openSUSE Security Announce
Threads by month
- ----- 2024 -----
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
February 2017
- 1 participants
- 49 discussions
[security-announce] SUSE-SU-2017:0582-1: important: Security update for xen
by opensuse-security@opensuse.org 28 Feb '17
by opensuse-security@opensuse.org 28 Feb '17
28 Feb '17
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0582-1
Rating: important
References: #1000195 #1002496 #1013657 #1013668 #1014490
#1014507 #1015169 #1016340 #1022627 #1022871
#1023004 #1024183 #1024186 #1024307 #1024834
#1025188 #907805
Cross-References: CVE-2014-8106 CVE-2016-10155 CVE-2016-9101
CVE-2016-9776 CVE-2016-9907 CVE-2016-9911
CVE-2016-9921 CVE-2016-9922 CVE-2017-2615
CVE-2017-2620 CVE-2017-5579 CVE-2017-5856
CVE-2017-5898 CVE-2017-5973
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves 14 vulnerabilities and has three
fixes is now available.
Description:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-5973: A infinite loop while doing control transfer in
xhci_kick_epctx allowed privileged user inside the guest to crash the
host process resulting in DoS (bsc#1025188)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was
vulnerable to a memory leakage issue allowing a privileged user to cause
a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
cirrus_bitblt_cputovideo failed to check the memory region, allowing for
an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation
support was vulnerable to a memory leakage issue allowing a privileged
user to leak host memory resulting in DoS (bsc#1024186)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to
an integer overflow flaw allowing a privileged user to crash the Qemu
process on the host resulting in DoS (bsc#1024307)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed
a malicious guest administrator to cause an out of bounds memory access,
possibly leading to information disclosure or privilege escalation
(bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator
allowed local guest users to execute arbitrary code via vectors related
to blit regions (bsc#907805).
- A malicious guest could have, by frequently rebooting over extended
periods of time, run the host system out of memory, resulting in a
Denial of Service (DoS) (bsc#1022871)
- CVE-2017-5579: The 16550A UART serial device emulation support was
vulnerable to a memory leakage issue allowing a privileged user to cause
a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a
memory leakage flaw when destroying the USB redirector in
'usbredir_handle_destroy'. A guest user/process could have used this
issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory
leakage issue while processing packet data in 'ehci_init_transfer'. A
guest user/process could have used this issue to leak host memory,
resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
to a divide by zero issue while copying VGA data. A privileged user
inside guest could have used this flaw to crash the process instance on
the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
to a divide by zero issue while copying VGA data. A privileged user
inside guest could have used this flaw to crash the process instance on
the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS
administrators to cause a denial of service (memory consumption and QEMU
process crash) by repeatedly unplugging an i8255x (PRO100) NIC device
(bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support
was vulnerable to an infinite loop issue while receiving packets in
'mcf_fec_receive'. A privileged user/process inside guest could have
used this issue to crash the Qemu process on the host leading to DoS
(bsc#1013657)
These non-security issues were fixed:
- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-299=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-299=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
xen-4.4.4_14-22.33.1
xen-debugsource-4.4.4_14-22.33.1
xen-doc-html-4.4.4_14-22.33.1
xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1
xen-kmp-default-debuginfo-4.4.4_14_k3.12.61_52.66-22.33.1
xen-libs-32bit-4.4.4_14-22.33.1
xen-libs-4.4.4_14-22.33.1
xen-libs-debuginfo-32bit-4.4.4_14-22.33.1
xen-libs-debuginfo-4.4.4_14-22.33.1
xen-tools-4.4.4_14-22.33.1
xen-tools-debuginfo-4.4.4_14-22.33.1
xen-tools-domU-4.4.4_14-22.33.1
xen-tools-domU-debuginfo-4.4.4_14-22.33.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
xen-4.4.4_14-22.33.1
xen-debugsource-4.4.4_14-22.33.1
xen-doc-html-4.4.4_14-22.33.1
xen-kmp-default-4.4.4_14_k3.12.61_52.66-22.33.1
xen-kmp-default-debuginfo-4.4.4_14_k3.12.61_52.66-22.33.1
xen-libs-32bit-4.4.4_14-22.33.1
xen-libs-4.4.4_14-22.33.1
xen-libs-debuginfo-32bit-4.4.4_14-22.33.1
xen-libs-debuginfo-4.4.4_14-22.33.1
xen-tools-4.4.4_14-22.33.1
xen-tools-debuginfo-4.4.4_14-22.33.1
xen-tools-domU-4.4.4_14-22.33.1
xen-tools-domU-debuginfo-4.4.4_14-22.33.1
References:
https://www.suse.com/security/cve/CVE-2014-8106.html
https://www.suse.com/security/cve/CVE-2016-10155.html
https://www.suse.com/security/cve/CVE-2016-9101.html
https://www.suse.com/security/cve/CVE-2016-9776.html
https://www.suse.com/security/cve/CVE-2016-9907.html
https://www.suse.com/security/cve/CVE-2016-9911.html
https://www.suse.com/security/cve/CVE-2016-9921.html
https://www.suse.com/security/cve/CVE-2016-9922.html
https://www.suse.com/security/cve/CVE-2017-2615.html
https://www.suse.com/security/cve/CVE-2017-2620.html
https://www.suse.com/security/cve/CVE-2017-5579.html
https://www.suse.com/security/cve/CVE-2017-5856.html
https://www.suse.com/security/cve/CVE-2017-5898.html
https://www.suse.com/security/cve/CVE-2017-5973.html
https://bugzilla.suse.com/1000195
https://bugzilla.suse.com/1002496
https://bugzilla.suse.com/1013657
https://bugzilla.suse.com/1013668
https://bugzilla.suse.com/1014490
https://bugzilla.suse.com/1014507
https://bugzilla.suse.com/1015169
https://bugzilla.suse.com/1016340
https://bugzilla.suse.com/1022627
https://bugzilla.suse.com/1022871
https://bugzilla.suse.com/1023004
https://bugzilla.suse.com/1024183
https://bugzilla.suse.com/1024186
https://bugzilla.suse.com/1024307
https://bugzilla.suse.com/1024834
https://bugzilla.suse.com/1025188
https://bugzilla.suse.com/907805
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0575-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 28 Feb '17
by opensuse-security@opensuse.org 28 Feb '17
28 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0575-1
Rating: important
References: #1000092 #1000619 #1003077 #1005918 #1006469
#1006472 #1007729 #1008742 #1009546 #1009674
#1009718 #1009911 #1010612 #1010690 #1010933
#1011176 #1011602 #1011660 #1011913 #1012382
#1012422 #1012829 #1012910 #1013000 #1013001
#1013273 #1013540 #1013792 #1013994 #1014120
#1014410 #1015038 #1015367 #1015840 #1016250
#1016403 #1016517 #1016884 #1016979 #1017164
#1017170 #1017410 #1018100 #1018316 #1018358
#1018446 #1018813 #1018913 #1019061 #1019148
#1019168 #1019260 #1019351 #1019594 #1019630
#1019631 #1019784 #1019851 #1020048 #1020214
#1020488 #1020602 #1020685 #1020817 #1020945
#1020975 #1021082 #1021248 #1021251 #1021258
#1021260 #1021294 #1021455 #1021474 #1022304
#1022429 #1022476 #1022547 #1022559 #1022971
#1023101 #1023175 #1023762 #1023884 #1023888
#1024081 #1024234 #1024508 #1024938 #1025235
#921494 #959709 #964944 #969476 #969477 #969479
#971975 #974215 #981709 #982783 #985561 #987192
#987576 #989056 #991273 #998106
Cross-References: CVE-2015-8709 CVE-2016-7117 CVE-2016-9806
CVE-2017-2583 CVE-2017-2584 CVE-2017-5551
CVE-2017-5576 CVE-2017-5577 CVE-2017-5897
CVE-2017-5970 CVE-2017-5986
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise High Availability 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________
An update that solves 11 vulnerabilities and has 95 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.49 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
function in net/socket.c in the Linux kernel allowed remote attackers to
execute arbitrary code via vectors involving a recvmmsg system call that
was mishandled during error processing (bnc#1003077).
- CVE-2017-5576: Integer overflow in the vc4_get_bcl function in
drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux
kernel allowed local users to cause a denial of service or possibly have
unspecified
other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call
(bnc#1021294).
- CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c
in the VideoCore DRM driver in the Linux kernel did not set an errno
value upon certain overflow detections, which allowed local users to
cause a denial of service (incorrect pointer dereference and OOPS) via
inconsistent size values in a VC4_SUBMIT_CL ioctl call (bnc#1021294).
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the
Linux kernel preserved the setgid bit during a setxattr call involving a
tmpfs filesystem, which allowed local users to gain group privileges by
leveraging the existence of a setgid program with restrictions on
execute permissions. (bnc#1021258).
- CVE-2017-2583: The load_segment_descriptor implementation in
arch/x86/kvm/emulate.c in the Linux kernel improperly emulated a "MOV
SS, NULL selector" instruction, which allowed guest OS users to cause a
denial of service (guest OS crash) or gain guest OS privileges via a
crafted application (bnc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local
users to obtain sensitive information from kernel memory or cause a
denial of service (use-after-free) via a crafted application that
leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt
(bnc#1019851).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
gid mappings, which allowed local users to gain privileges by
establishing a user namespace, waiting for a root process to enter that
namespace with an unsafe uid or gid, and then using the ptrace system
call. NOTE: the vendor states "there is no kernel bug here"
(bnc#1010933).
- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to
cause a denial of service (double free) or possibly have unspecified
other impact via a crafted application that made sendmsg system calls,
leading to a free
operation associated with a new dump that started earlier than
anticipated (bnc#1013540).
- CVE-2017-5897: fixed a bug in the Linux kernel IPv6 implementation which
allowed remote attackers to trigger an out-of-bounds access, leading to
a denial-of-service attack (bnc#1023762).
- CVE-2017-5970: Fixed a possible denial-of-service that could have been
triggered by sending bad IP options on a socket (bsc#1024938).
- CVE-2017-5986: an application could have triggered a BUG_ON() in
sctp_wait_for_sndbuf() if the socket TX buffer was full, a thread was
waiting
on it to queue more data, and meanwhile another thread peeled off the
association being used by the first thread (bsc#1025235).
The following non-security bugs were fixed:
- 8250: fintek: rename IRQ_MODE macro (boo#1009546).
- acpi: nfit, libnvdimm: fix / harden ars_status output length handling
(bsc#1023175).
- acpi: nfit: fix bus vs dimm confusion in xlat_status (bsc#1023175).
- acpi: nfit: validate ars_status output buffer size (bsc#1023175).
- arm64: numa: fix incorrect log for memory-less node (bsc#1019631).
- asoc: cht_bsw_rt5645: Fix leftover kmalloc (bsc#1010690).
- asoc: rt5670: add HS ground control (bsc#1016250).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1021260).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1019784).
- blk-mq: Allow timeouts to run while queue is freezing (bsc#1020817).
- blk-mq: Always schedule hctx->next_cpu (bsc#1020817).
- blk-mq: Avoid memory reclaim when remapping queues (bsc#1020817).
- blk-mq: Fix failed allocation path when mapping queues (bsc#1020817).
- blk-mq: do not overwrite rq->mq_ctx (bsc#1020817).
- blk-mq: improve warning for running a queue on the wrong CPU
(bsc#1020817).
- block: Change extern inline to static inline (bsc#1023175).
- bluetooth: btmrvl: fix hung task warning dump (bsc#1018813).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- brcmfmac: Change error print on wlan0 existence (bsc#1000092).
- btrfs: add support for RENAME_EXCHANGE and RENAME_WHITEOUT (bsc#1020975).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in
btrfs_ioctl (bsc#1018100).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
(bsc#1018100).
- btrfs: fix inode leak on failure to setup whiteout inode in rename
(bsc#1020975).
- btrfs: fix lockdep warning about log_mutex (bsc#1021455).
- btrfs: fix lockdep warning on deadlock against an inode's log mutex
(bsc#1021455).
- btrfs: fix number of transaction units for renames with whiteout
(bsc#1020975).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir
(bsc#981709).
- btrfs: incremental send, fix invalid paths for rename operations
(bsc#1018316).
- btrfs: incremental send, fix premature rmdir operations (bsc#1018316).
- btrfs: pin log earlier when renaming (bsc#1020975).
- btrfs: pin logs earlier when doing a rename exchange operation
(bsc#1020975).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir()
(bsc#981709).
- btrfs: send, add missing error check for calls to path_loop()
(bsc#1018316).
- btrfs: send, avoid incorrect leaf accesses when sending utimes
operations (bsc#1018316).
- btrfs: send, fix failure to move directories with the same name around
(bsc#1018316).
- btrfs: send, fix invalid leaf accesses due to incorrect utimes
operations (bsc#1018316).
- btrfs: send, fix warning due to late freeing of orphan_dir_info
structures (bsc#1018316).
- btrfs: test_check_exists: Fix infinite loop when searching for free
space entries (bsc#987192).
- btrfs: unpin log if rename operation fails (bsc#1020975).
- btrfs: unpin logs if rename exchange operation fails (bsc#1020975).
- ceph: fix bad endianness handling in parse_reply_info_extra
(bsc#1020488).
- clk: xgene: Add PMD clock (bsc#1019351).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019351).
- clk: xgene: Remove CLK_IS_ROOT (bsc#1019351).
- config: enable CONFIG_OCFS2_DEBUG_MASKLOG for ocfs2 (bsc#1015038)
- config: enable Ceph kernel client modules for ppc64le
- config: enable Ceph kernel client modules for s390x
- crypto: FIPS - allow tests to be disabled in FIPS mode (bsc#1018913).
- crypto: drbg - do not call drbg_instantiate in healt test (bsc#1018913).
- crypto: drbg - remove FIPS 140-2 continuous test (bsc#1018913).
- crypto: qat - fix bar discovery for c62x (bsc#1021251).
- crypto: qat - zero esram only for DH85x devices (bsc#1021248).
- crypto: rsa - allow keys >= 2048 bits in FIPS mode (bsc#1018913).
- crypto: xts - consolidate sanity check for keys (bsc#1018913).
- crypto: xts - fix compile errors (bsc#1018913).
- cxl: fix potential NULL dereference in free_adapter() (bsc#1016517).
- dax: fix deadlock with DAX 4k holes (bsc#1012829).
- dax: fix device-dax region base (bsc#1023175).
- device-dax: check devm_nsio_enable() return value (bsc#1023175).
- device-dax: fail all private mapping attempts (bsc#1023175).
- device-dax: fix percpu_ref_exit ordering (bsc#1023175).
- driver core: fix race between creating/querying glue dir and its cleanup
(bnc#1008742).
- drivers: hv: Introduce a policy for controlling channel affinity.
- drivers: hv: balloon: Add logging for dynamic memory operations.
- drivers: hv: balloon: Disable hot add when CONFIG_MEMORY_HOTPLUG is not
set.
- drivers: hv: balloon: Fix info request to show max page count.
- drivers: hv: balloon: Use available memory value in pressure report.
- drivers: hv: balloon: account for gaps in hot add regions.
- drivers: hv: balloon: keep track of where ha_region starts.
- drivers: hv: balloon: replace ha_region_mutex with spinlock.
- drivers: hv: cleanup vmbus_open() for wrap around mappings.
- drivers: hv: do not leak memory in vmbus_establish_gpadl().
- drivers: hv: get rid of id in struct vmbus_channel.
- drivers: hv: get rid of redundant messagecount in create_gpadl_header().
- drivers: hv: get rid of timeout in vmbus_open().
- drivers: hv: make VMBus bus ids persistent.
- drivers: hv: ring_buffer: count on wrap around mappings in
get_next_pkt_raw() (v2).
- drivers: hv: ring_buffer: use wrap around mappings in hv_copy{from,
to}_ringbuffer().
- drivers: hv: ring_buffer: wrap around mappings for ring buffers.
- drivers: hv: utils: Check VSS daemon is listening before a hot backup.
- drivers: hv: utils: Continue to poll VSS channel after handling requests.
- drivers: hv: utils: Fix the mapping between host version and protocol to
use.
- drivers: hv: utils: reduce HV_UTIL_NEGO_TIMEOUT timeout.
- drivers: hv: vmbus: Base host signaling strictly on the ring state.
- drivers: hv: vmbus: Enable explicit signaling policy for NIC channels.
- drivers: hv: vmbus: Implement a mechanism to tag the channel for low
latency.
- drivers: hv: vmbus: Make mmio resource local.
- drivers: hv: vmbus: On the read path cleanup the logic to interrupt the
host.
- drivers: hv: vmbus: On write cleanup the logic to interrupt the host.
- drivers: hv: vmbus: Reduce the delay between retries in vmbus_post_msg().
- drivers: hv: vmbus: finally fix hv_need_to_signal_on_read().
- drivers: hv: vmbus: fix the race when querying and updating the percpu
list.
- drivers: hv: vmbus: suppress some "hv_vmbus: Unknown GUID" warnings.
- drivers: hv: vss: Improve log messages.
- drivers: hv: vss: Operation timeouts should match host expectation.
- drivers: net: phy: mdio-xgene: Add hardware dependency (bsc#1019351).
- drivers: net: phy: xgene: Fix 'remove' function (bsc#1019351).
- drivers: net: xgene: Add change_mtu function (bsc#1019351).
- drivers: net: xgene: Add flow control configuration (bsc#1019351).
- drivers: net: xgene: Add flow control initialization (bsc#1019351).
- drivers: net: xgene: Add helper function (bsc#1019351).
- drivers: net: xgene: Add support for Jumbo frame (bsc#1019351).
- drivers: net: xgene: Configure classifier with pagepool (bsc#1019351).
- drivers: net: xgene: Fix MSS programming (bsc#1019351).
- drivers: net: xgene: fix build after change_mtu function change
(bsc#1019351).
- drivers: net: xgene: fix: Coalescing values for v2 hardware
(bsc#1019351).
- drivers: net: xgene: fix: Disable coalescing on v1 hardware
(bsc#1019351).
- drivers: net: xgene: fix: RSS for non-TCP/UDP (bsc#1019351).
- drivers: net: xgene: fix: Use GPIO to get link status (bsc#1019351).
- drivers: net: xgene: uninitialized variable in
xgene_enet_free_pagepool() (bsc#1019351).
- drm: Delete previous two fixes for i915 (bsc#1019061). These upstream
fixes brought some regressions, so better to revert for now.
- drm: Disable
patches.drivers/drm-i915-Exit-cherryview_irq_handler-after-one-pass The
patch seems leading to the instability on Wyse box (bsc#1015367).
- drm: Fix broken VT switch with video=1366x768 option (bsc#1018358).
- drm: Use u64 for intermediate dotclock calculations (bnc#1006472).
- drm: i915: Do not init hpd polling for vlv and chv from
runtime_suspend() (bsc#1014120).
- drm: i915: Fix PCODE polling during CDCLK change notification
(bsc#1015367).
- drm: i915: Fix watermarks for VLV/CHV (bsc#1011176).
- drm: i915: Force VDD off on the new power seqeuencer before starting to
use it (bsc#1009674).
- drm: i915: Mark CPU cache as dirty when used for rendering (bsc#1015367).
- drm: i915: Mark i915_hpd_poll_init_work as static (bsc#1014120).
- drm: i915: Prevent PPS stealing from a normal DP port on VLV/CHV
(bsc#1019061).
- drm: i915: Prevent enabling hpd polling in late suspend (bsc#1014120).
- drm: i915: Restore PPS HW state from the encoder resume hook
(bsc#1019061).
- drm: i915: Workaround for DP DPMS D3 on Dell monitor (bsc#1019061).
- drm: vc4: Fix an integer overflow in temporary allocation layout
(bsc#1021294).
- drm: vc4: Return -EINVAL on the overflow checks failing (bsc#1021294).
- drm: virtio-gpu: get the fb from the plane state for atomic updates
(bsc#1023101).
- edac: xgene: Fix spelling mistake in error messages (bsc#1019351).
- efi: libstub: Move Graphics Output Protocol handling to generic code
(bnc#974215).
- fbcon: Fix vc attr at deinit (bsc#1000619).
- fs: nfs: avoid including "mountproto=" with no protocol in /proc/mounts
(bsc#1019260).
- gpio: xgene: make explicitly non-modular (bsc#1019351).
- hv: acquire vmbus_connection.channel_mutex in vmbus_free_channels().
- hv: change clockevents unbind tactics.
- hv: do not reset hv_context.tsc_page on crash.
- hv_netvsc: Add handler for physical link speed change.
- hv_netvsc: Add query for initial physical link speed.
- hv_netvsc: Implement batching of receive completions.
- hv_netvsc: Revert "make inline functions static".
- hv_netvsc: Revert "report vmbus name in ethtool".
- hv_netvsc: add ethtool statistics for tx packet issues.
- hv_netvsc: count multicast packets received.
- hv_netvsc: dev hold/put reference to VF.
- hv_netvsc: fix a race between netvsc_send() and netvsc_init_buf().
- hv_netvsc: fix comments.
- hv_netvsc: fix rtnl locking in callback.
- hv_netvsc: improve VF device matching.
- hv_netvsc: init completion during alloc.
- hv_netvsc: make RSS hash key static.
- hv_netvsc: make device_remove void.
- hv_netvsc: make inline functions static.
- hv_netvsc: make netvsc_destroy_buf void.
- hv_netvsc: make variable local.
- hv_netvsc: rearrange start_xmit.
- hv_netvsc: refactor completion function.
- hv_netvsc: remove VF in flight counters.
- hv_netvsc: remove excessive logging on MTU change.
- hv_netvsc: report vmbus name in ethtool.
- hv_netvsc: simplify callback event code.
- hv_netvsc: style cleanups.
- hv_netvsc: use ARRAY_SIZE() for NDIS versions.
- hv_netvsc: use RCU to protect vf_netdev.
- hv_netvsc: use consume_skb.
- hv_netvsc: use kcalloc.
- hyperv: Fix spelling of HV_UNKOWN.
- i2c: designware-baytrail: Disallow the CPU to enter C6 or C7 while
holding the punit semaphore (bsc#1011913).
- i2c: designware: Implement support for SMBus block read and write
(bsc#1019351).
- i2c: designware: fix wrong Tx/Rx FIFO for ACPI (bsc#1019351).
- i2c: xgene: Fix missing code of DTB support (bsc#1019351).
- i40e: Be much more verbose about what we can and cannot offload
(bsc#985561).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit
(bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Workaround for igb i210 firmware issue (bsc#1009911).
- igb: add i211 to i210 PHY workaround (bsc#1009911).
- input: i8042: Trust firmware a bit more when probing on X86
(bsc#1011660).
- intel_idle: Add KBL support (bsc#1016884).
- ip6_gre: fix ip6gre_err() invalid reads (CVE-2017-5897, bsc#1023762).
- ipc: msg, make msgrcv work with LONG_MIN (bnc#1005918).
- iwlwifi: Expose the default fallback ucode API to module info
(boo#1021082, boo#1023884).
- kgraft: iscsi-target: Do not block kGraft in iscsi_np kthread
(bsc#1010612).
- kgraft: xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- libnvdimm: pfn: fix align attribute (bsc#1023175).
- mailbox: xgene-slimpro: Fix wrong test for devm_kzalloc (bsc#1019351).
- md linear: fix a race between linear_add() and linear_congested()
(bsc#1018446).
- md-cluster: convert the completion to wait queue.
- md-cluster: protect md_find_rdev_nr_rcu with rcu lock.
- md: ensure md devices are freed before module is unloaded (bsc#1022304).
- md: fix refcount problem on mddev when stopping array (bsc#1022304).
- misc: genwqe: ensure zero initialization.
- mm: do not loop on GFP_REPEAT high order requests if there is no reclaim
progress (bnc#1013000).
- mm: memcg: do not retry precharge charges (bnc#1022559).
- mm: page_alloc: fix check for NULL preferred_zone (bnc#971975 VM
performance -- page allocator).
- mm: page_alloc: fix fast-path race with cpuset update or removal
(bnc#971975 VM performance -- page allocator).
- mm: page_alloc: fix premature OOM when racing with cpuset mems update
(bnc#971975 VM performance -- page allocator).
- mm: page_alloc: keep pcp count and list contents in sync if struct page
is corrupted (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: move cpuset seqcount checking to slowpath (bnc#971975 VM
performance -- page allocator).
- mmc: sdhci-of-arasan: Remove no-hispd and no-cmd23 quirks for
sdhci-arasan4.9a (bsc#1019351).
- mwifiex: add missing check for PCIe8997 chipset (bsc#1018813).
- mwifiex: fix IBSS data path issue (bsc#1018813).
- mwifiex: fix PCIe register information for 8997 chipset (bsc#1018813).
- net: af_iucv: do not use paged skbs for TX on HiperSockets (bnc#1020945,
LTC#150566).
- net: ethernet: apm: xgene: use phydev from struct net_device
(bsc#1019351).
- net: ethtool: Initialize buffer when querying device channel settings
(bsc#969479).
- net: hyperv: avoid uninitialized variable.
- net: implement netif_cond_dbg macro (bsc#1019168).
- net: remove useless memset's in drivers get_stats64 (bsc#1019351).
- net: xgene: avoid bogus maybe-uninitialized warning (bsc#1019351).
- net: xgene: fix backward compatibility fix (bsc#1019351).
- net: xgene: fix error handling during reset (bsc#1019351).
- net: xgene: move xgene_cle_ptree_ewdn data off stack (bsc#1019351).
- netvsc: Remove mistaken udp.h inclusion.
- netvsc: add rcu_read locking to netvsc callback.
- netvsc: fix checksum on UDP IPV6.
- netvsc: reduce maximum GSO size.
- nfit: fail DSMs that return non-zero status by default (bsc#1023175).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period
(bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nvdimm: kabi protect nd_cmd_out_size() (bsc#1023175).
- nvme: apply DELAY_BEFORE_CHK_RDY quirk at probe time too (bsc#1020685).
- ocfs2: fix deadlock on mmapped page in ocfs2_write_begin_nolock()
(bnc#921494).
- pci: Add devm_request_pci_bus_resources() (bsc#1019351).
- pci: generic: Fix pci_remap_iospace() failure path (bsc#1019630).
- pci: hv: Allocate physically contiguous hypercall params buffer.
- pci: hv: Fix hv_pci_remove() for hot-remove.
- pci: hv: Handle hv_pci_generic_compl() error case.
- pci: hv: Handle vmbus_sendpacket() failure in hv_compose_msi_msg().
- pci: hv: Make unnecessarily global IRQ masking functions static.
- pci: hv: Remove the unused 'wrk' in struct hv_pcibus_device.
- pci: hv: Use list_move_tail() instead of list_del() + list_add_tail().
- pci: hv: Use pci_function_description in struct definitions.
- pci: hv: Use the correct buffer size in new_pcichild_device().
- pci: hv: Use zero-length array in struct pci_packet.
- pci: include header file (bsc#964944).
- pci: xgene: Add local struct device pointers (bsc#1019351).
- pci: xgene: Add register accessors (bsc#1019351).
- pci: xgene: Free bridge resource list on failure (bsc#1019351).
- pci: xgene: Make explicitly non-modular (bsc#1019351).
- pci: xgene: Pass struct xgene_pcie_port to setup functions (bsc#1019351).
- pci: xgene: Remove unused platform data (bsc#1019351).
- pci: xgene: Request host bridge window resources (bsc#1019351).
- perf: xgene: Remove bogus IS_ERR() check (bsc#1019351).
- phy: xgene: rename "enum phy_mode" to "enum xgene_phy_mode"
(bsc#1019351).
- power: reset: xgene-reboot: Unmap region obtained by of_iomap
(bsc#1019351).
- powerpc: fadump: Fix the race in crash_fadump() (bsc#1022971).
- qeth: check not more than 16 SBALEs on the completion queue
(bnc#1009718, LTC#148203).
- raid1: Fix a regression observed during the rebuilding of degraded
MDRAID VDs (bsc#1020048).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm: kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm: kernel-binary.spec.in: Fix installation of /etc/uefi/certs
(bsc#1019594)
- rtc: cmos: Clear ACPI-driven alarms upon resume (bsc#1022429).
- rtc: cmos: Do not enable interrupts in the middle of the interrupt
handler (bsc#1022429).
- rtc: cmos: Restore alarm after resume (bsc#1022429).
- rtc: cmos: avoid unused function warning (bsc#1022429).
- s390: Fix invalid domain response handling (bnc#1009718).
- s390: cpuinfo: show maximum thread id (bnc#1009718, LTC#148580).
- s390: sysinfo: show partition extended name and UUID if available
(bnc#1009718, LTC#150160).
- s390: time: LPAR offset handling (bnc#1009718, LTC#146920).
- s390: time: move PTFF definitions (bnc#1009718, LTC#146920).
- sched: Allow hotplug notifiers to be setup early (bnc#1022476).
- sched: Make wake_up_nohz_cpu() handle CPUs going offline (bnc#1022476).
- sched: core, x86/topology: Fix NUMA in package topology bug
(bnc#1022476).
- sched: core: Fix incorrect utilization accounting when switching to fair
class (bnc#1022476).
- sched: core: Fix set_user_nice() (bnc#1022476).
- sched: cputime: Add steal time support to full dynticks CPU time
accounting (bnc#1022476).
- sched: cputime: Fix prev steal time accouting during CPU hotplug
(bnc#1022476).
- sched: deadline: Always calculate end of period on sched_yield()
(bnc#1022476).
- sched: deadline: Fix a bug in dl_overflow() (bnc#1022476).
- sched: deadline: Fix lock pinning warning during CPU hotplug
(bnc#1022476).
- sched: deadline: Fix wrap-around in DL heap (bnc#1022476).
- sched: fair: Avoid using decay_load_missed() with a negative value
(bnc#1022476).
- sched: fair: Fix fixed point arithmetic width for shares and effective
load (bnc#1022476).
- sched: fair: Fix load_above_capacity fixed point arithmetic width
(bnc#1022476).
- sched: fair: Fix min_vruntime tracking (bnc#1022476).
- sched: fair: Fix the wrong throttled clock time for cfs_rq_clock_task()
(bnc#1022476).
- sched: fair: Improve PELT stuff some more (bnc#1022476).
- sched: rt, sched/dl: Do not push if task's scheduling class was changed
(bnc#1022476).
- sched: rt: Fix PI handling vs. sched_setscheduler() (bnc#1022476).
- sched: rt: Kick RT bandwidth timer immediately on start up (bnc#1022476).
- scsi: Add 'AIX VDASD' to blacklist (bsc#1006469).
- scsi: Modify HITACHI OPEN-V blacklist entry (bsc#1006469).
- scsi: bfa: Increase requested firmware version to 3.2.5.1 (bsc#1013273).
- scsi: storvsc: Payload buffer incorrectly sized for 32 bit kernels.
- scsi_dh_alua: uninitialized variable in alua_rtpg() (bsc#1012910).
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (CVE-2017-5986, bsc#1025235).
- sd: always scan VPD pages if thin provisioning is enabled (bsc#1013792).
- serial: 8250: Integrate Fintek into 8250_base (boo#1016979). Update
config files to change CONFIG_SERIAL_8250_FINTEK to boolean accordingly,
too. Also, the corresponding entry got removed from supported.conf.
- serial: 8250_fintek: fix the mismatched IRQ mode (boo#1009546).
- serial: Update metadata for serial fixes (bsc#1013001)
- ses: Fix SAS device detection in enclosure (bsc#1016403).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- sfc: refactor debug-or-warnings printks (bsc#1019168).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout
(bsc#1014410).
- supported.conf: Support Marvell WiFi/BT SDIO and pinctrl-cherrytrail
(bsc#1018813)
- supported.conf: delete xilinx/ll_temac (bsc#1011602)
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense
(bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tools: hv: Enable network manager for bonding scripts on RHEL.
- tools: hv: fix a compile warning in snprintf.
- tools: hv: kvp: configurable external scripts path.
- tools: hv: kvp: ensure kvp device fd is closed on exec.
- tools: hv: remove unnecessary header files and netlink related code.
- tools: hv: remove unnecessary link flag.
- tty: n_hdlc, fix lockdep false positive (bnc#1015840).
- uvcvideo: uvc_scan_fallback() for webcams with broken chain
(bsc#1021474).
- vmbus: make sysfs names consistent with PCI.
- x86: MCE: Dump MCE to dmesg if no consumers (bsc#1013994).
- x86: hyperv: Handle unknown NMIs on one CPU when unknown_nmi_panic.
- xfs: don't allow di_size with high bit set (bsc#1024234).
