openSUSE Security Announce
Threads by month
- ----- 2024 -----
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
April 2016
- 1 participants
- 61 discussions
[security-announce] openSUSE-SU-2016:1136-1: important: Security update for Chromium
by opensuse-security@opensuse.org 24 Apr '16
by opensuse-security@opensuse.org 24 Apr '16
24 Apr '16
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1136-1
Rating: important
References: #975572
Cross-References: CVE-2016-1651 CVE-2016-1652 CVE-2016-1653
CVE-2016-1654 CVE-2016-1655 CVE-2016-1656
CVE-2016-1657 CVE-2016-1658 CVE-2016-1659
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
Chromium was updated to 50.0.2661.75 to fix the following vulnerabilities:
- CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding
- CVE-2016-1652: Universal XSS in extension bindings
- CVE-2016-1653: Out-of-bounds write in V8
- CVE-2016-1654: Uninitialized memory read in media
- CVE-2016-1655: Use-after-free related to extensions
- CVE-2016-1656: Android downloaded file path restriction bypass
- CVE-2016-1657: Address bar spoofing
- CVE-2016-1658: Potential leak of sensitive information to malicious
extensions
- CVE-2016-1659: Various fixes from internal audits, fuzzing and other
initiatives
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch 2016-505=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
chromedriver-50.0.2661.75-144.1
chromedriver-debuginfo-50.0.2661.75-144.1
chromium-50.0.2661.75-144.1
chromium-debuginfo-50.0.2661.75-144.1
chromium-debugsource-50.0.2661.75-144.1
chromium-desktop-gnome-50.0.2661.75-144.1
chromium-desktop-kde-50.0.2661.75-144.1
chromium-ffmpegsumo-50.0.2661.75-144.1
chromium-ffmpegsumo-debuginfo-50.0.2661.75-144.1
References:
https://www.suse.com/security/cve/CVE-2016-1651.html
https://www.suse.com/security/cve/CVE-2016-1652.html
https://www.suse.com/security/cve/CVE-2016-1653.html
https://www.suse.com/security/cve/CVE-2016-1654.html
https://www.suse.com/security/cve/CVE-2016-1655.html
https://www.suse.com/security/cve/CVE-2016-1656.html
https://www.suse.com/security/cve/CVE-2016-1657.html
https://www.suse.com/security/cve/CVE-2016-1658.html
https://www.suse.com/security/cve/CVE-2016-1659.html
https://bugzilla.suse.com/975572
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1135-1: important: Security update for Chromium
by opensuse-security@opensuse.org 24 Apr '16
by opensuse-security@opensuse.org 24 Apr '16
24 Apr '16
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1135-1
Rating: important
References: #975572
Cross-References: CVE-2016-1651 CVE-2016-1652 CVE-2016-1653
CVE-2016-1654 CVE-2016-1655 CVE-2016-1656
CVE-2016-1657 CVE-2016-1658 CVE-2016-1659
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
Chromium was updated to 50.0.2661.75 to fix the following vulnerabilities:
- CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding
- CVE-2016-1652: Universal XSS in extension bindings
- CVE-2016-1653: Out-of-bounds write in V8
- CVE-2016-1654: Uninitialized memory read in media
- CVE-2016-1655: Use-after-free related to extensions
- CVE-2016-1656: Android downloaded file path restriction bypass
- CVE-2016-1657: Address bar spoofing
- CVE-2016-1658: Potential leak of sensitive information to malicious
extensions
- CVE-2016-1659: Various fixes from internal audits, fuzzing and other
initiatives
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-504=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
chromedriver-50.0.2661.75-94.3
chromedriver-debuginfo-50.0.2661.75-94.3
chromium-50.0.2661.75-94.3
chromium-debuginfo-50.0.2661.75-94.3
chromium-debugsource-50.0.2661.75-94.3
chromium-desktop-gnome-50.0.2661.75-94.3
chromium-desktop-kde-50.0.2661.75-94.3
chromium-ffmpegsumo-50.0.2661.75-94.3
chromium-ffmpegsumo-debuginfo-50.0.2661.75-94.3
References:
https://www.suse.com/security/cve/CVE-2016-1651.html
https://www.suse.com/security/cve/CVE-2016-1652.html
https://www.suse.com/security/cve/CVE-2016-1653.html
https://www.suse.com/security/cve/CVE-2016-1654.html
https://www.suse.com/security/cve/CVE-2016-1655.html
https://www.suse.com/security/cve/CVE-2016-1656.html
https://www.suse.com/security/cve/CVE-2016-1657.html
https://www.suse.com/security/cve/CVE-2016-1658.html
https://www.suse.com/security/cve/CVE-2016-1659.html
https://bugzilla.suse.com/975572
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1107-1: important: Security update for samba
by opensuse-security@opensuse.org 20 Apr '16
by opensuse-security@opensuse.org 20 Apr '16
20 Apr '16
openSUSE Security Update: Security update for samba
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1107-1
Rating: important
References: #844720 #849224 #853347 #917376 #936862 #958582
#958583 #958584 #958586 #968222 #971965 #973031
#973032 #973033 #973034 #973035 #973036
Cross-References: CVE-2012-6150 CVE-2013-4408 CVE-2013-4496
CVE-2015-0240 CVE-2015-5252 CVE-2015-5296
CVE-2015-5299 CVE-2015-5330 CVE-2015-5370
CVE-2015-7560 CVE-2016-2110 CVE-2016-2111
CVE-2016-2112 CVE-2016-2113 CVE-2016-2114
CVE-2016-2115 CVE-2016-2118
Affected Products:
openSUSE Evergreen 11.4
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
This update fixes these security vulnerabilities:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM
attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP
authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have
been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM
attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2114: "server signing = mandatory" not enforced (bsc#973035).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks
(bsc#973036).
- CVE-2016-2118: "Badlock" DCERPC impersonation of authenticated account
were possible (bsc#971965).
The openSUSE 13.1 update also upgrades to samba 4.2.4 as 4.1.x versions
are no longer supported by upstream. As a side effect, libpdb0 package was
replaced by libsamba-passdb0.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Evergreen 11.4:
zypper in -t patch 2016-490=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Evergreen 11.4 (i586 x86_64):
ldapsmb-1.34b-141.1
libldb-devel-1.0.2-141.1
libldb1-1.0.2-141.1
libldb1-debuginfo-1.0.2-141.1
libnetapi-devel-3.6.3-141.1
libnetapi0-3.6.3-141.1
libnetapi0-debuginfo-3.6.3-141.1
libsmbclient-devel-3.6.3-141.1
libsmbclient0-3.6.3-141.1
libsmbclient0-debuginfo-3.6.3-141.1
libsmbsharemodes-devel-3.6.3-141.1
libsmbsharemodes0-3.6.3-141.1
libsmbsharemodes0-debuginfo-3.6.3-141.1
libtalloc-devel-2.0.5-141.1
libtalloc2-2.0.5-141.1
libtalloc2-debuginfo-2.0.5-141.1
libtdb-devel-1.2.9-141.1
libtdb1-1.2.9-141.1
libtdb1-debuginfo-1.2.9-141.1
libtevent-devel-0.9.11-141.1
libtevent0-0.9.11-141.1
libtevent0-debuginfo-0.9.11-141.1
libwbclient-devel-3.6.3-141.1
libwbclient0-3.6.3-141.1
libwbclient0-debuginfo-3.6.3-141.1
samba-3.6.3-141.1
samba-client-3.6.3-141.1
samba-client-debuginfo-3.6.3-141.1
samba-debuginfo-3.6.3-141.1
samba-debugsource-3.6.3-141.1
samba-devel-3.6.3-141.1
samba-krb-printing-3.6.3-141.1
samba-krb-printing-debuginfo-3.6.3-141.1
samba-winbind-3.6.3-141.1
samba-winbind-debuginfo-3.6.3-141.1
- openSUSE Evergreen 11.4 (noarch):
samba-doc-3.6.3-141.1
- openSUSE Evergreen 11.4 (x86_64):
libldb1-32bit-1.0.2-141.1
libldb1-debuginfo-32bit-1.0.2-141.1
libsmbclient0-32bit-3.6.3-141.1
libsmbclient0-debuginfo-32bit-3.6.3-141.1
libtalloc2-32bit-2.0.5-141.1
libtalloc2-debuginfo-32bit-2.0.5-141.1
libtdb1-32bit-1.2.9-141.1
libtdb1-debuginfo-32bit-1.2.9-141.1
libtevent0-32bit-0.9.11-141.1
libtevent0-debuginfo-32bit-0.9.11-141.1
libwbclient0-32bit-3.6.3-141.1
libwbclient0-debuginfo-32bit-3.6.3-141.1
samba-32bit-3.6.3-141.1
samba-client-32bit-3.6.3-141.1
samba-client-debuginfo-32bit-3.6.3-141.1
samba-debuginfo-32bit-3.6.3-141.1
samba-winbind-32bit-3.6.3-141.1
samba-winbind-debuginfo-32bit-3.6.3-141.1
- openSUSE Evergreen 11.4 (ia64):
libldb1-debuginfo-x86-1.0.2-141.1
libldb1-x86-1.0.2-141.1
libsmbclient0-debuginfo-x86-3.6.3-141.1
libsmbclient0-x86-3.6.3-141.1
libtalloc2-debuginfo-x86-2.0.5-141.1
libtalloc2-x86-2.0.5-141.1
libtdb1-debuginfo-x86-1.2.9-141.1
libtdb1-x86-1.2.9-141.1
libtevent0-debuginfo-x86-0.9.11-141.1
libtevent0-x86-0.9.11-141.1
libwbclient0-debuginfo-x86-3.6.3-141.1
libwbclient0-x86-3.6.3-141.1
samba-client-debuginfo-x86-3.6.3-141.1
samba-client-x86-3.6.3-141.1
samba-debuginfo-x86-3.6.3-141.1
samba-winbind-debuginfo-x86-3.6.3-141.1
samba-winbind-x86-3.6.3-141.1
samba-x86-3.6.3-141.1
References:
https://www.suse.com/security/cve/CVE-2012-6150.html
https://www.suse.com/security/cve/CVE-2013-4408.html
https://www.suse.com/security/cve/CVE-2013-4496.html
https://www.suse.com/security/cve/CVE-2015-0240.html
https://www.suse.com/security/cve/CVE-2015-5252.html
https://www.suse.com/security/cve/CVE-2015-5296.html
https://www.suse.com/security/cve/CVE-2015-5299.html
https://www.suse.com/security/cve/CVE-2015-5330.html
https://www.suse.com/security/cve/CVE-2015-5370.html
https://www.suse.com/security/cve/CVE-2015-7560.html
https://www.suse.com/security/cve/CVE-2016-2110.html
https://www.suse.com/security/cve/CVE-2016-2111.html
https://www.suse.com/security/cve/CVE-2016-2112.html
https://www.suse.com/security/cve/CVE-2016-2113.html
https://www.suse.com/security/cve/CVE-2016-2114.html
https://www.suse.com/security/cve/CVE-2016-2115.html
https://www.suse.com/security/cve/CVE-2016-2118.html
https://bugzilla.suse.com/844720
https://bugzilla.suse.com/849224
https://bugzilla.suse.com/853347
https://bugzilla.suse.com/917376
https://bugzilla.suse.com/936862
https://bugzilla.suse.com/958582
https://bugzilla.suse.com/958583
https://bugzilla.suse.com/958584
https://bugzilla.suse.com/958586
https://bugzilla.suse.com/968222
https://bugzilla.suse.com/971965
https://bugzilla.suse.com/973031
https://bugzilla.suse.com/973032
https://bugzilla.suse.com/973033
https://bugzilla.suse.com/973034
https://bugzilla.suse.com/973035
https://bugzilla.suse.com/973036
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1106-1: important: Security update for samba
by opensuse-security@opensuse.org 20 Apr '16
by opensuse-security@opensuse.org 20 Apr '16
20 Apr '16
openSUSE Security Update: Security update for samba
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1106-1
Rating: important
References: #844720 #849224 #853347 #917376 #936862 #958582
#958583 #958584 #958586 #968222 #971965 #973031
#973032 #973033 #973034 #973035 #973036
Cross-References: CVE-2012-6150 CVE-2013-4408 CVE-2013-4496
CVE-2015-0240 CVE-2015-5252 CVE-2015-5296
CVE-2015-5299 CVE-2015-5330 CVE-2015-5370
CVE-2015-7560 CVE-2016-2110 CVE-2016-2111
CVE-2016-2112 CVE-2016-2113 CVE-2016-2114
CVE-2016-2115 CVE-2016-2118
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
This update fixes these security vulnerabilities:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM
attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP
authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have
been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM
attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2114: "server signing = mandatory" not enforced (bsc#973035).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks
(bsc#973036).
