnc#891087, LTC#114562). * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). * kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). * kernel: sclp console tty reference counting (bnc#891087, LTC#115466). * kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). * md/raid6: avoid data corruption during recovery of double-degraded RAID6. * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). * memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() * mm, hugetlb: change variable name reservations to resv * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache * mm, hugetlb: defer freeing pages when gathering surplus pages * mm, hugetlb: do not use a page in page cache for cow optimization * mm, hugetlb: fix and clean-up node iteration code to alloc or free * mm, hugetlb: fix race in region tracking * mm, hugetlb: fix subpool accounting handling * mm, hugetlb: improve page-fault scalability * mm, hugetlb: improve, cleanup resv_map parameters * mm, hugetlb: move up the code which check availability of free huge page * mm, hugetlb: protect reserved pages when soft offlining a hugepage * mm, hugetlb: remove decrement_hugepage_resv_vma() * mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() * mm, hugetlb: remove resv_map_put * mm, hugetlb: remove useless check about mapping type * mm, hugetlb: return a reserved page to a reserved pool if failed * mm, hugetlb: trivial commenting fix * mm, hugetlb: unify region structure handling * mm, hugetlb: unify region structure handling kabi * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). * mm, hugetlb: use vma_resv_map() map types * mm, oom: fix badness score underflow (bnc#884582, bnc#884767). * mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). * mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). * net/mlx4_core: Load higher level modules according to ports type (bnc#887680). * net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). * net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). * net: fix checksumming features handling in output path (bnc#891259). * pagecache_limit: batch large nr_to_scan targets (bnc#895221). * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). * perf/core: Add weighted samples (bnc#876114). * perf/x86: Add flags to event constraints (bnc#876114). * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). * perf: Add generic memory sampling interface (bnc#876114). * qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). * qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). * qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). * qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). * qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). * qla2xxx: Set host can_queue value based on available resources (bnc#859840). * restore smp_mb() in unlock_new_inode() (bnc#890526). * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). * sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). * sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). * scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614). * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). * scsiback: correct grant page unmapping. * scsiback: fix retry handling in __report_luns(). * scsiback: free resources after error. * sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). * supported.conf: remove external from drivers/net/veth (bnc#889727) * supported.conf: support net/sched/act_police.ko (bnc#890426) * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). * tg3: Change nvram command timeout value to 50ms (bnc#855657). * tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). * tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). * usb: Does not enable LPM if the exit latency is zero (bnc#832309). * usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). * usbhid: fix PIXART optical mouse (bnc#888607). * uswsusp: Disable when module loading is restricted (bnc#884333). * vscsi: support larger transfer sizes (bnc#774818). * writeback: Do not sync data dirtied after sync start (bnc#833820). * x86 thermal: Delete power-limit-notification console messages (bnc#882317). * x86 thermal: Disable power limit notification interrupt by default (bnc#882317). * x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). * x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). * x86/UV: Add kdump to UV NMI handler (bnc#888847). * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). * x86/UV: Move NMI support (bnc#888847). * x86/UV: Update UV support for external NMI signals (bnc#888847). * x86/uv/nmi: Fix Sparse warnings (bnc#888847). * x86: Add check for number of available vectors before CPU down (bnc#887418). * x86: Lock down IO port access when module security is enabled (bnc#884333). * x86: Restrict MSR access when module loading is restricted (bnc#884333). Security Issues: * CVE-2013-1979 * CVE-2014-1739 * CVE-2014-2706 * CVE-2014-4027 * CVE-2014-4171 * CVE-2014-4508 * CVE-2014-4667 * CVE-2014-4943 * CVE-2014-5077 * CVE-2014-5471 * CVE-2014-5472 * CVE-2014-3153 * CVE-2014-6410 The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix various bugs and security issues. Following security bugs were fixed: CVE-2013-1979: The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application (bnc#816708). CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) The following non-security bugs were fixed: - ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). - ACPI: Limit access to custom_method (bnc#884333). - Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction when we does not find our extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a possible deadlock between scrub and transaction committing. - Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit "ret" in end_extent_writepage(). - Btrfs: free delayed node outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make device scan less noisy. - Btrfs: make sure there are not any read requests before stopping workers. - Btrfs: more efficient io tree navigation on wait_extent_bit. - Btrfs: output warning instead of error when loading free space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). - Btrfs: use right type to get real comparison. - Btrfs: wake up @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). - CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - CacheFiles: Make some debugging statements conditional (bnc#880344). - Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). - FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). - FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). - FS-Cache: Fix operation state management and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation (bnc#880344). - FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). - FS-Cache: Provide proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on object state (bnc#880344). - HID: usbhid: add always-poll quirk (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). - Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read delegation stateids in setattr (bnc#888968). - NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support in line with code going upstream - NFS: Use FS-Cache invalidation (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts (bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current should return "true" for an invalid stateid (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR access when module security is enabled (bnc#884333). - PCI: enable MPS "performance" setting to properly handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). - Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM errors during device suspend correctly (bnc#849123). - Update kabi files to reflect fscache change (bnc#880344) - VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). - af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). - autofs4: make "autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a redundant assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). - block: fix race between request completion and timeout handling (bnc#881051). - cdc-ether: clean packet filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. - crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). - dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). - dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on deleting sg device (bnc#870161). - drm/ast: Add missing entry to dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - drm/i915: create functions for the "unclaimed register" checks (bnc#869055). - drm/i915: use FPGA_DBG for the "unclaimed register" checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). - hibernate: Disable in a signed modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). - md/raid6: avoid data corruption during recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change variable name reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus pages - mm, hugetlb: do not use a page in page cache for cow optimization - mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up the code which check availability of free huge page - mm, hugetlb: protect reserved pages when soft offlining a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check about mapping type - mm, hugetlb: return a reserved page to a reserved pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb: unify region structure handling - mm, hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use vma_resv_map() map types - mm, oom: fix badness score underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). - net/mlx4_core: Load higher level modules according to ports type (bnc#887680). - net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). - net: fix checksumming features handling in output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue value based on available resources (bnc#859840). - restore smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix retry handling in __report_luns(). - scsiback: free resources after error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). - supported.conf: remove external from drivers/net/veth (bnc#889727) - supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram command timeout value to 50ms (bnc#855657). - tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). - usb: Does not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). - usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when module loading is restricted (bnc#884333). - vscsi: support larger transfer sizes (bnc#774818). - x86 thermal: Delete power-limit-notification console messages (bnc#882317). - x86 thermal: Disable power limit notification interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). - x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Lock down IO port access when module security is enabled (bnc#884333). - x86: Restrict MSR access when module loading is restricted (bnc#884333). Security Issues: * CVE-2013-1979 * CVE-2014-1739 * CVE-2014-2706 * CVE-2014-4027 * CVE-2014-4171 * CVE-2014-4508 * CVE-2014-4667 * CVE-2014-4943 * CVE-2014-5077 * CVE-2014-5471 * CVE-2014-5472 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Contraindications: Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-bigsmp-201409-9750 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-bigsmp-201409-9750 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-bigsmp-201409-9750 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-bigsmp-201409-9750 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): kernel-bigsmp-devel-3.0.101-0.40.1 - SUSE Linux Enterprise Server 11 SP3 (x86_64): iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83 kernel-bigsmp-3.0.101-0.40.1 kernel-bigsmp-base-3.0.101-0.40.1 kernel-bigsmp-devel-3.0.101-0.40.1 ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89 oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89 - SUSE Linux Enterprise High Availability Extension 11 SP3 (x86_64): cluster-network-kmp-bigsmp-1.4_3.0.101_0.40-2.27.98 drbd-kmp-bigsmp-8.4.4_3.0.101_0.40-0.22.64 gfs2-kmp-bigsmp-2_3.0.101_0.40-0.16.104 ocfs2-kmp-bigsmp-1.6_3.0.101_0.40-0.20.98 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): kernel-bigsmp-devel-3.0.101-0.40.1 - SLE 11 SERVER Unsupported Extras (x86_64): kernel-bigsmp-extra-3.0.101-0.40.1 References: http://support.novell.com/security/cve/CVE-2013-1979.html http://support.novell.com/security/cve/CVE-2014-1739.html http://support.novell.com/security/cve/CVE-2014-2706.html http://support.novell.com/security/cve/CVE-2014-4027.html http://support.novell.com/security/cve/CVE-2014-4171.html http://support.novell.com/security/cve/CVE-2014-4508.html http://support.novell.com/security/cve/CVE-2014-4667.html http://support.novell.com/security/cve/CVE-2014-4943.html http://support.novell.com/security/cve/CVE-2014-5077.html http://support.novell.com/security/cve/CVE-2014-5471.html http://support.novell.com/security/cve/CVE-2014-5472.html https://bugzilla.suse.com/show_bug.cgi?id=774818 https://bugzilla.suse.com/show_bug.cgi?id=806990 https://bugzilla.suse.com/show_bug.cgi?id=816708 https://bugzilla.suse.com/show_bug.cgi?id=826486 https://bugzilla.suse.com/show_bug.cgi?id=832309 https://bugzilla.suse.com/show_bug.cgi?id=849123 https://bugzilla.suse.com/show_bug.cgi?id=855657 https://bugzilla.suse.com/show_bug.cgi?id=859840 https://bugzilla.suse.com/show_bug.cgi?id=860441 https://bugzilla.suse.com/show_bug.cgi?id=860593 https://bugzilla.suse.com/show_bug.cgi?id=863586 https://bugzilla.suse.com/show_bug.cgi?id=866130 https://bugzilla.suse.com/show_bug.cgi?id=866615 https://bugzilla.suse.com/show_bug.cgi?id=866864 https://bugzilla.suse.com/show_bug.cgi?id=866911 https://bugzilla.suse.com/show_bug.cgi?id=869055 https://bugzilla.suse.com/show_bug.cgi?id=869934 https://bugzilla.suse.com/show_bug.cgi?id=870161 https://bugzilla.suse.com/show_bug.cgi?id=871797 https://bugzilla.suse.com/show_bug.cgi?id=876017 https://bugzilla.suse.com/show_bug.cgi?id=876055 https://bugzilla.suse.com/show_bug.cgi?id=876114 https://bugzilla.suse.com/show_bug.cgi?id=876590 https://bugzilla.suse.com/show_bug.cgi?id=879921 https://bugzilla.suse.com/show_bug.cgi?id=880344 https://bugzilla.suse.com/show_bug.cgi?id=880370 https://bugzilla.suse.com/show_bug.cgi?id=881051 https://bugzilla.suse.com/show_bug.cgi?id=881759 https://bugzilla.suse.com/show_bug.cgi?id=882317 https://bugzilla.suse.com/show_bug.cgi?id=882639 https://bugzilla.suse.com/show_bug.cgi?id=882804 https://bugzilla.suse.com/show_bug.cgi?id=882900 https://bugzilla.suse.com/show_bug.cgi?id=883376 https://bugzilla.suse.com/show_bug.cgi?id=883518 https://bugzilla.suse.com/show_bug.cgi?id=883724 https://bugzilla.suse.com/show_bug.cgi?id=884333 https://bugzilla.suse.com/show_bug.cgi?id=884582 https://bugzilla.suse.com/show_bug.cgi?id=884725 https://bugzilla.suse.com/show_bug.cgi?id=884767 https://bugzilla.suse.com/show_bug.cgi?id=885262 https://bugzilla.suse.com/show_bug.cgi?id=885382 https://bugzilla.suse.com/show_bug.cgi?id=885422 https://bugzilla.suse.com/show_bug.cgi?id=885509 https://bugzilla.suse.com/show_bug.cgi?id=886840 https://bugzilla.suse.com/show_bug.cgi?id=887082 https://bugzilla.suse.com/show_bug.cgi?id=887503 https://bugzilla.suse.com/show_bug.cgi?id=887608 https://bugzilla.suse.com/show_bug.cgi?id=887645 https://bugzilla.suse.com/show_bug.cgi?id=887680 https://bugzilla.suse.com/show_bug.cgi?id=888058 https://bugzilla.suse.com/show_bug.cgi?id=888105 https://bugzilla.suse.com/show_bug.cgi?id=888591 https://bugzilla.suse.com/show_bug.cgi?id=888607 https://bugzilla.suse.com/show_bug.cgi?id=888847 https://bugzilla.suse.com/show_bug.cgi?id=888849 https://bugzilla.suse.com/show_bug.cgi?id=888968 https://bugzilla.suse.com/show_bug.cgi?id=889061 https://bugzilla.suse.com/show_bug.cgi?id=889173 https://bugzilla.suse.com/show_bug.cgi?id=889451 https://bugzilla.suse.com/show_bug.cgi?id=889614 https://bugzilla.suse.com/show_bug.cgi?id=889727 https://bugzilla.suse.com/show_bug.cgi?id=890297 https://bugzilla.suse.com/show_bug.cgi?id=890426 https://bugzilla.suse.com/show_bug.cgi?id=890513 https://bugzilla.suse.com/show_bug.cgi?id=890526 https://bugzilla.suse.com/show_bug.cgi?id=891087 https://bugzilla.suse.com/show_bug.cgi?id=891259 https://bugzilla.suse.com/show_bug.cgi?id=891619 https://bugzilla.suse.com/show_bug.cgi?id=892200 https://bugzilla.suse.com/show_bug.cgi?id=892490 https://bugzilla.suse.com/show_bug.cgi?id=892723 https://bugzilla.suse.com/show_bug.cgi?id=893064 https://bugzilla.suse.com/show_bug.cgi?id=893496 https://bugzilla.suse.com/show_bug.cgi?id=893596 https://bugzilla.suse.com/show_bug.cgi?id=894200 http://download.suse.com/patch/finder/?keywords=dc5412c9dbb50ea612d1193ae55a8d38 http://download.suse.com/patch/finder/?keywords=e0773faf1a29419cf53084e7aa8fa6f1 From sle-updates at lists.suse.com Wed Oct 22 16:04:44 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 23 Oct 2014 00:04:44 +0200 (CEST) Subject: SUSE-RU-2014:1317-1: Recommended update for apache2 Message-ID: <20141022220444.B2C7F32257@maintenance.suse.de> SUSE Recommended Update: Recommended update for apache2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1317-1 Rating: low References: #894225 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for the Apache Web Server introduces directives to control two protocol options: * HttpContentLengthHeadZero: Allow responses to HEAD request with Content-Length of 0 * HttpExpectStrict: Allow the administrator to control whether clients must send "100-continue" MODULE_MAGIC_NUMBER_MINOR has been increased to 24, as this change is not forward-compatible. Modules built against this release might not work correctly with older releases of the Apache Web Server. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-apache2-9720 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-apache2-9720 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-apache2-9720 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): apache2-devel-2.2.12-1.50.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): apache2-2.2.12-1.50.1 apache2-doc-2.2.12-1.50.1 apache2-example-pages-2.2.12-1.50.1 apache2-prefork-2.2.12-1.50.1 apache2-utils-2.2.12-1.50.1 apache2-worker-2.2.12-1.50.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): apache2-2.2.12-1.50.1 apache2-doc-2.2.12-1.50.1 apache2-example-pages-2.2.12-1.50.1 apache2-prefork-2.2.12-1.50.1 apache2-utils-2.2.12-1.50.1 apache2-worker-2.2.12-1.50.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): apache2-2.2.12-1.50.1 apache2-doc-2.2.12-1.50.1 apache2-example-pages-2.2.12-1.50.1 apache2-prefork-2.2.12-1.50.1 apache2-utils-2.2.12-1.50.1 apache2-worker-2.2.12-1.50.1 References: https://bugzilla.suse.com/show_bug.cgi?id=894225 http://download.suse.com/patch/finder/?keywords=23a667ba7a5cf58a3740a2fb2687ba13 From sle-updates at lists.suse.com Wed Oct 22 17:04:50 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 23 Oct 2014 01:04:50 +0200 (CEST) Subject: SUSE-SU-2014:1318-1: moderate: Security update for Xen Message-ID: <20141022230451.03FBA32252@maintenance.suse.de> SUSE Security Update: Security update for Xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1318-1 Rating: moderate References: #798770 #833483 #842006 #858178 #862608 #864801 #865682 #867910 #878841 #880751 #881900 #882092 #891539 #895798 #895799 #895802 #897657 Cross-References: CVE-2013-4344 CVE-2013-4540 CVE-2014-2599 CVE-2014-3967 CVE-2014-3968 CVE-2014-4021 CVE-2014-7154 CVE-2014-7155 CVE-2014-7156 CVE-2014-7188 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has 7 fixes is now available. Description: The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to fix various bugs and security issues. The following security issues have been fixed: * XSA-108: CVE-2014-7188: Improper MSR range used for x2APIC emulation (bnc#897657) * XSA-106: CVE-2014-7156: Missing privilege level checks in x86 emulation of software interrupts (bnc#895802) * XSA-105: CVE-2014-7155: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation (bnc#895799) * XSA-104: CVE-2014-7154: Race condition in HVMOP_track_dirty_vram (bnc#895798) * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests (bnc#880751) * XSA-96: CVE-2014-3967, CVE-2014-3968: Vulnerabilities in HVM MSI injection (bnc#878841) * XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not preemptible (bnc#867910) * XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer overflow (bnc#842006) * CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load (bnc#864801) The following non-security issues have been fixed: * xend: Fix netif convertToDeviceNumber for running domains (bnc#891539) * Installing SLES12 as a VM on SLES11 SP3 fails because of btrfs in the VM (bnc#882092) * XEN kernel panic do_device_not_available() (bnc#881900) * Boot Failure with xen kernel in UEFI mode with error "No memory for trampoline" (bnc#833483) * SLES 11 SP3 vm-install should get RHEL 7 support when released (bnc#862608) * SLES 11 SP3 XEN kiso version cause softlockup on 8 blades npar(480 cpu) (bnc#858178) * Local attach support for PHY backends using scripts local_attach_support_for_phy.patch (bnc#865682) * Improve multipath support for npiv devices block-npiv (bnc#798770) Security Issues: * CVE-2013-4344 * CVE-2013-4540 * CVE-2014-2599 * CVE-2014-3967 * CVE-2014-3968 * CVE-2014-4021 * CVE-2014-7154 * CVE-2014-7155 * CVE-2014-7156 * CVE-2014-7188 Indications: Everyone using the Xen hypervisor should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-xen-201409-9828 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-xen-201409-9828 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-xen-201409-9828 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): xen-devel-4.2.4_04-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64): xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 xen-libs-4.2.4_04-0.9.1 xen-tools-domU-4.2.4_04-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (x86_64): xen-4.2.4_04-0.9.1 xen-doc-html-4.2.4_04-0.9.1 xen-doc-pdf-4.2.4_04-0.9.1 xen-libs-32bit-4.2.4_04-0.9.1 xen-tools-4.2.4_04-0.9.1 - SUSE Linux Enterprise Server 11 SP3 (i586): xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 xen-libs-4.2.4_04-0.9.1 xen-tools-domU-4.2.4_04-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): xen-4.2.4_04-0.9.1 xen-doc-html-4.2.4_04-0.9.1 xen-doc-pdf-4.2.4_04-0.9.1 xen-libs-32bit-4.2.4_04-0.9.1 xen-tools-4.2.4_04-0.9.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586): xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 References: http://support.novell.com/security/cve/CVE-2013-4344.html http://support.novell.com/security/cve/CVE-2013-4540.html http://support.novell.com/security/cve/CVE-2014-2599.html http://support.novell.com/security/cve/CVE-2014-3967.html http://support.novell.com/security/cve/CVE-2014-3968.html http://support.novell.com/security/cve/CVE-2014-4021.html http://support.novell.com/security/cve/CVE-2014-7154.html http://support.novell.com/security/cve/CVE-2014-7155.html http://support.novell.com/security/cve/CVE-2014-7156.html http://support.novell.com/security/cve/CVE-2014-7188.html https://bugzilla.suse.com/show_bug.cgi?id=798770 https://bugzilla.suse.com/show_bug.cgi?id=833483 https://bugzilla.suse.com/show_bug.cgi?id=842006 https://bugzilla.suse.com/show_bug.cgi?id=858178 https://bugzilla.suse.com/show_bug.cgi?id=862608 https://bugzilla.suse.com/show_bug.cgi?id=864801 https://bugzilla.suse.com/show_bug.cgi?id=865682 https://bugzilla.suse.com/show_bug.cgi?id=867910 https://bugzilla.suse.com/show_bug.cgi?id=878841 https://bugzilla.suse.com/show_bug.cgi?id=880751 https://bugzilla.suse.com/show_bug.cgi?id=881900 https://bugzilla.suse.com/show_bug.cgi?id=882092 https://bugzilla.suse.com/show_bug.cgi?id=891539 https://bugzilla.suse.com/show_bug.cgi?id=895798 https://bugzilla.suse.com/show_bug.cgi?id=895799 https://bugzilla.suse.com/show_bug.cgi?id=895802 https://bugzilla.suse.com/show_bug.cgi?id=897657 http://download.suse.com/patch/finder/?keywords=04044470a0f95da5c719e02715587524 From sle-updates at lists.suse.com Wed Oct 22 17:08:31 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 23 Oct 2014 01:08:31 +0200 (CEST) Subject: SUSE-SU-2014:1319-1: important: Security update for Linux kernel Message-ID: <20141022230831.98B3C32252@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1319-1 Rating: important References: #774818 #806990 #816708 #826486 #832309 #833820 #849123 #855657 #859840 #860441 #860593 #863586 #866130 #866615 #866864 #866911 #869055 #869934 #870161 #871134 #871797 #876017 #876055 #876114 #876590 #879304 #879921 #880344 #880370 #880892 #881051 #881759 #882317 #882639 #882804 #882900 #883096 #883376 #883518 #883724 #884333 #884582 #884725 #884767 #885262 #885382 #885422 #885509 #886840 #887082 #887418 #887503 #887608 #887645 #887680 #888058 #888105 #888591 #888607 #888847 #888849 #888968 #889061 #889173 #889451 #889614 #889727 #890297 #890426 #890513 #890526 #891087 #891259 #891281 #891619 #891746 #892200 #892490 #892723 #893064 #893496 #893596 #894200 #895221 #895608 #895680 #895983 #896689 Cross-References: CVE-2013-1979 CVE-2014-1739 CVE-2014-2706 CVE-2014-3153 CVE-2014-4027 CVE-2014-4171 CVE-2014-4508 CVE-2014-4667 CVE-2014-4943 CVE-2014-5077 CVE-2014-5471 CVE-2014-5472 CVE-2014-6410 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Real Time Extension 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 13 vulnerabilities and has 75 fixes is now available. It includes two new package versions. Description: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). * CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). * CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). * CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). * CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) * CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) * CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) * CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) * CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892) * CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689) The following non-security bugs have been fixed: * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). * ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). * ACPI: Limit access to custom_method (bnc#884333). * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). * Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). * Add secure_modules() call (bnc#884333). * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). * Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. * Btrfs: Return EXDEV for cross file system snapshot. * Btrfs: abort the transaction when we does not find our extent ref. * Btrfs: avoid warning bomb of btrfs_invalidate_inodes. * Btrfs: cancel scrub on transaction abortion. * Btrfs: correctly set profile flags on seqlock retry. * Btrfs: does not check nodes for extent items. * Btrfs: fix a possible deadlock between scrub and transaction committing. * Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). * Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). * Btrfs: fix double free in find_lock_delalloc_range. * Btrfs: fix possible memory leak in btrfs_create_tree(). * Btrfs: fix use of uninit "ret" in end_extent_writepage(). * Btrfs: free delayed node outside of root->inode_lock (bnc#866864). * Btrfs: make DEV_INFO ioctl available to anyone. * Btrfs: make FS_INFO ioctl available to anyone. * Btrfs: make device scan less noisy. * Btrfs: make sure there are not any read requests before stopping workers. * Btrfs: more efficient io tree navigation on wait_extent_bit. * Btrfs: output warning instead of error when loading free space cache failed. * Btrfs: retrieve more info from FS_INFO ioctl. * Btrfs: return EPERM when deleting a default subvolume (bnc#869934). * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * Btrfs: use right type to get real comparison. * Btrfs: wake up @scrub_pause_wait as much as we can. * Btrfs: wake up transaction thread upon remount. * CacheFiles: Add missing retrieval completions (bnc#880344). * CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). * CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). * CacheFiles: Fix the marking of cached pages (bnc#880344). * CacheFiles: Implement invalidation (bnc#880344). * CacheFiles: Make some debugging statements conditional (bnc#880344). * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). * FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). * FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). * FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). * FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). * FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). * FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). * FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). * FS-Cache: Fix operation state management and accounting (bnc#880344). * FS-Cache: Fix signal handling during waits (bnc#880344). * FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). * FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). * FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). * FS-Cache: Mark cancellation of in-progress operation (bnc#880344). * FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). * FS-Cache: Provide proper invalidation (bnc#880344). * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). * FS-Cache: Uninline fscache_object_init() (bnc#880344). * FS-Cache: Wrap checks on object state (bnc#880344). * HID: usbhid: add always-poll quirk (bnc#888607). * HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). * Ignore "flags" change to event_constraint (bnc#876114). * Ignore data_src/weight changes to perf_sample_data (bnc#876114). * NFS: Allow more operations in an NFSv4.1 request (bnc#890513). * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). * NFS: Does not copy read delegation stateids in setattr (bnc#888968). * NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) * NFS: Fixes for NFS RCU-walk support in line with code going upstream * NFS: Use FS-Cache invalidation (bnc#880344). * NFS: allow lockless access to access_cache (bnc#866130). * NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts (bnc#888591). * NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). * NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). * NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). * NFS: support RCU_WALK in nfs_permission() (bnc#866130). * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). * NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). * NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). * NFSv4: Add a helper for encoding opaque data (bnc#888968). * NFSv4: Add a helper for encoding stateids (bnc#888968). * NFSv4: Add helpers for basic copying of stateids (bnc#888968). * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). * NFSv4: Rename nfs4_copy_stateid() (bnc#888968). * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). * NFSv4: Simplify the struct nfs4_stateid (bnc#888968). * NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). * NFSv4: nfs4_stateid_is_current should return "true" for an invalid stateid (bnc#888968). * One more fix for kABI breakage. * PCI: Lock down BAR access when module security is enabled (bnc#884333). * PCI: enable MPS "performance" setting to properly handle bridge MPS (bnc#883376). * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). * PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). * PM / Hibernate: Implement position keeping in radix tree (bnc#860441). * PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). * PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). * Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). * Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). * USB: handle LPM errors during device suspend correctly (bnc#849123). * Update kabi files to reflect fscache change (bnc#880344) * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) * VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). * acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). * af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). * asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). * autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). * autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). * autofs4: make "autofs4_can_expire" idempotent (bnc#866130). * autofs4: remove a redundant assignment (bnc#866130). * autofs: fix lockref lookup (bnc#888591). * be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). * block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). * block: fix race between request completion and timeout handling (bnc#881051). * cdc-ether: clean packet filter upon probe (bnc#876017). * cpuset: Fix memory allocator deadlock (bnc#876590). * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. * crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). * dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). * dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). * dm-mpath: fix panic on deleting sg device (bnc#870161). * drm/ast: AST2000 cannot be detected correctly (bnc#895983). * drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). * drm/ast: Add missing entry to dclk_table[]. * drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). * drm/ast: initial DP501 support (v0.2) (bnc#871134). * drm/ast: open key before detect chips (bnc#895983). * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). * drm/i915: create functions for the "unclaimed register" checks (bnc#869055). * drm/i915: use FPGA_DBG for the "unclaimed register" checks (bnc#869055). * drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). * e1000e: enable support for new device IDs (bnc#885509). * fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). * hibernate: Disable in a signed modules environment (bnc#884333). * hugetlb: does not use ERR_PTR with VM_FAULT* values * ibmvscsi: Abort init sequence during error recovery (bnc#885382). * ibmvscsi: Add memory barriers for send / receive (bnc#885382). * inet: add a redirect generation id in inetpeer (bnc#860593). * inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). * kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). * kernel: 3215 tty hang (bnc#891087, LTC#114562). * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). * kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). * kernel: sclp console tty reference counting (bnc#891087, LTC#115466). * kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). * md/raid6: avoid data corruption during recovery of double-degraded RAID6. * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). * memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() * mm, hugetlb: change variable name reservations to resv * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache * mm, hugetlb: defer freeing pages when gathering surplus pages * mm, hugetlb: do not use a page in page cache for cow optimization * mm, hugetlb: fix and clean-up node iteration code to alloc or free * mm, hugetlb: fix race in region tracking * mm, hugetlb: fix subpool accounting handling * mm, hugetlb: improve page-fault scalability * mm, hugetlb: improve, cleanup resv_map parameters * mm, hugetlb: move up the code which check availability of free huge page * mm, hugetlb: protect reserved pages when soft offlining a hugepage * mm, hugetlb: remove decrement_hugepage_resv_vma() * mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() * mm, hugetlb: remove resv_map_put * mm, hugetlb: remove useless check about mapping type * mm, hugetlb: return a reserved page to a reserved pool if failed * mm, hugetlb: trivial commenting fix * mm, hugetlb: unify region structure handling * mm, hugetlb: unify region structure handling kabi * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). * mm, hugetlb: use vma_resv_map() map types * mm, oom: fix badness score underflow (bnc#884582, bnc#884767). * mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). * mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). * net/mlx4_core: Load higher level modules according to ports type (bnc#887680). * net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). * net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). * net: fix checksumming features handling in output path (bnc#891259). * pagecache_limit: batch large nr_to_scan targets (bnc#895221). * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). * perf/core: Add weighted samples (bnc#876114). * perf/x86: Add flags to event constraints (bnc#876114). * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). * perf: Add generic memory sampling interface (bnc#876114). * qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). * qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). * qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). * qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). * qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). * qla2xxx: Set host can_queue value based on available resources (bnc#859840). * restore smp_mb() in unlock_new_inode() (bnc#890526). * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). * sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). * sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). * scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614). * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). * scsiback: correct grant page unmapping. * scsiback: fix retry handling in __report_luns(). * scsiback: free resources after error. * sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). * supported.conf: remove external from drivers/net/veth (bnc#889727) * supported.conf: support net/sched/act_police.ko (bnc#890426) * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). * tg3: Change nvram command timeout value to 50ms (bnc#855657). * tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). * tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). * usb: Does not enable LPM if the exit latency is zero (bnc#832309). * usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). * usbhid: fix PIXART optical mouse (bnc#888607). * uswsusp: Disable when module loading is restricted (bnc#884333). * vscsi: support larger transfer sizes (bnc#774818). * writeback: Do not sync data dirtied after sync start (bnc#833820). * x86 thermal: Delete power-limit-notification console messages (bnc#882317). * x86 thermal: Disable power limit notification interrupt by default (bnc#882317). * x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). * x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). * x86/UV: Add kdump to UV NMI handler (bnc#888847). * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). * x86/UV: Move NMI support (bnc#888847). * x86/UV: Update UV support for external NMI signals (bnc#888847). * x86/uv/nmi: Fix Sparse warnings (bnc#888847). * x86: Add check for number of available vectors before CPU down (bnc#887418). * x86: Lock down IO port access when module security is enabled (bnc#884333). * x86: Restrict MSR access when module loading is restricted (bnc#884333). Security Issues: * CVE-2013-1979 * CVE-2014-1739 * CVE-2014-2706 * CVE-2014-4027 * CVE-2014-4171 * CVE-2014-4508 * CVE-2014-4667 * CVE-2014-4943 * CVE-2014-5077 * CVE-2014-5471 * CVE-2014-5472 * CVE-2014-3153 * CVE-2014-6410 The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was updated to fix various bugs and security issues. Following security bugs were fixed: CVE-2013-1979: The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application (bnc#816708). CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804). CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518). CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (bnc#883724). CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet (bnc#885422). CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket (bnc#887082). CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction (bnc#889173). CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry. (bnc#892490) CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry. (bnc#892490) CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. (bnc#882639) CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (bnc#880892) CVE-2014-6410: Avoid infinite loop when processing indirect ICBs (bnc#896689) The following non-security bugs were fixed: - ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset register is implemented in system memory (bnc#882900). - ACPI: Limit access to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746). - Add option to automatically enforce module signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down functions for UEFI secure boot Also updated series.conf and removed old patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction when we does not find our extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a possible deadlock between scrub and transaction committing. - Btrfs: fix corruption after write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit "ret" in end_extent_writepage(). - Btrfs: free delayed node outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make device scan less noisy. - Btrfs: make sure there are not any read requests before stopping workers. - Btrfs: more efficient io tree navigation on wait_extent_bit. - Btrfs: output warning instead of error when loading free space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). - Btrfs: use right type to get real comparison. - Btrfs: wake up @scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). - CacheFiles: Does not try to dump the index key if the cookie has been cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - CacheFiles: Make some debugging statements conditional (bnc#880344). - Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - FS-Cache: Add transition to handle invalidate immediately after lookup (bnc#880344). - FS-Cache: Check that there are no read ops when cookie relinquished (bnc#880344). - FS-Cache: Clear remaining page count on retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state machine to have separate work and wait states (bnc#880344). - FS-Cache: Fix operation state management and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise the object event mask with the calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of in-progress operation (bnc#880344). - FS-Cache: One of the write operation paths doeses not set the object state (bnc#880344). - FS-Cache: Provide proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on object state (bnc#880344). - HID: usbhid: add always-poll quirk (bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). - Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read delegation stateids in setattr (bnc#888968). - NFS: Does not use a delegation to open a file when returning that delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support in line with code going upstream - NFS: Use FS-Cache invalidation (bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts (bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data (bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current should return "true" for an invalid stateid (bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR access when module security is enabled (bnc#884333). - PCI: enable MPS "performance" setting to properly handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when module loading is restricted (bnc#884333). - Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM errors during device suspend correctly (bnc#849123). - Update kabi files to reflect fscache change (bnc#880344) - Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted (bnc#884333). - af_iucv: correct cleanup if listen backlog is full (bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out of autofs4_expire_indirect (bnc#866130). - autofs4: make "autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a redundant assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - block: add cond_resched() to potentially long running ioctl discard loop (bnc#884725). - block: fix race between request completion and timeout handling (bnc#881051). - cdc-ether: clean packet filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have them, but some are FIPS certified, with some kernel support. - crypto: fips - only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode (bnc#889451). - dasd: validate request size before building CCW/TCW (bnc#891087, LTC#114068). - dm mpath: fix race condition between multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) (bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - drm/i915: create functions for the "unclaimed register" checks (bnc#869055). - drm/i915: use FPGA_DBG for the "unclaimed register" checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory (bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). - hibernate: Disable in a signed modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if the kernel enforces module loading restrictions (bnc#884333). - md/raid6: avoid data corruption during recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change variable name reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus pages - mm, hugetlb: do not use a page in page cache for cow optimization - mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up the code which check availability of free huge page - mm, hugetlb: protect reserved pages when soft offlining a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check about mapping type - mm, hugetlb: return a reserved page to a reserved pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb: unify region structure handling - mm, hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars instead of int in region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use vma_resv_map() map types - mm, oom: fix badness score underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). - net/mlx4_core: Load higher level modules according to ports type (bnc#887680). - net/mlx4_core: Load the IB driver when the device supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058). - net: fix checksumming features handling in output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets (bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples (bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the SCSI error handler if the command is not found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command for outstanding commands during cleanup when only firmware is alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue value based on available resources (bnc#859840). - restore smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix retry handling in __report_luns(). - scsiback: free resources after error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache (bnc#866130). - supported.conf: remove external from drivers/net/veth (bnc#889727) - supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram command timeout value to 50ms (bnc#855657). - tg3: Override clock, link aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed during boot code load (bnc#855657). - usb: Does not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive debounce failures of the same port (bnc#888105). - usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when module loading is restricted (bnc#884333). - vscsi: support larger transfer sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start (bnc#833820). - x86 thermal: Delete power-limit-notification console messages (bnc#882317). - x86 thermal: Disable power limit notification interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number of available vectors before CPU down (bnc#887418). - x86: Lock down IO port access when module security is enabled (bnc#884333). - x86: Restrict MSR access when module loading is restricted (bnc#884333). Security Issues: * CVE-2013-1979 * CVE-2014-1739 * CVE-2014-2706 * CVE-2014-4027 * CVE-2014-4171 * CVE-2014-4508 * CVE-2014-4667 * CVE-2014-4943 * CVE-2014-5077 * CVE-2014-5471 * CVE-2014-5472 * CVE-2014-3153 * CVE-2014-6410 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Contraindications: Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-9746 slessp3-kernel-9751 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-9746 slessp3-kernel-9747 slessp3-kernel-9748 slessp3-kernel-9749 slessp3-kernel-9751 - SUSE Linux Enterprise Real Time Extension 11 SP3: zypper in -t patch slertesp3-kernel-9772 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-9746 slehasp3-kernel-9747 slehasp3-kernel-9748 slehasp3-kernel-9749 slehasp3-kernel-9751 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-9746 sledsp3-kernel-9751 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.40.1 kernel-default-base-3.0.101-0.40.1 kernel-default-devel-3.0.101-0.40.1 kernel-source-3.0.101-0.40.1 kernel-syms-3.0.101-0.40.1 kernel-trace-3.0.101-0.40.1 kernel-trace-base-3.0.101-0.40.1 kernel-trace-devel-3.0.101-0.40.1 kernel-xen-devel-3.0.101-0.40.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.40.1 kernel-pae-base-3.0.101-0.40.1 kernel-pae-devel-3.0.101-0.40.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.40.1 kernel-default-base-3.0.101-0.40.1 kernel-default-devel-3.0.101-0.40.1 kernel-source-3.0.101-0.40.1 kernel-syms-3.0.101-0.40.1 kernel-trace-3.0.101-0.40.1 kernel-trace-base-3.0.101-0.40.1 kernel-trace-devel-3.0.101-0.40.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-ec2-3.0.101-0.40.1 kernel-ec2-base-3.0.101-0.40.1 kernel-ec2-devel-3.0.101-0.40.1 kernel-xen-3.0.101-0.40.1 kernel-xen-base-3.0.101-0.40.1 kernel-xen-devel-3.0.101-0.40.1 xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 - SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]: kernel-default-man-3.0.101-0.40.