- xfs: exclude never-released buffers from buftarg I/O accounting
(bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: track and serialize in-flight async buffers against unmount
(bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount - kABI
(bsc#1024508).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-300=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-300=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-300=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-300=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-300=1
- SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2017-300=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-300=1
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-300=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
kernel-default-debuginfo-4.4.49-92.11.1
kernel-default-debugsource-4.4.49-92.11.1
kernel-default-extra-4.4.49-92.11.1
kernel-default-extra-debuginfo-4.4.49-92.11.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.4.49-92.11.1
kernel-obs-build-debugsource-4.4.49-92.11.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
kernel-docs-4.4.49-92.11.3
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
kernel-default-4.4.49-92.11.1
kernel-default-base-4.4.49-92.11.1
kernel-default-base-debuginfo-4.4.49-92.11.1
kernel-default-debuginfo-4.4.49-92.11.1
kernel-default-debugsource-4.4.49-92.11.1
kernel-default-devel-4.4.49-92.11.1
kernel-syms-4.4.49-92.11.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
kernel-devel-4.4.49-92.11.1
kernel-macros-4.4.49-92.11.1
kernel-source-4.4.49-92.11.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
kernel-default-4.4.49-92.11.1
kernel-default-base-4.4.49-92.11.1
kernel-default-base-debuginfo-4.4.49-92.11.1
kernel-default-debuginfo-4.4.49-92.11.1
kernel-default-debugsource-4.4.49-92.11.1
kernel-default-devel-4.4.49-92.11.1
kernel-syms-4.4.49-92.11.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
kernel-devel-4.4.49-92.11.1
kernel-macros-4.4.49-92.11.1
kernel-source-4.4.49-92.11.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_49-92_11-default-1-6.1
- SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.49-92.11.1
cluster-md-kmp-default-debuginfo-4.4.49-92.11.1
cluster-network-kmp-default-4.4.49-92.11.1
cluster-network-kmp-default-debuginfo-4.4.49-92.11.1
dlm-kmp-default-4.4.49-92.11.1
dlm-kmp-default-debuginfo-4.4.49-92.11.1
gfs2-kmp-default-4.4.49-92.11.1
gfs2-kmp-default-debuginfo-4.4.49-92.11.1
kernel-default-debuginfo-4.4.49-92.11.1
kernel-default-debugsource-4.4.49-92.11.1
ocfs2-kmp-default-4.4.49-92.11.1
ocfs2-kmp-default-debuginfo-4.4.49-92.11.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
kernel-default-4.4.49-92.11.1
kernel-default-debuginfo-4.4.49-92.11.1
kernel-default-debugsource-4.4.49-92.11.1
kernel-default-devel-4.4.49-92.11.1
kernel-default-extra-4.4.49-92.11.1
kernel-default-extra-debuginfo-4.4.49-92.11.1
kernel-syms-4.4.49-92.11.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
kernel-devel-4.4.49-92.11.1
kernel-macros-4.4.49-92.11.1
kernel-source-4.4.49-92.11.1
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
kernel-default-4.4.49-92.11.1
kernel-default-debuginfo-4.4.49-92.11.1
kernel-default-debugsource-4.4.49-92.11.1
References:
https://www.suse.com/security/cve/CVE-2015-8709.html
https://www.suse.com/security/cve/CVE-2016-7117.html
https://www.suse.com/security/cve/CVE-2016-9806.html
https://www.suse.com/security/cve/CVE-2017-2583.html
https://www.suse.com/security/cve/CVE-2017-2584.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://www.suse.com/security/cve/CVE-2017-5576.html
https://www.suse.com/security/cve/CVE-2017-5577.html
https://www.suse.com/security/cve/CVE-2017-5897.html
https://www.suse.com/security/cve/CVE-2017-5970.html
https://www.suse.com/security/cve/CVE-2017-5986.html
https://bugzilla.suse.com/1000092
https://bugzilla.suse.com/1000619
https://bugzilla.suse.com/1003077
https://bugzilla.suse.com/1005918
https://bugzilla.suse.com/1006469
https://bugzilla.suse.com/1006472
https://bugzilla.suse.com/1007729
https://bugzilla.suse.com/1008742
https://bugzilla.suse.com/1009546
https://bugzilla.suse.com/1009674
https://bugzilla.suse.com/1009718
https://bugzilla.suse.com/1009911
https://bugzilla.suse.com/1010612
https://bugzilla.suse.com/1010690
https://bugzilla.suse.com/1010933
https://bugzilla.suse.com/1011176
https://bugzilla.suse.com/1011602
https://bugzilla.suse.com/1011660
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1012910
https://bugzilla.suse.com/1013000
https://bugzilla.suse.com/1013001
https://bugzilla.suse.com/1013273
https://bugzilla.suse.com/1013540
https://bugzilla.suse.com/1013792
https://bugzilla.suse.com/1013994
https://bugzilla.suse.com/1014120
https://bugzilla.suse.com/1014410
https://bugzilla.suse.com/1015038
https://bugzilla.suse.com/1015367
https://bugzilla.suse.com/1015840
https://bugzilla.suse.com/1016250
https://bugzilla.suse.com/1016403
https://bugzilla.suse.com/1016517
https://bugzilla.suse.com/1016884
https://bugzilla.suse.com/1016979
https://bugzilla.suse.com/1017164
https://bugzilla.suse.com/1017170
https://bugzilla.suse.com/1017410
https://bugzilla.suse.com/1018100
https://bugzilla.suse.com/1018316
https://bugzilla.suse.com/1018358
https://bugzilla.suse.com/1018446
https://bugzilla.suse.com/1018813
https://bugzilla.suse.com/1018913
https://bugzilla.suse.com/1019061
https://bugzilla.suse.com/1019148
https://bugzilla.suse.com/1019168
https://bugzilla.suse.com/1019260
https://bugzilla.suse.com/1019351
https://bugzilla.suse.com/1019594
https://bugzilla.suse.com/1019630
https://bugzilla.suse.com/1019631
https://bugzilla.suse.com/1019784
https://bugzilla.suse.com/1019851
https://bugzilla.suse.com/1020048
https://bugzilla.suse.com/1020214
https://bugzilla.suse.com/1020488
https://bugzilla.suse.com/1020602
https://bugzilla.suse.com/1020685
https://bugzilla.suse.com/1020817
https://bugzilla.suse.com/1020945
https://bugzilla.suse.com/1020975
https://bugzilla.suse.com/1021082
https://bugzilla.suse.com/1021248
https://bugzilla.suse.com/1021251
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/1021260
https://bugzilla.suse.com/1021294
https://bugzilla.suse.com/1021455
https://bugzilla.suse.com/1021474
https://bugzilla.suse.com/1022304
https://bugzilla.suse.com/1022429
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1022547
https://bugzilla.suse.com/1022559
https://bugzilla.suse.com/1022971
https://bugzilla.suse.com/1023101
https://bugzilla.suse.com/1023175
https://bugzilla.suse.com/1023762
https://bugzilla.suse.com/1023884
https://bugzilla.suse.com/1023888
https://bugzilla.suse.com/1024081
https://bugzilla.suse.com/1024234
https://bugzilla.suse.com/1024508
https://bugzilla.suse.com/1024938
https://bugzilla.suse.com/1025235
https://bugzilla.suse.com/921494
https://bugzilla.suse.com/959709
https://bugzilla.suse.com/964944
https://bugzilla.suse.com/969476
https://bugzilla.suse.com/969477
https://bugzilla.suse.com/969479
https://bugzilla.suse.com/971975
https://bugzilla.suse.com/974215
https://bugzilla.suse.com/981709
https://bugzilla.suse.com/982783
https://bugzilla.suse.com/985561
https://bugzilla.suse.com/987192
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/989056
https://bugzilla.suse.com/991273
https://bugzilla.suse.com/998106
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0571-1: important: Security update for xen
by opensuse-security@opensuse.org 27 Feb '17
by opensuse-security@opensuse.org 27 Feb '17
27 Feb '17
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0571-1
Rating: important
References: #1000195 #1002496 #1005028 #1012651 #1014298
#1014300 #1015169 #1016340 #1022871 #1023004
#1024834
Cross-References: CVE-2016-9921 CVE-2016-9922 CVE-2017-2615
CVE-2017-2620
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that solves four vulnerabilities and has 7 fixes
is now available.
Description:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
cirrus_bitblt_cputovideo failed to check the memory region, allowing for
an out-of-bounds write that allows for privilege escalation
(bsc#1024834).
- CVE-2017-2615: An error in the bitblt copy operation could have allowed
a malicious guest administrator to cause an out of bounds memory access,
possibly leading to information disclosure or privilege escalation
(bsc#1023004).
- A malicious guest could have, by frequently rebooting over extended
periods of time, run the host system out of memory, resulting in a
Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
to a divide by zero issue while copying VGA data. A privileged user
inside guest could have used this flaw to crash the process instance on
the host, resulting in DoS (bsc#1015169
These non-security issues were fixed:
- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#1005028: Fixed building Xen RPMs from Sources
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-296=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-296=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-296=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64):
xen-debugsource-4.7.1_06-31.1
xen-devel-4.7.1_06-31.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
xen-4.7.1_06-31.1
xen-debugsource-4.7.1_06-31.1
xen-doc-html-4.7.1_06-31.1
xen-libs-32bit-4.7.1_06-31.1
xen-libs-4.7.1_06-31.1
xen-libs-debuginfo-32bit-4.7.1_06-31.1
xen-libs-debuginfo-4.7.1_06-31.1
xen-tools-4.7.1_06-31.1
xen-tools-debuginfo-4.7.1_06-31.1
xen-tools-domU-4.7.1_06-31.1
xen-tools-domU-debuginfo-4.7.1_06-31.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
xen-4.7.1_06-31.1
xen-debugsource-4.7.1_06-31.1
xen-libs-32bit-4.7.1_06-31.1
xen-libs-4.7.1_06-31.1
xen-libs-debuginfo-32bit-4.7.1_06-31.1
xen-libs-debuginfo-4.7.1_06-31.1
References:
https://www.suse.com/security/cve/CVE-2016-9921.html
https://www.suse.com/security/cve/CVE-2016-9922.html
https://www.suse.com/security/cve/CVE-2017-2615.html
https://www.suse.com/security/cve/CVE-2017-2620.html
https://bugzilla.suse.com/1000195
https://bugzilla.suse.com/1002496
https://bugzilla.suse.com/1005028
https://bugzilla.suse.com/1012651
https://bugzilla.suse.com/1014298
https://bugzilla.suse.com/1014300
https://bugzilla.suse.com/1015169
https://bugzilla.suse.com/1016340
https://bugzilla.suse.com/1022871
https://bugzilla.suse.com/1023004
https://bugzilla.suse.com/1024834
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0570-1: important: Security update for xen
by opensuse-security@opensuse.org 27 Feb '17
by opensuse-security@opensuse.org 27 Feb '17
27 Feb '17
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0570-1
Rating: important
References: #1000195 #1002496 #1013657 #1013668 #1014490
#1014507 #1015169 #1016340 #1022627 #1022871
#1023004 #1024183 #1024186 #1024307 #1024834
#1025188
Cross-References: CVE-2016-10155 CVE-2016-9101 CVE-2016-9776
CVE-2016-9907 CVE-2016-9911 CVE-2016-9921
CVE-2016-9922 CVE-2017-2615 CVE-2017-2620
CVE-2017-5579 CVE-2017-5856 CVE-2017-5898
CVE-2017-5973
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 13 vulnerabilities and has three
fixes is now available.
Description:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-5973: A infinite loop while doing control transfer in
xhci_kick_epctx allowed privileged user inside the guest to crash the
host process resulting in DoS (bsc#1025188).
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was
vulnerable to a memory leakage issue allowing a privileged user to cause
a DoS and/or potentially crash the Qemu process on the host
(bsc#1024183).
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
cirrus_bitblt_cputovideo failed to check the memory region, allowing for
an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation
support was vulnerable to a memory leakage issue allowing a privileged
user to leak host memory resulting in DoS (bsc#1024186).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to
an integer overflow flaw allowing a privileged user to crash the Qemu
process on the host resulting in DoS (bsc#1024307).
- CVE-2017-2615: An error in the bitblt copy operation could have allowed
a malicious guest administrator to cause an out of bounds memory access,
possibly leading to information disclosure or privilege escalation
(bsc#1023004)
- A malicious guest could have, by frequently rebooting over extended
periods of time, run the host system out of memory, resulting in a
Denial of Service (DoS) (bsc#1022871)
- CVE-2017-5579: The 16550A UART serial device emulation support was
vulnerable to a memory leakage issue allowing a privileged user to cause
a DoS and/or potentially crash the Qemu process on the host
(bsc#1022627).
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a
memory leakage flaw when destroying the USB redirector in
'usbredir_handle_destroy'. A guest user/process could have used this
issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory
leakage issue while processing packet data in 'ehci_init_transfer'. A
guest user/process could have used this issue to leak host memory,
resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
to a divide by zero issue while copying VGA data. A privileged user
inside guest could have used this flaw to crash the process instance on
the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable
to a divide by zero issue while copying VGA data. A privileged user
inside guest could have used this flaw to crash the process instance on
the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS
administrators to cause a denial of service (memory consumption and QEMU
process crash) by repeatedly unplugging an i8255x (PRO100) NIC device
(bsc#1013668).
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support
was vulnerable to an infinite loop issue while receiving packets in
'mcf_fec_receive'. A privileged user/process inside guest could have
used this issue to crash the Qemu process on the host leading to DoS
(bsc#1013657)
These non-security issues were fixed:
- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-297=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-297=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-297=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (x86_64):
xen-debugsource-4.5.5_06-22.11.2
xen-devel-4.5.5_06-22.11.2
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
xen-4.5.5_06-22.11.2
xen-debugsource-4.5.5_06-22.11.2
xen-doc-html-4.5.5_06-22.11.2
xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2
xen-kmp-default-debuginfo-4.5.5_06_k3.12.69_60.64.32-22.11.2
xen-libs-32bit-4.5.5_06-22.11.2
xen-libs-4.5.5_06-22.11.2
xen-libs-debuginfo-32bit-4.5.5_06-22.11.2
xen-libs-debuginfo-4.5.5_06-22.11.2
xen-tools-4.5.5_06-22.11.2
xen-tools-debuginfo-4.5.5_06-22.11.2
xen-tools-domU-4.5.5_06-22.11.2
xen-tools-domU-debuginfo-4.5.5_06-22.11.2
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
xen-4.5.5_06-22.11.2
xen-debugsource-4.5.5_06-22.11.2
xen-kmp-default-4.5.5_06_k3.12.69_60.64.32-22.11.2
xen-kmp-default-debuginfo-4.5.5_06_k3.12.69_60.64.32-22.11.2
xen-libs-32bit-4.5.5_06-22.11.2
xen-libs-4.5.5_06-22.11.2
xen-libs-debuginfo-32bit-4.5.5_06-22.11.2
xen-libs-debuginfo-4.5.5_06-22.11.2
References:
https://www.suse.com/security/cve/CVE-2016-10155.html
https://www.suse.com/security/cve/CVE-2016-9101.html
https://www.suse.com/security/cve/CVE-2016-9776.html
https://www.suse.com/security/cve/CVE-2016-9907.html
https://www.suse.com/security/cve/CVE-2016-9911.html
https://www.suse.com/security/cve/CVE-2016-9921.html
https://www.suse.com/security/cve/CVE-2016-9922.html
https://www.suse.com/security/cve/CVE-2017-2615.html
https://www.suse.com/security/cve/CVE-2017-2620.html
https://www.suse.com/security/cve/CVE-2017-5579.html
https://www.suse.com/security/cve/CVE-2017-5856.html
https://www.suse.com/security/cve/CVE-2017-5898.html
https://www.suse.com/security/cve/CVE-2017-5973.html
https://bugzilla.suse.com/1000195
https://bugzilla.suse.com/1002496
https://bugzilla.suse.com/1013657
https://bugzilla.suse.com/1013668
https://bugzilla.suse.com/1014490
https://bugzilla.suse.com/1014507
https://bugzilla.suse.com/1015169
https://bugzilla.suse.com/1016340
https://bugzilla.suse.com/1022627
https://bugzilla.suse.com/1022871
https://bugzilla.suse.com/1023004
https://bugzilla.suse.com/1024183
https://bugzilla.suse.com/1024186
https://bugzilla.suse.com/1024307
https://bugzilla.suse.com/1024834
https://bugzilla.suse.com/1025188
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0568-1: important: Security update for php53
by opensuse-security@opensuse.org 27 Feb '17
by opensuse-security@opensuse.org 27 Feb '17
27 Feb '17
SUSE Security Update: Security update for php53
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0568-1
Rating: important
References: #1019550 #1022219 #1022255 #1022257 #1022260
#1022263 #1022264 #1022265
Cross-References: CVE-2016-10158 CVE-2016-10159 CVE-2016-10160
CVE-2016-10161 CVE-2016-10166 CVE-2016-10167
CVE-2016-10168 CVE-2016-7478
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for php53 fixes the following security issues:
- CVE-2016-7478: When unserializing untrusted input data, PHP could end up
in an infinite loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
in PHP allowed remote attackers to cause a denial of service
(application crash) via crafted EXIF data that triggers an attempt to
divide the minimum representable negative integer by -1. (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in
ext/phar/phar.c in PHP allowed remote attackers to cause a denial
of service (memory consumption or application crash) via a truncated
manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in
ext/phar/phar.c in PHP allowed remote attackers to cause a denial
of service (memory corruption) or possibly execute arbitrary code via a
crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
ext/standard/var_unserializer.c in PHP allowed remote attackers to cause
a denial of service (buffer over-read and application crash) via crafted
serialized data that is mishandled in a finish_nested_data call.
(bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
functions could lead to memory corruption in the PHP gd module
(bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead to
memory corruption (bsc#1022265)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-php53-12997=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-php53-12997=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-php53-12997=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-php53-12997=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-php53-12997=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-php53-12997=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-php53-12997=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-php53-12997=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-php53-12997=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
apache2-mod_php53-5.3.17-101.1
php53-5.3.17-101.1
php53-bcmath-5.3.17-101.1
php53-bz2-5.3.17-101.1
php53-calendar-5.3.17-101.1
php53-ctype-5.3.17-101.1
php53-curl-5.3.17-101.1
php53-dba-5.3.17-101.1
php53-dom-5.3.17-101.1
php53-exif-5.3.17-101.1
php53-fastcgi-5.3.17-101.1
php53-fileinfo-5.3.17-101.1
php53-ftp-5.3.17-101.1
php53-gd-5.3.17-101.1
php53-gettext-5.3.17-101.1
php53-gmp-5.3.17-101.1
php53-iconv-5.3.17-101.1
php53-intl-5.3.17-101.1
php53-json-5.3.17-101.1
php53-ldap-5.3.17-101.1
php53-mbstring-5.3.17-101.1
php53-mcrypt-5.3.17-101.1
php53-mysql-5.3.17-101.1
php53-odbc-5.3.17-101.1
php53-openssl-5.3.17-101.1
php53-pcntl-5.3.17-101.1
php53-pdo-5.3.17-101.1
php53-pear-5.3.17-101.1
php53-pgsql-5.3.17-101.1
php53-pspell-5.3.17-101.1
php53-shmop-5.3.17-101.1
php53-snmp-5.3.17-101.1
php53-soap-5.3.17-101.1
php53-suhosin-5.3.17-101.1
php53-sysvmsg-5.3.17-101.1
php53-sysvsem-5.3.17-101.1
php53-sysvshm-5.3.17-101.1
php53-tokenizer-5.3.17-101.1
php53-wddx-5.3.17-101.1
php53-xmlreader-5.3.17-101.1
php53-xmlrpc-5.3.17-101.1
php53-xmlwriter-5.3.17-101.1
php53-xsl-5.3.17-101.1
php53-zip-5.3.17-101.1
php53-zlib-5.3.17-101.1
- SUSE Manager Proxy 2.1 (x86_64):
apache2-mod_php53-5.3.17-101.1
php53-5.3.17-101.1
php53-bcmath-5.3.17-101.1
php53-bz2-5.3.17-101.1
php53-calendar-5.3.17-101.1
php53-ctype-5.3.17-101.1
php53-curl-5.3.17-101.1
php53-dba-5.3.17-101.1
php53-dom-5.3.17-101.1
php53-exif-5.3.17-101.1
php53-fastcgi-5.3.17-101.1
php53-fileinfo-5.3.17-101.1
php53-ftp-5.3.17-101.1
php53-gd-5.3.17-101.1
php53-gettext-5.3.17-101.1
php53-gmp-5.3.17-101.1
php53-iconv-5.3.17-101.1
php53-intl-5.3.17-101.1
php53-json-5.3.17-101.1
php53-ldap-5.3.17-101.1
php53-mbstring-5.3.17-101.1
php53-mcrypt-5.3.17-101.1
php53-mysql-5.3.17-101.1
php53-odbc-5.3.17-101.1
php53-openssl-5.3.17-101.1
php53-pcntl-5.3.17-101.1
php53-pdo-5.3.17-101.1
php53-pear-5.3.17-101.1
php53-pgsql-5.3.17-101.1
php53-pspell-5.3.17-101.1
php53-shmop-5.3.17-101.1
php53-snmp-5.3.17-101.1
php53-soap-5.3.17-101.1
php53-suhosin-5.3.17-101.1
php53-sysvmsg-5.3.17-101.1
php53-sysvsem-5.3.17-101.1
php53-sysvshm-5.3.17-101.1
php53-tokenizer-5.3.17-101.1
php53-wddx-5.3.17-101.1
php53-xmlreader-5.3.17-101.1
php53-xmlrpc-5.3.17-101.1
php53-xmlwriter-5.3.17-101.1
php53-xsl-5.3.17-101.1
php53-zip-5.3.17-101.1
php53-zlib-5.3.17-101.1
- SUSE Manager 2.1 (s390x x86_64):
apache2-mod_php53-5.3.17-101.1
php53-5.3.17-101.1
php53-bcmath-5.3.17-101.1
php53-bz2-5.3.17-101.1
php53-calendar-5.3.17-101.1
php53-ctype-5.3.17-101.1
php53-curl-5.3.17-101.1
php53-dba-5.3.17-101.1
php53-dom-5.3.17-101.1
php53-exif-5.3.17-101.1
php53-fastcgi-5.3.17-101.1
php53-fileinfo-5.3.17-101.1
php53-ftp-5.3.17-101.1
php53-gd-5.3.17-101.1
php53-gettext-5.3.17-101.1
php53-gmp-5.3.17-101.1
php53-iconv-5.3.17-101.1
php53-intl-5.3.17-101.1
php53-json-5.3.17-101.1
php53-ldap-5.3.17-101.1
php53-mbstring-5.3.17-101.1
php53-mcrypt-5.3.17-101.1
php53-mysql-5.3.17-101.1
php53-odbc-5.3.17-101.1
php53-openssl-5.3.17-101.1
php53-pcntl-5.3.17-101.1
php53-pdo-5.3.17-101.1
php53-pear-5.3.17-101.1
php53-pgsql-5.3.17-101.1
php53-pspell-5.3.17-101.1
php53-shmop-5.3.17-101.1
php53-snmp-5.3.17-101.1
php53-soap-5.3.17-101.1
php53-suhosin-5.3.17-101.1
php53-sysvmsg-5.3.17-101.1
php53-sysvsem-5.3.17-101.1
php53-sysvshm-5.3.17-101.1
php53-tokenizer-5.3.17-101.1
php53-wddx-5.3.17-101.1
php53-xmlreader-5.3.17-101.1
php53-xmlrpc-5.3.17-101.1
php53-xmlwriter-5.3.17-101.1
php53-xsl-5.3.17-101.1
php53-zip-5.3.17-101.1
php53-zlib-5.3.17-101.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
php53-devel-5.3.17-101.1
php53-imap-5.3.17-101.1
php53-posix-5.3.17-101.1
php53-readline-5.3.17-101.1
php53-sockets-5.3.17-101.1
php53-sqlite-5.3.17-101.1
php53-tidy-5.3.17-101.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
apache2-mod_php53-5.3.17-101.1
php53-5.3.17-101.1
php53-bcmath-5.3.17-101.1
php53-bz2-5.3.17-101.1
php53-calendar-5.3.17-101.1
php53-ctype-5.3.17-101.1
php53-curl-5.3.17-101.1
php53-dba-5.3.17-101.1
php53-dom-5.3.17-101.1
php53-exif-5.3.17-101.1
php53-fastcgi-5.3.17-101.1
php53-fileinfo-5.3.17-101.1
php53-ftp-5.3.17-101.1
php53-gd-5.3.17-101.1
php53-gettext-5.3.17-101.1
php53-gmp-5.3.17-101.1
php53-iconv-5.3.17-101.1
php53-intl-5.3.17-101.1
php53-json-5.3.17-101.1
php53-ldap-5.3.17-101.1
php53-mbstring-5.3.17-101.1
php53-mcrypt-5.3.17-101.1
php53-mysql-5.3.17-101.1
php53-odbc-5.3.17-101.1
php53-openssl-5.3.17-101.1
php53-pcntl-5.3.17-101.1
php53-pdo-5.3.17-101.1
php53-pear-5.3.17-101.1
php53-pgsql-5.3.17-101.1
php53-pspell-5.3.17-101.1
php53-shmop-5.3.17-101.1
php53-snmp-5.3.17-101.1
php53-soap-5.3.17-101.1
php53-suhosin-5.3.17-101.1
php53-sysvmsg-5.3.17-101.1
php53-sysvsem-5.3.17-101.1
php53-sysvshm-5.3.17-101.1
php53-tokenizer-5.3.17-101.1
php53-wddx-5.3.17-101.1
php53-xmlreader-5.3.17-101.1
php53-xmlrpc-5.3.17-101.1
php53-xmlwriter-5.3.17-101.1
php53-xsl-5.3.17-101.1
php53-zip-5.3.17-101.1
php53-zlib-5.3.17-101.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
apache2-mod_php53-5.3.17-101.1
php53-5.3.17-101.1
php53-bcmath-5.3.17-101.1
php53-bz2-5.3.17-101.1
php53-calendar-5.3.17-101.1
php53-ctype-5.3.17-101.1
php53-curl-5.3.17-101.1
php53-dba-5.3.17-101.1
php53-dom-5.3.17-101.1
php53-exif-5.3.17-101.1
php53-fastcgi-5.3.17-101.1
php53-fileinfo-5.3.17-101.1
php53-ftp-5.3.17-101.1
php53-gd-5.3.17-101.1
php53-gettext-5.3.17-101.1
php53-gmp-5.3.17-101.1
php53-iconv-5.3.17-101.1
php53-intl-5.3.17-101.1
php53-json-5.3.17-101.1
php53-ldap-5.3.17-101.1
php53-mbstring-5.3.17-101.1
php53-mcrypt-5.3.17-101.1
php53-mysql-5.3.17-101.1
php53-odbc-5.3.17-101.1
php53-openssl-5.3.17-101.1
php53-pcntl-5.3.17-101.1
php53-pdo-5.3.17-101.1
php53-pear-5.3.17-101.1
php53-pgsql-5.3.17-101.1
php53-pspell-5.3.17-101.1
php53-shmop-5.3.17-101.1
php53-snmp-5.3.17-101.1
php53-soap-5.3.17-101.1
php53-suhosin-5.3.17-101.1
php53-sysvmsg-5.3.17-101.1
php53-sysvsem-5.3.17-101.1
php53-sysvshm-5.3.17-101.1
php53-tokenizer-5.3.17-101.1
php53-wddx-5.3.17-101.1
php53-xmlreader-5.3.17-101.1
php53-xmlrpc-5.3.17-101.1
php53-xmlwriter-5.3.17-101.1
php53-xsl-5.3.17-101.1
php53-zip-5.3.17-101.1
php53-zlib-5.3.17-101.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
apache2-mod_php53-5.3.17-101.1
php53-5.3.17-101.1
php53-bcmath-5.3.17-101.1
php53-bz2-5.3.17-101.1
php53-calendar-5.3.17-101.1
php53-ctype-5.3.17-101.1
php53-curl-5.3.17-101.1
php53-dba-5.3.17-101.1
php53-dom-5.3.17-101.1
php53-exif-5.3.17-101.1
php53-fastcgi-5.3.17-101.1
php53-fileinfo-5.3.17-101.1
php53-ftp-5.3.17-101.1
php53-gd-5.3.17-101.1
php53-gettext-5.3.17-101.1
php53-gmp-5.3.17-101.1
php53-iconv-5.3.17-101.1
php53-intl-5.3.17-101.1
php53-json-5.3.17-101.1
php53-ldap-5.3.17-101.1
php53-mbstring-5.3.17-101.1
php53-mcrypt-5.3.17-101.1
php53-mysql-5.3.17-101.1
php53-odbc-5.3.17-101.1
php53-openssl-5.3.17-101.1
php53-pcntl-5.3.17-101.1
php53-pdo-5.3.17-101.1
php53-pear-5.3.17-101.1
php53-pgsql-5.3.17-101.1
php53-pspell-5.3.17-101.1
php53-shmop-5.3.17-101.1
php53-snmp-5.3.17-101.1
php53-soap-5.3.17-101.1
php53-suhosin-5.3.17-101.1
php53-sysvmsg-5.3.17-101.1
php53-sysvsem-5.3.17-101.1
php53-sysvshm-5.3.17-101.1
php53-tokenizer-5.3.17-101.1
php53-wddx-5.3.17-101.1
php53-xmlreader-5.3.17-101.1
php53-xmlrpc-5.3.17-101.1
php53-xmlwriter-5.3.17-101.1
php53-xsl-5.3.17-101.1
php53-zip-5.3.17-101.1
php53-zlib-5.3.17-101.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
php53-debuginfo-5.3.17-101.1
php53-debugsource-5.3.17-101.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
php53-debuginfo-5.3.17-101.1
php53-debugsource-5.3.17-101.1
References:
https://www.suse.com/security/cve/CVE-2016-10158.html
https://www.suse.com/security/cve/CVE-2016-10159.html
https://www.suse.com/security/cve/CVE-2016-10160.html
https://www.suse.com/security/cve/CVE-2016-10161.html
https://www.suse.com/security/cve/CVE-2016-10166.html
https://www.suse.com/security/cve/CVE-2016-10167.html
https://www.suse.com/security/cve/CVE-2016-10168.html
https://www.suse.com/security/cve/CVE-2016-7478.html
https://bugzilla.suse.com/1019550
https://bugzilla.suse.com/1022219
https://bugzilla.suse.com/1022255
https://bugzilla.suse.com/1022257
https://bugzilla.suse.com/1022260
https://bugzilla.suse.com/1022263
https://bugzilla.suse.com/1022264
https://bugzilla.suse.com/1022265
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0565-1: important: Security update of chromium
by opensuse-security@opensuse.org 27 Feb '17
by opensuse-security@opensuse.org 27 Feb '17
27 Feb '17
openSUSE Security Update: Security update of chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0565-1
Rating: important
References: #1022049
Cross-References: CVE-2017-5006 CVE-2017-5007 CVE-2017-5008
CVE-2017-5009 CVE-2017-5010 CVE-2017-5011
CVE-2017-5012 CVE-2017-5013 CVE-2017-5014
CVE-2017-5015 CVE-2017-5016 CVE-2017-5017
CVE-2017-5018 CVE-2017-5019 CVE-2017-5020
CVE-2017-5021 CVE-2017-5022 CVE-2017-5023
CVE-2017-5024 CVE-2017-5025 CVE-2017-5026
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 21 vulnerabilities is now available.
Description:
Google chromium was updated to 56.0.2924.87:
* Various small fixes
* Disabled option to enable/disable plugins in the chrome://plugins
- Changed the build requirement of libavformat to library version
57.41.100, as included in ffmpeg 3.1.1, as only this version properly
supports the public AVStream API 'codecpar'.
It also contains the version update to 56.0.2924.76 (bsc#1022049):
- CVE-2017-5007: Universal XSS in Blink
- CVE-2017-5006: Universal XSS in Blink
- CVE-2017-5008: Universal XSS in Blink
- CVE-2017-5010: Universal XSS in Blink
- CVE-2017-5011: Unauthorised file access in Devtools
- CVE-2017-5009: Out of bounds memory access in WebRTC
- CVE-2017-5012: Heap overflow in V8
- CVE-2017-5013: Address spoofing in Omnibox
- CVE-2017-5014: Heap overflow in Skia
- CVE-2017-5015: Address spoofing in Omnibox
- CVE-2017-5019: Use after free in Renderer
- CVE-2017-5016: UI spoofing in Blink
- CVE-2017-5017: Uninitialised memory access in webm video
- CVE-2017-5018: Universal XSS in chrome://apps
- CVE-2017-5020: Universal XSS in chrome://downloads
- CVE-2017-5021: Use after free in Extensions
- CVE-2017-5022: Bypass of Content Security Policy in Blink
- CVE-2017-5023: Type confusion in metrics
- CVE-2017-5024: Heap overflow in FFmpeg
- CVE-2017-5025: Heap overflow in FFmpeg
- CVE-2017-5026: UI spoofing. Credit to Ronni Skansing
- Enable VAAPI hardware accelerated video decoding.
- Chromium 55.0.2883.87:
* various fixes for crashes and specific wesites
* update Google pinned certificates
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2017-272=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-56.0.2924.87-5.1
chromium-56.0.2924.87-5.1
References:
https://www.suse.com/security/cve/CVE-2017-5006.html
https://www.suse.com/security/cve/CVE-2017-5007.html
https://www.suse.com/security/cve/CVE-2017-5008.html
https://www.suse.com/security/cve/CVE-2017-5009.html
https://www.suse.com/security/cve/CVE-2017-5010.html
https://www.suse.com/security/cve/CVE-2017-5011.html
https://www.suse.com/security/cve/CVE-2017-5012.html
https://www.suse.com/security/cve/CVE-2017-5013.html
https://www.suse.com/security/cve/CVE-2017-5014.html
https://www.suse.com/security/cve/CVE-2017-5015.html
https://www.suse.com/security/cve/CVE-2017-5016.html
https://www.suse.com/security/cve/CVE-2017-5017.html
https://www.suse.com/security/cve/CVE-2017-5018.html
https://www.suse.com/security/cve/CVE-2017-5019.html
https://www.suse.com/security/cve/CVE-2017-5020.html
https://www.suse.com/security/cve/CVE-2017-5021.html
https://www.suse.com/security/cve/CVE-2017-5022.html
https://www.suse.com/security/cve/CVE-2017-5023.html
https://www.suse.com/security/cve/CVE-2017-5024.html
https://www.suse.com/security/cve/CVE-2017-5025.html
https://www.suse.com/security/cve/CVE-2017-5026.html
https://bugzilla.suse.com/1022049
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0563-1: important: Security update for Chromium
by opensuse-security@opensuse.org 27 Feb '17
by opensuse-security@opensuse.org 27 Feb '17
27 Feb '17
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0563-1
Rating: important
References: #1013236
Cross-References: CVE-2016-5203 CVE-2016-5204 CVE-2016-5205
CVE-2016-5206 CVE-2016-5207 CVE-2016-5208
CVE-2016-5209 CVE-2016-5210 CVE-2016-5211
CVE-2016-5212 CVE-2016-5213 CVE-2016-5214
CVE-2016-5215 CVE-2016-5216 CVE-2016-5217
CVE-2016-5218 CVE-2016-5219 CVE-2016-5220
CVE-2016-5221 CVE-2016-5222 CVE-2016-5223
CVE-2016-5224 CVE-2016-5225 CVE-2016-5226
CVE-2016-9650 CVE-2016-9651 CVE-2016-9652
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 27 vulnerabilities is now available.