- CVE-2016-2118: "Badlock" DCERPC impersonation of authenticated account
were possible (bsc#971965).
The openSUSE 13.1 update also upgrades to samba 4.2.4 as 4.1.x versions
are no longer supported by upstream. As a side effect, libpdb0 package was
replaced by libsamba-passdb0.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch 2016-490=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
ctdb-4.2.4-3.54.2
ctdb-debuginfo-4.2.4-3.54.2
ctdb-devel-4.2.4-3.54.2
ctdb-pcp-pmda-4.2.4-3.54.2
ctdb-pcp-pmda-debuginfo-4.2.4-3.54.2
ctdb-tests-4.2.4-3.54.2
ctdb-tests-debuginfo-4.2.4-3.54.2
libdcerpc-atsvc-devel-4.2.4-3.54.2
libdcerpc-atsvc0-4.2.4-3.54.2
libdcerpc-atsvc0-debuginfo-4.2.4-3.54.2
libdcerpc-binding0-4.2.4-3.54.2
libdcerpc-binding0-debuginfo-4.2.4-3.54.2
libdcerpc-devel-4.2.4-3.54.2
libdcerpc-samr-devel-4.2.4-3.54.2
libdcerpc-samr0-4.2.4-3.54.2
libdcerpc-samr0-debuginfo-4.2.4-3.54.2
libdcerpc0-4.2.4-3.54.2
libdcerpc0-debuginfo-4.2.4-3.54.2
libgensec-devel-4.2.4-3.54.2
libgensec0-4.2.4-3.54.2
libgensec0-debuginfo-4.2.4-3.54.2
libndr-devel-4.2.4-3.54.2
libndr-krb5pac-devel-4.2.4-3.54.2
libndr-krb5pac0-4.2.4-3.54.2
libndr-krb5pac0-debuginfo-4.2.4-3.54.2
libndr-nbt-devel-4.2.4-3.54.2
libndr-nbt0-4.2.4-3.54.2
libndr-nbt0-debuginfo-4.2.4-3.54.2
libndr-standard-devel-4.2.4-3.54.2
libndr-standard0-4.2.4-3.54.2
libndr-standard0-debuginfo-4.2.4-3.54.2
libndr0-4.2.4-3.54.2
libndr0-debuginfo-4.2.4-3.54.2
libnetapi-devel-4.2.4-3.54.2
libnetapi0-4.2.4-3.54.2
libnetapi0-debuginfo-4.2.4-3.54.2
libregistry-devel-4.2.4-3.54.2
libregistry0-4.2.4-3.54.2
libregistry0-debuginfo-4.2.4-3.54.2
libsamba-credentials-devel-4.2.4-3.54.2
libsamba-credentials0-4.2.4-3.54.2
libsamba-credentials0-debuginfo-4.2.4-3.54.2
libsamba-hostconfig-devel-4.2.4-3.54.2
libsamba-hostconfig0-4.2.4-3.54.2
libsamba-hostconfig0-debuginfo-4.2.4-3.54.2
libsamba-passdb-devel-4.2.4-3.54.2
libsamba-passdb0-4.2.4-3.54.2
libsamba-passdb0-debuginfo-4.2.4-3.54.2
libsamba-policy-devel-4.2.4-3.54.2
libsamba-policy0-4.2.4-3.54.2
libsamba-policy0-debuginfo-4.2.4-3.54.2
libsamba-util-devel-4.2.4-3.54.2
libsamba-util0-4.2.4-3.54.2
libsamba-util0-debuginfo-4.2.4-3.54.2
libsamdb-devel-4.2.4-3.54.2
libsamdb0-4.2.4-3.54.2
libsamdb0-debuginfo-4.2.4-3.54.2
libsmbclient-devel-4.2.4-3.54.2
libsmbclient-raw-devel-4.2.4-3.54.2
libsmbclient-raw0-4.2.4-3.54.2
libsmbclient-raw0-debuginfo-4.2.4-3.54.2
libsmbclient0-4.2.4-3.54.2
libsmbclient0-debuginfo-4.2.4-3.54.2
libsmbconf-devel-4.2.4-3.54.2
libsmbconf0-4.2.4-3.54.2
libsmbconf0-debuginfo-4.2.4-3.54.2
libsmbldap-devel-4.2.4-3.54.2
libsmbldap0-4.2.4-3.54.2
libsmbldap0-debuginfo-4.2.4-3.54.2
libtevent-util-devel-4.2.4-3.54.2
libtevent-util0-4.2.4-3.54.2
libtevent-util0-debuginfo-4.2.4-3.54.2
libwbclient-devel-4.2.4-3.54.2
libwbclient0-4.2.4-3.54.2
libwbclient0-debuginfo-4.2.4-3.54.2
samba-4.2.4-3.54.2
samba-client-4.2.4-3.54.2
samba-client-debuginfo-4.2.4-3.54.2
samba-core-devel-4.2.4-3.54.2
samba-debuginfo-4.2.4-3.54.2
samba-debugsource-4.2.4-3.54.2
samba-libs-4.2.4-3.54.2
samba-libs-debuginfo-4.2.4-3.54.2
samba-pidl-4.2.4-3.54.2
samba-python-4.2.4-3.54.2
samba-python-debuginfo-4.2.4-3.54.2
samba-test-4.2.4-3.54.2
samba-test-debuginfo-4.2.4-3.54.2
samba-test-devel-4.2.4-3.54.2
samba-winbind-4.2.4-3.54.2
samba-winbind-debuginfo-4.2.4-3.54.2
- openSUSE 13.1 (x86_64):
libdcerpc-atsvc0-32bit-4.2.4-3.54.2
libdcerpc-atsvc0-debuginfo-32bit-4.2.4-3.54.2
libdcerpc-binding0-32bit-4.2.4-3.54.2
libdcerpc-binding0-debuginfo-32bit-4.2.4-3.54.2
libdcerpc-samr0-32bit-4.2.4-3.54.2
libdcerpc-samr0-debuginfo-32bit-4.2.4-3.54.2
libdcerpc0-32bit-4.2.4-3.54.2
libdcerpc0-debuginfo-32bit-4.2.4-3.54.2
libgensec0-32bit-4.2.4-3.54.2
libgensec0-debuginfo-32bit-4.2.4-3.54.2
libndr-krb5pac0-32bit-4.2.4-3.54.2
libndr-krb5pac0-debuginfo-32bit-4.2.4-3.54.2
libndr-nbt0-32bit-4.2.4-3.54.2
libndr-nbt0-debuginfo-32bit-4.2.4-3.54.2
libndr-standard0-32bit-4.2.4-3.54.2
libndr-standard0-debuginfo-32bit-4.2.4-3.54.2
libndr0-32bit-4.2.4-3.54.2
libndr0-debuginfo-32bit-4.2.4-3.54.2
libnetapi0-32bit-4.2.4-3.54.2
libnetapi0-debuginfo-32bit-4.2.4-3.54.2
libregistry0-32bit-4.2.4-3.54.2
libregistry0-debuginfo-32bit-4.2.4-3.54.2
libsamba-credentials0-32bit-4.2.4-3.54.2
libsamba-credentials0-debuginfo-32bit-4.2.4-3.54.2
libsamba-hostconfig0-32bit-4.2.4-3.54.2
libsamba-hostconfig0-debuginfo-32bit-4.2.4-3.54.2
libsamba-passdb0-32bit-4.2.4-3.54.2
libsamba-passdb0-debuginfo-32bit-4.2.4-3.54.2
libsamba-policy0-32bit-4.2.4-3.54.2
libsamba-policy0-debuginfo-32bit-4.2.4-3.54.2
libsamba-util0-32bit-4.2.4-3.54.2
libsamba-util0-debuginfo-32bit-4.2.4-3.54.2
libsamdb0-32bit-4.2.4-3.54.2
libsamdb0-debuginfo-32bit-4.2.4-3.54.2
libsmbclient-raw0-32bit-4.2.4-3.54.2
libsmbclient-raw0-debuginfo-32bit-4.2.4-3.54.2
libsmbclient0-32bit-4.2.4-3.54.2
libsmbclient0-debuginfo-32bit-4.2.4-3.54.2
libsmbconf0-32bit-4.2.4-3.54.2
libsmbconf0-debuginfo-32bit-4.2.4-3.54.2
libsmbldap0-32bit-4.2.4-3.54.2
libsmbldap0-debuginfo-32bit-4.2.4-3.54.2
libtevent-util0-32bit-4.2.4-3.54.2
libtevent-util0-debuginfo-32bit-4.2.4-3.54.2
libwbclient0-32bit-4.2.4-3.54.2
libwbclient0-debuginfo-32bit-4.2.4-3.54.2
samba-32bit-4.2.4-3.54.2
samba-client-32bit-4.2.4-3.54.2
samba-client-debuginfo-32bit-4.2.4-3.54.2
samba-debuginfo-32bit-4.2.4-3.54.2
samba-libs-32bit-4.2.4-3.54.2
samba-libs-debuginfo-32bit-4.2.4-3.54.2
samba-winbind-32bit-4.2.4-3.54.2
samba-winbind-debuginfo-32bit-4.2.4-3.54.2
- openSUSE 13.1 (noarch):
samba-doc-4.2.4-3.54.2
References:
https://www.suse.com/security/cve/CVE-2012-6150.html
https://www.suse.com/security/cve/CVE-2013-4408.html
https://www.suse.com/security/cve/CVE-2013-4496.html
https://www.suse.com/security/cve/CVE-2015-0240.html
https://www.suse.com/security/cve/CVE-2015-5252.html
https://www.suse.com/security/cve/CVE-2015-5296.html
https://www.suse.com/security/cve/CVE-2015-5299.html
https://www.suse.com/security/cve/CVE-2015-5330.html
https://www.suse.com/security/cve/CVE-2015-5370.html
https://www.suse.com/security/cve/CVE-2015-7560.html
https://www.suse.com/security/cve/CVE-2016-2110.html
https://www.suse.com/security/cve/CVE-2016-2111.html
https://www.suse.com/security/cve/CVE-2016-2112.html
https://www.suse.com/security/cve/CVE-2016-2113.html
https://www.suse.com/security/cve/CVE-2016-2114.html
https://www.suse.com/security/cve/CVE-2016-2115.html
https://www.suse.com/security/cve/CVE-2016-2118.html
https://bugzilla.suse.com/844720
https://bugzilla.suse.com/849224
https://bugzilla.suse.com/853347
https://bugzilla.suse.com/917376
https://bugzilla.suse.com/936862
https://bugzilla.suse.com/958582
https://bugzilla.suse.com/958583
https://bugzilla.suse.com/958584
https://bugzilla.suse.com/958586
https://bugzilla.suse.com/968222
https://bugzilla.suse.com/971965
https://bugzilla.suse.com/973031
https://bugzilla.suse.com/973032
https://bugzilla.suse.com/973033
https://bugzilla.suse.com/973034
https://bugzilla.suse.com/973035
https://bugzilla.suse.com/973036
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:1105-1: important: Security update for samba
by opensuse-security@opensuse.org 19 Apr '16
by opensuse-security@opensuse.org 19 Apr '16
19 Apr '16
SUSE Security Update: Security update for samba
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:1105-1
Rating: important
References: #913087 #958582 #973031 #973032
Cross-References: CVE-2015-5252 CVE-2016-2110 CVE-2016-2111
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
Samba was updated to fix three security issues.
These security issues were fixed:
* CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP
authentication (bso#11688, bsc#973031).
* CVE-2016-2111: Domain controller netlogon member computer could have
been spoofed (bso#11749, bsc#973032).
* CVE-2015-5252: Insufficient symlink verification (allowed file access
outside the share) (bso#11395, bnc#958582).
This non-security issue was fixed:
* Allow "delete readonly = yes" to correctly override deletion of a
file (bsc#913087, bso#5073)
Security Issues:
* CVE-2016-2110
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110>
* CVE-2016-2111
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111>
* CVE-2015-5252
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252>
Contraindications:
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
cifs-mount-3.0.36-0.13.32.1
ldapsmb-1.34b-25.13.32.1
libmsrpc-3.0.36-0.13.32.1
libmsrpc-devel-3.0.36-0.13.32.1
libsmbclient-3.0.36-0.13.32.1
libsmbclient-devel-3.0.36-0.13.32.1
samba-3.0.36-0.13.32.1
samba-client-3.0.36-0.13.32.1
samba-krb-printing-3.0.36-0.13.32.1
samba-python-3.0.36-0.13.32.1
samba-vscan-0.3.6b-43.13.32.1
samba-winbind-3.0.36-0.13.32.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
libsmbclient-32bit-3.0.36-0.13.32.1
samba-32bit-3.0.36-0.13.32.1
samba-client-32bit-3.0.36-0.13.32.1
samba-winbind-32bit-3.0.36-0.13.32.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (noarch):
samba-doc-3.0.36-0.12.32.1
References:
https://www.suse.com/security/cve/CVE-2015-5252.html
https://www.suse.com/security/cve/CVE-2016-2110.html
https://www.suse.com/security/cve/CVE-2016-2111.html
https://bugzilla.suse.com/913087
https://bugzilla.suse.com/958582
https://bugzilla.suse.com/973031
https://bugzilla.suse.com/973032
https://download.suse.com/patch/finder/?keywords=7a8b86525db490aaf0868ada97…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:1102-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 19 Apr '16
by opensuse-security@opensuse.org 19 Apr '16
19 Apr '16
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:1102-1
Rating: important
References: #758040 #904035 #912738 #915183 #924919 #933782
#937444 #940017 #940946 #942082 #947128 #948330
#949298 #951392 #951815 #952976 #953369 #954992
#955308 #955654 #955837 #955925 #956084 #956375
#956514 #956708 #956949 #957986 #957988 #957990
#958000 #958463 #958886 #958906 #958912 #958951
#959190 #959312 #959399 #959649 #959705 #961500
#961509 #961516 #961658 #962965 #963276 #963561
#963765 #963767 #964201 #964818 #966094 #966137
#966437 #966693 #967042 #967972 #967973 #967974
#967975 #968011 #968012 #968013 #969307 #969571
Cross-References: CVE-2013-7446 CVE-2015-7515 CVE-2015-7550
CVE-2015-8539 CVE-2015-8543 CVE-2015-8550
CVE-2015-8551 CVE-2015-8552 CVE-2015-8569
CVE-2015-8575 CVE-2015-8767 CVE-2015-8785
CVE-2015-8812 CVE-2016-0723 CVE-2016-2069
CVE-2016-2384 CVE-2016-2543 CVE-2016-2544
CVE-2016-2545 CVE-2016-2546 CVE-2016-2547
CVE-2016-2548 CVE-2016-2549
Affected Products:
SUSE Linux Enterprise Real Time Extension 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that solves 23 vulnerabilities and has 43 fixes
is now available.
Description:
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various
security and bugfixes.
Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O
bandwidth. (FATE#320200) It is called xen-blkfront in PV, and
xen-vbd-upstream in HVM mode.
The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the
Linux kernel allowed local users to bypass intended AF_UNIX socket
permissions or cause a denial of service (panic) via crafted epoll_ctl
calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB driver
could be used by physical local attackers to crash the kernel
(bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in
the Linux kernel did not properly use a semaphore, which allowed local
users to cause a denial of service (NULL pointer dereference and system
crash) or possibly have unspecified other impact via a crafted
application that leverages a race condition between keyctl_revoke and
keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local
users to gain privileges or cause a denial of service (BUG) via crafted
keyctl commands that negatively instantiate a key, related to
security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and
security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel did not
validate protocol identifiers for certain protocol families, which
allowed local users to cause a denial of service (NULL function pointer
dereference and system crash) or possibly gain privileges by leveraging
CLONE_NEWUSER support to execute a crafted SOCK_RAW application
(bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
could have lead to double fetch vulnerabilities, causing denial of
service
or arbitrary code execution (depending on the configuration)
(bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
(bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
length, which allowed local users to obtain sensitive information from
kernel memory and bypass the KASLR protection mechanism via a crafted
application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
Linux kernel did not verify an address length, which allowed local users
to obtain sensitive information from kernel memory and bypass the KASLR
protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
properly manage the relationship between a lock and a socket, which
allowed local users to cause a denial of service (deadlock) via a
crafted sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in
the Linux kernel allowed local users to cause a denial of service
(infinite loop) via a writev system call that triggers a zero length for
the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
driver when the network was considered to be congested. This could be
used by local attackers to cause machine crashes or potentially code
execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory or cause a denial of service
(use-after-free and system crash) by making a TIOCGETD ioctl call during
processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could leak
to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in the
umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in ALSA
that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
bsc#968012, bsc#968013).
The following non-security bugs were fixed:
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver
implementation (bsc#957986, bsc#956084, bsc#961658).
- alsa: hda - Add one more node in the EAPD supporting candidate list
(bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset
(bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT
(bsc#966137).
- blktap: also call blkif_disconnect() when frontend switched to closed
(bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658
fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- drivers: xen-blkfront: only talk_to_blkback() when in
XenbusStateInitialising (bsc#961658 fate#320200).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place
(bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ec2: Update kabi files and start tracking ec2
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- Fix handling of re-write-before-commit for mmapped NFS pages
(bsc#964201).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode
(bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no
external, 3rd party modules use the symbol and the
bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver.
(bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry
(bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- memcg: do not hang on OOM when killed by userspace OOM access to memory
reserves (bnc#969571).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too
(bsc#951815).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch
(bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also
address bsc#966094).
- rt: v3.0-rt relevant @stable-rt patches from v3.2-rt rt111 update
- s390/cio: collect format 1 channel-path description data (bnc#958000,
LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000,
LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000,
LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000,
LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file
(bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation
(bsc#956949).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- Update
patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch
(bnc#940017, bnc#949298, bnc#947128).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT
when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and
TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658
fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658
fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support
(bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard
together (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed
(XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent
(bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658
fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658
fate#320200).
- xen, blkfront: factor out flush-related checks from do_blkif_request()
(bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658
fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658
fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states
(bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658
fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation
(bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request
(bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA
(bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of
indirect segments (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658
fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path
(bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658
fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658
fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend
(bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658
fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658
fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658
fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen: consolidate and simplify struct xenbus_driver instantiation
(bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658
fate#320200).
- xen: Update Xen config files (enable upstream block frontend).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush
synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags()
(bsc#948330).
- xfs: Skip dirty pages in ->releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Real Time Extension 11-SP4:
zypper in -t patch slertesp4-kernel-201603-12516=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-kernel-201603-12516=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Real Time Extension 11-SP4 (x86_64):
kernel-rt-3.0.101.rt130-51.1
kernel-rt-base-3.0.101.rt130-51.1
kernel-rt-devel-3.0.101.rt130-51.1
kernel-rt_trace-3.0.101.rt130-51.1
kernel-rt_trace-base-3.0.101.rt130-51.1
kernel-rt_trace-devel-3.0.101.rt130-51.1
kernel-source-rt-3.0.101.rt130-51.1
kernel-syms-rt-3.0.101.rt130-51.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64):
kernel-rt-debuginfo-3.0.101.rt130-51.1
kernel-rt-debugsource-3.0.101.rt130-51.1
kernel-rt_debug-debuginfo-3.0.101.rt130-51.1
kernel-rt_debug-debugsource-3.0.101.rt130-51.1
kernel-rt_trace-debuginfo-3.0.101.rt130-51.1
kernel-rt_trace-debugsource-3.0.101.rt130-51.1
References:
https://www.suse.com/security/cve/CVE-2013-7446.html
https://www.suse.com/security/cve/CVE-2015-7515.html
https://www.suse.com/security/cve/CVE-2015-7550.html
https://www.suse.com/security/cve/CVE-2015-8539.html
https://www.suse.com/security/cve/CVE-2015-8543.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8551.html
https://www.suse.com/security/cve/CVE-2015-8552.html
https://www.suse.com/security/cve/CVE-2015-8569.html
https://www.suse.com/security/cve/CVE-2015-8575.html
https://www.suse.com/security/cve/CVE-2015-8767.html
https://www.suse.com/security/cve/CVE-2015-8785.html
https://www.suse.com/security/cve/CVE-2015-8812.html
https://www.suse.com/security/cve/CVE-2016-0723.html
https://www.suse.com/security/cve/CVE-2016-2069.html
https://www.suse.com/security/cve/CVE-2016-2384.html
https://www.suse.com/security/cve/CVE-2016-2543.html
https://www.suse.com/security/cve/CVE-2016-2544.html
https://www.suse.com/security/cve/CVE-2016-2545.html
https://www.suse.com/security/cve/CVE-2016-2546.html
https://www.suse.com/security/cve/CVE-2016-2547.html
https://www.suse.com/security/cve/CVE-2016-2548.html
https://www.suse.com/security/cve/CVE-2016-2549.html
https://bugzilla.suse.com/758040
https://bugzilla.suse.com/904035
https://bugzilla.suse.com/912738
https://bugzilla.suse.com/915183
https://bugzilla.suse.com/924919
https://bugzilla.suse.com/933782
https://bugzilla.suse.com/937444
https://bugzilla.suse.com/940017
https://bugzilla.suse.com/940946
https://bugzilla.suse.com/942082
https://bugzilla.suse.com/947128
https://bugzilla.suse.com/948330
https://bugzilla.suse.com/949298
https://bugzilla.suse.com/951392
https://bugzilla.suse.com/951815
https://bugzilla.suse.com/952976
https://bugzilla.suse.com/953369
https://bugzilla.suse.com/954992
https://bugzilla.suse.com/955308
https://bugzilla.suse.com/955654
https://bugzilla.suse.com/955837
https://bugzilla.suse.com/955925
https://bugzilla.suse.com/956084
https://bugzilla.suse.com/956375
https://bugzilla.suse.com/956514
https://bugzilla.suse.com/956708
https://bugzilla.suse.com/956949
https://bugzilla.suse.com/957986
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/957990
https://bugzilla.suse.com/958000
https://bugzilla.suse.com/958463
https://bugzilla.suse.com/958886
https://bugzilla.suse.com/958906
https://bugzilla.suse.com/958912
https://bugzilla.suse.com/958951
https://bugzilla.suse.com/959190
https://bugzilla.suse.com/959312
https://bugzilla.suse.com/959399
https://bugzilla.suse.com/959649
https://bugzilla.suse.com/959705
https://bugzilla.suse.com/961500
https://bugzilla.suse.com/961509
https://bugzilla.suse.com/961516
https://bugzilla.suse.com/961658
https://bugzilla.suse.com/962965
https://bugzilla.suse.com/963276
https://bugzilla.suse.com/963561
https://bugzilla.suse.com/963765
https://bugzilla.suse.com/963767
https://bugzilla.suse.com/964201
https://bugzilla.suse.com/964818
https://bugzilla.suse.com/966094
https://bugzilla.suse.com/966137
https://bugzilla.suse.com/966437
https://bugzilla.suse.com/966693
https://bugzilla.suse.com/967042
https://bugzilla.suse.com/967972
https://bugzilla.suse.com/967973
https://bugzilla.suse.com/967974
https://bugzilla.suse.com/967975
https://bugzilla.suse.com/968011
https://bugzilla.suse.com/968012
https://bugzilla.suse.com/968013
https://bugzilla.suse.com/969307
https://bugzilla.suse.com/969571
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1101-1: important: Security update for systemd
by opensuse-security@opensuse.org 19 Apr '16
by opensuse-security@opensuse.org 19 Apr '16
19 Apr '16
openSUSE Security Update: Security update for systemd
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1101-1
Rating: important
References: #959886 #960158 #963230 #964355 #965897 #967122
#970423 #970860 #972612 #972727
Cross-References: CVE-2014-9770 CVE-2015-8842
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that solves two vulnerabilities and has 8 fixes
is now available.
Description:
This update for systemd fixes several issues.
These security issues were fixed:
- CVE-2014-9770, CVE-2015-8842: Don't allow read access to journal files
to users (boo#972612)
These non-security issues were fixed:
- Import commit 523777609a04fe9e590420e89f94ef07e3719baa: e5e362a udev:
exclude MD from block device ownership event locking 8839413 udev:
really exclude device-mapper from block device ownership event locking
66782e6 udev: exclude device-mapper from block device ownership event
locking (boo#972727) 1386f57 tmpfiles: explicitly set mode for /run/log
faadb74 tmpfiles: don't allow read access to journal files to users not
in systemd-journal 9b1ef37 tmpfiles: don't apply sgid and executable bit
to journal files, only the directories they are contained in 011c39f
tmpfiles: add ability to mask access mode by pre-existing access mode on
files/directories 07e2d60 tmpfiles: get rid of "m" lines d504e28
tmpfiles: various modernizations f97250d systemctl: no need to pass
--all if inactive is explicitly requested in list-units (boo#967122)
2686573 fstab-generator: fix automount option and don't start associated
mount unit at boot (boo#970423) 5c1637d login: support more than just
power-gpio-key (fate#318444) (boo#970860) 2c95ecd logind: add standard
gpio power button support (fate#318444) (boo#970860) af3eb93 Revert
"log-target-null-instead-kmsg" 555dad4 shorten hostname before checking
for trailing dot (boo#965897) 522194c Revert "log: honour the kernel's
quiet cmdline argument" (boo#963230) cc94e47 transaction: downgrade
warnings about wanted unit which are not found (boo#960158) eb3cfb3
Revert "vhangup-on-all-consoles" 0c28752 remove WorkingDirectory
parameter from emergency, rescue and console-shell.service (boo#959886)
1d6d840 Fix wrong substitution variable name in
systemd-udev-root-symlink.service.in (boo#964355)
- Don't ship boot.udev and systemd-journald.init anymore. It was used
during the systemd transition when both sysvinit and systemd could be
used on the same system
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-487=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
libgudev-1_0-0-210.1459453449.5237776-25.37.1
libgudev-1_0-0-debuginfo-210.1459453449.5237776-25.37.1
libgudev-1_0-devel-210.1459453449.5237776-25.37.1
libudev-devel-210.1459453449.5237776-25.37.1
libudev-mini-devel-210.1459453449.5237776-25.37.1
libudev-mini1-210.1459453449.5237776-25.37.1
libudev-mini1-debuginfo-210.1459453449.5237776-25.37.1
libudev1-210.1459453449.5237776-25.37.1
libudev1-debuginfo-210.1459453449.5237776-25.37.1
nss-myhostname-210.1459453449.5237776-25.37.1
nss-myhostname-debuginfo-210.1459453449.5237776-25.37.1
systemd-210.1459453449.5237776-25.37.1
systemd-debuginfo-210.1459453449.5237776-25.37.1
systemd-debugsource-210.1459453449.5237776-25.37.1
systemd-devel-210.1459453449.5237776-25.37.1
systemd-journal-gateway-210.1459453449.5237776-25.37.1
systemd-journal-gateway-debuginfo-210.1459453449.5237776-25.37.1
systemd-logger-210.1459453449.5237776-25.37.1
systemd-mini-210.1459453449.5237776-25.37.1
systemd-mini-debuginfo-210.1459453449.5237776-25.37.1
systemd-mini-debugsource-210.1459453449.5237776-25.37.1
systemd-mini-devel-210.1459453449.5237776-25.37.1
systemd-mini-sysvinit-210.1459453449.5237776-25.37.1
systemd-sysvinit-210.1459453449.5237776-25.37.1
typelib-1_0-GUdev-1_0-210.1459453449.5237776-25.37.1
udev-210.1459453449.5237776-25.37.1
udev-debuginfo-210.1459453449.5237776-25.37.1
udev-mini-210.1459453449.5237776-25.37.1
udev-mini-debuginfo-210.1459453449.5237776-25.37.1
- openSUSE 13.2 (noarch):
systemd-bash-completion-210.1459453449.5237776-25.37.1
- openSUSE 13.2 (x86_64):
libgudev-1_0-0-32bit-210.1459453449.5237776-25.37.1
libgudev-1_0-0-debuginfo-32bit-210.1459453449.5237776-25.37.1
libudev1-32bit-210.1459453449.5237776-25.37.1
libudev1-debuginfo-32bit-210.1459453449.5237776-25.37.1
nss-myhostname-32bit-210.1459453449.5237776-25.37.1
nss-myhostname-debuginfo-32bit-210.1459453449.5237776-25.37.1
systemd-32bit-210.1459453449.5237776-25.37.1
systemd-debuginfo-32bit-210.1459453449.5237776-25.37.1
References:
https://www.suse.com/security/cve/CVE-2014-9770.html
https://www.suse.com/security/cve/CVE-2015-8842.html
https://bugzilla.suse.com/959886
https://bugzilla.suse.com/960158
https://bugzilla.suse.com/963230
https://bugzilla.suse.com/964355
https://bugzilla.suse.com/965897
https://bugzilla.suse.com/967122
https://bugzilla.suse.com/970423
https://bugzilla.suse.com/970860
https://bugzilla.suse.com/972612
https://bugzilla.suse.com/972727
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1073-1: important: Security update for mercurial
by opensuse-security@opensuse.org 17 Apr '16
by opensuse-security@opensuse.org 17 Apr '16
17 Apr '16
openSUSE Security Update: Security update for mercurial
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1073-1
Rating: important
References: #973175 #973176 #973177
Cross-References: CVE-2016-3068 CVE-2016-3069 CVE-2016-3630
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
mercurial was updated to fix three security issues.