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]: kernel-ppc64-3.0.101-0.40.1 kernel-ppc64-base-3.0.101-0.40.1 kernel-ppc64-devel-3.0.101-0.40.1 - SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.40.1 kernel-pae-base-3.0.101-0.40.1 kernel-pae-devel-3.0.101-0.40.1 xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 - SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]: cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99 cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99 drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65 drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65 iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84 iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84 kernel-rt-3.0.101.rt130-0.28.1 kernel-rt-base-3.0.101.rt130-0.28.1 kernel-rt-devel-3.0.101.rt130-0.28.1 kernel-rt_trace-3.0.101.rt130-0.28.1 kernel-rt_trace-base-3.0.101.rt130-0.28.1 kernel-rt_trace-devel-3.0.101.rt130-0.28.1 kernel-source-rt-3.0.101.rt130-0.28.1 kernel-syms-rt-3.0.101.rt130-0.28.1 lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75 lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75 ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99 ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99 ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90 ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.101_0.40-2.27.98 cluster-network-kmp-trace-1.4_3.0.101_0.40-2.27.98 gfs2-kmp-default-2_3.0.101_0.40-0.16.104 gfs2-kmp-trace-2_3.0.101_0.40-0.16.104 ocfs2-kmp-default-1.6_3.0.101_0.40-0.20.98 ocfs2-kmp-trace-1.6_3.0.101_0.40-0.20.98 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.101_0.40-2.27.98 gfs2-kmp-xen-2_3.0.101_0.40-0.16.104 ocfs2-kmp-xen-1.6_3.0.101_0.40-0.20.98 - SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.101_0.40-2.27.98 gfs2-kmp-ppc64-2_3.0.101_0.40-0.16.104 ocfs2-kmp-ppc64-1.6_3.0.101_0.40-0.20.98 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586): cluster-network-kmp-pae-1.4_3.0.101_0.40-2.27.98 gfs2-kmp-pae-2_3.0.101_0.40-0.16.104 ocfs2-kmp-pae-1.6_3.0.101_0.40-0.20.98 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.40.1 kernel-default-base-3.0.101-0.40.1 kernel-default-devel-3.0.101-0.40.1 kernel-default-extra-3.0.101-0.40.1 kernel-source-3.0.101-0.40.1 kernel-syms-3.0.101-0.40.1 kernel-trace-devel-3.0.101-0.40.1 kernel-xen-3.0.101-0.40.1 kernel-xen-base-3.0.101-0.40.1 kernel-xen-devel-3.0.101-0.40.1 kernel-xen-extra-3.0.101-0.40.1 xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 - SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.40.1 kernel-pae-base-3.0.101-0.40.1 kernel-pae-devel-3.0.101-0.40.1 kernel-pae-extra-3.0.101-0.40.1 xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-0.40.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-3.0.101-0.40.1 - SLE 11 SERVER Unsupported Extras (ppc64): kernel-ppc64-extra-3.0.101-0.40.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-3.0.101-0.40.1 References: http://support.novell.com/security/cve/CVE-2013-1979.html http://support.novell.com/security/cve/CVE-2014-1739.html http://support.novell.com/security/cve/CVE-2014-2706.html http://support.novell.com/security/cve/CVE-2014-3153.html http://support.novell.com/security/cve/CVE-2014-4027.html http://support.novell.com/security/cve/CVE-2014-4171.html http://support.novell.com/security/cve/CVE-2014-4508.html http://support.novell.com/security/cve/CVE-2014-4667.html http://support.novell.com/security/cve/CVE-2014-4943.html http://support.novell.com/security/cve/CVE-2014-5077.html http://support.novell.com/security/cve/CVE-2014-5471.html http://support.novell.com/security/cve/CVE-2014-5472.html http://support.novell.com/security/cve/CVE-2014-6410.html https://bugzilla.suse.com/show_bug.cgi?id=774818 https://bugzilla.suse.com/show_bug.cgi?id=806990 https://bugzilla.suse.com/show_bug.cgi?id=816708 https://bugzilla.suse.com/show_bug.cgi?id=826486 https://bugzilla.suse.com/show_bug.cgi?id=832309 https://bugzilla.suse.com/show_bug.cgi?id=833820 https://bugzilla.suse.com/show_bug.cgi?id=849123 https://bugzilla.suse.com/show_bug.cgi?id=855657 https://bugzilla.suse.com/show_bug.cgi?id=859840 https://bugzilla.suse.com/show_bug.cgi?id=860441 https://bugzilla.suse.com/show_bug.cgi?id=860593 https://bugzilla.suse.com/show_bug.cgi?id=863586 https://bugzilla.suse.com/show_bug.cgi?id=866130 https://bugzilla.suse.com/show_bug.cgi?id=866615 https://bugzilla.suse.com/show_bug.cgi?id=866864 https://bugzilla.suse.com/show_bug.cgi?id=866911 https://bugzilla.suse.com/show_bug.cgi?id=869055 https://bugzilla.suse.com/show_bug.cgi?id=869934 https://bugzilla.suse.com/show_bug.cgi?id=870161 https://bugzilla.suse.com/show_bug.cgi?id=871134 https://bugzilla.suse.com/show_bug.cgi?id=871797 https://bugzilla.suse.com/show_bug.cgi?id=876017 https://bugzilla.suse.com/show_bug.cgi?id=876055 https://bugzilla.suse.com/show_bug.cgi?id=876114 https://bugzilla.suse.com/show_bug.cgi?id=876590 https://bugzilla.suse.com/show_bug.cgi?id=879304 https://bugzilla.suse.com/show_bug.cgi?id=879921 https://bugzilla.suse.com/show_bug.cgi?id=880344 https://bugzilla.suse.com/show_bug.cgi?id=880370 https://bugzilla.suse.com/show_bug.cgi?id=880892 https://bugzilla.suse.com/show_bug.cgi?id=881051 https://bugzilla.suse.com/show_bug.cgi?id=881759 https://bugzilla.suse.com/show_bug.cgi?id=882317 https://bugzilla.suse.com/show_bug.cgi?id=882639 https://bugzilla.suse.com/show_bug.cgi?id=882804 https://bugzilla.suse.com/show_bug.cgi?id=882900 https://bugzilla.suse.com/show_bug.cgi?id=883096 https://bugzilla.suse.com/show_bug.cgi?id=883376 https://bugzilla.suse.com/show_bug.cgi?id=883518 https://bugzilla.suse.com/show_bug.cgi?id=883724 https://bugzilla.suse.com/show_bug.cgi?id=884333 https://bugzilla.suse.com/show_bug.cgi?id=884582 https://bugzilla.suse.com/show_bug.cgi?id=884725 https://bugzilla.suse.com/show_bug.cgi?id=884767 https://bugzilla.suse.com/show_bug.cgi?id=885262 https://bugzilla.suse.com/show_bug.cgi?id=885382 https://bugzilla.suse.com/show_bug.cgi?id=885422 https://bugzilla.suse.com/show_bug.cgi?id=885509 https://bugzilla.suse.com/show_bug.cgi?id=886840 https://bugzilla.suse.com/show_bug.cgi?id=887082 https://bugzilla.suse.com/show_bug.cgi?id=887418 https://bugzilla.suse.com/show_bug.cgi?id=887503 https://bugzilla.suse.com/show_bug.cgi?id=887608 https://bugzilla.suse.com/show_bug.cgi?id=887645 https://bugzilla.suse.com/show_bug.cgi?id=887680 https://bugzilla.suse.com/show_bug.cgi?id=888058 https://bugzilla.suse.com/show_bug.cgi?id=888105 https://bugzilla.suse.com/show_bug.cgi?id=888591 https://bugzilla.suse.com/show_bug.cgi?id=888607 https://bugzilla.suse.com/show_bug.cgi?id=888847 https://bugzilla.suse.com/show_bug.cgi?id=888849 https://bugzilla.suse.com/show_bug.cgi?id=888968 https://bugzilla.suse.com/show_bug.cgi?id=889061 https://bugzilla.suse.com/show_bug.cgi?id=889173 https://bugzilla.suse.com/show_bug.cgi?id=889451 https://bugzilla.suse.com/show_bug.cgi?id=889614 https://bugzilla.suse.com/show_bug.cgi?id=889727 https://bugzilla.suse.com/show_bug.cgi?id=890297 https://bugzilla.suse.com/show_bug.cgi?id=890426 https://bugzilla.suse.com/show_bug.cgi?id=890513 https://bugzilla.suse.com/show_bug.cgi?id=890526 https://bugzilla.suse.com/show_bug.cgi?id=891087 https://bugzilla.suse.com/show_bug.cgi?id=891259 https://bugzilla.suse.com/show_bug.cgi?id=891281 https://bugzilla.suse.com/show_bug.cgi?id=891619 https://bugzilla.suse.com/show_bug.cgi?id=891746 https://bugzilla.suse.com/show_bug.cgi?id=892200 https://bugzilla.suse.com/show_bug.cgi?id=892490 https://bugzilla.suse.com/show_bug.cgi?id=892723 https://bugzilla.suse.com/show_bug.cgi?id=893064 https://bugzilla.suse.com/show_bug.cgi?id=893496 https://bugzilla.suse.com/show_bug.cgi?id=893596 https://bugzilla.suse.com/show_bug.cgi?id=894200 https://bugzilla.suse.com/show_bug.cgi?id=895221 https://bugzilla.suse.com/show_bug.cgi?id=895608 https://bugzilla.suse.com/show_bug.cgi?id=895680 https://bugzilla.suse.com/show_bug.cgi?id=895983 https://bugzilla.suse.com/show_bug.cgi?id=896689 http://download.suse.com/patch/finder/?keywords=01c0bdf9329bf1fbfc034fc009538fd3 http://download.suse.com/patch/finder/?keywords=1439dbce4e4c9644db358f7531923fbe http://download.suse.com/patch/finder/?keywords=1a668c9859986c2300a5f27acf2d3be9 http://download.suse.com/patch/finder/?keywords=4af5f794a265afdfe45a95f7032b5e85 http://download.suse.com/patch/finder/?keywords=5e4143f9e1829ed4b39a7eccffaa4cf3 http://download.suse.com/patch/finder/?keywords=81ea8f0b23808daa3ce30dda8a9f5765 http://download.suse.com/patch/finder/?keywords=9a4508f548dca82be59620eeabed6a12 http://download.suse.com/patch/finder/?keywords=9f2f8b759827a980e4f998aef659fa08 http://download.suse.com/patch/finder/?keywords=c2937e35f763f2736ed1acf1055ec575 http://download.suse.com/patch/finder/?keywords=ec3b4fdfc28b3e5b31314cd6b64cee6f http://download.suse.com/patch/finder/?keywords=fe96acccaeb363ead4fc832ed39f05b7 From sle-updates at lists.suse.com Thu Oct 23 13:04:39 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 23 Oct 2014 21:04:39 +0200 (CEST) Subject: SUSE-SU-2014:1321-1: Security update for perl Message-ID: <20141023190439.8AFDC32257@maintenance.suse.de> SUSE Security Update: Security update for perl ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1321-1 Rating: low References: #838333 #896715 Cross-References: CVE-2014-4330 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update fixes a memory leak and an infinite recursion in Data::Dumper. (CVE-2014-4330) Security Issues: * CVE-2014-4330 Indications: Everybody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-perl-9858 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-perl-9858 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-perl-9858 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-perl-9858 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64): perl-base-32bit-5.10.0-64.70.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): perl-5.10.0-64.70.1 perl-Module-Build-0.2808.01-0.70.1 perl-Test-Simple-0.72-0.70.1 perl-base-5.10.0-64.70.1 perl-doc-5.10.0-64.70.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): perl-32bit-5.10.0-64.70.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): perl-5.10.0-64.70.1 perl-Module-Build-0.2808.01-0.70.1 perl-Test-Simple-0.72-0.70.1 perl-base-5.10.0-64.70.1 perl-doc-5.10.0-64.70.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): perl-32bit-5.10.0-64.70.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): perl-x86-5.10.0-64.70.