Description:
This update to Chromium 55.0.2883.75 fixes the following vulnerabilities:
- CVE-2016-9651: Private property access in V8
- CVE-2016-5208: Universal XSS in Blink
- CVE-2016-5207: Universal XSS in Blink
- CVE-2016-5206: Same-origin bypass in PDFium
- CVE-2016-5205: Universal XSS in Blink
- CVE-2016-5204: Universal XSS in Blink
- CVE-2016-5209: Out of bounds write in Blink
- CVE-2016-5203: Use after free in PDFium
- CVE-2016-5210: Out of bounds write in PDFium
- CVE-2016-5212: Local file disclosure in DevTools
- CVE-2016-5211: Use after free in PDFium
- CVE-2016-5213: Use after free in V8
- CVE-2016-5214: File download protection bypass
- CVE-2016-5216: Use after free in PDFium
- CVE-2016-5215: Use after free in Webaudio
- CVE-2016-5217: Use of unvalidated data in PDFium
- CVE-2016-5218: Address spoofing in Omnibox
- CVE-2016-5219: Use after free in V8
- CVE-2016-5221: Integer overflow in ANGLE
- CVE-2016-5220: Local file access in PDFium
- CVE-2016-5222: Address spoofing in Omnibox
- CVE-2016-9650: CSP Referrer disclosure
- CVE-2016-5223: Integer overflow in PDFium
- CVE-2016-5226: Limited XSS in Blink
- CVE-2016-5225: CSP bypass in Blink
- CVE-2016-5224: Same-origin bypass in SVG
- CVE-2016-9652: Various fixes from internal audits, fuzzing and other
initiatives
The default bookmarks override was removed.
The following packaging changes are included:
- Switch to system libraries: harfbuzz, zlib, ffmpeg, where available.
- Chromium now requires harfbuzz >= 1.3.0
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2016-1496=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-55.0.2883.75-2.1
chromium-55.0.2883.75-2.1
References:
https://www.suse.com/security/cve/CVE-2016-5203.html
https://www.suse.com/security/cve/CVE-2016-5204.html
https://www.suse.com/security/cve/CVE-2016-5205.html
https://www.suse.com/security/cve/CVE-2016-5206.html
https://www.suse.com/security/cve/CVE-2016-5207.html
https://www.suse.com/security/cve/CVE-2016-5208.html
https://www.suse.com/security/cve/CVE-2016-5209.html
https://www.suse.com/security/cve/CVE-2016-5210.html
https://www.suse.com/security/cve/CVE-2016-5211.html
https://www.suse.com/security/cve/CVE-2016-5212.html
https://www.suse.com/security/cve/CVE-2016-5213.html
https://www.suse.com/security/cve/CVE-2016-5214.html
https://www.suse.com/security/cve/CVE-2016-5215.html
https://www.suse.com/security/cve/CVE-2016-5216.html
https://www.suse.com/security/cve/CVE-2016-5217.html
https://www.suse.com/security/cve/CVE-2016-5218.html
https://www.suse.com/security/cve/CVE-2016-5219.html
https://www.suse.com/security/cve/CVE-2016-5220.html
https://www.suse.com/security/cve/CVE-2016-5221.html
https://www.suse.com/security/cve/CVE-2016-5222.html
https://www.suse.com/security/cve/CVE-2016-5223.html
https://www.suse.com/security/cve/CVE-2016-5224.html
https://www.suse.com/security/cve/CVE-2016-5225.html
https://www.suse.com/security/cve/CVE-2016-5226.html
https://www.suse.com/security/cve/CVE-2016-9650.html
https://www.suse.com/security/cve/CVE-2016-9651.html
https://www.suse.com/security/cve/CVE-2016-9652.html
https://bugzilla.suse.com/1013236
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0556-1: important: Security update for php5
by opensuse-security@opensuse.org 23 Feb '17
by opensuse-security@opensuse.org 23 Feb '17
23 Feb '17
SUSE Security Update: Security update for php5
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0556-1
Rating: important
References: #1019550 #1022219 #1022255 #1022257 #1022260
#1022263 #1022264 #1022265
Cross-References: CVE-2016-10158 CVE-2016-10159 CVE-2016-10160
CVE-2016-10161 CVE-2016-10166 CVE-2016-10167
CVE-2016-10168 CVE-2016-7478
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for php5 fixes the following issues:
- CVE-2016-7478: When unserializing untrusted input data, PHP could end up
in an infinite loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
in PHP allowed remote attackers to cause a denial of service
(application crash) via crafted EXIF data that triggers an attempt to
divide the minimum representable negative integer by -1. (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in
ext/phar/phar.c in PHP allowed remote attackers to cause a denial
of service (memory consumption or application crash) via a truncated
manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in
ext/phar/phar.c in PHP allowed remote attackers to cause a denial
of service (memory corruption) or possibly execute arbitrary code via a
crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
ext/standard/var_unserializer.c in PHP allowed remote attackers to cause
a denial of service (buffer over-read and application crash) via crafted
serialized data that is mishandled in a finish_nested_data call.
(bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
functions could lead to memory corruption in the PHP gd module
(bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead to
memory corruption (bsc#1022265)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-293=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-293=1
- SUSE Linux Enterprise Module for Web Scripting 12:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2017-293=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
php5-debuginfo-5.5.14-96.1
php5-debugsource-5.5.14-96.1
php5-devel-5.5.14-96.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
php5-debuginfo-5.5.14-96.1
php5-debugsource-5.5.14-96.1
php5-devel-5.5.14-96.1
- SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):
apache2-mod_php5-5.5.14-96.1
apache2-mod_php5-debuginfo-5.5.14-96.1
php5-5.5.14-96.1
php5-bcmath-5.5.14-96.1
php5-bcmath-debuginfo-5.5.14-96.1
php5-bz2-5.5.14-96.1
php5-bz2-debuginfo-5.5.14-96.1
php5-calendar-5.5.14-96.1
php5-calendar-debuginfo-5.5.14-96.1
php5-ctype-5.5.14-96.1
php5-ctype-debuginfo-5.5.14-96.1
php5-curl-5.5.14-96.1
php5-curl-debuginfo-5.5.14-96.1
php5-dba-5.5.14-96.1
php5-dba-debuginfo-5.5.14-96.1
php5-debuginfo-5.5.14-96.1
php5-debugsource-5.5.14-96.1
php5-dom-5.5.14-96.1
php5-dom-debuginfo-5.5.14-96.1
php5-enchant-5.5.14-96.1
php5-enchant-debuginfo-5.5.14-96.1
php5-exif-5.5.14-96.1
php5-exif-debuginfo-5.5.14-96.1
php5-fastcgi-5.5.14-96.1
php5-fastcgi-debuginfo-5.5.14-96.1
php5-fileinfo-5.5.14-96.1
php5-fileinfo-debuginfo-5.5.14-96.1
php5-fpm-5.5.14-96.1
php5-fpm-debuginfo-5.5.14-96.1
php5-ftp-5.5.14-96.1
php5-ftp-debuginfo-5.5.14-96.1
php5-gd-5.5.14-96.1
php5-gd-debuginfo-5.5.14-96.1
php5-gettext-5.5.14-96.1
php5-gettext-debuginfo-5.5.14-96.1
php5-gmp-5.5.14-96.1
php5-gmp-debuginfo-5.5.14-96.1
php5-iconv-5.5.14-96.1
php5-iconv-debuginfo-5.5.14-96.1
php5-imap-5.5.14-96.1
php5-imap-debuginfo-5.5.14-96.1
php5-intl-5.5.14-96.1
php5-intl-debuginfo-5.5.14-96.1
php5-json-5.5.14-96.1
php5-json-debuginfo-5.5.14-96.1
php5-ldap-5.5.14-96.1
php5-ldap-debuginfo-5.5.14-96.1
php5-mbstring-5.5.14-96.1
php5-mbstring-debuginfo-5.5.14-96.1
php5-mcrypt-5.5.14-96.1
php5-mcrypt-debuginfo-5.5.14-96.1
php5-mysql-5.5.14-96.1
php5-mysql-debuginfo-5.5.14-96.1
php5-odbc-5.5.14-96.1
php5-odbc-debuginfo-5.5.14-96.1
php5-opcache-5.5.14-96.1
php5-opcache-debuginfo-5.5.14-96.1
php5-openssl-5.5.14-96.1
php5-openssl-debuginfo-5.5.14-96.1
php5-pcntl-5.5.14-96.1
php5-pcntl-debuginfo-5.5.14-96.1
php5-pdo-5.5.14-96.1
php5-pdo-debuginfo-5.5.14-96.1
php5-pgsql-5.5.14-96.1
php5-pgsql-debuginfo-5.5.14-96.1
php5-phar-5.5.14-96.1
php5-phar-debuginfo-5.5.14-96.1
php5-posix-5.5.14-96.1
php5-posix-debuginfo-5.5.14-96.1
php5-pspell-5.5.14-96.1
php5-pspell-debuginfo-5.5.14-96.1
php5-shmop-5.5.14-96.1
php5-shmop-debuginfo-5.5.14-96.1
php5-snmp-5.5.14-96.1
php5-snmp-debuginfo-5.5.14-96.1
php5-soap-5.5.14-96.1
php5-soap-debuginfo-5.5.14-96.1
php5-sockets-5.5.14-96.1
php5-sockets-debuginfo-5.5.14-96.1
php5-sqlite-5.5.14-96.1
php5-sqlite-debuginfo-5.5.14-96.1
php5-suhosin-5.5.14-96.1
php5-suhosin-debuginfo-5.5.14-96.1
php5-sysvmsg-5.5.14-96.1
php5-sysvmsg-debuginfo-5.5.14-96.1
php5-sysvsem-5.5.14-96.1
php5-sysvsem-debuginfo-5.5.14-96.1
php5-sysvshm-5.5.14-96.1
php5-sysvshm-debuginfo-5.5.14-96.1
php5-tokenizer-5.5.14-96.1
php5-tokenizer-debuginfo-5.5.14-96.1
php5-wddx-5.5.14-96.1
php5-wddx-debuginfo-5.5.14-96.1
php5-xmlreader-5.5.14-96.1
php5-xmlreader-debuginfo-5.5.14-96.1
php5-xmlrpc-5.5.14-96.1
php5-xmlrpc-debuginfo-5.5.14-96.1
php5-xmlwriter-5.5.14-96.1
php5-xmlwriter-debuginfo-5.5.14-96.1
php5-xsl-5.5.14-96.1
php5-xsl-debuginfo-5.5.14-96.1
php5-zip-5.5.14-96.1
php5-zip-debuginfo-5.5.14-96.1
php5-zlib-5.5.14-96.1
php5-zlib-debuginfo-5.5.14-96.1
- SUSE Linux Enterprise Module for Web Scripting 12 (noarch):
php5-pear-5.5.14-96.1
References:
https://www.suse.com/security/cve/CVE-2016-10158.html
https://www.suse.com/security/cve/CVE-2016-10159.html
https://www.suse.com/security/cve/CVE-2016-10160.html
https://www.suse.com/security/cve/CVE-2016-10161.html
https://www.suse.com/security/cve/CVE-2016-10166.html
https://www.suse.com/security/cve/CVE-2016-10167.html
https://www.suse.com/security/cve/CVE-2016-10168.html
https://www.suse.com/security/cve/CVE-2016-7478.html
https://bugzilla.suse.com/1019550
https://bugzilla.suse.com/1022219
https://bugzilla.suse.com/1022255
https://bugzilla.suse.com/1022257
https://bugzilla.suse.com/1022260
https://bugzilla.suse.com/1022263
https://bugzilla.suse.com/1022264
https://bugzilla.suse.com/1022265
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0555-1: important: Security update for util-linux
by opensuse-security@opensuse.org 23 Feb '17
by opensuse-security@opensuse.org 23 Feb '17
23 Feb '17
SUSE Security Update: Security update for util-linux
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0555-1
Rating: important
References: #1008965 #1012504 #1012632 #1019332 #1020077
#1023041
Cross-References: CVE-2017-2616
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves one vulnerability and has 5 fixes is
now available.
Description:
This update for util-linux fixes the following issues:
This security issue was fixed:
- CVE-2017-2616: In su with PAM support it was possible for local users to
send SIGKILL to selected other processes with root privileges
(bsc#1023041).
This non-security issues were fixed:
- lscpu: Implement WSL detection and work around crash (bsc#1019332)
- fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and bind mounts
(bsc#1020077)
- Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
- Disable ro checks for mtab (bsc#1012632)
- Ensure that the option "users,exec,dev,suid" work as expected on NFS
mounts (bsc#1008965)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-291=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-291=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-291=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-291=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
libuuid-devel-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
libblkid-devel-2.25-40.1
libmount-devel-2.25-40.1
libsmartcols-devel-2.25-40.1
libuuid-devel-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libblkid1-2.25-40.1
libblkid1-debuginfo-2.25-40.1
libmount1-2.25-40.1
libmount1-debuginfo-2.25-40.1
libsmartcols1-2.25-40.1
libsmartcols1-debuginfo-2.25-40.1
libuuid1-2.25-40.1
libuuid1-debuginfo-2.25-40.1
python-libmount-2.25-40.2
python-libmount-debuginfo-2.25-40.2
python-libmount-debugsource-2.25-40.2
util-linux-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1
util-linux-systemd-2.25-40.1
util-linux-systemd-debuginfo-2.25-40.1
util-linux-systemd-debugsource-2.25-40.1
uuidd-2.25-40.1
uuidd-debuginfo-2.25-40.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libblkid1-32bit-2.25-40.1
libblkid1-debuginfo-32bit-2.25-40.1
libmount1-32bit-2.25-40.1
libmount1-debuginfo-32bit-2.25-40.1
libuuid1-32bit-2.25-40.1
libuuid1-debuginfo-32bit-2.25-40.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
util-linux-lang-2.25-40.1
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
util-linux-lang-2.25-40.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libblkid1-2.25-40.1
libblkid1-32bit-2.25-40.1
libblkid1-debuginfo-2.25-40.1
libblkid1-debuginfo-32bit-2.25-40.1
libmount1-2.25-40.1
libmount1-32bit-2.25-40.1
libmount1-debuginfo-2.25-40.1
libmount1-debuginfo-32bit-2.25-40.1
libsmartcols1-2.25-40.1
libsmartcols1-debuginfo-2.25-40.1
libuuid-devel-2.25-40.1
libuuid1-2.25-40.1
libuuid1-32bit-2.25-40.1
libuuid1-debuginfo-2.25-40.1
libuuid1-debuginfo-32bit-2.25-40.1
python-libmount-2.25-40.2
python-libmount-debuginfo-2.25-40.2
python-libmount-debugsource-2.25-40.2
util-linux-2.25-40.1
util-linux-debuginfo-2.25-40.1
util-linux-debugsource-2.25-40.1
util-linux-systemd-2.25-40.1
util-linux-systemd-debuginfo-2.25-40.1
util-linux-systemd-debugsource-2.25-40.1
uuidd-2.25-40.1
uuidd-debuginfo-2.25-40.1
References:
https://www.suse.com/security/cve/CVE-2017-2616.html
https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1023041
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0554-1: important: Security update for util-linux
by opensuse-security@opensuse.org 23 Feb '17
by opensuse-security@opensuse.org 23 Feb '17
23 Feb '17
SUSE Security Update: Security update for util-linux
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0554-1
Rating: important
References: #1008965 #1012504 #1012632 #1019332 #1020077
#1020985 #1023041
Cross-References: CVE-2017-2616
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that solves one vulnerability and has 6 fixes is
now available.
Description:
This update for util-linux fixes the following issues:
This security issue was fixed:
- CVE-2017-2616: In su with PAM support it was possible for local users to
send SIGKILL to selected other processes with root privileges
(bsc#1023041).
This non-security issues were fixed:
- lscpu: Implement WSL detection and work around crash (bsc#1019332)
- fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and bind mounts
(bsc#1020077)
- Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
- Disable ro checks for mtab (bsc#1012632)
- Ensure that the option "users,exec,dev,suid" work as expected on NFS
mounts (bsc#1008965)
- Fix empty slave detection to prevent 100% CPU load in some cases
(bsc#1020985)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-292=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-292=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-292=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-292=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-292=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
libuuid-devel-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
libblkid-devel-2.28-44.3.1
libmount-devel-2.28-44.3.1
libsmartcols-devel-2.28-44.3.1
libuuid-devel-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libblkid1-2.28-44.3.1
libblkid1-debuginfo-2.28-44.3.1
libfdisk1-2.28-44.3.1
libfdisk1-debuginfo-2.28-44.3.1
libmount1-2.28-44.3.1
libmount1-debuginfo-2.28-44.3.1
libsmartcols1-2.28-44.3.1
libsmartcols1-debuginfo-2.28-44.3.1
libuuid1-2.28-44.3.1
libuuid1-debuginfo-2.28-44.3.1
python-libmount-2.28-44.3.3
python-libmount-debuginfo-2.28-44.3.3
python-libmount-debugsource-2.28-44.3.3
util-linux-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
util-linux-systemd-2.28-44.3.3
util-linux-systemd-debuginfo-2.28-44.3.3
util-linux-systemd-debugsource-2.28-44.3.3
uuidd-2.28-44.3.3
uuidd-debuginfo-2.28-44.3.3
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
util-linux-lang-2.28-44.3.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
libblkid1-2.28-44.3.1
libblkid1-debuginfo-2.28-44.3.1
libfdisk1-2.28-44.3.1
libfdisk1-debuginfo-2.28-44.3.1
libmount1-2.28-44.3.1
libmount1-debuginfo-2.28-44.3.1
libsmartcols1-2.28-44.3.1
libsmartcols1-debuginfo-2.28-44.3.1
libuuid1-2.28-44.3.1
libuuid1-debuginfo-2.28-44.3.1
python-libmount-2.28-44.3.3
python-libmount-debuginfo-2.28-44.3.3
python-libmount-debugsource-2.28-44.3.3
util-linux-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
util-linux-systemd-2.28-44.3.3
util-linux-systemd-debuginfo-2.28-44.3.3
util-linux-systemd-debugsource-2.28-44.3.3
uuidd-2.28-44.3.3
uuidd-debuginfo-2.28-44.3.3
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
libblkid1-32bit-2.28-44.3.1
libblkid1-debuginfo-32bit-2.28-44.3.1
libmount1-32bit-2.28-44.3.1
libmount1-debuginfo-32bit-2.28-44.3.1
libuuid1-32bit-2.28-44.3.1
libuuid1-debuginfo-32bit-2.28-44.3.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
util-linux-lang-2.28-44.3.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libblkid1-2.28-44.3.1
libblkid1-32bit-2.28-44.3.1
libblkid1-debuginfo-2.28-44.3.1
libblkid1-debuginfo-32bit-2.28-44.3.1
libfdisk1-2.28-44.3.1
libfdisk1-debuginfo-2.28-44.3.1
libmount1-2.28-44.3.1
libmount1-32bit-2.28-44.3.1
libmount1-debuginfo-2.28-44.3.1
libmount1-debuginfo-32bit-2.28-44.3.1
libsmartcols1-2.28-44.3.1
libsmartcols1-debuginfo-2.28-44.3.1
libuuid-devel-2.28-44.3.1
libuuid1-2.28-44.3.1
libuuid1-32bit-2.28-44.3.1
libuuid1-debuginfo-2.28-44.3.1
libuuid1-debuginfo-32bit-2.28-44.3.1
python-libmount-2.28-44.3.3
python-libmount-debuginfo-2.28-44.3.3
python-libmount-debugsource-2.28-44.3.3
util-linux-2.28-44.3.1
util-linux-debuginfo-2.28-44.3.1
util-linux-debugsource-2.28-44.3.1
util-linux-systemd-2.28-44.3.3
util-linux-systemd-debuginfo-2.28-44.3.3
util-linux-systemd-debugsource-2.28-44.3.3
uuidd-2.28-44.3.3
uuidd-debuginfo-2.28-44.3.3
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
util-linux-lang-2.28-44.3.1
References:
https://www.suse.com/security/cve/CVE-2017-2616.html
https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1020985
https://bugzilla.suse.com/1023041
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0553-1: important: Security update for util-linux
by opensuse-security@opensuse.org 23 Feb '17
by opensuse-security@opensuse.org 23 Feb '17
23 Feb '17
SUSE Security Update: Security update for util-linux
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0553-1
Rating: important
References: #1008965 #1012504 #1012632 #1019332 #1020077
#1023041 #947494 #966891 #978993 #982331
#983164 #987176 #988361
Cross-References: CVE-2016-5011 CVE-2017-2616
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has 11 fixes
is now available.
Description:
This update for util-linux fixes a number of bugs and two security issues.
The following security bugs were fixed:
- CVE-2016-5011: Infinite loop DoS in libblkid while parsing DOS partition
(bsc#988361)
- CVE-2017-2616: In su with PAM support it was possible for local users to
send SIGKILL to selected other processes with root privileges
(bsc#1023041).
The following non-security bugs were fixed:
- bsc#1008965: Ensure that the option "users,exec,dev,suid" work as
expected on NFS mounts
- bsc#1012504: Fix regressions in safe loop re-use patch set for libmount
- bsc#1012632: Disable ro checks for mtab
- bsc#1020077: fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and
bind mounts
- bsc#947494: mount -a would fail to recognize btrfs already mounted,
address loop re-use in libmount
- bsc#966891: Conflict in meaning of losetup -L. This switch in SLE12 SP1
and SP2 continues to carry the meaning of --logical-blocksize instead of
upstream --nooverlap
- bsc#978993: cfdisk would mangle some text output
- bsc#982331: libmount: ignore redundant slashes
- bsc#983164: mount uid= and gid= would reject valid non UID/GID values
- bsc#987176: When mounting a subfolder of a CIFS share, mount -a would
show the mount as busy
- bsc#1019332: lscpu: Implement WSL detection and work around crash
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-290=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-290=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
libblkid1-2.25-24.10.1
libblkid1-32bit-2.25-24.10.1
libblkid1-debuginfo-2.25-24.10.1
libblkid1-debuginfo-32bit-2.25-24.10.1
libmount1-2.25-24.10.1
libmount1-32bit-2.25-24.10.1
libmount1-debuginfo-2.25-24.10.1
libmount1-debuginfo-32bit-2.25-24.10.1
libsmartcols1-2.25-24.10.1
libsmartcols1-debuginfo-2.25-24.10.1
libuuid1-2.25-24.10.1
libuuid1-32bit-2.25-24.10.1
libuuid1-debuginfo-2.25-24.10.1
libuuid1-debuginfo-32bit-2.25-24.10.1
python-libmount-2.25-24.10.3
python-libmount-debuginfo-2.25-24.10.3
python-libmount-debugsource-2.25-24.10.3
util-linux-2.25-24.10.1
util-linux-debuginfo-2.25-24.10.1
util-linux-debugsource-2.25-24.10.1
util-linux-systemd-2.25-24.10.1
util-linux-systemd-debuginfo-2.25-24.10.1
util-linux-systemd-debugsource-2.25-24.10.1
uuidd-2.25-24.10.1
uuidd-debuginfo-2.25-24.10.1
- SUSE Linux Enterprise Server for SAP 12 (noarch):
util-linux-lang-2.25-24.10.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
libblkid1-2.25-24.10.1
libblkid1-debuginfo-2.25-24.10.1
libmount1-2.25-24.10.1
libmount1-debuginfo-2.25-24.10.1
libsmartcols1-2.25-24.10.1
libsmartcols1-debuginfo-2.25-24.10.1
libuuid1-2.25-24.10.1
libuuid1-debuginfo-2.25-24.10.1
python-libmount-2.25-24.10.3
python-libmount-debuginfo-2.25-24.10.3
python-libmount-debugsource-2.25-24.10.3
util-linux-2.25-24.10.1
util-linux-debuginfo-2.25-24.10.1
util-linux-debugsource-2.25-24.10.1
util-linux-systemd-2.25-24.10.1
util-linux-systemd-debuginfo-2.25-24.10.1
util-linux-systemd-debugsource-2.25-24.10.1
uuidd-2.25-24.10.1
uuidd-debuginfo-2.25-24.10.1
- SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):
libblkid1-32bit-2.25-24.10.1
libblkid1-debuginfo-32bit-2.25-24.10.1
libmount1-32bit-2.25-24.10.1
libmount1-debuginfo-32bit-2.25-24.10.1
libuuid1-32bit-2.25-24.10.1
libuuid1-debuginfo-32bit-2.25-24.10.1
- SUSE Linux Enterprise Server 12-LTSS (noarch):
util-linux-lang-2.25-24.10.1
References:
https://www.suse.com/security/cve/CVE-2016-5011.html
https://www.suse.com/security/cve/CVE-2017-2616.html
https://bugzilla.suse.com/1008965
https://bugzilla.suse.com/1012504
https://bugzilla.suse.com/1012632
https://bugzilla.suse.com/1019332
https://bugzilla.suse.com/1020077
https://bugzilla.suse.com/1023041
https://bugzilla.suse.com/947494
https://bugzilla.suse.com/966891
https://bugzilla.suse.com/978993
https://bugzilla.suse.com/982331
https://bugzilla.suse.com/983164
https://bugzilla.suse.com/987176
https://bugzilla.suse.com/988361
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0547-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 22 Feb '17
by opensuse-security@opensuse.org 22 Feb '17
22 Feb '17
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0547-1
Rating: important
References: #1005666 #1015787 #1018100 #1023762 #1023888
#1024081 #1024234 #1024508 #1024938 #1025047
#1025048 #1025049 #1025050 #1025051 #1025053
#1025055 #1025057 #1025058 #1025059 #1025060
#1025061 #1025062 #1025063 #1025064 #1025065
#1025066 #1025067 #1025069 #1025070 #1025071
#1025072 #1025073 #1025074 #1025075 #1025076
#1025077 #1025079 #1025080 #1025081 #1025235
#1026024 #865869 #904489 #927455 #929871
#935087 #935088 #936445 #937609 #937612 #937616
#938550 #938891 #938892 #942512 #942685 #942925
#944001 #945649 #946057 #946902 #949440 #949472
#951615 #951844 #957805 #960300 #963193 #965344
#966278 #966910 #968230 #972844 #972951 #972993
#973855 #975596 #977685 #981038 #981709 #983087
#984779 #985562 #985850 #987192 #989953 #990384
#992712 #993841 #994881
Cross-References: CVE-2017-5897 CVE-2017-5970 CVE-2017-5986
CVE-2017-6074
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that solves four vulnerabilities and has 86 fixes
is now available.
Description:
The openSUSE Leap 42.1 kernel was updated to receive various security and
bugfixes.
The following security bugs were fixed:
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c
in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures
in the LISTEN state, which allowed local users to cause a denial of
service (invalid free) or possibly have unspecified other impact via an
application that made an IPV6_RECVPKTINFO setsockopt system call
(bnc#1026024).
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in
net/sctp/socket.c in the Linux kernel allowed local users to cause a
denial of service (assertion failure and panic) via a multithreaded
application that peels off an association in a certain buffer-full state
(bnc#1025235).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in
net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a
denial of service (system crash) via (1) an application that made
crafted system calls or possibly (2) IPv4 traffic with invalid IP
options (bnc#1024938).
- CVE-2017-5897: A potential remote denial of service within the IPv6 GRE
protocol was fixed. (bsc#1023762)
The following non-security bugs were fixed:
- btrfs: support NFSv2 export (bnc#929871).
- btrfs: Direct I/O: Fix space accounting (bsc#1025058).
- btrfs: add RAID 5/6 BTRFS_RBIO_REBUILD_MISSING operation (bsc#1025069).
- btrfs: bail out if block group has different mixed flag (bsc#1025072).
- btrfs: be more precise on errors when getting an inode from disk
(bsc#981038).
- btrfs: check pending chunks when shrinking fs to avoid corruption
(bnc#936445).
- btrfs: check prepare_uptodate_page() error code earlier (bnc#966910).
- btrfs: do not BUG() during drop snapshot (bsc#1025076).
- btrfs: do not collect ordered extents when logging that inode exists
(bsc#977685).
- btrfs: do not initialize a space info as full to prevent ENOSPC
(bnc#944001).
- btrfs: do not leak reloc root nodes on error (bsc#1025074).
- btrfs: fix block group ->space_info null pointer dereference
(bnc#935088).
- btrfs: fix chunk allocation regression leading to transaction abort
(bnc#938550).
- btrfs: fix crash on close_ctree() if cleaner starts new transaction
(bnc#938891).
- btrfs: fix deadlock between direct IO reads and buffered writes
(bsc#973855).
- btrfs: fix deadlock between direct IO write and defrag/readpages
(bnc#965344).
- btrfs: fix device replace of a missing RAID 5/6 device (bsc#1025057).
- btrfs: fix empty symlink after creating symlink and fsync parent dir
(bsc#977685).
- btrfs: fix extent accounting for partial direct IO writes (bsc#1025062).
- btrfs: fix file corruption after cloning inline extents (bnc#942512).
- btrfs: fix file loss on log replay after renaming a file and fsync
(bsc#977685).
- btrfs: fix file read corruption after extent cloning and fsync
(bnc#946902).
- btrfs: fix fitrim discarding device area reserved for boot loader's use
(bsc#904489).
- btrfs: fix for incorrect directory entries after fsync log replay
(bsc#957805, bsc#977685).
- btrfs: fix hang when failing to submit bio of directIO (bnc#942685).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix invalid page accesses in extent_same (dedup) ioctl
(bnc#968230).
- btrfs: fix listxattrs not listing all xattrs packed in the same item
(bsc#1025063).
- btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
- btrfs: fix memory corruption on failure to submit bio for direct IO
(bnc#942685).
- btrfs: fix memory leak in do_walk_down (bsc#1025075).
- btrfs: fix memory leak in reading btree blocks (bsc#1025071).
- btrfs: fix order by which delayed references are run (bnc#949440).
- btrfs: fix page reading in extent_same ioctl leading to csum errors
(bnc#968230).
- btrfs: fix qgroup rescan worker initialization (bsc#1025077).
- btrfs: fix qgroup sanity tests (bnc#951615).
- btrfs: fix race between balance and unused block group deletion
(bnc#938892).
- btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- btrfs: fix race waiting for qgroup rescan worker (bnc#960300).
- btrfs: fix regression running delayed references when using qgroups
(bnc#951615).
- btrfs: fix regression when running delayed references (bnc#951615).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: fix shrinking truncate when the no_holes feature is enabled
(bsc#1025053).
- btrfs: fix sleeping inside atomic context in qgroup rescan worker
(bnc#960300).
- btrfs: fix stale dir entries after removing a link and fsync
(bnc#942925).
- btrfs: fix unreplayable log after snapshot delete + parent dir fsync
(bsc#977685).
- btrfs: fix warning in backref walking (bnc#966278).
- btrfs: fix warning of bytes_may_use (bsc#1025065).
- btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: incremental send, check if orphanized dir inode needs delayed
rename (bsc#1025049).
- btrfs: incremental send, do not delay directory renames unnecessarily
(bsc#1025048).
- btrfs: incremental send, fix clone operations for compressed extents
(fate#316463).
- btrfs: incremental send, fix premature rmdir operations (bsc#1025064).
- btrfs: keep dropped roots in cache until transaction commit (bnc#935087,
bnc#945649, bnc#951615).
- btrfs: remove misleading handling of missing device scrub (bsc#1025055).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock
(bsc#904489).
- btrfs: return gracefully from balance if fs tree is corrupted
(bsc#1025073).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- btrfs: send, fix corner case for reference overwrite detection
(bsc#1025080).
- btrfs: send, fix file corruption due to incorrect cloning operations
(bsc#1025060).
- btrfs: set UNWRITTEN for prealloc'ed extents in fiemap (bsc#1025047).
- btrfs: test_check_exists: Fix infinite loop when searching for free
space entries (bsc#987192).
- btrfs: use btrfs_get_fs_root in resolve_indirect_ref (bnc#935087,
bnc#945649).
- btrfs: use received_uuid of parent during send (bsc#1025051).
- btrfs: wake up extent state waiters on unlock through clear_extent_bits
(bsc#1025050).
- btrfs: Add handler for invalidate page (bsc#963193).
- btrfs: Add qgroup tracing (bnc#935087, bnc#945649).
- btrfs: Avoid truncate tailing page if fallocate range does not exceed
inode size (bsc#1025059).
- btrfs: Continue write in case of can_not_nocow (bsc#1025070).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space
(bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c
(bsc#983087).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596,
bsc#984779).
- btrfs: Handle unaligned length in extent_same (bsc#937609).
- btrfs: abort transaction on btrfs_reloc_cow_block() (bsc#1025081).
- btrfs: add missing discards when unpinning extents with -o discard
(bsc#904489).
- btrfs: advertise which crc32c implementation is being used on mount
(bsc#946057).
- btrfs: allow dedupe of same inode (bsc#1025067).
- btrfs: backref: Add special time_seq == (u64)-1 case for
btrfs_find_all_roots() (bnc#935087, bnc#945649).
- btrfs: backref: Do not merge refs which are not for same block
(bnc#935087, bnc#945649).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector
boundaries (bsc#904489).
- btrfs: change max_inline default to 2048 (bsc#949472).
- btrfs: delayed-ref: Cleanup the unneeded functions (bnc#935087,
bnc#945649).
- btrfs: delayed-ref: Use list to replace the ref_root in ref_head
(bnc#935087, bnc#945649).
- btrfs: delayed-ref: double free in btrfs_add_delayed_tree_ref()
(bsc#1025079).
- btrfs: delayed_ref: Add new function to record reserved space into
delayed ref (bsc#963193).
- btrfs: delayed_ref: release and free qgroup reserved at proper timing
(bsc#963193).
- btrfs: disable defrag of tree roots.
- btrfs: do not create or leak aliased root while cleaning up orphans
(bsc#994881).
- btrfs: do not update mtime/ctime on deduped inodes (bsc#937616).
- btrfs: explictly delete unused block groups in close_ctree and
ro-remount (bsc#904489).
- btrfs: extent-tree: Add new version of btrfs_check_data_free_space and
btrfs_free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Add new version of
btrfs_delalloc_reserve/release_space (bsc#963193).
- btrfs: extent-tree: Switch to new check_data_free_space and
free_reserved_data_space (bsc#963193).
- btrfs: extent-tree: Switch to new delalloc space reserve and release
(bsc#963193).
- btrfs: extent-tree: Use ref_node to replace unneeded parameters in
__inc_extent_ref() and __free_extent() (bnc#935087, bnc#945649).
- btrfs: extent_io: Introduce needed structure for recoding set/clear bits
(bsc#963193).