These security issues were fixed:
- CVE-2016-3069: Arbitrary code execution when converting Git repos
(bsc#973176).
- CVE-2016-3068: Arbitrary code execution with Git subrepos (bsc#973177).
- CVE-2016-3630: Remote code execution in binary delta decoding
(bsc#973175).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2016-467=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i586 x86_64):
mercurial-3.5.1-3.1
mercurial-debuginfo-3.5.1-3.1
mercurial-debugsource-3.5.1-3.1
- openSUSE Leap 42.1 (noarch):
mercurial-lang-3.5.1-3.1
References:
https://www.suse.com/security/cve/CVE-2016-3068.html
https://www.suse.com/security/cve/CVE-2016-3069.html
https://www.suse.com/security/cve/CVE-2016-3630.html
https://bugzilla.suse.com/973175
https://bugzilla.suse.com/973176
https://bugzilla.suse.com/973177
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1064-1: important: Security update for samba
by opensuse-security@opensuse.org 17 Apr '16
by opensuse-security@opensuse.org 17 Apr '16
17 Apr '16
openSUSE Security Update: Security update for samba
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1064-1
Rating: important
References: #898031 #901813 #912457 #913238 #913547 #914279
#917376 #919309 #924519 #936862 #942716 #946051
#947552 #949022 #958581 #958582 #958583 #958584
#958585 #958586 #964023 #966271 #968222 #968973
#971965 #972197 #973031 #973032 #973033 #973034
#973036 #973832 #974629
Cross-References: CVE-2014-8143 CVE-2015-0240 CVE-2015-3223
CVE-2015-5252 CVE-2015-5296 CVE-2015-5299
CVE-2015-5330 CVE-2015-5370 CVE-2015-7560
CVE-2015-8467 CVE-2016-2110 CVE-2016-2111
CVE-2016-2112 CVE-2016-2113 CVE-2016-2115
CVE-2016-2118
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that solves 16 vulnerabilities and has 17 fixes
is now available.
Description:
samba was updated to version 4.2.4 to fix 14 security issues.
These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM
attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP
authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have
been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM
attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks
(bsc#973036).
- CVE-2016-2118: "Badlock" DCERPC impersonation of authenticated account
were possible (bsc#971965).
- CVE-2015-3223: Malicious request can cause Samba LDAP server to hang,
spinning using CPU (boo#958581).
- CVE-2015-5330: Remote read memory exploit in LDB (boo#958586).
- CVE-2015-5252: Insufficient symlink verification (file access outside
the share)(boo#958582).
- CVE-2015-5296: No man in the middle protection when forcing smb
encryption on the client side (boo#958584).
- CVE-2015-5299: Currently the snapshot browsing is not secure thru
windows previous version (shadow_copy2) (boo#958583).
- CVE-2015-8467: Fix Microsoft MS15-096 to prevent machine accounts from
being changed into user accounts (boo#958585).
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change
permissions on link target (boo#968222).
These non-security issues were fixed:
- Fix samba.tests.messaging test and prevent potential tdb corruption by
removing obsolete now invalid tdb_close call; (boo#974629).
- Align fsrvp feature sources with upstream version.
- Obsolete libsmbsharemodes0 from samba-libs and libsmbsharemodes-devel
from samba-core-devel; (boo#973832).
- s3:utils/smbget: Fix recursive download; (bso#6482).
- s3: smbd: posix_acls: Fix check for setting u:g:o entry on a filesystem
with no ACL support; (bso#10489).
- docs: Add example for domain logins to smbspool man page; (bso#11643).
- s3-client: Add a KRB5 wrapper for smbspool; (bso#11690).
- loadparm: Fix memory leak issue; (bso#11708).
- lib/tsocket: Work around sockets not supporting FIONREAD; (bso#11714).
- ctdb-scripts: Drop use of "smbcontrol winbindd ip-dropped ...";
(bso#11719).
- s3:smbd:open: Skip redundant call to file_set_dosmode when creating a
new file; (bso#11727).
- param: Fix str_list_v3 to accept ";" again; (bso#11732).
- Real memeory leak(buildup) issue in loadparm; (bso#11740).
- Obsolete libsmbclient from libsmbclient0 and libpdb-devel from
libsamba-passdb-devel while not providing it; (boo#972197).
- Upgrade on-disk FSRVP server state to new version; (boo#924519).
- Only obsolete but do not provide gplv2/3 package names; (boo#968973).
- Enable clustering (CTDB) support; (boo#966271).
- s3: smbd: Fix timestamp rounding inside SMB2 create; (bso#11703);
(boo#964023).
- vfs_fruit: Fix renaming directories with open files; (bso#11065).
- Fix MacOS finder error 36 when copying folder to Samba; (bso#11347).
- s3:smbd/oplock: Obey kernel oplock setting when releasing oplocks;
(bso#11400).
- Fix copying files with vfs_fruit when using vfs_streams_xattr without
stream prefix and type suffix; (bso#11466).
- s3:libsmb: Correctly initialize the list head when keeping a list of
primary followed by DFS connections; (bso#11624).
- Reduce the memory footprint of empty string options; (bso#11625).
- lib/async_req: Do not install async_connect_send_test; (bso#11639).
- docs: Fix typos in man vfs_gpfs; (bso#11641).
- smbd: make "hide dot files" option work with "store dos attributes =
yes"; (bso#11645).
- smbcacls: Fix uninitialized variable; (bso#11682).
- s3:smbd: Ignore initial allocation size for directory creation;
(bso#11684).
- Changing log level of two entries to from 1 to 3; (bso#9912).
- vfs_gpfs: Re-enable share modes; (bso#11243).
- wafsamba: Also build libraries with RELRO protection; (bso#11346).
- ctdb: Strip trailing spaces from nodes file; (bso#11365).
- s3-smbd: Fix old DOS client doing wildcard delete - gives a attribute
type of zero; (bso#11452).
- nss_wins: Do not run into use after free issues when we access memory
allocated on the globals and the global being reinitialized; (bso#11563).
- async_req: Fix non-blocking connect(); (bso#11564).
- auth: gensec: Fix a memory leak; (bso#11565).
- lib: util: Make non-critical message a warning; (bso#11566).
- Fix winbindd crashes with samlogon for trusted domain user; (bso#11569);
(boo#949022).
- smbd: Send SMB2 oplock breaks unencrypted; (bso#11570).
- ctdb: Open the RO tracking db with perms 0600 instead of 0000;
(bso#11577).
- manpage: Correct small typo error; (bso#11584).
- s3: smbd: If EA's are turned off on a share don't allow an SMB2 create
containing them; (bso#11589).
- Backport some valgrind fixes from upstream master; (bso#11597).
- s3: smbd: have_file_open_below() fails to enumerate open files below an
open directory handle; (bso#11615).
- docs: Fix some typos in the idmap config section of man 5 smb.conf;
(bso#11619).
- Remove redundant configure options while adding with-relro.
- s3: smbd: Fix our access-based enumeration on "hide unreadable" to match
Windows; (bso#10252).
- smbd: Fix file name buflen and padding in notify repsonse; (bso#10634).
- kerberos: Make sure we only use prompter type when available;
(bso#11038).
- s3:ctdbd_conn: Make sure we destroy tevent_fd before closing the socket;
(bso#11316).
- dcerpc.idl: accept invalid dcerpc_bind_nak pdus; (bso#11327).
- Fix a deadlock in tdb; (bso#11381).
- s3: smbd: Fix mkdir race condition; (bso#11486).
- pam_winbind: Fix a segfault if initialization fails; (bso#11502).
- s3: dfs: Fix a crash when the dfs targets are disabled; (bso#11509).
- s3: smbd: Fix opening/creating :stream files on the root share
directory; (bso#11522).
- net: Fix a crash with 'net ads keytab create'; (bso#11528).