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): perl-5.10.0-64.70.1 perl-Module-Build-0.2808.01-0.70.1 perl-Test-Simple-0.72-0.70.1 perl-base-5.10.0-64.70.1 perl-doc-5.10.0-64.70.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): perl-32bit-5.10.0-64.70.1 References: http://support.novell.com/security/cve/CVE-2014-4330.html https://bugzilla.suse.com/show_bug.cgi?id=838333 https://bugzilla.suse.com/show_bug.cgi?id=896715 http://download.suse.com/patch/finder/?keywords=18ef30a02fd6022cd9f00c22e66f9f25 From sle-updates at lists.suse.com Thu Oct 23 23:04:48 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 24 Oct 2014 07:04:48 +0200 (CEST) Subject: SUSE-RU-2014:1322-1: Recommended update for smt Message-ID: <20141024050448.5E80C32257@maintenance.suse.de> SUSE Recommended Update: Recommended update for smt ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1322-1 Rating: low References: #857206 #880704 #881728 #884574 #885966 #887133 #889373 #889383 #891810 #894853 #897246 #897250 #898703 #899508 #900895 Affected Products: Subscription Management Tool for SUSE Linux Enterprise 11 SP3 ______________________________________________________________________________ An update that has 15 recommended fixes can now be installed. It includes two new package versions. Description: This maintenance update enables the Subscription Management Tool (SMT) for SUSE Linux Enterprise 11 Service Pack 3 to register SUSE products on SUSE Customer Center (SCC) and allows the smooth migration from Novell Customer Center (NCC) to SCC. Customers deploying SUSE Linux Enterprise 12 systems registered against SMT should refer to the Release Notes at https://www.suse.com/releasenotes/x86_64/SLE-SMT/11-SP3/ for more details. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - Subscription Management Tool for SUSE Linux Enterprise 11 SP3: zypper in -t patch slesmtsp3-smt-20-9861 To bring your system up-to-date, use "zypper patch". Package List: - Subscription Management Tool for SUSE Linux Enterprise 11 SP3 (i586 s390x x86_64) [New Version: 2.0.7]: res-signingkeys-2.0.7-0.7.1 smt-2.0.7-0.7.1 smt-support-2.0.7-0.7.1 - Subscription Management Tool for SUSE Linux Enterprise 11 SP3 (noarch) [New Version: 2.17.30]: perl-JSON-2.53-0.12.21 yast2-smt-2.17.30-0.9.2 References: https://bugzilla.suse.com/show_bug.cgi?id=857206 https://bugzilla.suse.com/show_bug.cgi?id=880704 https://bugzilla.suse.com/show_bug.cgi?id=881728 https://bugzilla.suse.com/show_bug.cgi?id=884574 https://bugzilla.suse.com/show_bug.cgi?id=885966 https://bugzilla.suse.com/show_bug.cgi?id=887133 https://bugzilla.suse.com/show_bug.cgi?id=889373 https://bugzilla.suse.com/show_bug.cgi?id=889383 https://bugzilla.suse.com/show_bug.cgi?id=891810 https://bugzilla.suse.com/show_bug.cgi?id=894853 https://bugzilla.suse.com/show_bug.cgi?id=897246 https://bugzilla.suse.com/show_bug.cgi?id=897250 https://bugzilla.suse.com/show_bug.cgi?id=898703 https://bugzilla.suse.com/show_bug.cgi?id=899508 https://bugzilla.suse.com/show_bug.cgi?id=900895 http://download.suse.com/patch/finder/?keywords=4f95de475a3324342b85c27286e6ae90 From sle-updates at lists.suse.com Mon Oct 27 17:04:42 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 28 Oct 2014 00:04:42 +0100 (CET) Subject: SUSE-OU-2014:1324-1: Optional update for virt-utils Message-ID: <20141027230442.95A6732255@maintenance.suse.de> SUSE Optional Update: Optional update for virt-utils ______________________________________________________________________________ Announcement ID: SUSE-OU-2014:1324-1 Rating: low References: #894746 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 ______________________________________________________________________________ An update that has one optional fix can now be installed. Description: This optional update adds the package virt-utils to SLE Software Development Kit to fulfill a new dependency of Kiwi 5.05.76. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-virt-utils-9691 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): virt-utils-1.2.1-0.7.19 References: https://bugzilla.suse.com/show_bug.cgi?id=894746 http://download.suse.com/patch/finder/?keywords=4be9eaf155d42ac18018d34f085ee0fe From sle-updates at lists.suse.com Mon Oct 27 19:04:42 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 28 Oct 2014 02:04:42 +0100 (CET) Subject: SUSE-OU-2014:1325-1: Optional update for perl-Class-Singleton, perl-File-Slurp, perl-JSON, perl-Readonly Message-ID: <20141028010442.98AEE3224E@maintenance.suse.de> SUSE Optional Update: Optional update for perl-Class-Singleton, perl-File-Slurp, perl-JSON, perl-Readonly ______________________________________________________________________________ Announcement ID: SUSE-OU-2014:1325-1 Rating: low References: #891396 Affected Products: Subscription Management Tool for SUSE Linux Enterprise 11 SP3 SUSE Manager Server SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Point of Service 11 SP3 ______________________________________________________________________________ An update that has one optional fix can now be installed. Description: This optional update provides a collection of Perl modules that are required by Kiwi 5: perl-JSON, perl-Class-Singleton, perl-Readonly, perl-File-Slurp. Indications: Any user can install these packages. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - Subscription Management Tool for SUSE Linux Enterprise 11 SP3: zypper in -t patch slesmtsp3-kiwi5-deps-201408-9675 - SUSE Manager Server: zypper in -t patch sleman21-kiwi5-deps-201408-9675 - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-kiwi5-deps-201408-9675 - SUSE Linux Enterprise Point of Service 11 SP3: zypper in -t patch sleposp3-kiwi5-deps-201408-9675 To bring your system up-to-date, use "zypper patch". Package List: - Subscription Management Tool for SUSE Linux Enterprise 11 SP3 (noarch): perl-JSON-2.53-0.12.15 - SUSE Manager Server (noarch): perl-Class-Singleton-1.4-4.13.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): perl-Readonly-1.03-11.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (noarch): perl-Class-Singleton-1.4-4.13.1 perl-File-Slurp-9999.19-1.7.1 perl-JSON-2.53-0.12.15 - SUSE Linux Enterprise Point of Service 11 SP3 (i586 x86_64): perl-Readonly-1.03-11.10.1 - SUSE Linux Enterprise Point of Service 11 SP3 (noarch): perl-Class-Singleton-1.4-4.13.1 perl-File-Slurp-9999.19-1.7.1 perl-JSON-2.53-0.12.15 References: https://bugzilla.suse.com/show_bug.cgi?id=891396 http://download.suse.com/patch/finder/?keywords=eef96401afc30cd7b2e6198bfe23aa14 From sle-updates at lists.suse.com Mon Oct 27 19:05:31 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 28 Oct 2014 02:05:31 +0100 (CET) Subject: SUSE-RU-2014:1326-1: Recommended update for kiwi Message-ID: <20141028010531.920F132255@maintenance.suse.de> SUSE Recommended Update: Recommended update for kiwi ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1326-1 Rating: low References: #891396 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Point of Service 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides Kiwi 5.05.76. This new version brings bug fixes, enhancements and several new features, including: * Support for UEFI and secure boot * Support for Software-RAID images * Support for ZFS * Support for BtrFS * Multiboot Support for Xen * Support for Microsoft Hyper-V. For a comprehensive list of changes, please refer to the package's change log. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-kiwi-9674 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kiwi-9674 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kiwi-9674 - SUSE Linux Enterprise Point of Service 11 SP3: zypper in -t patch sleposp3-kiwi-9674 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.05.76]: kiwi-5.05.76-0.7.1 kiwi-instsource-5.05.76-0.7.1 kiwi-tools-5.05.76-0.7.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 s390x x86_64) [New Version: 5.05.76]: kiwi-desc-oemboot-5.05.76-0.7.1 kiwi-desc-vmxboot-5.05.76-0.7.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64) [New Version: 5.05.76]: kiwi-desc-isoboot-5.05.76-0.7.1 kiwi-desc-netboot-5.05.76-0.7.1 kiwi-doc-5.05.76-0.7.1 kiwi-pxeboot-5.05.76-0.7.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): kiwi-tools-5.05.76-0.7.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): kiwi-tools-5.05.76-0.7.1 - SUSE Linux Enterprise Point of Service 11 SP3 (i586 x86_64) [New Version: 5.05.76]: kiwi-5.05.76-0.7.1 kiwi-desc-isoboot-5.05.76-0.7.1 kiwi-desc-netboot-5.05.76-0.7.1 kiwi-desc-oemboot-5.05.76-0.7.1 kiwi-doc-5.05.76-0.7.1 kiwi-tools-5.05.76-0.7.1 References: https://bugzilla.suse.com/show_bug.cgi?id=891396 http://download.suse.com/patch/finder/?keywords=25a03b1cf5a425126d56b69e2a10b88d From sle-updates at lists.suse.com Mon Oct 27 21:04:43 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 28 Oct 2014 04:04:43 +0100 (CET) Subject: SUSE-RU-2014:1327-1: Recommended update for yast2-product-creator Message-ID: <20141028030443.9C68B320B9@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-product-creator ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1327-1 Rating: low References: #834664 #834845 #901141 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Point of Service 11 SP3 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. It includes one version update. Description: This update for yast2-product-creator provides the following fixes and enhancements: * Update to support kiwi version 5.05. (FATE#317123, bnc#891396) * Require kiwi and kiwi-schema=5.8 packages. * Drop obsoleted usbboot image support. (bnc#834664) * Enable all image types when not using the template. (bnc#834845) * Fix the iso image template. (bnc#901141) * Drop obsoleted Xen template. * Added support for current image flags. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-yast2-product-creator-9903 - SUSE Linux Enterprise Point of Service 11 SP3: zypper in -t patch sleposp3-yast2-product-creator-9903 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (noarch) [New Version: 2.17.60]: yast2-product-creator-2.17.60-0.7.1 - SUSE Linux Enterprise Point of Service 11 SP3 (noarch) [New Version: 2.17.60]: yast2-product-creator-2.17.60-0.7.1 References: https://bugzilla.suse.com/show_bug.cgi?id=834664 https://bugzilla.suse.com/show_bug.cgi?id=834845 https://bugzilla.suse.com/show_bug.cgi?id=901141 http://download.suse.com/patch/finder/?keywords=5253e9f74cf8ccee7cae46fe3d6c2ba7 From sle-updates at lists.suse.com Wed Oct 29 17:04:43 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 30 Oct 2014 00:04:43 +0100 (CET) Subject: SUSE-RU-2014:1332-1: Recommended update for procps Message-ID: <20141029230443.715BE3225B@maintenance.suse.de> SUSE Recommended Update: Recommended update for procps ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1332-1 Rating: low References: #863990 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for procps fixes the following issues: * Shared memory value in command free(1) is always zero. (bnc#863990) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-procps-9891 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-procps-9891 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-procps-9891 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): procps-3.2.7-151.28.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): procps-3.2.7-151.28.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): procps-3.2.7-151.28.1 References: https://bugzilla.suse.com/show_bug.cgi?id=863990 http://download.suse.com/patch/finder/?keywords=c58bf6e39c0b6fcbed5f888aa218eb3f From sle-updates at lists.suse.com Wed Oct 29 17:05:00 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 30 Oct 2014 00:05:00 +0100 (CET) Subject: SUSE-RU-2014:1333-1: Recommended update for release-notes-smt Message-ID: <20141029230500.E95EE3225D@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-smt ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1333-1 Rating: low References: #880704 #902706 Affected Products: Subscription Management Tool for SUSE Linux Enterprise 11 SP3 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. It includes one version update. Description: This update provides the latest revision of the Release Notes for Subscription Management Tool 11-SP3, documenting support for SUSE Customer Center and the SUSE Linux Enterprise 12 product family. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - Subscription Management Tool for SUSE Linux Enterprise 11 SP3: zypper in -t patch slesmtsp3-release-notes-smt-9911 To bring your system up-to-date, use "zypper patch". Package List: - Subscription Management Tool for SUSE Linux Enterprise 11 SP3 (i586 s390x x86_64) [New Version: 2.0.4]: release-notes-smt-2.0.4-0.11.1 References: https://bugzilla.suse.com/show_bug.cgi?id=880704 https://bugzilla.suse.com/show_bug.cgi?id=902706 http://download.suse.com/patch/finder/?keywords=aac76d2b9c11955f4a130c114d89c84c From sle-updates at lists.suse.com Wed Oct 29 19:04:49 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 30 Oct 2014 02:04:49 +0100 (CET) Subject: SUSE-RU-2014:1334-1: Recommended update for telnet Message-ID: <20141030010449.7F0B832238@maintenance.suse.de> SUSE Recommended Update: Recommended update for telnet ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1334-1 Rating: low References: #700229 #898481 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update for telnet provides the following fixes: * Exit cleanly when hostalias cannot be resolved. * Fix infinite loop if local output generates a SIGPIPE. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-telnet-9892 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-telnet-9892 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-telnet-9892 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-telnet-9892 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): telnet-server-1.2-134.24.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): telnet-1.2-134.24.1 telnet-server-1.2-134.24.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): telnet-1.2-134.24.1 telnet-server-1.2-134.24.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): telnet-1.2-134.24.1 References: https://bugzilla.suse.com/show_bug.cgi?id=700229 https://bugzilla.suse.com/show_bug.cgi?id=898481 http://download.suse.com/patch/finder/?keywords=3332279a83123879df399236bb22cd0c From sle-updates at lists.suse.com Fri Oct 31 11:05:07 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 31 Oct 2014 18:05:07 +0100 (CET) Subject: SUSE-SU-2014:1339-1: important: Security update for spacewalk-java Message-ID: <20141031170507.5122E3224E@maintenance.suse.de> SUSE Security Update: Security update for spacewalk-java ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1339-1 Rating: important References: #896012 #902182 Cross-References: CVE-2014-3595 CVE-2014-3654 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: This update fixes various cross-site scripting (XSS) issues in spacewalk-java. CVE-2014-3654 and CVE-2014-3595 have been assigned to these issues. Security Issues: * CVE-2014-3654 * CVE-2014-3595 Indications: Everybody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-spacewalk-java-9909 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (noarch) [New Version: 1.7.54.33]: spacewalk-java-1.7.54.33-0.5.1 spacewalk-java-config-1.7.54.33-0.5.1 spacewalk-java-lib-1.7.54.33-0.5.1 spacewalk-java-oracle-1.7.54.33-0.5.1 spacewalk-java-postgresql-1.7.54.33-0.5.1 spacewalk-taskomatic-1.7.54.33-0.5.1 References: http://support.novell.com/security/cve/CVE-2014-3595.html http://support.novell.com/security/cve/CVE-2014-3654.html https://bugzilla.suse.com/show_bug.cgi?id=896012 https://bugzilla.suse.com/show_bug.cgi?id=902182 http://download.suse.com/patch/finder/?keywords=93c795b3574d176f0dde9827573343c1 From sle-updates at lists.suse.com Fri Oct 31 11:05:35 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 31 Oct 2014 18:05:35 +0100 (CET) Subject: SUSE-RU-2014:1340-1: Recommended update for pure-ftpd Message-ID: <20141031170535.F011632255@maintenance.suse.de> SUSE Recommended Update: Recommended update for pure-ftpd ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:1340-1 Rating: low References: #828469 #856424 #899136 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This update for pure-ftpd provides fixes for the following issues: * LIST command processed incorrectly when pathname argument contains a space character. (bnc#899136) * LIST FILENAME handled incorrectly when using ftp-tls if file name doesn't exist. (bnc#856424) * Re-enable disable_ascii option. (bnc#828469) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-pure-ftpd-9849 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-pure-ftpd-9849 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-pure-ftpd-9849 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): pure-ftpd-1.0.22-3.21.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): pure-ftpd-1.0.22-3.21.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): pure-ftpd-1.0.22-3.21.1 References: https://bugzilla.suse.com/show_bug.cgi?id=828469 https://bugzilla.suse.com/show_bug.cgi?id=856424 https://bugzilla.suse.com/show_bug.cgi?id=899136 http://download.suse.com/patch/finder/?keywords=373f5112012884389c18d207879e44b7 From sle-updates at lists.suse.com Fri Oct 31 11:06:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 31 Oct 2014 18:06:16 +0100 (CET) Subject: SUSE-SU-2014:1341-1: Security update for openstack-glance Message-ID: <20141031170616.36BAA32255@maintenance.suse.de> SUSE Security Update: Security update for openstack-glance ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1341-1 Rating: low References: #892779 #897815 Cross-References: CVE-2014-5356 Affected Products: SUSE Cloud 4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. It includes one version update. Description: This update for openstack-glance provides the following fixes: * Enforce image_size_cap on v2 upload (bnc#892779, CVE-2014-5356) * Block sqlalchemy-migrate 0.9.2 * Check on schemes not stores * Fix collection order issues and unit test failures * Set Python hash seed to 0 in tox.ini. Security Issues: * CVE-2014-5356 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 4: zypper in -t patch sleclo40sp3-openstack-glance-9802 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 4 (x86_64) [New Version: 2014.1.3.dev8.gf43b1c2]: openstack-glance-2014.1.3.dev8.gf43b1c2-0.7.1 python-glance-2014.1.3.dev8.gf43b1c2-0.7.1 - SUSE Cloud 4 (noarch) [New Version: 2014.1.3.dev8.gf43b1c2]: openstack-glance-doc-2014.1.3.dev8.gf43b1c2-0.7.1 References: http://support.novell.com/security/cve/CVE-2014-5356.html https://bugzilla.suse.com/show_bug.cgi?id=892779 https://bugzilla.suse.com/show_bug.cgi?id=897815 http://download.suse.com/patch/finder/?keywords=35a62a0843b658f9e9d366bcdd9f05c2 From sle-updates at lists.suse.com Fri Oct 31 11:06:43 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 31 Oct 2014 18:06:43 +0100 (CET) Subject: SUSE-SU-2014:1342-1: important: Security update for spacewalk-java Message-ID: <20141031170643.C772732255@maintenance.suse.de> SUSE Security Update: Security update for spacewalk-java ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:1342-1 Rating: important References: #902182 Cross-References: CVE-2014-3654 Affected Products: SUSE Manager Server ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes various cross-site scripting (XSS) issues in spacewalk-java. CVE-2014-3654 has been assigned to this issue. Security Issues: * CVE-2014-3654 Indications: Everybody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Server: zypper in -t patch sleman21-spacewalk-java-9910 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Server (noarch): spacewalk-java-2.1.165.6-0.13.1 spacewalk-java-config-2.1.165.6-0.13.1 spacewalk-java-lib-2.1.165.6-0.13.1 spacewalk-java-oracle-2.1.165.6-0.13.1 spacewalk-java-postgresql-2.1.165.6-0.13.1 spacewalk-taskomatic-2.1.165.6-0.13.1 References: http://support.novell.com/security/cve/CVE-2014-3654.html https://bugzilla.suse.com/show_bug.cgi?id=902182 http://download.suse.com/patch/finder/?keywords=2ce4e2b73960b7af5ee0784875a91727