- btrfs: extent_io: Introduce new function clear_record_extent_bits()
(bsc#963193).
- btrfs: extent_io: Introduce new function set_record_extent_bits
(bsc#963193).
- btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
(bsc#1018100).
- btrfs: fix clone / extent-same deadlocks (bsc#937612).
- btrfs: fix deadlock with extent-same and readpage (bsc#937612).
- btrfs: fix resending received snapshot with parent (bsc#1025061).
- btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
- btrfs: increment ctx->pos for every emitted or skipped dirent in
readdir (bsc#981709).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: make file clone aware of fatal signals (bsc#1015787).
- btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: provide super_operations->inode_get_dev (bsc#927455).
- btrfs: qgroup: Add function qgroup_update_counters() (bnc#935087,
bnc#945649).
- btrfs: qgroup: Add function qgroup_update_refcnt() (bnc#935087,
bnc#945649).
- btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193).
- btrfs: qgroup: Add new function to record old_roots (bnc#935087,
bnc#945649).
- btrfs: qgroup: Add new qgroup calculation function
btrfs_qgroup_account_extents() (bnc#935087, bnc#945649).
- btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193).
- btrfs: qgroup: Add the ability to skip given qgroup for old/new_roots
(bnc#935087, bnc#945649).
- btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in
clear_bit_hook (bsc#963193).
- btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193).
- btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193).
- btrfs: qgroup: Cleanup open-coded old/new_refcnt update and read
(bnc#935087, bnc#945649).
- btrfs: qgroup: Cleanup the old ref_node-oriented mechanism (bnc#935087,
bnc#945649).
- btrfs: qgroup: Do not copy extent buffer to do qgroup rescan
(bnc#960300).
- btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans
(bsc#963193).
- btrfs: qgroup: Fix a rebase bug which will cause qgroup double free
(bsc#963193).
- btrfs: qgroup: Fix a regression in qgroup reserved space (bnc#935087,
bnc#945649).
- btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972993).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing
(bsc#983087).
- btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193).
- btrfs: qgroup: Introduce functions to release/free qgroup reserve data
space (bsc#963193).
- btrfs: qgroup: Introduce new functions to reserve/free metadata
(bsc#963193).
- btrfs: qgroup: Make snapshot accounting work with new extent-oriented
qgroup (bnc#935087, bnc#945649).
- btrfs: qgroup: Record possible quota-related extent for qgroup
(bnc#935087, bnc#945649).
- btrfs: qgroup: Switch rescan to new mechanism (bnc#935087, bnc#945649).
- btrfs: qgroup: Switch self test to extent-oriented qgroup mechanism
(bnc#935087, bnc#945649).
- btrfs: qgroup: Switch to new extent-oriented qgroup mechanism
(bnc#935087, bnc#945649).
- btrfs: qgroup: Use new metadata reservation (bsc#963193).
- btrfs: qgroup: account shared subtree during snapshot delete
(bnc#935087, bnc#945649).
- btrfs: qgroup: exit the rescan worker during umount (bnc#960300).
- btrfs: qgroup: fix quota disable during rescan (bnc#960300).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir()
(bsc#981709).
- btrfs: serialize subvolume mounts with potentially mismatching rw flags
(bsc#951844).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: syslog when quota is disabled.
- btrfs: syslog when quota is enabled
- btrfs: ulist: Add ulist_del() function (bnc#935087, bnc#945649).
- btrfs: use the new VFS super_block_dev (bnc#865869).
- btrfs: waiting on qgroup rescan should not always be interruptible
(bsc#992712).
- fs/super.c: add new super block sub devices super_block_dev (bnc#865869).
- fs/super.c: fix race between freeze_super() and thaw_super()
(bsc#1025066).
- kabi: only use sops->get_inode_dev with proper fsflag (bsc#927455).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- vfs: add super_operations->get_inode_dev (bsc#927455).
- xfs: do not allow di_size with high bit set (bsc#1024234).
- xfs: exclude never-released buffers from buftarg I/O accounting
(bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: track and serialize in-flight async buffers against unmount - kABI
(bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount
(bsc#1024508).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-287=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i586 x86_64):
kernel-default-4.1.38-50.1
kernel-default-base-4.1.38-50.1
kernel-default-base-debuginfo-4.1.38-50.1
kernel-default-debuginfo-4.1.38-50.1
kernel-default-debugsource-4.1.38-50.1
kernel-default-devel-4.1.38-50.1
kernel-obs-build-4.1.38-50.2
kernel-obs-build-debugsource-4.1.38-50.2
kernel-obs-qa-4.1.38-50.1
kernel-syms-4.1.38-50.1
- openSUSE Leap 42.1 (i686 x86_64):
kernel-debug-4.1.38-50.1
kernel-debug-base-4.1.38-50.1
kernel-debug-base-debuginfo-4.1.38-50.1
kernel-debug-debuginfo-4.1.38-50.1
kernel-debug-debugsource-4.1.38-50.1
kernel-debug-devel-4.1.38-50.1
kernel-debug-devel-debuginfo-4.1.38-50.1
kernel-ec2-4.1.38-50.1
kernel-ec2-base-4.1.38-50.1
kernel-ec2-base-debuginfo-4.1.38-50.1
kernel-ec2-debuginfo-4.1.38-50.1
kernel-ec2-debugsource-4.1.38-50.1
kernel-ec2-devel-4.1.38-50.1
kernel-pv-4.1.38-50.1
kernel-pv-base-4.1.38-50.1
kernel-pv-base-debuginfo-4.1.38-50.1
kernel-pv-debuginfo-4.1.38-50.1
kernel-pv-debugsource-4.1.38-50.1
kernel-pv-devel-4.1.38-50.1
kernel-vanilla-4.1.38-50.1
kernel-vanilla-debuginfo-4.1.38-50.1
kernel-vanilla-debugsource-4.1.38-50.1
kernel-vanilla-devel-4.1.38-50.1
kernel-xen-4.1.38-50.1
kernel-xen-base-4.1.38-50.1
kernel-xen-base-debuginfo-4.1.38-50.1
kernel-xen-debuginfo-4.1.38-50.1
kernel-xen-debugsource-4.1.38-50.1
kernel-xen-devel-4.1.38-50.1
- openSUSE Leap 42.1 (noarch):
kernel-devel-4.1.38-50.1
kernel-docs-4.1.38-50.3
kernel-docs-html-4.1.38-50.3
kernel-docs-pdf-4.1.38-50.3
kernel-macros-4.1.38-50.1
kernel-source-4.1.38-50.1
kernel-source-vanilla-4.1.38-50.1
- openSUSE Leap 42.1 (i686):
kernel-pae-4.1.38-50.1
kernel-pae-base-4.1.38-50.1
kernel-pae-base-debuginfo-4.1.38-50.1
kernel-pae-debuginfo-4.1.38-50.1
kernel-pae-debugsource-4.1.38-50.1
kernel-pae-devel-4.1.38-50.1
References:
https://www.suse.com/security/cve/CVE-2017-5897.html
https://www.suse.com/security/cve/CVE-2017-5970.html
https://www.suse.com/security/cve/CVE-2017-5986.html
https://www.suse.com/security/cve/CVE-2017-6074.html
https://bugzilla.suse.com/1005666
https://bugzilla.suse.com/1015787
https://bugzilla.suse.com/1018100
https://bugzilla.suse.com/1023762
https://bugzilla.suse.com/1023888
https://bugzilla.suse.com/1024081
https://bugzilla.suse.com/1024234
https://bugzilla.suse.com/1024508
https://bugzilla.suse.com/1024938
https://bugzilla.suse.com/1025047
https://bugzilla.suse.com/1025048
https://bugzilla.suse.com/1025049
https://bugzilla.suse.com/1025050
https://bugzilla.suse.com/1025051
https://bugzilla.suse.com/1025053
https://bugzilla.suse.com/1025055
https://bugzilla.suse.com/1025057
https://bugzilla.suse.com/1025058
https://bugzilla.suse.com/1025059
https://bugzilla.suse.com/1025060
https://bugzilla.suse.com/1025061
https://bugzilla.suse.com/1025062
https://bugzilla.suse.com/1025063
https://bugzilla.suse.com/1025064
https://bugzilla.suse.com/1025065
https://bugzilla.suse.com/1025066
https://bugzilla.suse.com/1025067
https://bugzilla.suse.com/1025069
https://bugzilla.suse.com/1025070
https://bugzilla.suse.com/1025071
https://bugzilla.suse.com/1025072
https://bugzilla.suse.com/1025073
https://bugzilla.suse.com/1025074
https://bugzilla.suse.com/1025075
https://bugzilla.suse.com/1025076
https://bugzilla.suse.com/1025077
https://bugzilla.suse.com/1025079
https://bugzilla.suse.com/1025080
https://bugzilla.suse.com/1025081
https://bugzilla.suse.com/1025235
https://bugzilla.suse.com/1026024
https://bugzilla.suse.com/865869
https://bugzilla.suse.com/904489
https://bugzilla.suse.com/927455
https://bugzilla.suse.com/929871
https://bugzilla.suse.com/935087
https://bugzilla.suse.com/935088
https://bugzilla.suse.com/936445
https://bugzilla.suse.com/937609
https://bugzilla.suse.com/937612
https://bugzilla.suse.com/937616
https://bugzilla.suse.com/938550
https://bugzilla.suse.com/938891
https://bugzilla.suse.com/938892
https://bugzilla.suse.com/942512
https://bugzilla.suse.com/942685
https://bugzilla.suse.com/942925
https://bugzilla.suse.com/944001
https://bugzilla.suse.com/945649
https://bugzilla.suse.com/946057
https://bugzilla.suse.com/946902
https://bugzilla.suse.com/949440
https://bugzilla.suse.com/949472
https://bugzilla.suse.com/951615
https://bugzilla.suse.com/951844
https://bugzilla.suse.com/957805
https://bugzilla.suse.com/960300
https://bugzilla.suse.com/963193
https://bugzilla.suse.com/965344
https://bugzilla.suse.com/966278
https://bugzilla.suse.com/966910
https://bugzilla.suse.com/968230
https://bugzilla.suse.com/972844
https://bugzilla.suse.com/972951
https://bugzilla.suse.com/972993
https://bugzilla.suse.com/973855
https://bugzilla.suse.com/975596
https://bugzilla.suse.com/977685
https://bugzilla.suse.com/981038
https://bugzilla.suse.com/981709
https://bugzilla.suse.com/983087
https://bugzilla.suse.com/984779
https://bugzilla.suse.com/985562
https://bugzilla.suse.com/985850
https://bugzilla.suse.com/987192
https://bugzilla.suse.com/989953
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/992712
https://bugzilla.suse.com/993841
https://bugzilla.suse.com/994881
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0541-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 22 Feb '17
by opensuse-security@opensuse.org 22 Feb '17
22 Feb '17
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0541-1
Rating: important
References: #1012382 #1018100 #1019168 #1020048 #1021082
#1022181 #1022304 #1023762 #1023884 #1023888
#1024081 #1024234 #1024508 #1024938 #1025235
#1026024 #969479 #982783 #989056 #998106
Cross-References: CVE-2017-5897 CVE-2017-5970 CVE-2017-5986
CVE-2017-6074
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that solves four vulnerabilities and has 16 fixes
is now available.
Description:
The openSUSE Leap 42.2 kernel was updated to 4.4.49 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5986: A userlevel triggerable BUG_ON on sctp_wait_for_sndbuf
was fixed. (bsc#1025235)
- CVE-2017-5970: The ipv4_pktinfo_prepare function in
net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a
denial of service (system crash) via (1) an application that made
crafted system calls or possibly (2) IPv4 traffic with invalid IP
options (bnc#1024938).
- CVE-2017-5897: A potential remote denial of service within the IPv6 GRE
protocol was fixed. (bsc#1023762)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c
in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures
in the LISTEN state, which allowed local users to cause a denial of
service (invalid free) or possibly have unspecified other impact via an
application that makes an IPV6_RECVPKTINFO setsockopt system call.
(bsc#1026024).
The following non-security bugs were fixed:
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
(bsc#1018100).
- iwlwifi: Expose the default fallback ucode API to module info
(boo#1021082, boo#1023884).
- kabi: protect struct tcp_fastopen_cookie (kabi).
- md: ensure md devices are freed before module is unloaded (bsc#1022304).
- md: Fix a regression reported by bsc#1020048 in
patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.patch
(bsc#982783,bsc#998106,bsc#1020048).
- net: ethtool: Initialize buffer when querying device channel settings
(bsc#969479 FATE#320634).
- net: implement netif_cond_dbg macro (bsc#1019168).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- sfc: refactor debug-or-warnings printks (bsc#1019168).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not allow di_size with high bit set (bsc#1024234).
- xfs: exclude never-released buffers from buftarg I/O accounting
(bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: track and serialize in-flight async buffers against unmount
(bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount - kABI
(bsc#1024508).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-286=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (noarch):
kernel-devel-4.4.49-16.1
kernel-docs-4.4.49-16.2
kernel-docs-html-4.4.49-16.2
kernel-docs-pdf-4.4.49-16.2
kernel-macros-4.4.49-16.1
kernel-source-4.4.49-16.1
kernel-source-vanilla-4.4.49-16.1
- openSUSE Leap 42.2 (x86_64):
kernel-debug-4.4.49-16.1
kernel-debug-base-4.4.49-16.1
kernel-debug-base-debuginfo-4.4.49-16.1
kernel-debug-debuginfo-4.4.49-16.1
kernel-debug-debugsource-4.4.49-16.1
kernel-debug-devel-4.4.49-16.1
kernel-debug-devel-debuginfo-4.4.49-16.1
kernel-default-4.4.49-16.1
kernel-default-base-4.4.49-16.1
kernel-default-base-debuginfo-4.4.49-16.1
kernel-default-debuginfo-4.4.49-16.1
kernel-default-debugsource-4.4.49-16.1
kernel-default-devel-4.4.49-16.1
kernel-obs-build-4.4.49-16.1
kernel-obs-build-debugsource-4.4.49-16.1
kernel-obs-qa-4.4.49-16.1
kernel-syms-4.4.49-16.1
kernel-vanilla-4.4.49-16.1
kernel-vanilla-base-4.4.49-16.1
kernel-vanilla-base-debuginfo-4.4.49-16.1
kernel-vanilla-debuginfo-4.4.49-16.1
kernel-vanilla-debugsource-4.4.49-16.1
kernel-vanilla-devel-4.4.49-16.1
References:
https://www.suse.com/security/cve/CVE-2017-5897.html
https://www.suse.com/security/cve/CVE-2017-5970.html
https://www.suse.com/security/cve/CVE-2017-5986.html
https://www.suse.com/security/cve/CVE-2017-6074.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1018100
https://bugzilla.suse.com/1019168
https://bugzilla.suse.com/1020048
https://bugzilla.suse.com/1021082
https://bugzilla.suse.com/1022181
https://bugzilla.suse.com/1022304
https://bugzilla.suse.com/1023762
https://bugzilla.suse.com/1023884
https://bugzilla.suse.com/1023888
https://bugzilla.suse.com/1024081
https://bugzilla.suse.com/1024234
https://bugzilla.suse.com/1024508
https://bugzilla.suse.com/1024938
https://bugzilla.suse.com/1025235
https://bugzilla.suse.com/1026024
https://bugzilla.suse.com/969479
https://bugzilla.suse.com/982783
https://bugzilla.suse.com/989056
https://bugzilla.suse.com/998106
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0534-1: important: Security update for php7
by opensuse-security@opensuse.org 22 Feb '17
by opensuse-security@opensuse.org 22 Feb '17
22 Feb '17
SUSE Security Update: Security update for php7
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0534-1
Rating: important
References: #1008026 #1019547 #1019550 #1019568 #1019570
#1022219 #1022255 #1022257 #1022260 #1022262
#1022263 #1022264 #1022265
Cross-References: CVE-2016-10158 CVE-2016-10159 CVE-2016-10160
CVE-2016-10161 CVE-2016-10162 CVE-2016-10166
CVE-2016-10167 CVE-2016-10168 CVE-2016-7478
CVE-2016-7479 CVE-2016-7480 CVE-2016-9138
CVE-2017-5340
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
This update for php7 fixes the following security issues:
- CVE-2016-7480: The SplObjectStorage unserialize implementation in
ext/spl/spl_observer.c in PHP did not verify that a key is an object,
which allowed remote attackers to execute arbitrary code or cause a
denial
of service (uninitialized memory access) via crafted serialized data.
(bsc#1019568)
- CVE-2017-5340: Zend/zend_hash.c in PHP mishandled certain cases that
require large array allocations, which allowed remote attackers to
execute arbitrary code or cause a denial of service (integer overflow,
uninitialized memory access, and use of arbitrary destructor function
pointers) via crafted serialized data. (bsc#1019570)
- CVE-2016-7479: In all versions of PHP 7, during the unserialization
process, resizing the 'properties' hash table of a serialized object may
have lead to use-after-free. A remote attacker may exploit this bug to
gain arbitrary code execution. (bsc#1019547)
- CVE-2016-7478: Zend/zend_exceptions.c in PHP allowed remote attackers to
cause a denial of service (infinite loop) via a crafted Exception object
in serialized data, a related issue to CVE-2015-8876. (bsc#1019550)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in
ext/phar/phar.c in PHP allowed remote attackers to cause a denial
of service (memory consumption or application crash) via a truncated
manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in
ext/phar/phar.c in PHP allowed remote attackers to cause a denial
of service (memory corruption) or possibly execute arbitrary code via a
crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
ext/standard/var_unserializer.c in PHP allowed remote attackers to cause
a denial of service (buffer over-read and application crash) via crafted
serialized data that is mishandled in a finish_nested_data call.
(bsc#1022260)
- CVE-2016-10162: The php_wddx_pop_element function in ext/wddx/wddx.c in
PHP 7 allowed remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via an inapplicable class
name in a wddxPacket XML document, leading to mishandling in a
wddx_deserialize call. (bsc#1022262)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
functions could lead to memory corruption in the PHP gd module
(bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead to
memory corruption (bsc#1022265)
- CVE-2016-9138: PHP mishandled property modification during __wakeup
processing, which allows remote attackers to cause a denial of service
or possibly have unspecified other impact via crafted serialized data,
as demonstrated by Exception::__toString with DateInterval::__wakeup.
(bsc#1008026)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-277=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-277=1
- SUSE Linux Enterprise Module for Web Scripting 12:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2017-277=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
php7-debuginfo-7.0.7-35.1
php7-debugsource-7.0.7-35.1
php7-devel-7.0.7-35.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
php7-debuginfo-7.0.7-35.1
php7-debugsource-7.0.7-35.1
php7-devel-7.0.7-35.1
- SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):
apache2-mod_php7-7.0.7-35.1
apache2-mod_php7-debuginfo-7.0.7-35.1
php7-7.0.7-35.1
php7-bcmath-7.0.7-35.1
php7-bcmath-debuginfo-7.0.7-35.1
php7-bz2-7.0.7-35.1
php7-bz2-debuginfo-7.0.7-35.1
php7-calendar-7.0.7-35.1
php7-calendar-debuginfo-7.0.7-35.1
php7-ctype-7.0.7-35.1
php7-ctype-debuginfo-7.0.7-35.1
php7-curl-7.0.7-35.1
php7-curl-debuginfo-7.0.7-35.1
php7-dba-7.0.7-35.1
php7-dba-debuginfo-7.0.7-35.1
php7-debuginfo-7.0.7-35.1
php7-debugsource-7.0.7-35.1
php7-dom-7.0.7-35.1
php7-dom-debuginfo-7.0.7-35.1
php7-enchant-7.0.7-35.1
php7-enchant-debuginfo-7.0.7-35.1
php7-exif-7.0.7-35.1
php7-exif-debuginfo-7.0.7-35.1
php7-fastcgi-7.0.7-35.1
php7-fastcgi-debuginfo-7.0.7-35.1
php7-fileinfo-7.0.7-35.1
php7-fileinfo-debuginfo-7.0.7-35.1
php7-fpm-7.0.7-35.1
php7-fpm-debuginfo-7.0.7-35.1
php7-ftp-7.0.7-35.1
php7-ftp-debuginfo-7.0.7-35.1
php7-gd-7.0.7-35.1
php7-gd-debuginfo-7.0.7-35.1
php7-gettext-7.0.7-35.1
php7-gettext-debuginfo-7.0.7-35.1
php7-gmp-7.0.7-35.1
php7-gmp-debuginfo-7.0.7-35.1
php7-iconv-7.0.7-35.1
php7-iconv-debuginfo-7.0.7-35.1
php7-imap-7.0.7-35.1
php7-imap-debuginfo-7.0.7-35.1
php7-intl-7.0.7-35.1
php7-intl-debuginfo-7.0.7-35.1
php7-json-7.0.7-35.1
php7-json-debuginfo-7.0.7-35.1
php7-ldap-7.0.7-35.1
php7-ldap-debuginfo-7.0.7-35.1
php7-mbstring-7.0.7-35.1
php7-mbstring-debuginfo-7.0.7-35.1
php7-mcrypt-7.0.7-35.1
php7-mcrypt-debuginfo-7.0.7-35.1
php7-mysql-7.0.7-35.1
php7-mysql-debuginfo-7.0.7-35.1
php7-odbc-7.0.7-35.1
php7-odbc-debuginfo-7.0.7-35.1
php7-opcache-7.0.7-35.1
php7-opcache-debuginfo-7.0.7-35.1
php7-openssl-7.0.7-35.1
php7-openssl-debuginfo-7.0.7-35.1
php7-pcntl-7.0.7-35.1
php7-pcntl-debuginfo-7.0.7-35.1
php7-pdo-7.0.7-35.1
php7-pdo-debuginfo-7.0.7-35.1
php7-pgsql-7.0.7-35.1
php7-pgsql-debuginfo-7.0.7-35.1
php7-phar-7.0.7-35.1
php7-phar-debuginfo-7.0.7-35.1
php7-posix-7.0.7-35.1
php7-posix-debuginfo-7.0.7-35.1
php7-pspell-7.0.7-35.1
php7-pspell-debuginfo-7.0.7-35.1
php7-shmop-7.0.7-35.1
php7-shmop-debuginfo-7.0.7-35.1
php7-snmp-7.0.7-35.1
php7-snmp-debuginfo-7.0.7-35.1
php7-soap-7.0.7-35.1
php7-soap-debuginfo-7.0.7-35.1
php7-sockets-7.0.7-35.1
php7-sockets-debuginfo-7.0.7-35.1
php7-sqlite-7.0.7-35.1
php7-sqlite-debuginfo-7.0.7-35.1
php7-sysvmsg-7.0.7-35.1
php7-sysvmsg-debuginfo-7.0.7-35.1
php7-sysvsem-7.0.7-35.1
php7-sysvsem-debuginfo-7.0.7-35.1
php7-sysvshm-7.0.7-35.1
php7-sysvshm-debuginfo-7.0.7-35.1
php7-tokenizer-7.0.7-35.1
php7-tokenizer-debuginfo-7.0.7-35.1
php7-wddx-7.0.7-35.1
php7-wddx-debuginfo-7.0.7-35.1
php7-xmlreader-7.0.7-35.1
php7-xmlreader-debuginfo-7.0.7-35.1
php7-xmlrpc-7.0.7-35.1
php7-xmlrpc-debuginfo-7.0.7-35.1
php7-xmlwriter-7.0.7-35.1
php7-xmlwriter-debuginfo-7.0.7-35.1
php7-xsl-7.0.7-35.1
php7-xsl-debuginfo-7.0.7-35.1
php7-zip-7.0.7-35.1
php7-zip-debuginfo-7.0.7-35.1
php7-zlib-7.0.7-35.1
php7-zlib-debuginfo-7.0.7-35.1
- SUSE Linux Enterprise Module for Web Scripting 12 (noarch):
php7-pear-7.0.7-35.1
php7-pear-Archive_Tar-7.0.7-35.1
References:
https://www.suse.com/security/cve/CVE-2016-10158.html
https://www.suse.com/security/cve/CVE-2016-10159.html
https://www.suse.com/security/cve/CVE-2016-10160.html
https://www.suse.com/security/cve/CVE-2016-10161.html
https://www.suse.com/security/cve/CVE-2016-10162.html
https://www.suse.com/security/cve/CVE-2016-10166.html
https://www.suse.com/security/cve/CVE-2016-10167.html
https://www.suse.com/security/cve/CVE-2016-10168.html
https://www.suse.com/security/cve/CVE-2016-7478.html
https://www.suse.com/security/cve/CVE-2016-7479.html
https://www.suse.com/security/cve/CVE-2016-7480.html
https://www.suse.com/security/cve/CVE-2016-9138.html
https://www.suse.com/security/cve/CVE-2017-5340.html
https://bugzilla.suse.com/1008026
https://bugzilla.suse.com/1019547
https://bugzilla.suse.com/1019550
https://bugzilla.suse.com/1019568
https://bugzilla.suse.com/1019570
https://bugzilla.suse.com/1022219
https://bugzilla.suse.com/1022255
https://bugzilla.suse.com/1022257
https://bugzilla.suse.com/1022260
https://bugzilla.suse.com/1022262
https://bugzilla.suse.com/1022263
https://bugzilla.suse.com/1022264
https://bugzilla.suse.com/1022265
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0523-1: important: Security update for flash-player
by opensuse-security@opensuse.org 20 Feb '17
by opensuse-security@opensuse.org 20 Feb '17
20 Feb '17
SUSE Security Update: Security update for flash-player
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0523-1
Rating: important
References: #1025258
Cross-References: CVE-2017-2982 CVE-2017-2985 CVE-2017-2986
CVE-2017-2987 CVE-2017-2988 CVE-2017-2990
CVE-2017-2991 CVE-2017-2992 CVE-2017-2993
CVE-2017-2994 CVE-2017-2995 CVE-2017-2996
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 12 vulnerabilities is now available.
Description:
The Adobe flash-player was updated to 24.0.0.221 to fix the following
issues:
Security update to 24.0.0.221 (bsc#1025258), fixing the following
vulnerabilities advised under APSB17-04:
* type confusion vulnerability that could lead to code execution
(CVE-2017-2995).
* integer overflow vulnerability that could lead to code execution
(CVE-2017-2987).
* use-after-free vulnerabilities that could lead to code execution
(CVE-2017-2982, CVE-2017-2985, CVE-2017-2993, CVE-2017-2994).
* heap buffer overflow vulnerabilities that could lead to code execution
(CVE-2017- 2984, CVE-2017-2986, CVE-2017-2992).
* memory corruption vulnerabilities that could lead to code execution
(CVE-2017-2988, CVE-2017-2990, CVE-2017-2991, CVE-2017-2996).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-268=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-268=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
flash-player-24.0.0.221-158.1
flash-player-gnome-24.0.0.221-158.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
flash-player-24.0.0.221-158.1
flash-player-gnome-24.0.0.221-158.1
References:
https://www.suse.com/security/cve/CVE-2017-2982.html
https://www.suse.com/security/cve/CVE-2017-2985.html
https://www.suse.com/security/cve/CVE-2017-2986.html
https://www.suse.com/security/cve/CVE-2017-2987.html
https://www.suse.com/security/cve/CVE-2017-2988.html
https://www.suse.com/security/cve/CVE-2017-2990.html
https://www.suse.com/security/cve/CVE-2017-2991.html
https://www.suse.com/security/cve/CVE-2017-2992.html
https://www.suse.com/security/cve/CVE-2017-2993.html
https://www.suse.com/security/cve/CVE-2017-2994.html
https://www.suse.com/security/cve/CVE-2017-2995.html
https://www.suse.com/security/cve/CVE-2017-2996.html
https://bugzilla.suse.com/1025258
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0517-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 20 Feb '17
by opensuse-security@opensuse.org 20 Feb '17
20 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0517-1
Rating: important
References: #1020048 #1024938
Cross-References: CVE-2017-5970
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
The SUSE Linux Enterprise 12 SP1 kernel was updated to fix the following
two issues:
- CVE-2017-5970: Remote attackers could have potentially caused a denial
of service by sending bad IP options on a socket (bsc#1024938)
- Fix a regression in MD RAID1 which could have caused wrong data to be
read (bsc#1020048)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-267=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-267=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-267=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-267=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-267=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-267=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
kernel-default-debuginfo-3.12.69-60.64.32.1
kernel-default-debugsource-3.12.69-60.64.32.1
kernel-default-extra-3.12.69-60.64.32.1
kernel-default-extra-debuginfo-3.12.69-60.64.32.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
kernel-obs-build-3.12.69-60.64.32.1
kernel-obs-build-debugsource-3.12.69-60.64.32.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):
kernel-docs-3.12.69-60.64.32.3
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
kernel-default-3.12.69-60.64.32.1
kernel-default-base-3.12.69-60.64.32.1
kernel-default-base-debuginfo-3.12.69-60.64.32.1
kernel-default-debuginfo-3.12.69-60.64.32.1
kernel-default-debugsource-3.12.69-60.64.32.1
kernel-default-devel-3.12.69-60.64.32.1
kernel-syms-3.12.69-60.64.32.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
kernel-devel-3.12.69-60.64.32.1
kernel-macros-3.12.69-60.64.32.1
kernel-source-3.12.69-60.64.32.1
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
kernel-xen-3.12.69-60.64.32.1
kernel-xen-base-3.12.69-60.64.32.1
kernel-xen-base-debuginfo-3.12.69-60.64.32.1
kernel-xen-debuginfo-3.12.69-60.64.32.1
kernel-xen-debugsource-3.12.69-60.64.32.1
kernel-xen-devel-3.12.69-60.64.32.1
- SUSE Linux Enterprise Server 12-SP1 (s390x):
kernel-default-man-3.12.69-60.64.32.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.69-60.64.32.1
kernel-ec2-debuginfo-3.12.69-60.64.32.1
kernel-ec2-debugsource-3.12.69-60.64.32.1
kernel-ec2-devel-3.12.69-60.64.32.1
kernel-ec2-extra-3.12.69-60.64.32.1
kernel-ec2-extra-debuginfo-3.12.69-60.64.32.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_69-60_64_32-default-1-2.1
kgraft-patch-3_12_69-60_64_32-xen-1-2.1
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
kernel-devel-3.12.69-60.64.32.1
kernel-macros-3.12.69-60.64.32.1
kernel-source-3.12.69-60.64.32.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
kernel-default-3.12.69-60.64.32.1
kernel-default-debuginfo-3.12.69-60.64.32.1
kernel-default-debugsource-3.12.69-60.64.32.1
kernel-default-devel-3.12.69-60.64.32.1
kernel-default-extra-3.12.69-60.64.32.1
kernel-default-extra-debuginfo-3.12.69-60.64.32.1
kernel-syms-3.12.69-60.64.32.1
kernel-xen-3.12.69-60.64.32.1
kernel-xen-debuginfo-3.12.69-60.64.32.1
kernel-xen-debugsource-3.12.69-60.64.32.1
kernel-xen-devel-3.12.69-60.64.32.1
References:
https://www.suse.com/security/cve/CVE-2017-5970.html
https://bugzilla.suse.com/1020048
https://bugzilla.suse.com/1024938
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0513-1: important: Security update for java-1_7_0-openjdk
by opensuse-security@opensuse.org 19 Feb '17
by opensuse-security@opensuse.org 19 Feb '17
19 Feb '17
openSUSE Security Update: Security update for java-1_7_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0513-1
Rating: important
References: #1020905
Cross-References: CVE-2016-2183 CVE-2016-5546 CVE-2016-5547
CVE-2016-5548 CVE-2016-5549 CVE-2016-5552
CVE-2017-3231 CVE-2017-3241 CVE-2017-3252
CVE-2017-3253 CVE-2017-3259 CVE-2017-3260
CVE-2017-3261 CVE-2017-3272 CVE-2017-3289
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
This update for java-1_7_0-openjdk fixes the following issues:
- Oracle Critical Patch Update of January 2017 to OpenJDK 7u131
(bsc#1020905):
* Security Fixes
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing performance
- S8167104, CVE-2017-3289: Additional class construction refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvments
- S8168724, CVE-2016-5549: ECDSA signing improvments
- S6253144: Long narrowing conversion should describe the algorithm
used and implied "risks"
- S6328537: Improve javadocs for Socket class by adding references to
SocketOptions
- S6978886: javadoc shows stacktrace after print error resulting from
disk full
- S6995421: Eliminate the static dependency to
sun.security.ec.ECKeyFactory
- S6996372: synchronizing handshaking hash
- S7027045: (doc) java/awt/Window.java has several typos in javadoc
- S7054969: Null-check-in-finally pattern in java/security
documentation
- S7072353: JNDI libraries do not build with javac -Xlint:all -Werror
- S7075563: Broken link in "javax.swing.SwingWorker"
- S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11
- S7088502: Security libraries don't build with javac -Werror
- S7092447: Clarify the default locale used in each locale sensitive
operation
- S7093640: Enable client-side TLS 1.2 by default
- S7103570: AtomicIntegerFieldUpdater does not work when
SecurityManager is installed
- S7117360: Warnings in java.util.concurrent.atomic package
- S7117465: Warning cleanup for IMF classes
- S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an
error
- S8000418: javadoc should used a standard "generated by javadoc"
string
- S8000666: javadoc should write directly to Writer instead of
composing strings
- S8000673: remove dead code from HtmlWriter and subtypes
- S8000970: break out auxiliary classes that will prevent multi-core
compilation of the JDK
- S8001669: javadoc internal DocletAbortException should set cause
when appropriate
- S8008949: javadoc stopped copying doc-files
- S8011402: Move blacklisting certificate logic from hard code to data
- S8011547: Update XML Signature implementation to Apache Santuario
1.5.4
- S8012288: XML DSig API allows wrong tag names and extra elements in
SignedInfo
- S8016217: More javadoc warnings
- S8017325: Cleanup of the javadoc <code> tag in java.security.cert
- S8017326: Cleanup of the javadoc <code> tag in java.security.spec
- S8019772: Fix doclint issues in javax.crypto and javax.security
subpackages
- S8020557: javadoc cleanup in javax.security
- S8020688: Broken links in documentation at
http://docs.oracle.com/javase/6/docs/api/index.