- s3: smbd: Fix a crash in unix_convert() and a NULL pointer bug
introduced by previous 'raw' stream fix (bso#11522); (bso#11535).
- vfs_fruit: Return value of ad_pack in vfs_fruit.c; (bso#11543).
- vfs_commit: Set the fd on open before calling SMB_VFS_FSTAT; (bso#11547).
- Fix bug in smbstatus where the lease info is not printed; (bso#11549).
- s3:smbstatus: Add stream name to share_entry_forall(); (bso#11550).
- Relocate the tmpfiles.d directory to the client package; (boo#947552).
- Do not provide libpdb0 from libsamba-passdb0 but add it to baselibs.conf
instead; (boo#942716).
- Package /var/lib/samba/private/sock with 0700 permissions; (boo#946051).
- auth/credentials: If credentials have principal set, they are not
anonymous anymore; (bso#11265).
- Fix stream names with colon with "fruit:encoding = native"; (bso#11278).
- s4:rpc_server/netlogon: Fix for NetApp; (bso#11291).
- lib: Fix rundown of open_socket_out(); (bso#11316).
- s3:lib: Fix some corner cases of open_socket_out_cleanup(); (bso#11316).
- vfs:fruit: Implement copyfile style copy_chunk; (bso#11317).
- ctdb-daemon: Return correct sequence number for CONTROL_GET_DB_SEQNUM;
(bso#11398).
- ctdb-scripts: Support monitoring of interestingly named VLANs on bonds;
(bso#11399).
- ctdb-daemon: Improve error handling for running event scripts;
(bso#11431).
- ctdb-daemon: Check if updates are in flight when releasing all IPs;
(bso#11432).
- ctdb-build: Fix building of PCP PMDA module; (bso#11435).
- Backport dcesrv_netr_DsRGetDCNameEx2 fixes; (bso#11454).
- vfs_fruit: Handling of empty resource fork; (bso#11467).
- Avoid quoting problems in user's DNs; (bso#11488).
- s3-auth: Fix "map to guest = Bad uid"; (bso#9862).
- s4:lib/tls: Fix build with gnutls 3.4; (bso#8780).
- s4.2/fsmo.py: Fixed fsmo transfer exception; (bso#10924).
- winbindd: Sync secrets.ldb into secrets.tdb on startup; (bso#10991).
- Logon via MS Remote Desktop hangs; (bso#11061).
- s3: lib: util: Ensure we read a hex number as %x, not %u; (bso#11068).
- tevent: Add a note to tevent_add_fd(); (bso#11141).
- s3:param/loadparm: Fix 'testparm --show-all-parameters'; (bso#11170).
- s3-unix_msg: Remove socket file after closing socket fd; (bso#11217).
- smbd: Fix a use-after-free; (bso#11218); (boo#919309).
- s3-rpc_server: Fix rpc_create_tcpip_sockets() processing of interfaces;
(bso#11245).
- s3:smb2: Add padding to last command in compound requests; (bso#11277).
- Add IPv6 support to ADS client side LDAP connects; (bso#11281).
- Add IPv6 support for determining FQDN during ADS join; (bso#11282).
- s3: IPv6 enabled DNS connections for ADS client; (bso#11283).
- Fix invalid write in ctdb_lock_context_destructor; (bso#11293).
- Excessive cli_resolve_path() usage can slow down transmission;
(bso#11295).
- vfs_fruit: Add option "veto_appledouble"; (bso#11305).
- tstream: Make socketpair nonblocking; (bso#11312).
- idmap_rfc2307: Fix wbinfo '--gid-to-sid' query; (bso#11313).
- Group creation: Add msSFU30Name only when --nis-domain was given;
(bso#11315).
- tevent_fd needs to be destroyed before closing the fd; (bso#11316).
- Build fails on Solaris 11 with "‘PTHREAD_MUTEX_ROBUST’ undeclared";
(bso#11319).
- smbd/trans2: Add a useful diagnostic for files with bad encoding;
(bso#11323).
- Change sharesec output back to previous format; (bso#11324).
- Robust mutex support broken in 1.3.5; (bso#11326).
- Kerberos auth info3 should contain resource group ids available from
pac_logon; winbindd: winbindd_raw_kerberos_login - ensure logon_info
exists in PAC; (bso#11328); (boo#912457).
- s3:smb2_setinfo: Fix memory leak in the defer_rename case; (bso#11329).
- tevent: Fix CID 1035381 Unchecked return value; (bso#11330).
- tdb: Fix CID 1034842 and 1034841 Resource leaks; (bso#11331).
- s3: smbd: Use separate flag to track become_root()/unbecome_root()
state; (bso#11339).
- s3: smbd: Codenomicon crash in do_smb_load_module(); (bso#11342).
- pidl: Make the compilation of PIDL producing the same results if the
content hasn't change; (bso#11356).
- winbindd: Disconnect child process if request is cancelled at main
process; (bso#11358).
- vfs_fruit: Check offset and length for AFP_AfpInfo read requests;
(bso#11363).
- docs: Overhaul the description of "smb encrypt" to include SMB3
encryption; (bso#11366).
- s3:auth_domain: Fix talloc problem in
connect_to_domain_password_server(); (bso#11367).
- ncacn_http: Fix GNUism; (bso#11371).
- Backport changes to use resource group sids obtained from pac
logon_info; (bso#11328); (boo#912457).
- Order winbind.service Before and Want nss-user-lookup target.
- s3:smbXsrv: refactor duplicate code into
smbXsrv_session_clear_and_logoff(); (bso#11182).
- gencache: don't fail gencache_stabilize if there were records to delete;
(bso#11260).
- s3: libsmbclient: After getting attribute server, ensure main srv
pointer is still valid; (bso#11186).
- s4: rpc: Refactor dcesrv_alter() function into setup and send steps;
(bso#11236).
- s3: smbd: Incorrect file size returned in the response of
"FILE_SUPERSEDE Create"; (bso#11240).
- Mangled names do not work with acl_xattr; (bso#11249).
- nmbd rewrites browse.dat when not required; (bso#11254).
- vfs_fruit: add option "nfs_aces" that controls the NFS ACEs stuff;
(bso#11213).
- s3:smbd: Add missing tevent_req_nterror; (bso#11224).
- vfs: kernel_flock and named streams; (bso#11243).
- vfs_gpfs: Error code path doesn't call END_PROFILE; (bso#11244).
- s4: libcli/finddcs_cldap: continue processing CLDAP until all addresses
are used; (bso#11284).
- ctdb: check for talloc_asprintf() failure; (bso#11201).
- spoolss: purge the printer name cache on name change; (bso#11210);
(boo#901813).
- CTDB statd-callout does not scale; (bso#11204).
- vfs_fruit: also map characters below 0x20; (bso#11221).
- ctdb: Coverity fix for CID 1291643; (bso#11201).
- Multiplexed RPC connections are not handled by DCERPC server;
(bso#11225).
- Fix terminate connection behavior for asynchronous endpoint with PUSH
notification flavors; (bso#11226).
- ctdb-scripts: Fix bashism in ctdbd_wrapper script; (bso#11007).
- ctdb: Fix CIDs 1125615, 1125634, 1125613, 1288201 and 1125553;
(bso#11201).
- SMB2 should cancel pending NOTIFY calls with DELETE_PENDING if the
directory is deleted; (bso#11257).
- s3:winbindd: make sure we remove pending io requests before closing
client
- 'sharesec' output no longer matches input format; (bso#11237).
- waf: Fix systemd detection; (bso#11200).
- CTDB: Fix portability issues; (bso#11202).
- CTDB: Fix some IPv6-related issues; (bso#11203).
- CTDB statd-callout does not scale; (bso#11204).
- 'net ads dns gethostbyname' crashes with an error in TALLOC_FREE if you
enter invalid values; (bso#11234).
- libads: record service ticket endtime for sealed ldap connections;
- lib/util: Include DEBUG macro in internal header files before
samba_util.h; (bso#11033).
- Initialize dwFlags field of DNS_RPC_NODE structure; (bso#9791).
- s3: lib: ntlmssp: If NTLMSSP_NEGOTIATE_TARGET_INFO isn't set, cope with
servers that don't send the 2 unused fields; (bso#10016).
- build:wafadmin: Fix use of spaces instead of tabs; (bso#10476).
- waf: Fix the build on openbsd; (bso#10476).
- s3: client: "client use spnego principal = yes" code checks wrong name;
- spoolss: Retrieve published printer GUID if not in registry; (bso#11018).
- vfs_fruit: Enhance handling of malformed AppleDouble files; (bso#11125).
- backupkey: Explicitly link to gnutls and gcrypt; (bso#11135).
- replace: Remove superfluous check for gcrypt header; (bso#11135).
- Backport subunit changes; (bso#11137).
- libcli/auth: Match Declaration of netlogon_creds_cli_context_tmp with
implementation; (bso#11140).
- s3-winbind: Fix cached user group lookup of trusted domains; (bso#11143).
- talloc: Version 2.1.2; (bso#11144).
- Update libwbclient version to 0.12; (bso#11149).
- brlock: Use 0 instead of empty initializer list; (bso#11153).
- s4:auth/gensec_gssapi: Let gensec_gssapi_update() return
- backupkey: Use ndr_pull_struct_blob_all(); (bso#11174).
- Fix lots of winbindd zombie processes on Solaris platform; (bso#11175).
- Prevent samba package updates from disabling samba kerberos printing.
- Add sparse file support for samba; (fate#318424).
- Simplify libxslt build requirement and README.SUSE install.
- Remove no longer required cleanup steps while populating the build root.
- smbd: Stop using vfs_Chdir after SMB_VFS_DISCONNECT; (bso#1115).
- pam_winbind: fix warn_pwd_expire implementation; (bso#9056).
- nsswitch: Fix soname of linux nss_*.so.2 modules; (bso#9299).
- Make 'profiles' work again; (bso#9629).
- s3:smb2_server: protect against integer wrap with "smb2 max credits =
65535"; (bso#9702).
- Make validate_ldb of String(Generalized-Time) accept millisecond format
".000Z"; (bso#9810).