- S8021108: Clean up doclint warnings and errors in java.text package
- S8021417: Fix doclint issues in java.util.concurrent
- S8021833: javadoc cleanup in java.net
- S8022120: JCK test
api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails
- S8022175: Fix doclint warnings in javax.print
- S8022406: Fix doclint issues in java.beans
- S8022746: List of spelling errors in API doc
- S8024779: [macosx] SwingNode crashes on exit
- S8025085: [javadoc] some errors in javax/swing
- S8025218: [javadoc] some errors in java/awt classes
- S8025249: [javadoc] fix some javadoc errors in javax/swing/
- S8025409: Fix javadoc comments errors and warning reported by
doclint report
- S8026021: more fix of javadoc errors and warnings reported by
doclint, see the description
- S8037099: [macosx] Remove all references to GC from native OBJ-C code
- S8038184: XMLSignature throws StringIndexOutOfBoundsException if ID
attribute value is empty String
- S8038349: Signing XML with DSA throws Exception when key is larger
than 1024 bits
- S8049244: XML Signature performance issue caused by unbuffered
signature data
- S8049432: New tests for TLS property jdk.tls.client.protocols
- S8050893: (smartcardio) Invert reset argument in tests in
sun/security/smartcardio
- S8059212: Modify regression tests so that they do not just fail if
no cardreader found
- S8068279: (typo in the spec)
javax.script.ScriptEngineFactory.getLanguageName
- S8068491: Update the protocol for references of docs.oracle.com to
HTTPS.
- S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be
updated for JDK-8061210
- S8076369: Introduce the jdk.tls.client.protocols system property for
JDK 7u
- S8139565: Restrict certificates with DSA keys less than 1024 bits
- S8140422: Add mechanism to allow non default root CAs to be not
subject to algorithm restrictions
- S8140587: Atomic*FieldUpdaters should use Class.isInstance instead
of direct class check
- S8143959: Certificates requiring blacklisting
- S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
- S8148516: Improve the default strength of EC in JDK
- S8149029: Secure validation of XML based digital signature always
enabled when checking wrapping attacks
- S8151893: Add security property to configure XML Signature secure
validation mode
- S8155760: Implement Serialization Filtering
- S8156802: Better constraint checking
- S8161228: URL objects with custom protocol handlers have port
changed after deserializing
- S8161571: Verifying ECDSA signatures permits trailing bytes
- S8163304: jarsigner -verbose -verify should print the algorithms
used to sign the jar
- S8164908: ReflectionFactory support for IIOP and custom serialization
- S8165230: RMIConnection addNotificationListeners failing with
specific inputs
- S8166393: disabledAlgorithms property should not be strictly parsed
- S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12
Sierra is very fast (Trackpad, Retina only)
- S8166739: Improve extensibility of ObjectInputFilter information
passed to the filter
- S8166875: (tz) Support tzdata2016g
- S8166878: Connection reset during TLS handshake
- S8167356: Follow up fix for jdk8 backport of 8164143. Changes for
CMenuComponent.m were missed
- S8167459: Add debug output for indicating if a chosen ciphersuite
was legacy
- S8167472: Chrome interop regression with JDK-8148516
- S8167591: Add MD5 to signed JAR restrictions
- S8168861: AnchorCertificates uses hardcoded password for cacerts
keystore
- S8168993: JDK8u121 L10n resource file update
- S8169191: (tz) Support tzdata2016i
- S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for
January CPU
- S8169911: Enhanced tests for jarsigner -verbose -verify after
JDK-8163304
- S8170131: Certificates not being blocked by
jdk.tls.disabledAlgorithms property
- S8170268: 8u121 L10n resource file update - msgdrop 20
- S8173622: Backport of 7180907 is incomplete
- S8173849: Fix use of java.util.Base64 in test cases
- S8173854: [TEST] Update DHEKeySizing test case following 8076328 &
8081760
- CVE-2017-3259 Vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE.
* Backports
- S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on
__APPLE__and _LLP64 systems.
- S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned
- S8153711, PR3315, RH1284948: [REDO] GlobalRefs never deleted when
processing invokeMethod command
- S8170888, PR3316, RH1390708: [linux] support for cgroup memory
limits in container (ie Docker) environments
* Bug fixes
- PR3318: Replace 'infinality' with 'improved font rendering'
(--enable-improved-font-rendering)
- PR3318: Fix compatibility with vanilla Fontconfig
- PR3318: Fix glyph y advance
- PR3318: Always round glyph advance in 26.6 space
- PR3318: Simplify glyph advance handling
- PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh
broken by PR1989
* AArch64 port
- S8165673, PR3320: AArch64: Fix JNI floating point argument handling
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-278=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-278=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
java-1_7_0-openjdk-1.7.0.131-40.1
java-1_7_0-openjdk-accessibility-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-debugsource-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-devel-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-headless-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-debugsource-1.7.0.131-40.1
java-1_7_0-openjdk-demo-1.7.0.131-40.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-devel-1.7.0.131-40.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-headless-1.7.0.131-40.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-src-1.7.0.131-40.1
- openSUSE Leap 42.2 (noarch):
java-1_7_0-openjdk-javadoc-1.7.0.131-40.1
- openSUSE Leap 42.1 (i586 x86_64):
java-1_7_0-openjdk-1.7.0.131-40.1
java-1_7_0-openjdk-accessibility-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-debugsource-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-devel-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-devel-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-headless-1.7.0.131-40.1
java-1_7_0-openjdk-bootstrap-headless-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-debugsource-1.7.0.131-40.1
java-1_7_0-openjdk-demo-1.7.0.131-40.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-devel-1.7.0.131-40.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-headless-1.7.0.131-40.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-40.1
java-1_7_0-openjdk-src-1.7.0.131-40.1
- openSUSE Leap 42.1 (noarch):
java-1_7_0-openjdk-javadoc-1.7.0.131-40.1
References:
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.suse.com/security/cve/CVE-2016-5546.html
https://www.suse.com/security/cve/CVE-2016-5547.html
https://www.suse.com/security/cve/CVE-2016-5548.html
https://www.suse.com/security/cve/CVE-2016-5549.html
https://www.suse.com/security/cve/CVE-2016-5552.html
https://www.suse.com/security/cve/CVE-2017-3231.html
https://www.suse.com/security/cve/CVE-2017-3241.html
https://www.suse.com/security/cve/CVE-2017-3252.html
https://www.suse.com/security/cve/CVE-2017-3253.html
https://www.suse.com/security/cve/CVE-2017-3259.html
https://www.suse.com/security/cve/CVE-2017-3260.html
https://www.suse.com/security/cve/CVE-2017-3261.html
https://www.suse.com/security/cve/CVE-2017-3272.html
https://www.suse.com/security/cve/CVE-2017-3289.html
https://bugzilla.suse.com/1020905
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0510-1: important: Security update for opus
by opensuse-security@opensuse.org 18 Feb '17
by opensuse-security@opensuse.org 18 Feb '17
18 Feb '17
openSUSE Security Update: Security update for opus
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0510-1
Rating: important
References: #1020102
Cross-References: CVE-2017-0381
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for opus fixes the following issues:
- CVE-2017-0381: Fixed a remote code execution vulnerability in
silk/NLSF_stabilize.c when playing certain media files (bsc#1020102)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-277=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-277=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
libopus-devel-1.1-6.1
libopus-devel-static-1.1-6.1
libopus0-1.1-6.1
libopus0-debuginfo-1.1-6.1
opus-debugsource-1.1-6.1
- openSUSE Leap 42.2 (x86_64):
libopus0-32bit-1.1-6.1
libopus0-debuginfo-32bit-1.1-6.1
- openSUSE Leap 42.1 (i586 x86_64):
libopus-devel-1.1-5.1
libopus-devel-static-1.1-5.1
libopus0-1.1-5.1
libopus0-debuginfo-1.1-5.1
opus-debugsource-1.1-5.1
- openSUSE Leap 42.1 (x86_64):
libopus0-32bit-1.1-5.1
libopus0-debuginfo-32bit-1.1-5.1
References:
https://www.suse.com/security/cve/CVE-2017-0381.html
https://bugzilla.suse.com/1020102
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0499-1: important: Security update of chromium
by opensuse-security@opensuse.org 18 Feb '17
by opensuse-security@opensuse.org 18 Feb '17
18 Feb '17
openSUSE Security Update: Security update of chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0499-1
Rating: important
References: #1022049
Cross-References: CVE-2017-5006 CVE-2017-5007 CVE-2017-5008
CVE-2017-5009 CVE-2017-5010 CVE-2017-5011
CVE-2017-5012 CVE-2017-5013 CVE-2017-5014
CVE-2017-5015 CVE-2017-5016 CVE-2017-5017
CVE-2017-5018 CVE-2017-5019 CVE-2017-5020
CVE-2017-5021 CVE-2017-5022 CVE-2017-5023
CVE-2017-5024 CVE-2017-5025 CVE-2017-5026
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 21 vulnerabilities is now available.
Description:
Google chromium was updated to 56.0.2924.87:
* Various small fixes
* Disabled option to enable/disable plugins in the chrome://plugins
- Changed the build requirement of libavformat to library version
57.41.100, as included in ffmpeg 3.1.1, as only this version properly
supports the public AVStream API 'codecpar'.
It also contains the version update to 56.0.2924.76 (bsc#1022049):
- CVE-2017-5007: Universal XSS in Blink
- CVE-2017-5006: Universal XSS in Blink
- CVE-2017-5008: Universal XSS in Blink
- CVE-2017-5010: Universal XSS in Blink
- CVE-2017-5011: Unauthorised file access in Devtools
- CVE-2017-5009: Out of bounds memory access in WebRTC
- CVE-2017-5012: Heap overflow in V8
- CVE-2017-5013: Address spoofing in Omnibox
- CVE-2017-5014: Heap overflow in Skia
- CVE-2017-5015: Address spoofing in Omnibox
- CVE-2017-5019: Use after free in Renderer
- CVE-2017-5016: UI spoofing in Blink
- CVE-2017-5017: Uninitialised memory access in webm video
- CVE-2017-5018: Universal XSS in chrome://apps
- CVE-2017-5020: Universal XSS in chrome://downloads
- CVE-2017-5021: Use after free in Extensions
- CVE-2017-5022: Bypass of Content Security Policy in Blink
- CVE-2017-5023: Type confusion in metrics
- CVE-2017-5024: Heap overflow in FFmpeg
- CVE-2017-5025: Heap overflow in FFmpeg
- CVE-2017-5026: UI spoofing. Credit to Ronni Skansing
- Enable VAAPI hardware accelerated video decoding.
- Chromium 55.0.2883.87:
* various fixes for crashes and specific wesites
* update Google pinned certificates
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-273=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-273=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
harfbuzz-debugsource-1.4.2-3.1
harfbuzz-devel-1.4.2-3.1
harfbuzz-tools-1.4.2-3.1
harfbuzz-tools-debuginfo-1.4.2-3.1
libharfbuzz-icu0-1.4.2-3.1
libharfbuzz-icu0-debuginfo-1.4.2-3.1
libharfbuzz0-1.4.2-3.1
libharfbuzz0-debuginfo-1.4.2-3.1
- openSUSE Leap 42.2 (x86_64):
chromedriver-56.0.2924.87-102.1
chromedriver-debuginfo-56.0.2924.87-102.1
chromium-56.0.2924.87-102.1
chromium-debuginfo-56.0.2924.87-102.1
chromium-debugsource-56.0.2924.87-102.1
libharfbuzz-icu0-32bit-1.4.2-3.1
libharfbuzz-icu0-debuginfo-32bit-1.4.2-3.1
libharfbuzz0-32bit-1.4.2-3.1
libharfbuzz0-debuginfo-32bit-1.4.2-3.1
- openSUSE Leap 42.1 (i586 x86_64):
ffmpeg3-3.2.2-2.1
ffmpeg3-debuginfo-3.2.2-2.1
ffmpeg3-debugsource-3.2.2-2.1
libavcodec-devel-3.2.2-2.1
libavcodec57-3.2.2-2.1
libavcodec57-debuginfo-3.2.2-2.1
libavdevice-devel-3.2.2-2.1
libavdevice57-3.2.2-2.1
libavdevice57-debuginfo-3.2.2-2.1
libavfilter-devel-3.2.2-2.1
libavfilter6-3.2.2-2.1
libavfilter6-debuginfo-3.2.2-2.1
libavformat-devel-3.2.2-2.1
libavformat57-3.2.2-2.1
libavformat57-debuginfo-3.2.2-2.1
libavresample-devel-3.2.2-2.1
libavresample3-3.2.2-2.1
libavresample3-debuginfo-3.2.2-2.1
libavutil-devel-3.2.2-2.1
libavutil55-3.2.2-2.1
libavutil55-debuginfo-3.2.2-2.1
libpostproc-devel-3.2.2-2.1
libpostproc54-3.2.2-2.1
libpostproc54-debuginfo-3.2.2-2.1
libswresample-devel-3.2.2-2.1
libswresample2-3.2.2-2.1
libswresample2-debuginfo-3.2.2-2.1
libswscale-devel-3.2.2-2.1
libswscale4-3.2.2-2.1
libswscale4-debuginfo-3.2.2-2.1
- openSUSE Leap 42.1 (x86_64):
chromedriver-56.0.2924.87-102.1
chromedriver-debuginfo-56.0.2924.87-102.1
chromium-56.0.2924.87-102.1
chromium-debuginfo-56.0.2924.87-102.1
chromium-debugsource-56.0.2924.87-102.1
libavcodec57-32bit-3.2.2-2.1
libavcodec57-debuginfo-32bit-3.2.2-2.1
libavdevice57-32bit-3.2.2-2.1
libavdevice57-debuginfo-32bit-3.2.2-2.1
libavfilter6-32bit-3.2.2-2.1
libavfilter6-debuginfo-32bit-3.2.2-2.1
libavformat57-32bit-3.2.2-2.1
libavformat57-debuginfo-32bit-3.2.2-2.1
libavresample3-32bit-3.2.2-2.1
libavresample3-debuginfo-32bit-3.2.2-2.1
libavutil55-32bit-3.2.2-2.1
libavutil55-debuginfo-32bit-3.2.2-2.1
libpostproc54-32bit-3.2.2-2.1
libpostproc54-debuginfo-32bit-3.2.2-2.1
libswresample2-32bit-3.2.2-2.1
libswresample2-debuginfo-32bit-3.2.2-2.1
libswscale4-32bit-3.2.2-2.1
libswscale4-debuginfo-32bit-3.2.2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-5006.html
https://www.suse.com/security/cve/CVE-2017-5007.html
https://www.suse.com/security/cve/CVE-2017-5008.html
https://www.suse.com/security/cve/CVE-2017-5009.html
https://www.suse.com/security/cve/CVE-2017-5010.html
https://www.suse.com/security/cve/CVE-2017-5011.html
https://www.suse.com/security/cve/CVE-2017-5012.html
https://www.suse.com/security/cve/CVE-2017-5013.html
https://www.suse.com/security/cve/CVE-2017-5014.html
https://www.suse.com/security/cve/CVE-2017-5015.html
https://www.suse.com/security/cve/CVE-2017-5016.html
https://www.suse.com/security/cve/CVE-2017-5017.html
https://www.suse.com/security/cve/CVE-2017-5018.html
https://www.suse.com/security/cve/CVE-2017-5019.html
https://www.suse.com/security/cve/CVE-2017-5020.html
https://www.suse.com/security/cve/CVE-2017-5021.html
https://www.suse.com/security/cve/CVE-2017-5022.html
https://www.suse.com/security/cve/CVE-2017-5023.html
https://www.suse.com/security/cve/CVE-2017-5024.html
https://www.suse.com/security/cve/CVE-2017-5025.html
https://www.suse.com/security/cve/CVE-2017-5026.html
https://bugzilla.suse.com/1022049
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0494-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 17 Feb '17
by opensuse-security@opensuse.org 17 Feb '17
17 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0494-1
Rating: important
References: #1001419 #1002165 #1003077 #1003253 #1003925
#1004517 #1007944 #1008374 #1008645 #1008831
#1008833 #1008850 #1009875 #1010150 #1010467
#1010501 #1010507 #1010711 #1010713 #1010716
#1011685 #1011820 #1012183 #1012422 #1012832
#1012851 #1012852 #1012895 #1013038 #1013042
#1013531 #1013542 #1014454 #1014746 #1015878
#1017710 #1018446 #1019079 #1019783 #1021258
#821612 #824171 #914939 #929141 #935436 #956514
#961923 #966826 #967716 #969340 #973691 #979595
#987576 #989152 #989261 #991665 #992566 #992569
#992906 #992991 #993890 #993891 #994296 #994618
#994759 #995968 #996329 #996541 #996557 #997059
#997401 #997708 #998689 #999932 #999943
Cross-References: CVE-2004-0230 CVE-2012-6704 CVE-2015-1350
CVE-2015-8956 CVE-2015-8962 CVE-2015-8964
CVE-2015-8970 CVE-2016-0823 CVE-2016-10088
CVE-2016-3841 CVE-2016-6828 CVE-2016-7042
CVE-2016-7097 CVE-2016-7117 CVE-2016-7425
CVE-2016-7910 CVE-2016-7911 CVE-2016-7916
CVE-2016-8399 CVE-2016-8632 CVE-2016-8633
CVE-2016-8646 CVE-2016-9555 CVE-2016-9685
CVE-2016-9756 CVE-2016-9793 CVE-2017-5551
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-EXTRA
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves 27 vulnerabilities and has 48 fixes
is now available.
Description:
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not
verify that a setkey operation has been performed on an AF_ALG socket
before an accept system call is processed, which allowed local users to
cause a denial of service (NULL pointer dereference and system crash)
via a crafted application that did not supply a key, related to the
lrw_crypt function in crypto/lrw.c (bnc#1008374).
- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs
(bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserves the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bnc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for
remote attackers to guess sequence numbers and cause a denial of service
(connection loss) to persistent TCP connections by repeatedly injecting
a TCP RST packet, especially in protocols that use long-lived
connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the
Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users
to gain privileges or cause a denial of service (heap-based buffer
overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel
networking subsystem could have enabled a local malicious application to
execute arbitrary code within the context of the kernel bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option
(bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not
properly initialize Code Segment (CS) in certain error cases, which
allowed local users to obtain sensitive information from kernel stack
memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options
data, which allowed local users to gain privileges or cause a denial of
service (use-after-free and system crash) via a crafted sendmsg system
call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in
fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause
a denial of service (memory consumption) via crafted XFS filesystem
operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an
incomplete set of requirements for setattr operations that
underspecifies removing extended privilege attributes, which allowed
local users to cause a denial of service (capability stripping) via a
failed invocation of a system call, as demonstrated by using chown to
remove a capability from the ping or Wireshark dumpcap program
(bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function
in drivers/scsi/sg.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (memory corruption and system
crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacked chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop
function in block/genhd.c in the Linux kernel allowed local users to
gain privileges by leveraging the execution of a certain stop operation
even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (use-after-free) via a crafted
ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in
drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by reading a tty data
structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in
fs/proc/base.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory by reading a /proc/*/environ
file during a process-setup time interval in which environment-variable
copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the
Linux kernel allowed local users to cause a denial of service (OOPS) by
attempting to trigger use of in-kernel hash algorithms for a socket that
has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain
unusual hardware configurations allowed remote attackers to execute
arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux, when the GNU Compiler Collection (gcc) stack protector is
enabled, used an incorrect buffer size for certain timeout data, which
allowed local users to cause a denial of service (stack memory
corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in
net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
obtain sensitive information or cause a denial of service (NULL pointer
dereference) via vectors involving a bind system call on a Bluetooth
RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
function in net/socket.c in the Linux kernel allowed remote attackers to
execute arbitrary code via vectors involving a recvmmsg system call that
is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the
Linux kernel allowed local users to obtain sensitive physical-address
information by reading a pagemap file (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a
certain length field, which allowed local users to gain privileges or
cause a denial of service (heap-based buffer overflow) via an
ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in
the Linux kernel did not properly maintain certain SACK state after a
failed data copy, which allowed local users to cause a denial of service
(tcp_xmit_retransmit_queue use-after-free and system crash) via a
crafted SACK option (bnc#994296).
The following non-security bugs were fixed:
- Always include the git commit in KOTD builds. This allows us not to set
it explicitly in builds submitted to the official distribution
(bnc#821612, bnc#824171).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- NFSv4: Ensure that we do not drop a state owner more than once
(bsc#979595).
- NFSv4: add flock_owner to open context (bnc#998689).
- NFSv4: change nfs4_do_setattr to take an open_context instead of a
nfs4_state (bnc#998689).
- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of
lock_owner (bnc#998689).
- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is
one (bnc#998689).
- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514,
bsc#989261, bsc#979595).
- SELinux: Fix possible NULL pointer dereference in
selinux_inode_permission() (bsc#1012895).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors
(bnc#991665).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).
- __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- include/linux/math64.h: add div64_ul() (bsc#996329).
- kabi-fix for flock_owner addition (bsc#998689).
- kabi: get back scsi_device.current_cmnd (bsc#935436).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- md linear: fix a race between linear_add() and linear_congested()
(bsc#1018446).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708,
bsc#999943).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge()
succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation
voluntarily (bsc#1007944).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock
sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer
deletion (bnc#997401).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested
functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1
(bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- printk/sched: Introduce special printk_sched() for those awkward
(bsc#1013042, bsc#996541, bsc#1015878).
- qlcnic: Schedule napi directly in netpoll (bsc#966826).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/config.sh: Set a fitting release string (bsc#997059)
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#961923,
LTC#135138).
- sched/core: Fix a race between try_to_wake_up() and a woken up task
(bnc#1002165).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule()
(bnc#1001419).
- sched: Fix possible divide by zero in avg_atom() calculation
(bsc#996329).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: remove current_cmnd field from struct scsi_device (bsc#935436).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xfs: remove the deprecated nodelaylog option (bsc#992906).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-linux-kernel-12992=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-linux-kernel-12992=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-linux-kernel-12992=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-linux-kernel-12992=1
- SUSE Linux Enterprise Server 11-EXTRA:
zypper in -t patch slexsp3-linux-kernel-12992=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-linux-kernel-12992=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-linux-kernel-12992=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
kernel-bigsmp-3.0.101-0.47.96.1
kernel-bigsmp-base-3.0.101-0.47.96.1
kernel-bigsmp-devel-3.0.101-0.47.96.1
kernel-default-3.0.101-0.47.96.1
kernel-default-base-3.0.101-0.47.96.1
kernel-default-devel-3.0.101-0.47.96.1
kernel-ec2-3.0.101-0.47.96.1
kernel-ec2-base-3.0.101-0.47.96.1
kernel-ec2-devel-3.0.101-0.47.96.1
kernel-source-3.0.101-0.47.96.1
kernel-syms-3.0.101-0.47.96.1
kernel-trace-3.0.101-0.47.96.1
kernel-trace-base-3.0.101-0.47.96.1
kernel-trace-devel-3.0.101-0.47.96.1
kernel-xen-3.0.101-0.47.96.1
kernel-xen-base-3.0.101-0.47.96.1
kernel-xen-devel-3.0.101-0.47.96.1
- SUSE Manager Proxy 2.1 (x86_64):
kernel-bigsmp-3.0.101-0.47.96.1
kernel-bigsmp-base-3.0.101-0.47.96.1
kernel-bigsmp-devel-3.0.101-0.47.96.1
kernel-default-3.0.101-0.47.96.1
kernel-default-base-3.0.101-0.47.96.1
kernel-default-devel-3.0.101-0.47.96.1
kernel-ec2-3.0.101-0.47.96.1
kernel-ec2-base-3.0.101-0.47.96.1
kernel-ec2-devel-3.0.101-0.47.96.1
kernel-source-3.0.101-0.47.96.1
kernel-syms-3.0.101-0.47.96.1
kernel-trace-3.0.101-0.47.96.1
kernel-trace-base-3.0.101-0.47.96.1
kernel-trace-devel-3.0.101-0.47.96.1
kernel-xen-3.0.101-0.47.96.1
kernel-xen-base-3.0.101-0.47.96.1
kernel-xen-devel-3.0.101-0.47.96.1
- SUSE Manager 2.1 (s390x x86_64):
kernel-default-3.0.101-0.47.96.1
kernel-default-base-3.0.101-0.47.96.1
kernel-default-devel-3.0.101-0.47.96.1
kernel-source-3.0.101-0.47.96.1
kernel-syms-3.0.101-0.47.96.1
kernel-trace-3.0.101-0.47.96.1
kernel-trace-base-3.0.101-0.47.96.1
kernel-trace-devel-3.0.101-0.47.96.1
- SUSE Manager 2.1 (x86_64):
kernel-bigsmp-3.0.101-0.47.96.1
kernel-bigsmp-base-3.0.101-0.47.96.1
kernel-bigsmp-devel-3.0.101-0.47.96.1
kernel-ec2-3.0.101-0.47.96.1
kernel-ec2-base-3.0.101-0.47.96.1
kernel-ec2-devel-3.0.101-0.47.96.1
kernel-xen-3.0.101-0.47.96.1
kernel-xen-base-3.0.101-0.47.96.1
kernel-xen-devel-3.0.101-0.47.96.1
- SUSE Manager 2.1 (s390x):
kernel-default-man-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
kernel-default-3.0.101-0.47.96.1
kernel-default-base-3.0.101-0.47.96.1
kernel-default-devel-3.0.101-0.47.96.1
kernel-source-3.0.101-0.47.96.1
kernel-syms-3.0.101-0.47.96.1
kernel-trace-3.0.101-0.47.96.1
kernel-trace-base-3.0.101-0.47.96.1
kernel-trace-devel-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):
kernel-ec2-3.0.101-0.47.96.1
kernel-ec2-base-3.0.101-0.47.96.1
kernel-ec2-devel-3.0.101-0.47.96.1
kernel-xen-3.0.101-0.47.96.1
kernel-xen-base-3.0.101-0.47.96.1
kernel-xen-devel-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64):
kernel-bigsmp-3.0.101-0.47.96.1
kernel-bigsmp-base-3.0.101-0.47.96.1
kernel-bigsmp-devel-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x):
kernel-default-man-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586):
kernel-pae-3.0.101-0.47.96.1
kernel-pae-base-3.0.101-0.47.96.1
kernel-pae-devel-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64):
kernel-xen-extra-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-EXTRA (x86_64):
kernel-bigsmp-extra-3.0.101-0.47.96.1
kernel-trace-extra-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-EXTRA (ppc64):
kernel-ppc64-extra-3.0.101-0.47.96.1
- SUSE Linux Enterprise Server 11-EXTRA (i586):
kernel-pae-extra-3.0.101-0.47.96.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
kernel-default-3.0.101-0.47.96.1
kernel-default-base-3.0.101-0.47.96.1
kernel-default-devel-3.0.101-0.47.96.1
kernel-ec2-3.0.101-0.47.96.1
kernel-ec2-base-3.0.101-0.47.96.1
kernel-ec2-devel-3.0.101-0.47.96.1
kernel-pae-3.0.101-0.47.96.1
kernel-pae-base-3.0.101-0.47.96.1
kernel-pae-devel-3.0.101-0.47.96.1
kernel-source-3.0.101-0.47.96.1
kernel-syms-3.0.101-0.47.96.1
kernel-trace-3.0.101-0.47.96.1
kernel-trace-base-3.0.101-0.47.96.1
kernel-trace-devel-3.0.101-0.47.96.1
kernel-xen-3.0.101-0.47.96.1
kernel-xen-base-3.0.101-0.47.96.1
kernel-xen-devel-3.0.101-0.47.96.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
kernel-default-debuginfo-3.0.101-0.47.96.1
kernel-default-debugsource-3.0.101-0.47.96.1
kernel-trace-debuginfo-3.0.101-0.47.96.1
kernel-trace-debugsource-3.0.101-0.47.96.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64):
kernel-ec2-debuginfo-3.0.101-0.47.96.1
kernel-ec2-debugsource-3.0.101-0.47.96.1
kernel-xen-debuginfo-3.0.101-0.47.96.1
kernel-xen-debugsource-3.0.101-0.47.96.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (x86_64):
kernel-bigsmp-debuginfo-3.0.101-0.47.96.1
kernel-bigsmp-debugsource-3.0.101-0.47.96.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586):
kernel-pae-debuginfo-3.0.101-0.47.96.1
kernel-pae-debugsource-3.0.101-0.47.96.1
References:
https://www.suse.com/security/cve/CVE-2004-0230.html
https://www.suse.com/security/cve/CVE-2012-6704.html
https://www.suse.com/security/cve/CVE-2015-1350.html
https://www.suse.com/security/cve/CVE-2015-8956.html
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2015-8970.html
https://www.suse.com/security/cve/CVE-2016-0823.html
https://www.suse.com/security/cve/CVE-2016-10088.html
https://www.suse.com/security/cve/CVE-2016-3841.html
https://www.suse.com/security/cve/CVE-2016-6828.html
https://www.suse.com/security/cve/CVE-2016-7042.html
https://www.suse.com/security/cve/CVE-2016-7097.html
https://www.suse.com/security/cve/CVE-2016-7117.html
https://www.suse.com/security/cve/CVE-2016-7425.html
https://www.suse.com/security/cve/CVE-2016-7910.html
https://www.suse.com/security/cve/CVE-2016-7911.html
https://www.suse.com/security/cve/CVE-2016-7916.html
https://www.suse.com/security/cve/CVE-2016-8399.html
https://www.suse.com/security/cve/CVE-2016-8632.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8646.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://www.suse.com/security/cve/CVE-2016-9685.html
https://www.suse.com/security/cve/CVE-2016-9756.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://bugzilla.suse.com/1001419
https://bugzilla.suse.com/1002165
https://bugzilla.suse.com/1003077
https://bugzilla.suse.com/1003253
https://bugzilla.suse.com/1003925
https://bugzilla.suse.com/1004517
https://bugzilla.suse.com/1007944
https://bugzilla.suse.com/1008374
https://bugzilla.suse.com/1008645
https://bugzilla.suse.com/1008831
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1008850
https://bugzilla.suse.com/1009875
https://bugzilla.suse.com/1010150
https://bugzilla.suse.com/1010467
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010711
https://bugzilla.suse.com/1010713
https://bugzilla.suse.com/1010716
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1011820
https://bugzilla.suse.com/1012183
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1012832
https://bugzilla.suse.com/1012851
https://bugzilla.suse.com/1012852
https://bugzilla.suse.com/1012895
https://bugzilla.suse.com/1013038
https://bugzilla.suse.com/1013042
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013542
https://bugzilla.suse.com/1014454
https://bugzilla.suse.com/1014746
https://bugzilla.suse.com/1015878
https://bugzilla.suse.com/1017710
https://bugzilla.suse.com/1018446
https://bugzilla.suse.com/1019079
https://bugzilla.suse.com/1019783
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/821612
https://bugzilla.suse.com/824171
https://bugzilla.suse.com/914939
https://bugzilla.suse.com/929141
https://bugzilla.suse.com/935436
https://bugzilla.suse.com/956514
https://bugzilla.suse.com/961923
https://bugzilla.suse.com/966826
https://bugzilla.suse.com/967716
https://bugzilla.suse.com/969340
https://bugzilla.suse.com/973691
https://bugzilla.suse.com/979595
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/989152
https://bugzilla.suse.com/989261
https://bugzilla.suse.com/991665
https://bugzilla.suse.com/992566
https://bugzilla.suse.com/992569
https://bugzilla.suse.com/992906
https://bugzilla.suse.com/992991
https://bugzilla.suse.com/993890
https://bugzilla.suse.com/993891
https://bugzilla.suse.com/994296
https://bugzilla.suse.com/994618
https://bugzilla.suse.com/994759
https://bugzilla.suse.com/995968
https://bugzilla.suse.com/996329
https://bugzilla.suse.com/996541
https://bugzilla.suse.com/996557
https://bugzilla.suse.com/997059
https://bugzilla.suse.com/997401
https://bugzilla.suse.com/997708
https://bugzilla.suse.com/998689
https://bugzilla.suse.com/999932
https://bugzilla.suse.com/999943
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0490-1: important: Security update for java-1_7_0-openjdk
by opensuse-security@opensuse.org 17 Feb '17
by opensuse-security@opensuse.org 17 Feb '17
17 Feb '17
SUSE Security Update: Security update for java-1_7_0-openjdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0490-1
Rating: important
References: #1020905
Cross-References: CVE-2016-2183 CVE-2016-5546 CVE-2016-5547
CVE-2016-5548 CVE-2016-5549 CVE-2016-5552
CVE-2017-3231 CVE-2017-3241 CVE-2017-3252
CVE-2017-3253 CVE-2017-3259 CVE-2017-3260
CVE-2017-3261 CVE-2017-3272 CVE-2017-3289
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
This update for java-1_7_0-openjdk fixes the following issues:
- Oracle Critical Patch Update of January 2017 to OpenJDK 7u131
(bsc#1020905):
* Security Fixes
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing performance
- S8167104, CVE-2017-3289: Additional class construction refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvments
- S8168724, CVE-2016-5549: ECDSA signing improvments
- S6253144: Long narrowing conversion should describe the algorithm
used and implied "risks"
- S6328537: Improve javadocs for Socket class by adding references to
SocketOptions
- S6978886: javadoc shows stacktrace after print error resulting from
disk full
- S6995421: Eliminate the static dependency to
sun.security.ec.ECKeyFactory
- S6996372: synchronizing handshaking hash
- S7027045: (doc) java/awt/Window.java has several typos in javadoc
- S7054969: Null-check-in-finally pattern in java/security
documentation
- S7072353: JNDI libraries do not build with javac -Xlint:all -Werror
- S7075563: Broken link in "javax.swing.SwingWorker"
- S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11
- S7088502: Security libraries don't build with javac -Werror
- S7092447: Clarify the default locale used in each locale sensitive
operation
- S7093640: Enable client-side TLS 1.2 by default
- S7103570: AtomicIntegerFieldUpdater does not work when
SecurityManager is installed
- S7117360: Warnings in java.util.concurrent.atomic package
- S7117465: Warning cleanup for IMF classes
- S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an
error
- S8000418: javadoc should used a standard "generated by javadoc"
string
- S8000666: javadoc should write directly to Writer instead of
composing strings
- S8000673: remove dead code from HtmlWriter and subtypes
- S8000970: break out auxiliary classes that will prevent multi-core
compilation of the JDK
- S8001669: javadoc internal DocletAbortException should set cause
when appropriate
- S8008949: javadoc stopped copying doc-files
- S8011402: Move blacklisting certificate logic from hard code to data
- S8011547: Update XML Signature implementation to Apache Santuario
1.5.4
- S8012288: XML DSig API allows wrong tag names and extra elements in
SignedInfo
- S8016217: More javadoc warnings
- S8017325: Cleanup of the javadoc <code> tag in java.security.cert
- S8017326: Cleanup of the javadoc <code> tag in java.security.spec
- S8019772: Fix doclint issues in javax.crypto and javax.security
subpackages
- S8020557: javadoc cleanup in javax.security
- S8020688: Broken links in documentation at
http://docs.oracle.com/javase/6/docs/api/index.
- S8021108: Clean up doclint warnings and errors in java.text package
- S8021417: Fix doclint issues in java.util.concurrent
- S8021833: javadoc cleanup in java.net
- S8022120: JCK test
api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails
- S8022175: Fix doclint warnings in javax.print
- S8022406: Fix doclint issues in java.beans
- S8022746: List of spelling errors in API doc
- S8024779: [macosx] SwingNode crashes on exit
- S8025085: [javadoc] some errors in javax/swing
- S8025218: [javadoc] some errors in java/awt classes
- S8025249: [javadoc] fix some javadoc errors in javax/swing/
- S8025409: Fix javadoc comments errors and warning reported by
doclint report
- S8026021: more fix of javadoc errors and warnings reported by
doclint, see the description
- S8037099: [macosx] Remove all references to GC from native OBJ-C code
- S8038184: XMLSignature throws StringIndexOutOfBoundsException if ID
attribute value is empty String
- S8038349: Signing XML with DSA throws Exception when key is larger
than 1024 bits
- S8049244: XML Signature performance issue caused by unbuffered
signature data
- S8049432: New tests for TLS property jdk.tls.client.protocols
- S8050893: (smartcardio) Invert reset argument in tests in
sun/security/smartcardio
- S8059212: Modify regression tests so that they do not just fail if
no cardreader found
- S8068279: (typo in the spec)
javax.script.ScriptEngineFactory.getLanguageName
- S8068491: Update the protocol for references of docs.oracle.com to
HTTPS.
- S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be
updated for JDK-8061210
- S8076369: Introduce the jdk.tls.client.protocols system property for
JDK 7u
- S8139565: Restrict certificates with DSA keys less than 1024 bits
- S8140422: Add mechanism to allow non default root CAs to be not
subject to algorithm restrictions
- S8140587: Atomic*FieldUpdaters should use Class.isInstance instead
of direct class check
- S8143959: Certificates requiring blacklisting
- S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
- S8148516: Improve the default strength of EC in JDK
- S8149029: Secure validation of XML based digital signature always
enabled when checking wrapping attacks
- S8151893: Add security property to configure XML Signature secure
validation mode
- S8155760: Implement Serialization Filtering
- S8156802: Better constraint checking
- S8161228: URL objects with custom protocol handlers have port
changed after deserializing
- S8161571: Verifying ECDSA signatures permits trailing bytes
- S8163304: jarsigner -verbose -verify should print the algorithms
used to sign the jar
- S8164908: ReflectionFactory support for IIOP and custom serialization
- S8165230: RMIConnection addNotificationListeners failing with
specific inputs
- S8166393: disabledAlgorithms property should not be strictly parsed
- S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12
Sierra is very fast (Trackpad, Retina only)
- S8166739: Improve extensibility of ObjectInputFilter information
passed to the filter
- S8166875: (tz) Support tzdata2016g
- S8166878: Connection reset during TLS handshake
- S8167356: Follow up fix for jdk8 backport of 8164143. Changes for
CMenuComponent.m were missed
- S8167459: Add debug output for indicating if a chosen ciphersuite
was legacy
- S8167472: Chrome interop regression with JDK-8148516
- S8167591: Add MD5 to signed JAR restrictions
- S8168861: AnchorCertificates uses hardcoded password for cacerts
keystore
- S8168993: JDK8u121 L10n resource file update
- S8169191: (tz) Support tzdata2016i
- S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for
January CPU
- S8169911: Enhanced tests for jarsigner -verbose -verify after
JDK-8163304
- S8170131: Certificates not being blocked by
jdk.tls.disabledAlgorithms property
- S8170268: 8u121 L10n resource file update - msgdrop 20
- S8173622: Backport of 7180907 is incomplete
- S8173849: Fix use of java.util.Base64 in test cases
- S8173854: [TEST] Update DHEKeySizing test case following 8076328 &
8081760
- CVE-2017-3259 Vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE.
* Backports
- S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on
__APPLE__and _LLP64 systems.
- S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned
- S8153711, PR3315, RH1284948: [REDO] GlobalRefs never deleted when
processing invokeMethod command
- S8170888, PR3316, RH1390708: [linux] support for cgroup memory
limits in container (ie Docker) environments
* Bug fixes
- PR3318: Replace 'infinality' with 'improved font rendering'
(--enable-improved-font-rendering)
- PR3318: Fix compatibility with vanilla Fontconfig
- PR3318: Fix glyph y advance
- PR3318: Always round glyph advance in 26.6 space
- PR3318: Simplify glyph advance handling
- PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh
broken by PR1989
* AArch64 port
- S8165673, PR3320: AArch64: Fix JNI floating point argument handling
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-255=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-255=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-255=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-255=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-255=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-255=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-255=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-demo-1.7.0.131-39.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-devel-1.7.0.131-39.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-demo-1.7.0.131-39.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-devel-1.7.0.131-39.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-demo-1.7.0.131-39.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-devel-1.7.0.131-39.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-demo-1.7.0.131-39.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-devel-1.7.0.131-39.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-demo-1.7.0.131-39.1
java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-devel-1.7.0.131-39.1
java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
java-1_7_0-openjdk-1.7.0.131-39.1
java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1
java-1_7_0-openjdk-debugsource-1.7.0.131-39.1
java-1_7_0-openjdk-headless-1.7.0.131-39.1
java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1
References:
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.suse.com/security/cve/CVE-2016-5546.html
https://www.suse.com/security/cve/CVE-2016-5547.html
https://www.suse.com/security/cve/CVE-2016-5548.html
https://www.suse.com/security/cve/CVE-2016-5549.html
https://www.suse.com/security/cve/CVE-2016-5552.html
https://www.suse.com/security/cve/CVE-2017-3231.html
https://www.suse.com/security/cve/CVE-2017-3241.html
https://www.suse.com/security/cve/CVE-2017-3252.html
https://www.suse.com/security/cve/CVE-2017-3253.html
https://www.suse.com/security/cve/CVE-2017-3259.html
https://www.suse.com/security/cve/CVE-2017-3260.html
https://www.suse.com/security/cve/CVE-2017-3261.html
https://www.suse.com/security/cve/CVE-2017-3272.html
https://www.suse.com/security/cve/CVE-2017-3289.html
https://bugzilla.suse.com/1020905
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0486-1: important: Security update for mariadb
by opensuse-security@opensuse.org 17 Feb '17
by opensuse-security@opensuse.org 17 Feb '17
17 Feb '17
openSUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0486-1
Rating: important
References: #1008253 #1020868 #1020873 #1020875 #1020877
#1020878 #1020882 #1020884 #1020885 #1020891
#1020894 #1020896 #1022428
Cross-References: CVE-2016-6664 CVE-2017-3238 CVE-2017-3243
CVE-2017-3244 CVE-2017-3257 CVE-2017-3258
CVE-2017-3265 CVE-2017-3291 CVE-2017-3312
CVE-2017-3317 CVE-2017-3318
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that solves 11 vulnerabilities and has two fixes
is now available.
Description:
This mariadb version update to 10.0.29 fixes the following issues:
- CVE-2017-3318: unspecified vulnerability affecting Error Handling
(bsc#1020896)
- CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3312: insecure error log file handling in mysqld_safe,
incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: unspecified vulnerability in the DDL component
(bsc#1020875)
- CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878)
- CVE-2017-3244: unspecified vulnerability affecing the DML component
(bsc#1020877)
- CVE-2017-3243: unspecified vulnerability affecting the Charsets
component (bsc#1020891)
- CVE-2017-3238: unspecified vulnerability affecting the Optimizer
component (bsc#1020882)
- CVE-2016-6664: Root Privilege Escalation (bsc#1008253)
- Applications using the client library for MySQL (libmysqlclient.so) had
a use-after-free issue that could cause the applications to crash
(bsc#1022428)
- notable changes:
* XtraDB updated to 5.6.34-79.1
* TokuDB updated to 5.6.34-79.1
* Innodb updated to 5.6.35
* Performance Schema updated to 5.6.35
Release notes and changelog:
* https://kb.askmonty.org/en/mariadb-10029-release-notes
* https://kb.askmonty.org/en/mariadb-10029-changelog
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-257=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-257=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
libmysqlclient-devel-10.0.29-18.1
libmysqlclient18-10.0.29-18.1
libmysqlclient18-debuginfo-10.0.29-18.1
libmysqlclient_r18-10.0.29-18.1
libmysqld-devel-10.0.29-18.1
libmysqld18-10.0.29-18.1
libmysqld18-debuginfo-10.0.29-18.1
mariadb-10.0.29-18.1
mariadb-bench-10.0.29-18.1
mariadb-bench-debuginfo-10.0.29-18.1
mariadb-client-10.0.29-18.1
mariadb-client-debuginfo-10.0.29-18.1
mariadb-debuginfo-10.0.29-18.1
mariadb-debugsource-10.0.29-18.1
mariadb-errormessages-10.0.29-18.1
mariadb-test-10.0.29-18.1
mariadb-test-debuginfo-10.0.29-18.1
mariadb-tools-10.0.29-18.1
mariadb-tools-debuginfo-10.0.29-18.1
- openSUSE Leap 42.2 (x86_64):
libmysqlclient18-32bit-10.0.29-18.1
libmysqlclient18-debuginfo-32bit-10.0.29-18.1
libmysqlclient_r18-32bit-10.0.29-18.1
- openSUSE Leap 42.1 (i586 x86_64):
libmysqlclient-devel-10.0.29-18.1
libmysqlclient18-10.0.29-18.1
libmysqlclient18-debuginfo-10.0.29-18.1
libmysqlclient_r18-10.0.29-18.1
libmysqld-devel-10.0.29-18.1
libmysqld18-10.0.29-18.1
libmysqld18-debuginfo-10.0.29-18.1
mariadb-10.0.29-18.1
mariadb-bench-10.0.29-18.1
mariadb-bench-debuginfo-10.0.29-18.1
mariadb-client-10.0.29-18.1
mariadb-client-debuginfo-10.0.29-18.1
mariadb-debuginfo-10.0.29-18.1
mariadb-debugsource-10.0.29-18.1
mariadb-errormessages-10.0.29-18.1
mariadb-test-10.0.29-18.1
mariadb-test-debuginfo-10.0.29-18.1
mariadb-tools-10.0.29-18.1
mariadb-tools-debuginfo-10.0.29-18.1
- openSUSE Leap 42.1 (x86_64):
libmysqlclient18-32bit-10.0.29-18.1
libmysqlclient18-debuginfo-32bit-10.0.29-18.1
libmysqlclient_r18-32bit-10.0.29-18.1
References:
https://www.suse.com/security/cve/CVE-2016-6664.html
https://www.suse.com/security/cve/CVE-2017-3238.html
https://www.suse.com/security/cve/CVE-2017-3243.html
https://www.suse.com/security/cve/CVE-2017-3244.html
https://www.suse.com/security/cve/CVE-2017-3257.html
https://www.suse.com/security/cve/CVE-2017-3258.html
https://www.suse.com/security/cve/CVE-2017-3265.html
https://www.suse.com/security/cve/CVE-2017-3291.html
https://www.suse.com/security/cve/CVE-2017-3312.html
https://www.suse.com/security/cve/CVE-2017-3317.html
https://www.suse.com/security/cve/CVE-2017-3318.html
https://bugzilla.suse.com/1008253
https://bugzilla.suse.com/1020868
https://bugzilla.suse.com/1020873
https://bugzilla.suse.com/1020875
https://bugzilla.suse.com/1020877
https://bugzilla.suse.com/1020878
https://bugzilla.suse.com/1020882
https://bugzilla.suse.com/1020884
https://bugzilla.suse.com/1020885
https://bugzilla.suse.com/1020891
https://bugzilla.suse.com/1020894
https://bugzilla.suse.com/1020896
https://bugzilla.suse.com/1022428
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0479-1: important: Security update for mysql-community-server
by opensuse-security@opensuse.org 17 Feb '17
by opensuse-security@opensuse.org 17 Feb '17
17 Feb '17
openSUSE Security Update: Security update for mysql-community-server
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0479-1
Rating: important
References: #1020872 #1020873 #1020875 #1020876 #1020877
#1020878 #1020882 #1020884 #1020885 #1020890
#1020893 #1020894 #1020896
Cross-References: CVE-2016-8318 CVE-2016-8327 CVE-2017-3238
CVE-2017-3244 CVE-2017-3257 CVE-2017-3258
CVE-2017-3265 CVE-2017-3273 CVE-2017-3291
CVE-2017-3312 CVE-2017-3313 CVE-2017-3317
CVE-2017-3318
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
mysql-community-server was updated to version 5.6.35 to fix bugs and
security issues:
* Changes http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-35.html
* Fixed CVEs: CVE-2016-8318 [boo#1020872], CVE-2017-3312 [boo#1020873],
CVE-2017-3258 [boo#1020875], CVE-2017-3273 [boo#1020876], CVE-2017-3244
[boo#1020877], CVE-2017-3257 [boo#1020878], CVE-2017-3238 [boo#1020882],
CVE-2017-3291 [boo#1020884], CVE-2017-3265 [boo#1020885], CVE-2017-3313
[boo#1020890], CVE-2016-8327 [boo#1020893], CVE-2017-3317 [boo#1020894],
CVE-2017-3318 [boo#1020896]
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-258=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i586 x86_64):
libmysql56client18-5.6.35-22.1
libmysql56client18-debuginfo-5.6.35-22.1
libmysql56client_r18-5.6.35-22.1
mysql-community-server-5.6.35-22.1
mysql-community-server-bench-5.6.35-22.1
mysql-community-server-bench-debuginfo-5.6.35-22.1
mysql-community-server-client-5.6.35-22.1
mysql-community-server-client-debuginfo-5.6.35-22.1
mysql-community-server-debuginfo-5.6.35-22.1
mysql-community-server-debugsource-5.6.35-22.1
mysql-community-server-errormessages-5.6.35-22.1
mysql-community-server-test-5.6.35-22.1
mysql-community-server-test-debuginfo-5.6.35-22.1
mysql-community-server-tools-5.6.35-22.1
mysql-community-server-tools-debuginfo-5.6.35-22.1
- openSUSE Leap 42.1 (x86_64):
libmysql56client18-32bit-5.6.35-22.1
libmysql56client18-debuginfo-32bit-5.6.35-22.1
libmysql56client_r18-32bit-5.6.35-22.1
References:
https://www.suse.com/security/cve/CVE-2016-8318.html
https://www.suse.com/security/cve/CVE-2016-8327.html
https://www.suse.com/security/cve/CVE-2017-3238.html
https://www.suse.com/security/cve/CVE-2017-3244.html
https://www.suse.com/security/cve/CVE-2017-3257.html
https://www.suse.com/security/cve/CVE-2017-3258.html
https://www.suse.com/security/cve/CVE-2017-3265.html
https://www.suse.com/security/cve/CVE-2017-3273.html
https://www.suse.com/security/cve/CVE-2017-3291.html
https://www.suse.com/security/cve/CVE-2017-3312.html
https://www.suse.com/security/cve/CVE-2017-3313.html
https://www.suse.com/security/cve/CVE-2017-3317.html
https://www.suse.com/security/cve/CVE-2017-3318.html
https://bugzilla.suse.com/1020872
https://bugzilla.suse.com/1020873
https://bugzilla.suse.com/1020875
https://bugzilla.suse.com/1020876
https://bugzilla.suse.com/1020877
https://bugzilla.suse.com/1020878
https://bugzilla.suse.com/1020882
https://bugzilla.suse.com/1020884
https://bugzilla.suse.com/1020885
https://bugzilla.suse.com/1020890
https://bugzilla.suse.com/1020893
https://bugzilla.suse.com/1020894
https://bugzilla.suse.com/1020896
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0471-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 15 Feb '17
by opensuse-security@opensuse.org 15 Feb '17
15 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0471-1
Rating: important
References: #1003153 #1003925 #1004462 #1004517 #1005666
#1007197 #1008833 #1008979 #1009969 #1010040
#1010475 #1010478 #1010501 #1010502 #1010507
#1010612 #1010711 #1010716 #1011820 #1012422
#1013038 #1013531 #1013540 #1013542 #1014746
#1016482 #1017410 #1017589 #1017710 #1019300
#1019851 #1020602 #1021258 #881008 #915183
#958606 #961257 #970083 #971989 #976195 #978094
#980371 #980560 #981038 #981597 #981709 #982282
#982544 #983619 #983721 #983977 #984148 #984419
#984755 #985978 #986362 #986365 #986445 #986569
#986572 #986811 #986941 #987542 #987565 #987576
#989152 #990384 #991608 #991665 #993392 #993890
#993891 #994296 #994748 #994881 #995968 #997708
#998795 #999584 #999600 #999932 #999943
Cross-References: CVE-2014-9904 CVE-2015-8956 CVE-2015-8962
CVE-2015-8963 CVE-2015-8964 CVE-2016-10088
CVE-2016-4470 CVE-2016-4998 CVE-2016-5696
CVE-2016-5828 CVE-2016-5829 CVE-2016-6130
CVE-2016-6327 CVE-2016-6480 CVE-2016-6828
CVE-2016-7042 CVE-2016-7097 CVE-2016-7425
CVE-2016-7910 CVE-2016-7911 CVE-2016-7913
CVE-2016-7914 CVE-2016-8399 CVE-2016-8633
CVE-2016-8645 CVE-2016-8658 CVE-2016-9083
CVE-2016-9084 CVE-2016-9756 CVE-2016-9793
CVE-2016-9806 CVE-2017-2583 CVE-2017-2584
CVE-2017-5551
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________
An update that solves 34 vulnerabilities and has 48 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to
receive various security and bugfixes.
The following feature was implemented:
- The ext2 filesystem got reenabled and supported to allow support for
"XIP" (Execute In Place) (FATE#320805).
The following security bugs were fixed:
- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel
preserved the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserved the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bnc#995968).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual
Machine (CONFIG_KVM) support was vulnerable to an incorrect segment
selector(SS) value error. A user/process inside guest could have used
this flaw to crash the guest resulting in DoS or potentially escalate
their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local
users to obtain sensitive information from kernel memory or cause a
denial of service (use-after-free) via a crafted application that
leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt
(bnc#1019851).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb
truncation, which allowed local users to cause a denial of service
(system crash) via a crafted application that made sendto system calls,
related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel
networking subsystem could enable a local malicious application to
execute arbitrary code within the context of the kernel. This issue is
rated as Moderate because it first requires compromising a privileged
process and current compiler optimizations restrict access to the
vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18.
Android ID: A-31349935 (bnc#1014746).
- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to
cause a denial of service (double free) or possibly have unspecified
other impact via a crafted application that made sendmsg system calls,
leading to a free operation associated with a new dump that started
earlier than anticipated (bnc#1013540).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not
properly initialize Code Segment (CS) in certain error cases, which
allowed local users to obtain sensitive information from kernel stack
memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option
(bnc#1013531).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop
function in block/genhd.c in the Linux kernel allowed local users to
gain privileges by leveraging the execution of a certain stop operation
even if the corresponding start operation had failed (bnc#1010716).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function
in drivers/scsi/sg.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (memory corruption and system
crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-7913: The xc2028_set_config function in
drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free)
via vectors involving omission of the firmware name from a certain data
structure (bnc#1010478).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (use-after-free) via a crafted
ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in
drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by reading a tty data
structure (bnc#1010507).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (use-after-free) by leveraging incorrect handling of an swevent
data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in
lib/assoc_array.c in the Linux kernel did not check whether a slot is a
leaf, which allowed local users to obtain sensitive information from
kernel memory or cause a denial of service (invalid pointer dereference
and out-of-bounds read) via an application that uses associative-array
data structures, as demonstrated by the keyutils test suite
(bnc#1010475).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote
attackers to execute arbitrary code via crafted fragmented packets
(bnc#1008833).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed
local users to bypass integer overflow checks, and cause a denial of
service (memory corruption) or have unspecified other impact, by
leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS
ioctl call, aka a "state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel
misused the kzalloc function, which allowed local users to cause a
denial of service (integer overflow) or have unspecified other impact by
leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel uses an incorrect buffer size for certain timeout data,
which allowed local users to cause a denial of service (stack memory
corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in
net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
obtain sensitive information or cause a denial of service (NULL pointer
dereference) via vectors involving a bind system call on a Bluetooth
RFCOMM socket (bnc#1003925).
- CVE-2016-8658: Stack-based buffer overflow in the
brcmf_cfg80211_start_ap function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (system crash)
or possibly have unspecified other impact via a long SSID Information
Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a
certain length field, which allowed local users to gain privileges or
cause a denial of service (heap-based buffer overflow) via an
ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel
allowed local users to cause a denial of service (NULL pointer
dereference and system crash) by using an ABORT_TASK command to abort a
device write operation (bnc#994748).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in
the Linux kernel did not properly maintain certain SACK state after a
failed data copy, which allowed local users to cause a denial of service
(tcp_xmit_retransmit_queue use-after-free and system crash) via a
crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
determine the rate of challenge ACK segments, which made it easier for
remote attackers to hijack TCP sessions via a blind in-window attack
(bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by changing a certain
length value, aka a "double fetch" vulnerability (bnc#987542).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
to cause a denial of service (out-of-bounds access or system crash) by
changing a certain size value, aka a "double fetch" vulnerability
(bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the
netfilter subsystem in the Linux kernel allowed local users to cause a
denial of service (out-of-bounds read) or possibly obtain sensitive
information from kernel heap memory by leveraging in-container root
access to provide a crafted offset value that leads to crossing a
ruleset blob boundary (bnc#986362 bnc#986365).
- CVE-2016-5828: The start_thread function in
arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms
mishandled transactional state, which allowed local users to cause a
denial of service (invalid process state or TM Bad Thing exception, and
system crash) or possibly have unspecified other impact by starting and
suspending a transaction before an exec system call (bnc#986569).
- CVE-2014-9904: The snd_compress_check_input function in
sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel
did not properly check for an integer overflow, which allowed local
users to cause a denial of service (insufficient memory allocation) or
possibly have unspecified other impact via a crafted
SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2016-5829: Multiple heap-based buffer overflows in the
hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux
kernel allow local users to cause a denial of service or possibly have
unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2)
HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c
in the Linux kernel did not ensure that a certain data structure is
initialized, which allowed local users to cause a denial of service
(system crash) via vectors involving a crafted keyctl request2 command
(bnc#984755).
The following non-security bugs were fixed:
- base: make module_create_drivers_dir race-free (bnc#983977).
- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable
(bsc#981597).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction
(bsc#983619).
- btrfs: be more precise on errors when getting an inode from disk
(bsc#981038).
- btrfs: do not create or leak aliased root while cleaning up orphans
(bsc#994881).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir
(bsc#999600).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: improve performance on fsync against new inode after
rename/unlink (bsc#981038).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir
(bsc#981709).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir()
(bsc#981709).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs in tuning.
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short
jumps to it (bsc#984419).
- ipv6: Fix improper use or RCU in
patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch.
(bsc#961257)
- ipv6: KABI workaround for ipv6: add complete rcu protection around
np->opt.
- kabi: prevent spurious modversion changes after bsc#982544 fix
(bsc#982544).
- kabi: reintroduce sk_filter (kabi).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread
(bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410,
fate#313296).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED
(VM Functionality, bnc#986445).
- modsign: Print appropriate status message when accessing UEFI variable
(bsc#958606).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708,
bsc#999943).
- netfilter: allow logging fron non-init netns (bsc#970083).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in
br_validate_ipv6 (bsc#982544).
- nfs: Do not write enable new pages while an invalidation is proceeding
(bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- pci/aer: Clear error status registers during enumeration and restore
(bsc#985978).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- reiserfs: fix race in prealloc discard (bsc#987576).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: Increase REPORT_LUNS timeout (bsc#982282).
- series.conf: move stray netfilter patches to the right section
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- supported.conf: Add ext2
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tty: audit: Fix audit source (bsc#1016482).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors
(bnc#991665).
- xen: Fix refcnt regression in xen netback introduced by changes made for
bug#881008 (bnc#978094)
- xfs: allow lazy sb counter sync during filesystem freeze sequence
(bsc#980560).
- xfs: fixed signedness of error code in xfs_inode_buf_verify
(bsc#1003153).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-247=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-247=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-247=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (noarch):
kernel-devel-3.12.61-52.66.1
kernel-macros-3.12.61-52.66.1
kernel-source-3.12.61-52.66.1
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
kernel-default-3.12.61-52.66.1
kernel-default-base-3.12.61-52.66.1
kernel-default-base-debuginfo-3.12.61-52.66.1
kernel-default-debuginfo-3.12.61-52.66.1
kernel-default-debugsource-3.12.61-52.66.1
kernel-default-devel-3.12.61-52.66.1
kernel-syms-3.12.61-52.66.1
kernel-xen-3.12.61-52.66.1
kernel-xen-base-3.12.61-52.66.1
kernel-xen-base-debuginfo-3.12.61-52.66.1
kernel-xen-debuginfo-3.12.61-52.66.1
kernel-xen-debugsource-3.12.61-52.66.1
kernel-xen-devel-3.12.61-52.66.1
kgraft-patch-3_12_61-52_66-default-1-2.1
kgraft-patch-3_12_61-52_66-xen-1-2.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
kernel-default-3.12.61-52.66.1
kernel-default-base-3.12.61-52.66.1
kernel-default-base-debuginfo-3.12.61-52.66.1
kernel-default-debuginfo-3.12.61-52.66.1
kernel-default-debugsource-3.12.61-52.66.1
kernel-default-devel-3.12.61-52.66.1
kernel-syms-3.12.61-52.66.1
- SUSE Linux Enterprise Server 12-LTSS (noarch):
kernel-devel-3.12.61-52.66.1
kernel-macros-3.12.61-52.66.1
kernel-source-3.12.61-52.66.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
kernel-xen-3.12.61-52.66.1
kernel-xen-base-3.12.61-52.66.1
kernel-xen-base-debuginfo-3.12.61-52.66.1
kernel-xen-debuginfo-3.12.61-52.66.1
kernel-xen-debugsource-3.12.61-52.66.1
kernel-xen-devel-3.12.61-52.66.1
kgraft-patch-3_12_61-52_66-default-1-2.1
kgraft-patch-3_12_61-52_66-xen-1-2.1
- SUSE Linux Enterprise Server 12-LTSS (s390x):
kernel-default-man-3.12.61-52.66.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.61-52.66.1
kernel-ec2-debuginfo-3.12.61-52.66.1
kernel-ec2-debugsource-3.12.61-52.66.1
kernel-ec2-devel-3.12.61-52.66.1
kernel-ec2-extra-3.12.61-52.66.1
kernel-ec2-extra-debuginfo-3.12.61-52.66.1
References:
https://www.suse.com/security/cve/CVE-2014-9904.html
https://www.suse.com/security/cve/CVE-2015-8956.html
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8963.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2016-10088.html
https://www.suse.com/security/cve/CVE-2016-4470.html
https://www.suse.com/security/cve/CVE-2016-4998.html
https://www.suse.com/security/cve/CVE-2016-5696.html
https://www.suse.com/security/cve/CVE-2016-5828.html
https://www.suse.com/security/cve/CVE-2016-5829.html
https://www.suse.com/security/cve/CVE-2016-6130.html
https://www.suse.com/security/cve/CVE-2016-6327.html
https://www.suse.com/security/cve/CVE-2016-6480.html
https://www.suse.com/security/cve/CVE-2016-6828.html
https://www.suse.com/security/cve/CVE-2016-7042.html
https://www.suse.com/security/cve/CVE-2016-7097.html
https://www.suse.com/security/cve/CVE-2016-7425.html
https://www.suse.com/security/cve/CVE-2016-7910.html
https://www.suse.com/security/cve/CVE-2016-7911.html
https://www.suse.com/security/cve/CVE-2016-7913.html
https://www.suse.com/security/cve/CVE-2016-7914.html
https://www.suse.com/security/cve/CVE-2016-8399.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8645.html
https://www.suse.com/security/cve/CVE-2016-8658.html
https://www.suse.com/security/cve/CVE-2016-9083.html
https://www.suse.com/security/cve/CVE-2016-9084.html
https://www.suse.com/security/cve/CVE-2016-9756.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2016-9806.html
https://www.suse.com/security/cve/CVE-2017-2583.html
https://www.suse.com/security/cve/CVE-2017-2584.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://bugzilla.suse.com/1003153
https://bugzilla.suse.com/1003925
https://bugzilla.suse.com/1004462
https://bugzilla.suse.com/1004517
https://bugzilla.suse.com/1005666
https://bugzilla.suse.com/1007197
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1008979
https://bugzilla.suse.com/1009969
https://bugzilla.suse.com/1010040
https://bugzilla.suse.com/1010475
https://bugzilla.suse.com/1010478
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010502
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010612
https://bugzilla.suse.com/1010711
https://bugzilla.suse.com/1010716
https://bugzilla.suse.com/1011820
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1013038
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013540
https://bugzilla.suse.com/1013542
https://bugzilla.suse.com/1014746
https://bugzilla.suse.com/1016482
https://bugzilla.suse.com/1017410
https://bugzilla.suse.com/1017589
https://bugzilla.suse.com/1017710
https://bugzilla.suse.com/1019300
https://bugzilla.suse.com/1019851
https://bugzilla.suse.com/1020602
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/881008
https://bugzilla.suse.com/915183
https://bugzilla.suse.com/958606
https://bugzilla.suse.com/961257
https://bugzilla.suse.com/970083
https://bugzilla.suse.com/971989
https://bugzilla.suse.com/976195
https://bugzilla.suse.com/978094
https://bugzilla.suse.com/980371
https://bugzilla.suse.com/980560
https://bugzilla.suse.com/981038
https://bugzilla.suse.com/981597
https://bugzilla.suse.com/981709
https://bugzilla.suse.com/982282
https://bugzilla.suse.com/982544
https://bugzilla.suse.com/983619
https://bugzilla.suse.com/983721
https://bugzilla.suse.com/983977
https://bugzilla.suse.com/984148
https://bugzilla.suse.com/984419
https://bugzilla.suse.com/984755
https://bugzilla.suse.com/985978
https://bugzilla.suse.com/986362
https://bugzilla.suse.com/986365
https://bugzilla.suse.com/986445
https://bugzilla.suse.com/986569
https://bugzilla.suse.com/986572
https://bugzilla.suse.com/986811
https://bugzilla.suse.com/986941
https://bugzilla.suse.com/987542
https://bugzilla.suse.com/987565
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/989152
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/991608
https://bugzilla.suse.com/991665
https://bugzilla.suse.com/993392
https://bugzilla.suse.com/993890
https://bugzilla.suse.com/993891
https://bugzilla.suse.com/994296
https://bugzilla.suse.com/994748
https://bugzilla.suse.com/994881
https://bugzilla.suse.com/995968
https://bugzilla.suse.com/997708
https://bugzilla.suse.com/998795
https://bugzilla.suse.com/999584
https://bugzilla.suse.com/999600
https://bugzilla.suse.com/999932
https://bugzilla.suse.com/999943
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0464-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 14 Feb '17
by opensuse-security@opensuse.org 14 Feb '17
14 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0464-1
Rating: important
References: #1003813 #1005666 #1007197 #1008557 #1008567
#1008833 #1008876 #1008979 #1009062 #1009969
#1010040 #1010213 #1010294 #1010475 #1010478
#1010501 #1010502 #1010507 #1010612 #1010711
#1010716 #1012060 #1012422 #1012917 #1012985
#1013001 #1013038 #1013479 #1013531 #1013540
#1013542 #1014410 #1014746 #1016713 #1016725
#1016961 #1017164 #1017170 #1017410 #1017589
#1017710 #1018100 #1019032 #1019148 #1019260
#1019300 #1019783 #1019851 #1020214 #1020602
#1021258 #856380 #857394 #858727 #921338
#921778 #922052 #922056 #923036 #923037 #924381
#938963 #972993 #980560 #981709 #983087 #983348
#984194 #984419 #985850 #987192 #987576 #990384
#991273 #993739 #997807 #999101
Cross-References: CVE-2015-8962 CVE-2015-8963 CVE-2015-8964
CVE-2016-10088 CVE-2016-7910 CVE-2016-7911
CVE-2016-7913 CVE-2016-7914 CVE-2016-8399
CVE-2016-8633 CVE-2016-8645 CVE-2016-9083
CVE-2016-9084 CVE-2016-9756 CVE-2016-9793
CVE-2016-9806 CVE-2017-2583 CVE-2017-2584
CVE-2017-5551
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 19 vulnerabilities and has 58 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.69 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8962: Double free vulnerability in the sg_common_write function
in drivers/scsi/sg.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (memory corruption and system
crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (use-after-free) by leveraging incorrect handling of an swevent
data structure during a CPU unplug operation (bnc#1010502).
- CVE-2015-8964: The tty_set_termios_ldisc function in
drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by reading a tty data
structure (bnc#1010507).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop
function in block/genhd.c in the Linux kernel allowed local users to
gain privileges by leveraging the execution of a certain stop operation
even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (use-after-free) via a crafted
ioprio_get system call (bnc#1010711).