- Use -R linker flag on Solaris, not -rpath; (bso#10112).
- vfs: Add glusterfs manpage; (bso#10240).
- Make 'smbclient' use cached creds; (bso#10279).
- pdb: Fix build issues with shared modules; (bso#10355).
- s4-dns: Add support for BIND 9.10; (bso#10620).
- idmap: Return the correct id type to *id_to_sid methods; (bso#10720).
- printing/cups: Pack requested-attributes with IPP_TAG_KEYWORD;
(bso#10808).
- Don't build vfs_snapper on FreeBSD; (bso#10834).
- nss_winbind: Add getgroupmembership for FreeBSD; (bso#10835).
- idmap_rfc2307: Fix a crash after connection problem to DC; (bso#10837).
- s3: smb2cli: query info return length check was reversed; (bso#10848).
- s3: lib, s3: modules: Fix compilation on Solaris; (bso#10849).
- lib: uid_wrapper: Fix setgroups and syscall detection on a system
without native uid_wrapper library; (bso#10851).
- winbind3: Fix pwent variable substitution; (bso#10852).
- Improve samba-regedit; (bso#10859).
- registry: Don't leave dangling transactions; (bso#10860).
- Fix build of socket_wrapper on systems without SO_PROTOCOL; (bso#10861).
- build: Do not install 'texpect' binary anymore; (bso#10862).
- Fix testparm to show hidden share defaults; (bso#10864).
- libcli/smb: Fix smb2cli_validate_negotiate_info with min=PROTOCOL_NT1
max=PROTOCOL_SMB2_02; (bso#10866).
- Integrate CTDB into top-level Samba build; (bso#10892).
- samba-tool group add: Add option '--nis-domain' and '--gid'; (bso#10895).
- s3-nmbd: Fix netbios name truncation; (bso#10896).
- spoolss: Fix handling of bad EnumJobs levels; (bso#10898).
- Fix smbclient loops doing a directory listing against Mac OS X 10 server
with a non-wildcard path; (bso#10904).
- Fix print job enumeration; (bso#10905); (boo#898031).
- samba-tool: Create NIS enabled users and unixHomeDirectory attribute;
(bso#10909).
- Add support for SMB2 leases; (bso#10911).
- btrfs: Don't leak opened directory handle; (bso#10918).
- s3: nmbd: Ensure NetBIOS names are only 15 characters stored;
(bso#10920).
- s3:smbd: Fix file corruption using "write cache size != 0"; (bso#10921).
- pdb_tdb: Fix a TALLOC/SAFE_FREE mixup; (bso#10932).
- s3-keytab: fix keytab array NULL termination; (bso#10933).
- s3:passdb: fix logic in pdb_set_pw_history(); (bso#10940).
- Cleanup add_string_to_array and usage; (bso#10942).
- dbwrap_ctdb: Pass on mutex flags to tdb_open; (bso#10942).
- Fix RootDSE search with extended dn control; (bso#10949).
- Fix 'samba-tool dns serverinfo <server>' for IPv6; (bso#10952).
- libcli/smb: only force signing of smb2 session setups when binding a new
session; (bso#10958).
- s3-smbclient: Return success if we listed the shares; (bso#10960).
- s3-smbstatus: Fix exit code of profile output; (bso#10961).
- socket_wrapper: Add missing prototype check for eventfd; (bso#10965).
- libcli: SMB2: Pure SMB2-only negprot fix to make us behave as a Windows
client does; (bso#10966).
- vfs_streams_xattr: Check stream type; (bso#10971).
- s3: smbd: Fix *allocate* calls to follow POSIX error return convention;
(bso#10982).
- vfs_fruit: Add support for AAPL; (bso#10983).
- Fix spoolss IDL response marshalling when returning error without
clearing info; (bso#10984).
- dsdb-samldb: Check for extended access rights before we allow changes to
userAccountControl; (bso#10993); CVE-2014-8143; (boo#914279).
- Fix IPv6 support in CTDB; (bso#10996).
- ctdb-daemon: Use correct tdb flags when enabling robust mutex support;
(bso#11000).
- vfs_streams_xattr: Add missing call to SMB_VFS_NEXT_CONNECT; (bso#11005).
- s3-util: Fix authentication with long hostnames; (bso#11008).
- ctdb-build: Fix build without xsltproc; (bso#11014).
- packaging: Include CTDB man pages in the tarball; (bso#11014).
- pdb_get_trusteddom_pw() fails with non valid UTF16 random passwords;
(bso#11016).
- Make Sharepoint search show user documents; (bso#11022).
- nss_wrapper: check for nss.h; (bso#11026).
- Enable mutexes in gencache_notrans.tdb; (bso#11032).
- tdb_wrap: Make mutexes easier to use; (bso#11032).
- lib/util: Avoid collision which alread defined consumer DEBUG macro;
(bso#11033).
- winbind: Retry after SESSION_EXPIRED error in ping-dc; (bso#11034).
- s3-libads: Fix a possible segfault in kerberos_fetch_pac(); (bso#11037).
- vfs_fruit: Fix base_fsp name conversion; (bso#11039).
- vfs_fruit: mmap under FreeBSD needs PROT_READ; (bso#11040).
- Fix authentication using Kerberos (not AD); (bso#11044).
- net: Fix sam addgroupmem; (bso#11051).
- vfs_snapper: Correctly handles multi-byte DBus strings; (bso#11055);
(boo#913238).
- cli_connect_nb_send: Don't segfault on host == NULL; (bso#11058).
- utils: Fix 'net time' segfault; (bso#11058).
- libsmb: Provide authinfo domain for encrypted session referrals;
(bso#11059).
- s3-pam_smbpass: Fix memory leak in pam_sm_authenticate(); (bso#11066).
- vfs_glusterfs: Add comments to the pipe(2) code; (bso#11069).
- vfs/glusterfs: Change xattr key to match gluster key; (bso#11069).
- vfs_glusterfs: Implement AIO support; (bso#11069).
- s3-vfs: Fix developer build of vfs_ceph module; (bso#11070).
- s3: netlogon: Ensure we don't call talloc_free on an uninitialized
pointer; (bso#11077); CVE-2015-0240; (boo#917376).
- vfs: Add a brief vfs_ceph manpage; (bso#11088).
- s3: smbclient: Allinfo leaves the file handle open; (bso#11094).
- Fix Win8.1 Credentials Manager issue after KB2992611 on Samba domain;
(bso#11097).
- debug: Set close-on-exec for the main log file FD; (bso#11100).
- s3: smbd: leases - losen paranoia check. Stat opens can grant leases;
(bso#11102).
- s3: smbd: SMB2 close. If a file has delete on close, store the return
info before deleting; (bso#11104).
- doc:man:vfs_glusterfs: improve the configuration section; (bso#11117).
- snprintf: Try to support %j; (bso#11119).
- ctdb-io: Do not use sys_write to write to client sockets; (bso#11124).
- doc-xml: Add 'sharesec' reference to 'access based share enum';
(bso#11127).
- Fix usage of freed memory on server exit; (bso#11218); (boo#919309).
- Adjust baselibs.conf due to libpdb0 package rename to libsamba-passdb0.
- Add libsamba-debug, libsocket-blocking, libsamba-cluster-support, and
libhttp to the libs package; (boo#913547).