- CVE-2016-7913: The xc2028_set_config function in
drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free)
via vectors involving omission of the firmware name from a certain data
structure (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in
lib/assoc_array.c in the Linux kernel did not check whether a slot is a
leaf, which allowed local users to obtain sensitive information from
kernel memory or cause a denial of service (invalid pointer dereference
and out-of-bounds read) via an application that uses associative-array
data structures, as demonstrated by the keyutils test suite
(bnc#1010475).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel
networking subsystem could enable a local malicious application to
execute arbitrary code within the context of the kernel. This issue is
rated as Moderate because it first requires compromising a privileged
process and current compiler optimizations restrict access to the
vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18.
Android ID: A-31349935 (bnc#1014746).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain
unusual hardware configurations, allowed remote attackers to execute
arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb
truncation, which allowed local users to cause a denial of service
(system crash) via a crafted application that made sendto system calls,
related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed
local users to bypass integer overflow checks, and cause a denial of
service (memory corruption) or have unspecified other impact, by
leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS
ioctl call, aka a "state machine confusion bug" (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel
misuses the kzalloc function, which allowed local users to cause a
denial of service (integer overflow) or have unspecified other impact by
leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not
properly initialize Code Segment (CS) in certain error cases, which
allowed local users to obtain sensitive information from kernel stack
memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option
(bnc#1013531 1013542).
- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to
cause a denial of service (double free) or possibly have unspecified
other impact via a crafted application that made sendmsg system calls,
leading to a free operation associated with a new dump that started
earlier than anticipated (bnc#1013540 1017589).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local
users to obtain sensitive information from kernel memory or cause a
denial of service (use-after-free) via a crafted application that
leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt
(bsc#1019851).
- CVE-2017-2583: Fixed broken emulation of "MOV SS, null selector"
(bsc#1020602).
- CVE-2017-5551: Clear SGID bit when setting file permissions on tmpfs
(bsc#1021258).
The following non-security bugs were fixed:
- Fixup acl reference leak and missing conversions in ext3, gfs2, jfs,
hfsplus
- RAID1: ignore discard error (bsc#1017164).
- Update
patches.suse/btrfs-8446-fix-qgroup-accounting-when-creating-snap.patch
(bsc#972993).
- blacklist: PCI fixes required only for cxl (bsc#1016713).
- blacklist: cxl fixes on SLE12 SP1 (bsc#1016725)
- blacklist: ibmvnic fixes on SLE12 SP1 (bsc#1016961)
- block_dev: do not test bdev->bd_contains when it is not stable
(bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052
fate#318602 bsc#922056 FATE#318604).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#922052 fate#318602 bsc#922056 FATE#318604).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space
(bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c
(bsc#983087).
- btrfs: Revert "Btrfs: do not delay inode ref updates during log replay"
(bsc#987192).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in
btrfs_ioctl (bsc#1018100).
- btrfs: do not delay inode ref updates during log replay (bsc#987192).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir
(bsc#981709).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing
(bsc#983087).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir()
(bsc#981709).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL)
(bsc#1008876).
- ext4: fix data exposure after a crash (bsc#1012985).
- fs: avoid including "mountproto=" with no protocol in /proc/mounts
(bsc#1019260).
- fuse: do not use iocb after it may have been freed (bsc#1012985).
- hpilo: Add support for iLO5 (bsc#999101).
- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381
FATE#318568 bsc#921338).
- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036 FATE#318772).
- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727 FATE#315946).
- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727
FATE#315946).
- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036 FATE#318772).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit
(bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Fix oops caused by missing queue pairing (bnc#857394).
- ipmi_si: create hardware-independent softdep for ipmi_devintf
(bsc#1009062).
- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963
FATE#319084).
- kabi fix (bsc#1014410).
- kabi: Whitelist KVM KABI changes resulting from adding a hcall. caused
by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae powerpc/pseries: Use
H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected
as result of changing KVM KABI so whitelisting for now. If we get some
additional input from IBM we can back out the patch.
- kabi: protect __sk_mem_reclaim (kabi).
- kabi: protect struct perf_event_context (kabi).
- kabi: reintroduce sk_filter (kabi).
- kbuild: Fix removal of the debian/ directory (bsc#1010213).
- kernel: remove broken memory detection sanity check (bnc#1008567,
LTC#148072).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread
(bsc#1010612).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- move the call of __d_drop(anon) into __d_materialise_unique(dentry,
anon) (bsc#984194).
- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727
FATE#315946).
- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036 FATE#318772).
- net/mlx5e: Do not modify CQ before it was created (bnc#923036
FATE#318772).
- net/mlx5e: Do not try to modify CQ moderation if it is not supported
(bnc#923036 FATE#318772).
- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036 FATE#318772).
- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036 FATE#318772).
- netback: correct array index (bsc#983348).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period
(bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec
(bsc#1003813).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter
(bsc#1012060)
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- serial: 8250_pci: Detach low-level driver during PCI error recovery
(bsc#1013001).
- serial: 8250_pci: Fix potential use-after-free in error path
(bsc#1013001).
- sfc: clear napi_hash state when copying channels (bsc#923037
FATE#318563).
- sfc: fix potential stack corruption from running past stat bitmask
(bsc#923037 FATE#318563).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380
FATE#315942).
- sunrpc: Enforce an upper limit on the number of cached credentials
(bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout
(bsc#1014410).
- supported.conf: Add lib/*.ko to supported.conf (bsc#1019032)
- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT
REACHABLE (bsc#991273).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense
(bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected()
(bsc#921778 FATE#318558).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq()
(bsc#1013479).
- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short
jumps to it (bsc#984419).
- xenbus: correctly signal errors from xenstored_local_init() (luckily
none so far).
- xfs: allow lazy sb counter sync during filesystem freeze sequence
(bsc#980560).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-238=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-238=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-238=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-238=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-238=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-238=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
kernel-default-debuginfo-3.12.69-60.64.29.1
kernel-default-debugsource-3.12.69-60.64.29.1
kernel-default-extra-3.12.69-60.64.29.1
kernel-default-extra-debuginfo-3.12.69-60.64.29.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
kernel-obs-build-3.12.69-60.64.29.1
kernel-obs-build-debugsource-3.12.69-60.64.29.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):
kernel-docs-3.12.69-60.64.29.3
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
kernel-default-3.12.69-60.64.29.1
kernel-default-base-3.12.69-60.64.29.1
kernel-default-base-debuginfo-3.12.69-60.64.29.1
kernel-default-debuginfo-3.12.69-60.64.29.1
kernel-default-debugsource-3.12.69-60.64.29.1
kernel-default-devel-3.12.69-60.64.29.1
kernel-syms-3.12.69-60.64.29.1
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
kernel-xen-3.12.69-60.64.29.1
kernel-xen-base-3.12.69-60.64.29.1
kernel-xen-base-debuginfo-3.12.69-60.64.29.1
kernel-xen-debuginfo-3.12.69-60.64.29.1
kernel-xen-debugsource-3.12.69-60.64.29.1
kernel-xen-devel-3.12.69-60.64.29.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
kernel-devel-3.12.69-60.64.29.1
kernel-macros-3.12.69-60.64.29.1
kernel-source-3.12.69-60.64.29.1
- SUSE Linux Enterprise Server 12-SP1 (s390x):
kernel-default-man-3.12.69-60.64.29.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.69-60.64.29.1
kernel-ec2-debuginfo-3.12.69-60.64.29.1
kernel-ec2-debugsource-3.12.69-60.64.29.1
kernel-ec2-devel-3.12.69-60.64.29.1
kernel-ec2-extra-3.12.69-60.64.29.1
kernel-ec2-extra-debuginfo-3.12.69-60.64.29.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_69-60_64_29-default-1-4.1
kgraft-patch-3_12_69-60_64_29-xen-1-4.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
kernel-default-3.12.69-60.64.29.1
kernel-default-debuginfo-3.12.69-60.64.29.1
kernel-default-debugsource-3.12.69-60.64.29.1
kernel-default-devel-3.12.69-60.64.29.1
kernel-default-extra-3.12.69-60.64.29.1
kernel-default-extra-debuginfo-3.12.69-60.64.29.1
kernel-syms-3.12.69-60.64.29.1
kernel-xen-3.12.69-60.64.29.1
kernel-xen-debuginfo-3.12.69-60.64.29.1
kernel-xen-debugsource-3.12.69-60.64.29.1
kernel-xen-devel-3.12.69-60.64.29.1
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
kernel-devel-3.12.69-60.64.29.1
kernel-macros-3.12.69-60.64.29.1
kernel-source-3.12.69-60.64.29.1
References:
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8963.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2016-10088.html
https://www.suse.com/security/cve/CVE-2016-7910.html
https://www.suse.com/security/cve/CVE-2016-7911.html
https://www.suse.com/security/cve/CVE-2016-7913.html
https://www.suse.com/security/cve/CVE-2016-7914.html
https://www.suse.com/security/cve/CVE-2016-8399.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8645.html
https://www.suse.com/security/cve/CVE-2016-9083.html
https://www.suse.com/security/cve/CVE-2016-9084.html
https://www.suse.com/security/cve/CVE-2016-9756.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2016-9806.html
https://www.suse.com/security/cve/CVE-2017-2583.html
https://www.suse.com/security/cve/CVE-2017-2584.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://bugzilla.suse.com/1003813
https://bugzilla.suse.com/1005666
https://bugzilla.suse.com/1007197
https://bugzilla.suse.com/1008557
https://bugzilla.suse.com/1008567
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1008876
https://bugzilla.suse.com/1008979
https://bugzilla.suse.com/1009062
https://bugzilla.suse.com/1009969
https://bugzilla.suse.com/1010040
https://bugzilla.suse.com/1010213
https://bugzilla.suse.com/1010294
https://bugzilla.suse.com/1010475
https://bugzilla.suse.com/1010478
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010502
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010612
https://bugzilla.suse.com/1010711
https://bugzilla.suse.com/1010716
https://bugzilla.suse.com/1012060
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1012917
https://bugzilla.suse.com/1012985
https://bugzilla.suse.com/1013001
https://bugzilla.suse.com/1013038
https://bugzilla.suse.com/1013479
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013540
https://bugzilla.suse.com/1013542
https://bugzilla.suse.com/1014410
https://bugzilla.suse.com/1014746
https://bugzilla.suse.com/1016713
https://bugzilla.suse.com/1016725
https://bugzilla.suse.com/1016961
https://bugzilla.suse.com/1017164
https://bugzilla.suse.com/1017170
https://bugzilla.suse.com/1017410
https://bugzilla.suse.com/1017589
https://bugzilla.suse.com/1017710
https://bugzilla.suse.com/1018100
https://bugzilla.suse.com/1019032
https://bugzilla.suse.com/1019148
https://bugzilla.suse.com/1019260
https://bugzilla.suse.com/1019300
https://bugzilla.suse.com/1019783
https://bugzilla.suse.com/1019851
https://bugzilla.suse.com/1020214
https://bugzilla.suse.com/1020602
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/856380
https://bugzilla.suse.com/857394
https://bugzilla.suse.com/858727
https://bugzilla.suse.com/921338
https://bugzilla.suse.com/921778
https://bugzilla.suse.com/922052
https://bugzilla.suse.com/922056
https://bugzilla.suse.com/923036
https://bugzilla.suse.com/923037
https://bugzilla.suse.com/924381
https://bugzilla.suse.com/938963
https://bugzilla.suse.com/972993
https://bugzilla.suse.com/980560
https://bugzilla.suse.com/981709
https://bugzilla.suse.com/983087
https://bugzilla.suse.com/983348
https://bugzilla.suse.com/984194
https://bugzilla.suse.com/984419
https://bugzilla.suse.com/985850
https://bugzilla.suse.com/987192
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/991273
https://bugzilla.suse.com/993739
https://bugzilla.suse.com/997807
https://bugzilla.suse.com/999101
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0460-1: important: Security update for java-1_8_0-ibm
by opensuse-security@opensuse.org 14 Feb '17
by opensuse-security@opensuse.org 14 Feb '17
14 Feb '17
SUSE Security Update: Security update for java-1_8_0-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0460-1
Rating: important
References: #1024218
Cross-References: CVE-2016-2183 CVE-2016-5547 CVE-2016-5548
CVE-2016-5549 CVE-2016-5552 CVE-2017-3231
CVE-2017-3241 CVE-2017-3252 CVE-2017-3253
CVE-2017-3259 CVE-2017-3261 CVE-2017-3272
CVE-2017-3289
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
This update for java-1_8_0-ibm to version 8.0-4.0 fixes a lot of security
issues (bsc#1024218):
Following CVEs are fixed: CVE-2016-5552 CVE-2017-3231 CVE-2017-3241
CVE-2017-3253 CVE-2017-3259 CVE-2017-3261 CVE-2017-3272 CVE-2017-3289
CVE-2016-2183 CVE-2016-5547 CVE-2016-5548 CVE-2016-5549 CVE-2017-3252
More information can be found on:
https://developer.ibm.com/javasdk/support/security-vulnerabilities/
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-237=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-237=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-237=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-237=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (ppc64le s390x x86_64):
java-1_8_0-ibm-devel-1.8.0_sr4.0-23.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
java-1_8_0-ibm-devel-1.8.0_sr4.0-23.1
- SUSE Linux Enterprise Server 12-SP2 (ppc64le x86_64):
java-1_8_0-ibm-1.8.0_sr4.0-23.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1
java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
java-1_8_0-ibm-1.8.0_sr4.0-23.1
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1
java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1
References:
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.suse.com/security/cve/CVE-2016-5547.html
https://www.suse.com/security/cve/CVE-2016-5548.html
https://www.suse.com/security/cve/CVE-2016-5549.html
https://www.suse.com/security/cve/CVE-2016-5552.html
https://www.suse.com/security/cve/CVE-2017-3231.html
https://www.suse.com/security/cve/CVE-2017-3241.html
https://www.suse.com/security/cve/CVE-2017-3252.html
https://www.suse.com/security/cve/CVE-2017-3253.html
https://www.suse.com/security/cve/CVE-2017-3259.html
https://www.suse.com/security/cve/CVE-2017-3261.html
https://www.suse.com/security/cve/CVE-2017-3272.html
https://www.suse.com/security/cve/CVE-2017-3289.html
https://bugzilla.suse.com/1024218
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0458-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 13 Feb '17
by opensuse-security@opensuse.org 13 Feb '17
13 Feb '17
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0458-1
Rating: important
References: #1003077 #1007886 #1009969 #1010444 #1011820
#1013273 #1013531 #1013540 #1013542 #1017589
#1017710 #1019658 #1019660 #1019784 #1020214
#1020381 #1021258 #983348 #987333 #987576
Cross-References: CVE-2016-10088 CVE-2016-10147 CVE-2016-7117
CVE-2016-7917 CVE-2016-8645 CVE-2016-9793
CVE-2016-9806 CVE-2017-5551
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 12 fixes is
now available.
Description:
The openSUSE Leap 42.1 kernel to 4.1.38 to receive various security and
bugfixes.
The following security bugs were fixed:
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
function in net/socket.c in the Linux kernel allowed remote attackers to
execute arbitrary code via vectors involving a recvmmsg system call that
is mishandled during error processing (bnc#1003077).
- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set
setgid bits on files they don't down (bsc#1021258).
- CVE-2016-10147: crypto/mcryptd.c in the Linux kernel allowed local users
to cause a denial of service (NULL pointer dereference and system crash)
by using an AF_ALG socket with an incompatible algorithm, as
demonstrated by mcryptd(md5) (bnc#1020381).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free) by
leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-7917: The nfnetlink_rcv_batch function in
net/netfilter/nfnetlink.c in the Linux kernel did not check whether a
batch message's length field is large enough, which allowed local users
to obtain sensitive information from kernel memory or cause a denial of
service (infinite loop or out-of-bounds read) by leveraging the
CAP_NET_ADMIN capability (bnc#1010444).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb
truncation, which allowed local users to cause a denial of service
(system crash) via a crafted application that made sendto system calls,
related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to
cause a denial of service (double free) or possibly have unspecified
other impact via a crafted application that made sendmsg system calls,
leading to a free operation associated with a new dump that started
earlier than anticipated (bnc#1013540 1017589).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option
(bnc#1013531 1013542).
The following non-security bugs were fixed:
- PCI: generic: Fix pci_remap_iospace() failure path (bsc#1019658).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1019784).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019660).
- kABI workaround for 4.1.37 mount changes (stable-4.1.37).
- kABI: reintroduce sk_filter (bsc#1009969).
- kabi/severities: Ignore inode_change_ok change It's renamed in 4.1.37 to
setattr_prepare()
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- net: introduce __sock_queue_rcv_skb() function (bsc#1009969).
- netback: correct array index (bsc#983348).
- netfront: do not truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rose: limit sk_filter trim to payload (bsc#1009969).
- scsi: bfa: Increase requested firmware version to 3.2.5.1 (bsc#1013273).
- xenbus: correctly signal errors from xenstored_local_init() (luckily
none so far).
- xenbus: do not invoke ->is_ready() for most device states (bsc#987333).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-246=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i686 x86_64):
kernel-debug-4.1.38-47.1
kernel-debug-base-4.1.38-47.1
kernel-debug-base-debuginfo-4.1.38-47.1
kernel-debug-debuginfo-4.1.38-47.1
kernel-debug-debugsource-4.1.38-47.1
kernel-debug-devel-4.1.38-47.1
kernel-debug-devel-debuginfo-4.1.38-47.1
kernel-ec2-4.1.38-47.1
kernel-ec2-base-4.1.38-47.1
kernel-ec2-base-debuginfo-4.1.38-47.1
kernel-ec2-debuginfo-4.1.38-47.1
kernel-ec2-debugsource-4.1.38-47.1
kernel-ec2-devel-4.1.38-47.1
kernel-pv-4.1.38-47.1
kernel-pv-base-4.1.38-47.1
kernel-pv-base-debuginfo-4.1.38-47.1
kernel-pv-debuginfo-4.1.38-47.1
kernel-pv-debugsource-4.1.38-47.1
kernel-pv-devel-4.1.38-47.1
kernel-vanilla-4.1.38-47.1
kernel-vanilla-debuginfo-4.1.38-47.1
kernel-vanilla-debugsource-4.1.38-47.1
kernel-vanilla-devel-4.1.38-47.1
kernel-xen-4.1.38-47.1
kernel-xen-base-4.1.38-47.1
kernel-xen-base-debuginfo-4.1.38-47.1
kernel-xen-debuginfo-4.1.38-47.1
kernel-xen-debugsource-4.1.38-47.1
kernel-xen-devel-4.1.38-47.1
- openSUSE Leap 42.1 (i586 x86_64):
kernel-default-4.1.38-47.1
kernel-default-base-4.1.38-47.1
kernel-default-base-debuginfo-4.1.38-47.1
kernel-default-debuginfo-4.1.38-47.1
kernel-default-debugsource-4.1.38-47.1
kernel-default-devel-4.1.38-47.1
kernel-obs-build-4.1.38-47.3
kernel-obs-build-debugsource-4.1.38-47.3
kernel-obs-qa-4.1.38-47.1
kernel-syms-4.1.38-47.1
- openSUSE Leap 42.1 (noarch):
kernel-devel-4.1.38-47.1
kernel-docs-4.1.38-47.2
kernel-docs-html-4.1.38-47.2
kernel-docs-pdf-4.1.38-47.2
kernel-macros-4.1.38-47.1
kernel-source-4.1.38-47.1
kernel-source-vanilla-4.1.38-47.1
- openSUSE Leap 42.1 (i686):
kernel-pae-4.1.38-47.1
kernel-pae-base-4.1.38-47.1
kernel-pae-base-debuginfo-4.1.38-47.1
kernel-pae-debuginfo-4.1.38-47.1
kernel-pae-debugsource-4.1.38-47.1
kernel-pae-devel-4.1.38-47.1
References:
https://www.suse.com/security/cve/CVE-2016-10088.html
https://www.suse.com/security/cve/CVE-2016-10147.html
https://www.suse.com/security/cve/CVE-2016-7117.html
https://www.suse.com/security/cve/CVE-2016-7917.html
https://www.suse.com/security/cve/CVE-2016-8645.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2016-9806.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://bugzilla.suse.com/1003077
https://bugzilla.suse.com/1007886
https://bugzilla.suse.com/1009969
https://bugzilla.suse.com/1010444
https://bugzilla.suse.com/1011820
https://bugzilla.suse.com/1013273
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013540
https://bugzilla.suse.com/1013542
https://bugzilla.suse.com/1017589
https://bugzilla.suse.com/1017710
https://bugzilla.suse.com/1019658
https://bugzilla.suse.com/1019660
https://bugzilla.suse.com/1019784
https://bugzilla.suse.com/1020214
https://bugzilla.suse.com/1020381
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/983348
https://bugzilla.suse.com/987333
https://bugzilla.suse.com/987576
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0456-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 13 Feb '17
by opensuse-security@opensuse.org 13 Feb '17
13 Feb '17
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0456-1
Rating: important
References: #1000092 #1000619 #1003077 #1003253 #1005918
#1006469 #1006472 #1007729 #1008742 #1009546
#1009674 #1009718 #1009911 #1009969 #1010612
#1010690 #1011176 #1011250 #1011602 #1011660
#1011913 #1012422 #1012829 #1012910 #1013000
#1013001 #1013273 #1013531 #1013540 #1013542
#1013792 #1013994 #1014120 #1014392 #1014410
#1014701 #1014710 #1015038 #1015212 #1015359
#1015367 #1015416 #1015840 #1016250 #1016403
#1016517 #1016884 #1016979 #1017164 #1017170
#1017410 #1017589 #1018100 #1018316 #1018358
#1018385 #1018446 #1018813 #1018913 #1019061
#1019148 #1019260 #1019351 #1019594 #1019630
#1019631 #1019784 #1019851 #1020214 #1020488
#1020602 #1020685 #1020817 #1020945 #1020975
#1021248 #1021251 #1021258 #1021260 #1021294
#1021455 #1021474 #1022304 #1022429 #1022476
#1022547 #1022559 #1022971 #1023101 #1023175
#921494 #959709 #960561 #964944 #966170 #966172
#966186 #966191 #969474 #969475 #969756 #971975
#974215 #979378 #981709 #985561 #987192 #987576
#991273
Cross-References: CVE-2015-8709 CVE-2016-7117 CVE-2016-8645
CVE-2016-9793 CVE-2016-9806 CVE-2016-9919
CVE-2017-2583 CVE-2017-2584 CVE-2017-5551
CVE-2017-5576 CVE-2017-5577
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that solves 11 vulnerabilities and has 98 fixes
is now available.
Description:
The openSUSE 42.2 kernel was updated to 4.4.42 stable release.
The following security bugs were fixed:
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
function in net/socket.c in the Linux kernel allowed remote attackers to
execute arbitrary code via vectors involving a recvmmsg system call that
is mishandled during error processing (bnc#1003077 1003253).
- CVE-2017-5576, CVE-2017-5577: A buffer overflow in the VC4_SUBMIT_CL
IOCTL in the VideoCore DRM driver for Raspberry Pi was fixed.
(bsc#1021294)
- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set
setgid bits on files they don't down. (bsc#1021258).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual
Machine (CONFIG_KVM) support was vulnerable to an incorrect segment
selector(SS) value error. A user/process inside guest could have used
this flaw to crash the guest resulting in DoS or potentially escalate
their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local
users to obtain sensitive information from kernel memory or cause a
denial of service (use-after-free) via a crafted application that
leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt
(bnc#1019851).
- CVE-2015-8709: ** DISPUTED ** kernel/ptrace.c in the Linux kernel
mishandled uid and gid mappings, which allowed local users to gain
privileges by establishing a user namespace, waiting for a root process
to enter that namespace with an unsafe uid or gid, and then using the
ptrace system call. NOTE: the vendor states "there is no kernel bug
here (bnc#959709 bsc#960561).
- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to
cause a denial of service (double free) or possibly have unspecified
other impact via a crafted application that made sendmsg system calls,
leading to a free operation associated with a new dump that started
earlier than anticipated (bnc#1013540 1017589).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb
truncation, which allowed local users to cause a denial of service
(system crash) via a crafted application that made sendto system calls,
related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash) or possibly have unspecified other impact
by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt
system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option
(bnc#1013531 bsc#1013542).
- CVE-2016-9919: The icmp6_send function in net/ipv6/icmp.c in the Linux
kernel omits a certain check of the dst data structure, which allowed
remote attackers to cause a denial of service (panic) via a fragmented
IPv6 packet (bnc#1014701).
The following non-security bugs were fixed:
- 8250/fintek: rename IRQ_MODE macro (boo#1009546).
- acpi, nfit: fix bus vs dimm confusion in xlat_status (bsc#1023175).
- acpi, nfit, libnvdimm: fix / harden ars_status output length handling
(bsc#1023175).
- acpi, nfit: validate ars_status output buffer size (bsc#1023175).
- arm64/numa: fix incorrect log for memory-less node (bsc#1019631).
- ASoC: cht_bsw_rt5645: Fix leftover kmalloc (bsc#1010690).
- ASoC: Intel: bytcr_rt5640: fallback mechanism if MCLK is not enabled
(bsc#1010690).
- ASoC: rt5670: add HS ground control (bsc#1016250).
- avoid including "mountproto=" with no protocol in /proc/mounts
(bsc#1019260).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1021260).
- bcache: partition support: add 16 minors per bcacheN device
(bsc#1019784).
- blacklist.conf: add 1b8d2afde54f libnvdimm, pfn: fix ARCH=alpha
allmodconfig build failure (bsc#1023175).
- blacklist.conf: Add i915 stable commits that can be ignored (bsc#1015367)
- blk: Do not collide with QUEUE_FLAG_WC from upstream (bsc#1022547)
- blk-mq: Allow timeouts to run while queue is freezing (bsc#1020817).
- blk-mq: Always schedule hctx->next_cpu (bsc#1020817).
- blk-mq: Avoid memory reclaim when remapping queues (bsc#1020817).
- blk-mq: do not overwrite rq->mq_ctx (bsc#1020817).
- blk-mq: Fix failed allocation path when mapping queues (bsc#1020817).
- blk-mq: improve warning for running a queue on the wrong CPU
(bsc#1020817).
- block: Change extern inline to static inline (bsc#1023175).
- Bluetooth: btmrvl: fix hung task warning dump (bsc#1018813).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- brcmfmac: Change error print on wlan0 existence (bsc#1000092).
- btrfs: add support for RENAME_EXCHANGE and RENAME_WHITEOUT (bsc#1020975).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in
btrfs_ioctl (bsc#1018100).
- btrfs: fix inode leak on failure to setup whiteout inode in rename
(bsc#1020975).
- btrfs: fix lockdep warning about log_mutex (bsc#1021455).
- btrfs: fix lockdep warning on deadlock against an inode's log mutex
(bsc#1021455).
- btrfs: fix number of transaction units for renames with whiteout
(bsc#1020975).
- btrfs: incremental send, fix invalid paths for rename operations
(bsc#1018316).
- btrfs: incremental send, fix premature rmdir operations (bsc#1018316).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir
(bsc#981709).
- btrfs: pin log earlier when renaming (bsc#1020975).
- btrfs: pin logs earlier when doing a rename exchange operation
(bsc#1020975).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir()
(bsc#981709).
- btrfs: send, add missing error check for calls to path_loop()
(bsc#1018316).
- btrfs: send, avoid incorrect leaf accesses when sending utimes
operations (bsc#1018316).
- btrfs: send, fix failure to move directories with the same name around
(bsc#1018316).
- btrfs: send, fix invalid leaf accesses due to incorrect utimes
operations (bsc#1018316).
- btrfs: send, fix warning due to late freeing of orphan_dir_info
structures (bsc#1018316).
- btrfs: test_check_exists: Fix infinite loop when searching for free
space entries (bsc#987192).
- btrfs: unpin log if rename operation fails (bsc#1020975).
- btrfs: unpin logs if rename exchange operation fails (bsc#1020975).
- [BZ 149851] kernel: Fix invalid domain response handling (bnc#1009718,
LTC#149851).
- ceph: fix bad endianness handling in parse_reply_info_extra
(bsc#1020488).
- clk: xgene: Add PMD clock (bsc#1019351).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019351).
- clk: xgene: Remove CLK_IS_ROOT (bsc#1019351).
- config: enable Ceph kernel client modules for ppc64le (fate#321098)
- config: enable Ceph kernel client modules for s390x (fate#321098)
- config: enable CONFIG_OCFS2_DEBUG_MASKLOG for ocfs2 (bsc#1015038)
- crypto: drbg - do not call drbg_instantiate in healt test (bsc#1018913).
- crypto: drbg - remove FIPS 140-2 continuous test (bsc#1018913).
- crypto: FIPS - allow tests to be disabled in FIPS mode (bsc#1018913).
- crypto: qat - fix bar discovery for c62x (bsc#1021251).
- crypto: qat - zero esram only for DH85x devices (1021248).
- crypto: rsa - allow keys >= 2048 bits in FIPS mode (bsc#1018913).
- crypto: xts - consolidate sanity check for keys (bsc#1018913).
- crypto: xts - fix compile errors (bsc#1018913).
- cxl: fix potential NULL dereference in free_adapter() (bsc#1016517).
- dax: fix deadlock with DAX 4k holes (bsc#1012829).
- dax: fix device-dax region base (bsc#1023175).
- device-dax: check devm_nsio_enable() return value (bsc#1023175).
- device-dax: fail all private mapping attempts (bsc#1023175).
- device-dax: fix percpu_ref_exit ordering (bsc#1023175).
- driver core: fix race between creating/querying glue dir and its cleanup
(bnc#1008742).
- drivers:hv: balloon: account for gaps in hot add regions (fate#320485).
- drivers:hv: balloon: Add logging for dynamic memory operations
(fate#320485).
- drivers:hv: balloon: Disable hot add when CONFIG_MEMORY_HOTPLUG is not
set (fate#320485).
- drivers:hv: balloon: Fix info request to show max page count
(fate#320485).
- drivers:hv: balloon: keep track of where ha_region starts (fate#320485).
- drivers:hv: balloon: replace ha_region_mutex with spinlock (fate#320485).
- drivers:hv: balloon: Use available memory value in pressure report
(fate#320485).
- drivers:hv: cleanup vmbus_open() for wrap around mappings (fate#320485).
- drivers:hv: do not leak memory in vmbus_establish_gpadl() (fate#320485).
- drivers:hv: get rid of id in struct vmbus_channel (fate#320485).
- drivers:hv: get rid of redundant messagecount in create_gpadl_header()
(fate#320485).
- drivers:hv: get rid of timeout in vmbus_open() (fate#320485).
- drivers:hv: Introduce a policy for controlling channel affinity
(fate#320485).
- drivers:hv: make VMBus bus ids persistent (fate#320485).
- drivers:hv: ring_buffer: count on wrap around mappings in
get_next_pkt_raw() (v2) (fate#320485).
- drivers:hv: ring_buffer: use wrap around mappings in hv_copy{from,
to}_ringbuffer() (fate#320485).
- drivers:hv: ring_buffer: wrap around mappings for ring buffers
(fate#320485).
- drivers:hv: utils: Check VSS daemon is listening before a hot backup
(fate#320485).
- drivers:hv: utils: Continue to poll VSS channel after handling requests
(fate#320485).
- drivers:hv: utils: fix a race on userspace daemons registration
(bnc#1014392).
- drivers:hv: utils: Fix the mapping between host version and protocol to
use (fate#320485).
- drivers:hv: utils: reduce HV_UTIL_NEGO_TIMEOUT timeout (fate#320485).
- drivers:hv: vmbus: Base host signaling strictly on the ring state
(fate#320485).
- drivers:hv: vmbus: Enable explicit signaling policy for NIC channels
(fate#320485).
- drivers:hv: vmbus: finally fix hv_need_to_signal_on_read() (fate#320485,
bug#1018385).
- drivers:hv: vmbus: fix the race when querying & updating the percpu list
(fate#320485).
- drivers:hv: vmbus: Implement a mechanism to tag the channel for low
latency (fate#320485).
- drivers: hv: vmbus: Make mmio resource local (fate#320485).
- drivers:hv: vmbus: On the read path cleanup the logic to interrupt the
host (fate#320485).
- drivers:hv: vmbus: On write cleanup the logic to interrupt the host
(fate#320485).
- drivers:hv: vmbus: Reduce the delay between retries in vmbus_post_msg()
(fate#320485).
- drivers:hv: vmbus: suppress some "hv_vmbus: Unknown GUID" warnings
(fate#320485).
- drivers:hv: vss: Improve log messages (fate#320485).
- drivers:hv: vss: Operation timeouts should match host expectation
(fate#320485).
- drivers: net: phy: mdio-xgene: Add hardware dependency (bsc#1019351).
- drivers: net: phy: xgene: Fix 'remove' function (bsc#1019351).
- drivers: net: xgene: Add change_mtu function (bsc#1019351).
- drivers: net: xgene: Add flow control configuration (bsc#1019351).
- drivers: net: xgene: Add flow control initialization (bsc#1019351).
- drivers: net: xgene: Add helper function (bsc#1019351).
- drivers: net: xgene: Add support for Jumbo frame (bsc#1019351).
- drivers: net: xgene: Configure classifier with pagepool (bsc#1019351).
- drivers: net: xgene: fix build after change_mtu function change
(bsc#1019351).
- drivers: net: xgene: fix: Coalescing values for v2 hardware
(bsc#1019351).
- drivers: net: xgene: fix: Disable coalescing on v1 hardware
(bsc#1019351).
- drivers: net: xgene: Fix MSS programming (bsc#1019351).
- drivers: net: xgene: fix: RSS for non-TCP/UDP (bsc#1019351).
- drivers: net: xgene: fix: Use GPIO to get link status (bsc#1019351).
- drivers: net: xgene: uninitialized variable in
xgene_enet_free_pagepool() (bsc#1019351).
- drm: Fix broken VT switch with video=1366x768 option (bsc#1018358).
- drm/i915: add helpers for platform specific revision id range checks
(bsc#1015367).
- drm/i915: Apply broader WaRsDisableCoarsePowerGating for guc also
(bsc#1015367).
- drm/i915/bxt: add revision id for A1 stepping and use it (bsc#1015367).
- drm/i915: Call intel_dp_mst_resume() before resuming displays
(bsc#1015359).