- Rebase File Server Remote VSS Protocol (FSRVP) server against 4.2.0rc1;
(fate#313346).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-462=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
ctdb-4.2.4-34.1
ctdb-debuginfo-4.2.4-34.1
ctdb-devel-4.2.4-34.1
ctdb-pcp-pmda-4.2.4-34.1
ctdb-pcp-pmda-debuginfo-4.2.4-34.1
ctdb-tests-4.2.4-34.1
ctdb-tests-debuginfo-4.2.4-34.1
libdcerpc-atsvc-devel-4.2.4-34.1
libdcerpc-atsvc0-4.2.4-34.1
libdcerpc-atsvc0-debuginfo-4.2.4-34.1
libdcerpc-binding0-4.2.4-34.1
libdcerpc-binding0-debuginfo-4.2.4-34.1
libdcerpc-devel-4.2.4-34.1
libdcerpc-samr-devel-4.2.4-34.1
libdcerpc-samr0-4.2.4-34.1
libdcerpc-samr0-debuginfo-4.2.4-34.1
libdcerpc0-4.2.4-34.1
libdcerpc0-debuginfo-4.2.4-34.1
libgensec-devel-4.2.4-34.1
libgensec0-4.2.4-34.1
libgensec0-debuginfo-4.2.4-34.1
libndr-devel-4.2.4-34.1
libndr-krb5pac-devel-4.2.4-34.1
libndr-krb5pac0-4.2.4-34.1
libndr-krb5pac0-debuginfo-4.2.4-34.1
libndr-nbt-devel-4.2.4-34.1
libndr-nbt0-4.2.4-34.1
libndr-nbt0-debuginfo-4.2.4-34.1
libndr-standard-devel-4.2.4-34.1
libndr-standard0-4.2.4-34.1
libndr-standard0-debuginfo-4.2.4-34.1
libndr0-4.2.4-34.1
libndr0-debuginfo-4.2.4-34.1
libnetapi-devel-4.2.4-34.1
libnetapi0-4.2.4-34.1
libnetapi0-debuginfo-4.2.4-34.1
libregistry-devel-4.2.4-34.1
libregistry0-4.2.4-34.1
libregistry0-debuginfo-4.2.4-34.1
libsamba-credentials-devel-4.2.4-34.1
libsamba-credentials0-4.2.4-34.1
libsamba-credentials0-debuginfo-4.2.4-34.1
libsamba-hostconfig-devel-4.2.4-34.1
libsamba-hostconfig0-4.2.4-34.1
libsamba-hostconfig0-debuginfo-4.2.4-34.1
libsamba-passdb-devel-4.2.4-34.1
libsamba-passdb0-4.2.4-34.1
libsamba-passdb0-debuginfo-4.2.4-34.1
libsamba-policy-devel-4.2.4-34.1
libsamba-policy0-4.2.4-34.1
libsamba-policy0-debuginfo-4.2.4-34.1
libsamba-util-devel-4.2.4-34.1
libsamba-util0-4.2.4-34.1
libsamba-util0-debuginfo-4.2.4-34.1
libsamdb-devel-4.2.4-34.1
libsamdb0-4.2.4-34.1
libsamdb0-debuginfo-4.2.4-34.1
libsmbclient-devel-4.2.4-34.1
libsmbclient-raw-devel-4.2.4-34.1
libsmbclient-raw0-4.2.4-34.1
libsmbclient-raw0-debuginfo-4.2.4-34.1
libsmbclient0-4.2.4-34.1
libsmbclient0-debuginfo-4.2.4-34.1
libsmbconf-devel-4.2.4-34.1
libsmbconf0-4.2.4-34.1
libsmbconf0-debuginfo-4.2.4-34.1
libsmbldap-devel-4.2.4-34.1
libsmbldap0-4.2.4-34.1
libsmbldap0-debuginfo-4.2.4-34.1
libtevent-util-devel-4.2.4-34.1
libtevent-util0-4.2.4-34.1
libtevent-util0-debuginfo-4.2.4-34.1
libwbclient-devel-4.2.4-34.1
libwbclient0-4.2.4-34.1
libwbclient0-debuginfo-4.2.4-34.1
samba-4.2.4-34.1
samba-client-4.2.4-34.1
samba-client-debuginfo-4.2.4-34.1
samba-core-devel-4.2.4-34.1
samba-debuginfo-4.2.4-34.1
samba-debugsource-4.2.4-34.1
samba-libs-4.2.4-34.1
samba-libs-debuginfo-4.2.4-34.1
samba-pidl-4.2.4-34.1
samba-python-4.2.4-34.1
samba-python-debuginfo-4.2.4-34.1
samba-test-4.2.4-34.1
samba-test-debuginfo-4.2.4-34.1
samba-test-devel-4.2.4-34.1
samba-winbind-4.2.4-34.1
samba-winbind-debuginfo-4.2.4-34.1
- openSUSE 13.2 (x86_64):
libdcerpc-atsvc0-32bit-4.2.4-34.1
libdcerpc-atsvc0-debuginfo-32bit-4.2.4-34.1
libdcerpc-binding0-32bit-4.2.4-34.1
libdcerpc-binding0-debuginfo-32bit-4.2.4-34.1
libdcerpc-samr0-32bit-4.2.4-34.1
libdcerpc-samr0-debuginfo-32bit-4.2.4-34.1
libdcerpc0-32bit-4.2.4-34.1
libdcerpc0-debuginfo-32bit-4.2.4-34.1
libgensec0-32bit-4.2.4-34.1
libgensec0-debuginfo-32bit-4.2.4-34.1
libndr-krb5pac0-32bit-4.2.4-34.1
libndr-krb5pac0-debuginfo-32bit-4.2.4-34.1
libndr-nbt0-32bit-4.2.4-34.1
libndr-nbt0-debuginfo-32bit-4.2.4-34.1
libndr-standard0-32bit-4.2.4-34.1
libndr-standard0-debuginfo-32bit-4.2.4-34.1
libndr0-32bit-4.2.4-34.1
libndr0-debuginfo-32bit-4.2.4-34.1
libnetapi0-32bit-4.2.4-34.1
libnetapi0-debuginfo-32bit-4.2.4-34.1
libregistry0-32bit-4.2.4-34.1
libregistry0-debuginfo-32bit-4.2.4-34.1
libsamba-credentials0-32bit-4.2.4-34.1
libsamba-credentials0-debuginfo-32bit-4.2.4-34.1
libsamba-hostconfig0-32bit-4.2.4-34.1
libsamba-hostconfig0-debuginfo-32bit-4.2.4-34.1
libsamba-passdb0-32bit-4.2.4-34.1
libsamba-passdb0-debuginfo-32bit-4.2.4-34.1
libsamba-policy0-32bit-4.2.4-34.1
libsamba-policy0-debuginfo-32bit-4.2.4-34.1
libsamba-util0-32bit-4.2.4-34.1
libsamba-util0-debuginfo-32bit-4.2.4-34.1
libsamdb0-32bit-4.2.4-34.1
libsamdb0-debuginfo-32bit-4.2.4-34.1
libsmbclient-raw0-32bit-4.2.4-34.1
libsmbclient-raw0-debuginfo-32bit-4.2.4-34.1
libsmbclient0-32bit-4.2.4-34.1
libsmbclient0-debuginfo-32bit-4.2.4-34.1
libsmbconf0-32bit-4.2.4-34.1
libsmbconf0-debuginfo-32bit-4.2.4-34.1
libsmbldap0-32bit-4.2.4-34.1
libsmbldap0-debuginfo-32bit-4.2.4-34.1
libtevent-util0-32bit-4.2.4-34.1
libtevent-util0-debuginfo-32bit-4.2.4-34.1
libwbclient0-32bit-4.2.4-34.1
libwbclient0-debuginfo-32bit-4.2.4-34.1
samba-32bit-4.2.4-34.1
samba-client-32bit-4.2.4-34.1
samba-client-debuginfo-32bit-4.2.4-34.1
samba-debuginfo-32bit-4.2.4-34.1
samba-libs-32bit-4.2.4-34.1
samba-libs-debuginfo-32bit-4.2.4-34.1
samba-winbind-32bit-4.2.4-34.1
samba-winbind-debuginfo-32bit-4.2.4-34.1
- openSUSE 13.2 (noarch):
samba-doc-4.2.4-34.1
References:
https://www.suse.com/security/cve/CVE-2014-8143.html
https://www.suse.com/security/cve/CVE-2015-0240.html
https://www.suse.com/security/cve/CVE-2015-3223.html
https://www.suse.com/security/cve/CVE-2015-5252.html
https://www.suse.com/security/cve/CVE-2015-5296.html
https://www.suse.com/security/cve/CVE-2015-5299.html
https://www.suse.com/security/cve/CVE-2015-5330.html
https://www.suse.com/security/cve/CVE-2015-5370.html
https://www.suse.com/security/cve/CVE-2015-7560.html
https://www.suse.com/security/cve/CVE-2015-8467.html
https://www.suse.com/security/cve/CVE-2016-2110.html
https://www.suse.com/security/cve/CVE-2016-2111.html
https://www.suse.com/security/cve/CVE-2016-2112.html
https://www.suse.com/security/cve/CVE-2016-2113.html
https://www.suse.com/security/cve/CVE-2016-2115.html
https://www.suse.com/security/cve/CVE-2016-2118.html
https://bugzilla.suse.com/898031
https://bugzilla.suse.com/901813
https://bugzilla.suse.com/912457
https://bugzilla.suse.com/913238
https://bugzilla.suse.com/913547
https://bugzilla.suse.com/914279
https://bugzilla.suse.com/917376
https://bugzilla.suse.com/919309
https://bugzilla.suse.com/924519
https://bugzilla.suse.com/936862
https://bugzilla.suse.com/942716
https://bugzilla.suse.com/946051
https://bugzilla.suse.com/947552
https://bugzilla.suse.com/949022
https://bugzilla.suse.com/958581
https://bugzilla.suse.com/958582
https://bugzilla.suse.com/958583
https://bugzilla.suse.com/958584
https://bugzilla.suse.com/958585
https://bugzilla.suse.com/958586
https://bugzilla.suse.com/964023
https://bugzilla.suse.com/966271
https://bugzilla.suse.com/968222
https://bugzilla.suse.com/968973
https://bugzilla.suse.com/971965
https://bugzilla.suse.com/972197
https://bugzilla.suse.com/973031
https://bugzilla.suse.com/973032
https://bugzilla.suse.com/973033
https://bugzilla.suse.com/973034
https://bugzilla.suse.com/973036
https://bugzilla.suse.com/973832
https://bugzilla.suse.com/974629
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:1061-1: important: Security update for Chromium
by opensuse-security@opensuse.org 17 Apr '16
by opensuse-security@opensuse.org 17 Apr '16
17 Apr '16
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1061-1
Rating: important
References: #975572
Cross-References: CVE-2016-1651 CVE-2016-1652 CVE-2016-1653
CVE-2016-1654 CVE-2016-1655 CVE-2016-1656
CVE-2016-1657 CVE-2016-1658 CVE-2016-1659
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
Chromium was updated to 50.0.2661.75 to fix the following vulnerabilities:
- CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding
- CVE-2016-1652: Universal XSS in extension bindings
- CVE-2016-1653: Out-of-bounds write in V8
- CVE-2016-1654: Uninitialized memory read in media
- CVE-2016-1655: Use-after-free related to extensions
- CVE-2016-1656: Android downloaded file path restriction bypass
- CVE-2016-1657: Address bar spoofing
- CVE-2016-1658: Potential leak of sensitive information to malicious
extensions
- CVE-2016-1659: Various fixes from internal audits, fuzzing and other
initiatives
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch 4965=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (x86_64):
chromedriver-50.0.2661.75-41.1
chromedriver-debuginfo-50.0.2661.75-41.1
chromium-50.0.2661.75-41.1
chromium-debuginfo-50.0.2661.75-41.1
chromium-debugsource-50.0.2661.75-41.1
chromium-desktop-gnome-50.0.2661.75-41.1
chromium-desktop-kde-50.0.2661.75-41.1
chromium-ffmpegsumo-50.0.2661.75-41.1
chromium-ffmpegsumo-debuginfo-50.0.2661.75-41.1
References:
https://www.suse.com/security/cve/CVE-2016-1651.html
https://www.suse.com/security/cve/CVE-2016-1652.html
https://www.suse.com/security/cve/CVE-2016-1653.html
https://www.suse.com/security/cve/CVE-2016-1654.html
https://www.suse.com/security/cve/CVE-2016-1655.html
https://www.suse.com/security/cve/CVE-2016-1656.html
https://www.suse.com/security/cve/CVE-2016-1657.html
https://www.suse.com/security/cve/CVE-2016-1658.html
https://www.suse.com/security/cve/CVE-2016-1659.html
https://bugzilla.suse.com/975572
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0