- drm/i915: Cleaning up DDI translation tables (bsc#1014392).
- drm/i915: Clean up L3 SQC register field definitions (bsc#1014392).
- drm/i915: Do not init hpd polling for vlv and chv from runtime_suspend()
(bsc#1014120).
- drm-i915-dp-Restore-PPS-HW-state-from-the-encoder-re
- drm/i915/dp: Restore PPS HW state from the encoder resume hook
(bsc#1019061).
- drm/i915/dsi: fix CHV dsi encoder hardware state readout on port C
(bsc#1015367).
- drm/i915: Exit cherryview_irq_handler() after one pass (bsc#1015367).
- drm/i915: Fix iboost setting for SKL Y/U DP DDI buffer translation entry
2 (bsc#1014392).
- drm/i915: Fix system resume if PCI device remained enabled (bsc#1015367).
- drm/i915: Fix watermarks for VLV/CHV (bsc#1011176).
- drm/i915: Force ringbuffers to not be at offset 0 (bsc#1015367).
- drm/i915: Force VDD off on the new power seqeuencer before starting to
use it (bsc#1009674).
- drm/i915/gen9: Add WaInPlaceDecompressionHang (bsc#1014392).
- drm/i915/gen9: Fix PCODE polling during CDCLK change notification
(bsc#1015367).
- drm/i915: Mark CPU cache as dirty when used for rendering (bsc#1015367).
- drm/i915: Mark i915_hpd_poll_init_work as static (bsc#1014120).
- drm-i915-Prevent-PPS-stealing-from-a-normal-DP-port
- drm/i915: Prevent PPS stealing from a normal DP port on VLV/CHV
(bsc#1019061).
- drm/i915: remove parens around revision ids (bsc#1015367).
- drm/i915/skl: Add WaDisableGafsUnitClkGating (bsc#1014392).
- drm/i915/skl: Fix rc6 based gpu/system hang (bsc#1015367).
- drm/i915/skl: Fix spurious gpu hang with gt3/gt4 revs (bsc#1015367).
- drm/i915/skl: Update DDI translation tables for SKL (bsc#1014392).
- drm/i915/skl: Update watermarks before the crtc is disabled
(bsc#1015367).
- drm/i915: Update Skylake DDI translation table for DP (bsc#1014392).
- drm/i915: Update Skylake DDI translation table for HDMI (bsc#1014392).
- drm/i915/userptr: Hold mmref whilst calling get-user-pages (bsc#1015367).
- drm/i915/vlv: Prevent enabling hpd polling in late suspend (bsc#1014120).
- drm/i915: Workaround for DP DPMS D3 on Dell monitor (bsc#1019061).
- drm: Use u64 for intermediate dotclock calculations (bnc#1006472).
- drm/vc4: Fix an integer overflow in temporary allocation layout
(bsc#1021294).
- drm/vc4: Return -EINVAL on the overflow checks failing (bsc#1021294).
- drm: virtio-gpu: get the fb from the plane state for atomic updates
(bsc#1023101).
- EDAC, xgene: Fix spelling mistake in error messages (bsc#1019351).
- efi/libstub: Move Graphics Output Protocol handling to generic code
(bnc#974215).
- fbcon: Fix vc attr at deinit (bsc#1000619).
- Fix kABI breakage by i2c-designware baytrail fix (bsc#1011913).
- Fix kABI breakage by linux/acpi.h inclusion in i8042-x86ia46io.h
(bsc#1011660).
- gpio: xgene: make explicitly non-modular (bsc#1019351).
- gro_cells: mark napi struct as not busy poll candidates (bsc#966191
FATE#320230 bsc#966186 FATE#320228).
- hv: acquire vmbus_connection.channel_mutex in vmbus_free_channels()
(fate#320485).
- hv: change clockevents unbind tactics (fate#320485).
- hv: do not reset hv_context.tsc_page on crash (fate#320485, bnc#1007729).
- hv_netvsc: add ethtool statistics for tx packet issues (fate#320485).
- hv_netvsc: Add handler for physical link speed change (fate#320485).
- hv_netvsc: Add query for initial physical link speed (fate#320485).
- hv_netvsc: count multicast packets received (fate#320485).
- hv_netvsc: dev hold/put reference to VF (fate#320485).
- hv_netvsc: fix a race between netvsc_send() and netvsc_init_buf()
(fate#320485).
- hv_netvsc: fix comments (fate#320485).
- hv_netvsc: fix rtnl locking in callback (fate#320485).
- hv_netvsc: Implement batching of receive completions (fate#320485).
- hv_netvsc: improve VF device matching (fate#320485).
- hv_netvsc: init completion during alloc (fate#320485).
- hv_netvsc: make device_remove void (fate#320485).
- hv_netvsc: make inline functions static (fate#320485).
- hv_netvsc: make netvsc_destroy_buf void (fate#320485).
- hv_netvsc: make RSS hash key static (fate#320485).
- hv_netvsc: make variable local (fate#320485).
- hv_netvsc: rearrange start_xmit (fate#320485).
- hv_netvsc: refactor completion function (fate#320485).
- hv_netvsc: remove excessive logging on MTU change (fate#320485).
- hv_netvsc: remove VF in flight counters (fate#320485).
- hv_netvsc: report vmbus name in ethtool (fate#320485).
- hv_netvsc: simplify callback event code (fate#320485).
- hv_netvsc: style cleanups (fate#320485).
- hv_netvsc: use ARRAY_SIZE() for NDIS versions (fate#320485).
- hv_netvsc: use consume_skb (fate#320485).
- hv_netvsc: use kcalloc (fate#320485).
- hv_netvsc: use RCU to protect vf_netdev (fate#320485).
- hyperv: Fix spelling of HV_UNKOWN (fate#320485).
- i2c: designware-baytrail: Disallow the CPU to enter C6 or C7 while
holding the punit semaphore (bsc#1011913).
- i2c: designware: fix wrong Tx/Rx FIFO for ACPI (bsc#1019351).
- i2c: designware: Implement support for SMBus block read and write
(bsc#1019351).
- i2c: xgene: Fix missing code of DTB support (bsc#1019351).
- i40e: Be much more verbose about what we can and cannot offload
(bsc#985561).
- i915: Delete previous two fixes for i915 (bsc#1019061). These upstream
fixes brought some regressions, so better to revert for now.
- i915: Disable
patches.drivers/drm-i915-Exit-cherryview_irq_handler-after-one-pass The
patch seems leading to the instability on Wyse box (bsc#1015367).
- IB/core: Fix possible memory leak in cma_resolve_iboe_route()
(bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- IB/mlx5: Fix iteration overrun in GSI qps (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- IB/mlx5: Fix steering resource leak (bsc#966170 FATE#320225 bsc#966172
FATE#320226).
- IB/mlx5: Set source mac address in FTE (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit
(bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- ibmvnic: convert to use simple_open() (bsc#1015416).
- ibmvnic: Driver Version 1.0.1 (bsc#1015416).
- ibmvnic: drop duplicate header seq_file.h (bsc#1015416).
- ibmvnic: fix error return code in ibmvnic_probe() (bsc#1015416).
- ibmvnic: Fix GFP_KERNEL allocation in interrupt context (bsc#1015416).
- ibmvnic: Fix missing brackets in init_sub_crq_irqs (bsc#1015416).
- ibmvnic: Fix releasing of sub-CRQ IRQs in interrupt context
(bsc#1015416).
- ibmvnic: Fix size of debugfs name buffer (bsc#1015416).
- ibmvnic: Handle backing device failover and reinitialization
(bsc#1015416).
- ibmvnic: Start completion queue negotiation at server-provided optimum
values (bsc#1015416).
- ibmvnic: Unmap ibmvnic_statistics structure (bsc#1015416).
- ibmvnic: Update MTU after device initialization (bsc#1015416).
- igb: add i211 to i210 PHY workaround (bsc#1009911).
- igb: Workaround for igb i210 firmware issue (bsc#1009911).
- Input: i8042 - Trust firmware a bit more when probing on X86
(bsc#1011660).
- intel_idle: Add KBL support (bsc#1016884).
- ipc: msg, make msgrcv work with LONG_MIN (bnc#1005918).
- ipc/sem.c: add cond_resched in exit_sme (bsc#979378).
- ixgbe: Do not clear RAR entry when clearing VMDq for SAN MAC (bsc#969474
FATE#319812 bsc#969475 FATE#319814).
- ixgbe: Force VLNCTRL.VFE to be set in all VMDq paths (bsc#969474
FATE#319812 bsc#969475 FATE#319814).
- KABI fix (bsc#1014410).
- kABI: protect struct mm_struct (kabi).
- kABI: protect struct musb_platform_ops (kabi).
- kABI: protect struct task_struct (kabi).
- kABI: protect struct user_fpsimd_state (kabi).
- kABI: protect struct wake_irq (kabi).
- kABI: protect struct xhci_hcd (kabi).
- kABI: protect user_namespace include in fs/exec (kabi).
- kABI: protect user_namespace include in kernel/ptrace (kabi).
- kabi/severities: Ignore changes in drivers/hv
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread
(bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410,
fate#313296).
- libnvdimm, pfn: fix align attribute (bsc#1023175).
- locking/pv-qspinlock: Use cmpxchg_release() in __pv_queued_spin_unlock()
(bsc#969756).
- locking/rtmutex: Prevent dequeue vs. unlock race (bsc#1015212).
- locking/rtmutex: Use READ_ONCE() in rt_mutex_owner() (bsc#1015212).
- mailbox: xgene-slimpro: Fix wrong test for devm_kzalloc (bsc#1019351).
- md-cluster: convert the completion to wait queue (fate#316335).
- md-cluster: protect md_find_rdev_nr_rcu with rcu lock (fate#316335).
- md: fix refcount problem on mddev when stopping array (bsc#1022304).
- md linear: fix a race between linear_add() and linear_congested()
(bsc#1018446).
- [media] uvcvideo: uvc_scan_fallback() for webcams with broken chain
(bsc#1021474).
- misc/genwqe: ensure zero initialization (fate#321595).
- mmc: sdhci-of-arasan: Remove no-hispd and no-cmd23 quirks for
sdhci-arasan4.9a (bsc#1019351).
- mm: do not loop on GFP_REPEAT high order requests if there is no reclaim
progress (bnc#1013000).
- mm, memcg: do not retry precharge charges (bnc#1022559).
- mm, page_alloc: fix check for NULL preferred_zone (bnc#971975 VM
performance -- page allocator).
- mm, page_alloc: fix fast-path race with cpuset update or removal
(bnc#971975 VM performance -- page allocator).
- mm, page_alloc: fix premature OOM when racing with cpuset mems update
(bnc#971975 VM performance -- page allocator).
- mm, page_alloc: keep pcp count and list contents in sync if struct page
is corrupted (bnc#971975 VM performance -- page allocator).
- mm, page_alloc: move cpuset seqcount checking to slowpath (bnc#971975 VM
performance -- page allocator).
- mwifiex: add missing check for PCIe8997 chipset (bsc#1018813).
- mwifiex: fix IBSS data path issue (bsc#1018813).
- mwifiex: fix PCIe register information for 8997 chipset (bsc#1018813).
- net/af_iucv: do not use paged skbs for TX on HiperSockets (bnc#1020945,
LTC#150566).
- net: ethernet: apm: xgene: use phydev from struct net_device
(bsc#1019351).
- net/hyperv: avoid uninitialized variable (fate#320485).
- net: icmp6_send should use dst dev to determine L3 domain (bsc#1014701).
- net: ipv6: tcp reset, icmp need to consider L3 domain (bsc#1014701).
- net/mlx4_en: Fix panic on xmit while port is down (bsc#966191
FATE#320230).
- net/mlx5e: Use correct flow dissector key on flower offloading
(bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix autogroups groups num not decreasing (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Keep autogroups list ordered (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- net: remove useless memset's in drivers get_stats64 (bsc#1019351).
- net_sched: fix a typo in tc_for_each_action() (bsc#966170 FATE#320225
bsc#966172 FATE#320226).
- netvsc: add rcu_read locking to netvsc callback (fate#320485).
- netvsc: fix checksum on UDP IPV6 (fate#320485).
- netvsc: reduce maximum GSO size (fate#320485).
- netvsc: Remove mistaken udp.h inclusion (fate#320485).
- net: xgene: avoid bogus maybe-uninitialized warning (bsc#1019351).
- net: xgene: fix backward compatibility fix (bsc#1019351).
- net/xgene: fix error handling during reset (bsc#1019351).
- net: xgene: move xgene_cle_ptree_ewdn data off stack (bsc#1019351).
- nfit: fail DSMs that return non-zero status by default (bsc#1023175).
- NFSv4: Cap the transport reconnection timer at 1/2 lease period
(bsc#1014410).
- NFSv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nvdimm: kabi protect nd_cmd_out_size() (bsc#1023175).
- nvme: apply DELAY_BEFORE_CHK_RDY quirk at probe time too (bsc#1020685).
- ocfs2: fix deadlock on mmapped page in ocfs2_write_begin_nolock()
(bnc#921494).
- pci: Add devm_request_pci_bus_resources() (bsc#1019351).
- PCI/AER: include header file (bsc#964944,FATE#319965).
- pci: generic: Fix pci_remap_iospace() failure path (bsc#1019630).
- pci: hv: Allocate physically contiguous hypercall params buffer
(fate#320485).
- pci: hv: Delete the device earlier from hbus->children for hot-remove
(fate#320485).
- pci: hv: Fix hv_pci_remove() for hot-remove (fate#320485).
- pci: hv: Handle hv_pci_generic_compl() error case (fate#320485).
- pci: hv: Handle vmbus_sendpacket() failure in hv_compose_msi_msg()
(fate#320485).
- pci: hv: Make unnecessarily global IRQ masking functions static
(fate#320485).
- pci: hv: Remove the unused 'wrk' in struct hv_pcibus_device
(fate#320485).
- pci: hv: Use list_move_tail() instead of list_del() + list_add_tail()
(fate#320485).
- pci: hv: Use pci_function_description in struct definitions
(fate#320485).
- pci: hv: Use the correct buffer size in new_pcichild_device()
(fate#320485).
- pci: hv: Use zero-length array in struct pci_packet (fate#320485).
- pci: xgene: Add local struct device pointers (bsc#1019351).
- pci: xgene: Add register accessors (bsc#1019351).
- pci: xgene: Free bridge resource list on failure (bsc#1019351).
- pci: xgene: Make explicitly non-modular (bsc#1019351).
- pci: xgene: Pass struct xgene_pcie_port to setup functions (bsc#1019351).
- pci: xgene: Remove unused platform data (bsc#1019351).
- pci: xgene: Request host bridge window resources (bsc#1019351).
- perf: xgene: Remove bogus IS_ERR() check (bsc#1019351).
- phy: xgene: rename "enum phy_mode" to "enum xgene_phy_mode"
(bsc#1019351).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- power: reset: xgene-reboot: Unmap region obtained by of_iomap
(bsc#1019351).
- qeth: check not more than 16 SBALEs on the completion queue
(bnc#1009718, LTC#148203).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-binary.spec.in: Fix installation of /etc/uefi/certs
(bsc#1019594)
- rtc: cmos: avoid unused function warning (bsc#1022429).
- rtc: cmos: Clear ACPI-driven alarms upon resume (bsc#1022429).
- rtc: cmos: Do not enable interrupts in the middle of the interrupt
handler (bsc#1022429).
- rtc: cmos: Restore alarm after resume (bsc#1022429).
- s390/cpuinfo: show maximum thread id (bnc#1009718, LTC#148580).
- s390/sysinfo: show partition extended name and UUID if available
(bnc#1009718, LTC#150160).
- s390/time: LPAR offset handling (bnc#1009718, LTC#146920).
- s390/time: move PTFF definitions (bnc#1009718, LTC#146920).
- sched: Allow hotplug notifiers to be setup early (bnc#1022476).
- sched/core: Fix incorrect utilization accounting when switching to fair
class (bnc#1022476).
- sched/core: Fix set_user_nice() (bnc#1022476).
- sched/core, x86/topology: Fix NUMA in package topology bug (bnc#1022476).
- sched/cputime: Add steal time support to full dynticks CPU time
accounting (bnc#1022476).
- sched/cputime: Fix prev steal time accouting during CPU hotplug
(bnc#1022476).
- sched/deadline: Always calculate end of period on sched_yield()
(bnc#1022476).
- sched/deadline: Fix a bug in dl_overflow() (bnc#1022476).
- sched/deadline: Fix lock pinning warning during CPU hotplug
(bnc#1022476).
- sched/deadline: Fix wrap-around in DL heap (bnc#1022476).
- sched/fair: Avoid using decay_load_missed() with a negative value
(bnc#1022476).
- sched/fair: Fix fixed point arithmetic width for shares and effective
load (bnc#1022476).
- sched/fair: Fix load_above_capacity fixed point arithmetic width
(bnc#1022476).
- sched/fair: Fix min_vruntime tracking (bnc#1022476).
- sched/fair: Fix the wrong throttled clock time for cfs_rq_clock_task()
(bnc#1022476).
- sched/fair: Improve PELT stuff some more (bnc#1022476).
- sched: Make wake_up_nohz_cpu() handle CPUs going offline (bnc#1022476).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1022476).
- sched/rt: Kick RT bandwidth timer immediately on start up (bnc#1022476).
- sched/rt, sched/dl: Do not push if task's scheduling class was changed
(bnc#1022476).
- scsi: Add 'AIX VDASD' to blacklist (bsc#1006469).
- scsi: bfa: Increase requested firmware version to 3.2.5.1 (bsc#1013273).
- scsi_dh_alua: uninitialized variable in alua_rtpg() (bsc#1012910).
- scsi: Modify HITACHI OPEN-V blacklist entry (bsc#1006469).
- scsi: storvsc: Payload buffer incorrectly sized for 32 bit kernels
(fate#320485).
- sd: always scan VPD pages if thin provisioning is enabled (bsc#1013792).
- serial: 8250_fintek: fix the mismatched IRQ mode (boo#1009546).
- serial: 8250: Integrate Fintek into 8250_base (boo#1016979). Update
config files to change CONFIG_SERIAL_8250_FINTEK to boolean accordingly,
too. Also, the corresponding entry got removed from supported.conf.
- ses: Fix SAS device detection in enclosure (bsc#1016403).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: fix refcounting problems with auth_gss messages (boo#1011250).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout
(bsc#1014410).
- supported.conf: delete xilinx/ll_temac (bsc#1011602)
- supported.conf: Support Marvell WiFi/BT SDIO and pinctrl-cherrytrail
(bsc#1018813)
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense
(bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- tools: hv: Enable network manager for bonding scripts on RHEL
(fate#320485).
- tools: hv: fix a compile warning in snprintf (fate#320485).
- Tools: hv: kvp: configurable external scripts path (fate#320485).
- Tools: hv: kvp: ensure kvp device fd is closed on exec (fate#320485).
- tools: hv: remove unnecessary header files and netlink related code
(fate#320485).
- tools: hv: remove unnecessary link flag (fate#320485).
- tty: n_hdlc, fix lockdep false positive (bnc#1015840).
- Update metadata for serial fixes (bsc#1013001)
- vmbus: make sysfs names consistent with PCI (fate#320485).
- x86/hpet: Reduce HPET counter read contention (bsc#1014710).
- x86/hyperv: Handle unknown NMIs on one CPU when unknown_nmi_panic
(fate#320485).
- x86/MCE: Dump MCE to dmesg if no consumers (bsc#1013994).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-245=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (x86_64):
kernel-debug-4.4.46-11.1
kernel-debug-base-4.4.46-11.1
kernel-debug-base-debuginfo-4.4.46-11.1
kernel-debug-debuginfo-4.4.46-11.1
kernel-debug-debugsource-4.4.46-11.1
kernel-debug-devel-4.4.46-11.1
kernel-debug-devel-debuginfo-4.4.46-11.1
kernel-default-4.4.46-11.1
kernel-default-base-4.4.46-11.1
kernel-default-base-debuginfo-4.4.46-11.1
kernel-default-debuginfo-4.4.46-11.1
kernel-default-debugsource-4.4.46-11.1
kernel-default-devel-4.4.46-11.1
kernel-obs-build-4.4.46-11.1
kernel-obs-build-debugsource-4.4.46-11.1
kernel-obs-qa-4.4.46-11.1
kernel-syms-4.4.46-11.1
kernel-vanilla-4.4.46-11.1
kernel-vanilla-base-4.4.46-11.1
kernel-vanilla-base-debuginfo-4.4.46-11.1
kernel-vanilla-debuginfo-4.4.46-11.1
kernel-vanilla-debugsource-4.4.46-11.1
kernel-vanilla-devel-4.4.46-11.1
- openSUSE Leap 42.2 (noarch):
kernel-devel-4.4.46-11.1
kernel-docs-4.4.46-11.3
kernel-docs-html-4.4.46-11.3
kernel-docs-pdf-4.4.46-11.3
kernel-macros-4.4.46-11.1
kernel-source-4.4.46-11.1
kernel-source-vanilla-4.4.46-11.1
References:
https://www.suse.com/security/cve/CVE-2015-8709.html
https://www.suse.com/security/cve/CVE-2016-7117.html
https://www.suse.com/security/cve/CVE-2016-8645.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2016-9806.html
https://www.suse.com/security/cve/CVE-2016-9919.html
https://www.suse.com/security/cve/CVE-2017-2583.html
https://www.suse.com/security/cve/CVE-2017-2584.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://www.suse.com/security/cve/CVE-2017-5576.html
https://www.suse.com/security/cve/CVE-2017-5577.html
https://bugzilla.suse.com/1000092
https://bugzilla.suse.com/1000619
https://bugzilla.suse.com/1003077
https://bugzilla.suse.com/1003253
https://bugzilla.suse.com/1005918
https://bugzilla.suse.com/1006469
https://bugzilla.suse.com/1006472
https://bugzilla.suse.com/1007729
https://bugzilla.suse.com/1008742
https://bugzilla.suse.com/1009546
https://bugzilla.suse.com/1009674
https://bugzilla.suse.com/1009718
https://bugzilla.suse.com/1009911
https://bugzilla.suse.com/1009969
https://bugzilla.suse.com/1010612
https://bugzilla.suse.com/1010690
https://bugzilla.suse.com/1011176
https://bugzilla.suse.com/1011250
https://bugzilla.suse.com/1011602
https://bugzilla.suse.com/1011660
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1012910
https://bugzilla.suse.com/1013000
https://bugzilla.suse.com/1013001
https://bugzilla.suse.com/1013273
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013540
https://bugzilla.suse.com/1013542
https://bugzilla.suse.com/1013792
https://bugzilla.suse.com/1013994
https://bugzilla.suse.com/1014120
https://bugzilla.suse.com/1014392
https://bugzilla.suse.com/1014410
https://bugzilla.suse.com/1014701
https://bugzilla.suse.com/1014710
https://bugzilla.suse.com/1015038
https://bugzilla.suse.com/1015212
https://bugzilla.suse.com/1015359
https://bugzilla.suse.com/1015367
https://bugzilla.suse.com/1015416
https://bugzilla.suse.com/1015840
https://bugzilla.suse.com/1016250
https://bugzilla.suse.com/1016403
https://bugzilla.suse.com/1016517
https://bugzilla.suse.com/1016884
https://bugzilla.suse.com/1016979
https://bugzilla.suse.com/1017164
https://bugzilla.suse.com/1017170
https://bugzilla.suse.com/1017410
https://bugzilla.suse.com/1017589
https://bugzilla.suse.com/1018100
https://bugzilla.suse.com/1018316
https://bugzilla.suse.com/1018358
https://bugzilla.suse.com/1018385
https://bugzilla.suse.com/1018446
https://bugzilla.suse.com/1018813
https://bugzilla.suse.com/1018913
https://bugzilla.suse.com/1019061
https://bugzilla.suse.com/1019148
https://bugzilla.suse.com/1019260
https://bugzilla.suse.com/1019351
https://bugzilla.suse.com/1019594
https://bugzilla.suse.com/1019630
https://bugzilla.suse.com/1019631
https://bugzilla.suse.com/1019784
https://bugzilla.suse.com/1019851
https://bugzilla.suse.com/1020214
https://bugzilla.suse.com/1020488
https://bugzilla.suse.com/1020602
https://bugzilla.suse.com/1020685
https://bugzilla.suse.com/1020817
https://bugzilla.suse.com/1020945
https://bugzilla.suse.com/1020975
https://bugzilla.suse.com/1021248
https://bugzilla.suse.com/1021251
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/1021260
https://bugzilla.suse.com/1021294
https://bugzilla.suse.com/1021455
https://bugzilla.suse.com/1021474
https://bugzilla.suse.com/1022304
https://bugzilla.suse.com/1022429
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1022547
https://bugzilla.suse.com/1022559
https://bugzilla.suse.com/1022971
https://bugzilla.suse.com/1023101
https://bugzilla.suse.com/1023175
https://bugzilla.suse.com/921494
https://bugzilla.suse.com/959709
https://bugzilla.suse.com/960561
https://bugzilla.suse.com/964944
https://bugzilla.suse.com/966170
https://bugzilla.suse.com/966172
https://bugzilla.suse.com/966186
https://bugzilla.suse.com/966191
https://bugzilla.suse.com/969474
https://bugzilla.suse.com/969475
https://bugzilla.suse.com/969756
https://bugzilla.suse.com/971975
https://bugzilla.suse.com/974215
https://bugzilla.suse.com/979378
https://bugzilla.suse.com/981709
https://bugzilla.suse.com/985561
https://bugzilla.suse.com/987192
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/991273
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0444-1: important: Security update for tigervnc
by opensuse-security@opensuse.org 11 Feb '17
by opensuse-security@opensuse.org 11 Feb '17
11 Feb '17
openSUSE Security Update: Security update for tigervnc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0444-1
Rating: important
References: #1022432 #1023012
Cross-References: CVE-2016-10207
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for tigervnc fixes the following issues:
This security issue was fixed:
- CVE-2016-10207: Prevent crash caused by failed TLS connection
(bnc#1023012)
This non-security issue was fixed:
* Fix random client disconnections (boo#1022432)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-243=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-243=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
libXvnc-devel-1.6.0-11.1
libXvnc1-1.6.0-11.1
libXvnc1-debuginfo-1.6.0-11.1
tigervnc-1.6.0-11.1
tigervnc-debuginfo-1.6.0-11.1
tigervnc-debugsource-1.6.0-11.1
xorg-x11-Xvnc-1.6.0-11.1
xorg-x11-Xvnc-debuginfo-1.6.0-11.1
- openSUSE Leap 42.1 (i586 x86_64):
tigervnc-1.5.0-32.1
tigervnc-debuginfo-1.5.0-32.1
tigervnc-debugsource-1.5.0-32.1
xorg-x11-Xvnc-1.5.0-32.1
xorg-x11-Xvnc-debuginfo-1.5.0-32.1
References:
https://www.suse.com/security/cve/CVE-2016-10207.html
https://bugzilla.suse.com/1022432
https://bugzilla.suse.com/1023012
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0437-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 09 Feb '17
by opensuse-security@opensuse.org 09 Feb '17
09 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0437-1
Rating: important
References: #1003813 #1005877 #1007615 #1008557 #1008645
#1008831 #1008833 #1008893 #1009875 #1010150
#1010175 #1010201 #1010467 #1010501 #1010507
#1010711 #1010713 #1010716 #1011685 #1011820
#1012183 #1012411 #1012422 #1012832 #1012851
#1012852 #1012917 #1013018 #1013038 #1013042
#1013070 #1013531 #1013542 #1014410 #1014454
#1014746 #1015561 #1015752 #1015760 #1015796
#1015803 #1015817 #1015828 #1015844 #1015848
#1015878 #1015932 #1016320 #1016505 #1016520
#1016668 #1016688 #1016824 #1016831 #1017686
#1017710 #1019079 #1019148 #1019165 #1019348
#1019783 #1020214 #1021258 #748806 #786036
#790588 #795297 #800999 #821612 #824171 #851603
#853052 #871728 #901809 #909350 #909491 #913387
#914939 #919382 #924708 #925065 #953233 #961589
#962846 #969340 #973691 #987333 #987576 #989152
#989680 #989896 #990245 #992991 #993739 #993832
#996541 #996557 #997401 #999101
Cross-References: CVE-2004-0230 CVE-2012-6704 CVE-2013-6368
CVE-2015-1350 CVE-2015-8962 CVE-2015-8964
CVE-2016-10088 CVE-2016-5696 CVE-2016-7910
CVE-2016-7911 CVE-2016-7916 CVE-2016-8399
CVE-2016-8632 CVE-2016-8633 CVE-2016-8646
CVE-2016-9555 CVE-2016-9685 CVE-2016-9756
CVE-2016-9793 CVE-2017-5551
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-EXTRA
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that solves 20 vulnerabilities and has 79 fixes
is now available.
Description:
The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to
receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs
(bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations
or cause a denial of service (use-after-free) by leveraging access to a
/dev/sg device NOTE: this vulnerability existed because of an
incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for
remote attackers to guess sequence numbers and cause a denial of service
(connection loss) to persistent TCP connections by repeatedly injecting
a TCP RST packet, especially in protocols that use long-lived
connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an
incomplete set of requirements for setattr
operations that underspecified removing extended privilege attributes,
which allowed local users to cause a denial
of service (capability stripping) via a failed invocation of a system
call, as demonstrated by using chown to remove a capability from the
ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the
Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users
to gain privileges or cause a denial of service (heap-based buffer
overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel
networking subsystem could enable a local malicious application to
execute arbitrary code within the context of the kernel. This issue is
rated as Moderate because it first requires compromising a privileged
process and current compiler optimizations restrict access to the
vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash)
or possibly have unspecified other impact by leveraging the
CAP_NET_ADMIN capability for a crafted setsockopt system call with the
(1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the
Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf,
which allowed local users to cause a denial of service (memory
corruption and system crash)
or possibly have unspecified other impact by leveraging the
CAP_NET_ADMIN capability for a crafted setsockopt system call with the
(1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not
properly initialize Code Segment (CS) in certain error cases, which
allowed local users to obtain sensitive information from kernel stack
memory via a crafted application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in
fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause
a denial of service (memory consumption) via crafted XFS filesystem
operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function
in drivers/scsi/sg.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (memory corruption and system
crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacked chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop
function in block/genhd.c in the Linux kernel allowed local users to
gain privileges by leveraging the execution of a certain stop operation
even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (use-after-free) via a crafted
ioprio_get system call (bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users
to gain privileges or cause a denial of service (system crash) via a
VAPIC synchronization operation involving a page-end address
(bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in
drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by reading a tty data
structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in
fs/proc/base.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory by reading a /proc/*/environ
file during a process-setup time interval in which environment-variable
copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the
Linux kernel allowed local users to cause a denial of service (OOPS) by
attempting to trigger use of in-kernel hash algorithms for a socket that
has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain
unusual hardware configurations, allowed remote attackers to execute
arbitrary code via crafted fragmented packets (bnc#1008833).
The following non-security bugs were fixed:
- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev->bd_contains when it is not stable
(bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106
(bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491
FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector
(bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs()
(bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491
FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers
(bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host->n_tags to avoid oops on SAS controllers
(bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS
response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup
(bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036
FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036
FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036
FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036
FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036
FATE#314304).
- mm/memory_hotplug.c: check for missing sections in
test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge()
succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036
FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382
FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow
(bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline
(bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been
initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards
(bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to
FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT
(bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency
(bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382
FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036
FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036
FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and
service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382
FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period
(bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity
(bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock
sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer
deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts
(bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config
(bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec
(bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE
(bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward
(bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag()
(bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run
(bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery
(bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials
(bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache
(bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout
(bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port
(bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions
(bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers
(bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe
(bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path
(bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path
(bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path
(bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-kernel-12977=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-kernel-12977=1
- SUSE Linux Enterprise Server 11-EXTRA:
zypper in -t patch slexsp3-kernel-12977=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-kernel-12977=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch):
kernel-docs-3.0.101-94.2
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
kernel-default-3.0.101-94.1
kernel-default-base-3.0.101-94.1
kernel-default-devel-3.0.101-94.1
kernel-source-3.0.101-94.1
kernel-syms-3.0.101-94.1
kernel-trace-3.0.101-94.1
kernel-trace-base-3.0.101-94.1
kernel-trace-devel-3.0.101-94.1
- SUSE Linux Enterprise Server 11-SP4 (i586 x86_64):
kernel-ec2-3.0.101-94.1
kernel-ec2-base-3.0.101-94.1
kernel-ec2-devel-3.0.101-94.1
kernel-xen-3.0.101-94.1
kernel-xen-base-3.0.101-94.1
kernel-xen-devel-3.0.101-94.1
- SUSE Linux Enterprise Server 11-SP4 (s390x):
kernel-default-man-3.0.101-94.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64):
kernel-bigmem-3.0.101-94.1
kernel-bigmem-base-3.0.101-94.1
kernel-bigmem-devel-3.0.101-94.1
kernel-ppc64-3.0.101-94.1
kernel-ppc64-base-3.0.101-94.1
kernel-ppc64-devel-3.0.101-94.1
- SUSE Linux Enterprise Server 11-SP4 (i586):
kernel-pae-3.0.101-94.1
kernel-pae-base-3.0.101-94.1
kernel-pae-devel-3.0.101-94.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-94.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64):
kernel-xen-extra-3.0.101-94.1
- SUSE Linux Enterprise Server 11-EXTRA (x86_64):
kernel-trace-extra-3.0.101-94.1
- SUSE Linux Enterprise Server 11-EXTRA (ppc64):
kernel-ppc64-extra-3.0.101-94.1
- SUSE Linux Enterprise Server 11-EXTRA (i586):
kernel-pae-extra-3.0.101-94.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
kernel-default-debuginfo-3.0.101-94.1
kernel-default-debugsource-3.0.101-94.1
kernel-trace-debuginfo-3.0.101-94.1
kernel-trace-debugsource-3.0.101-94.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 s390x x86_64):
kernel-default-devel-debuginfo-3.0.101-94.1
kernel-trace-devel-debuginfo-3.0.101-94.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
kernel-ec2-debuginfo-3.0.101-94.1
kernel-ec2-debugsource-3.0.101-94.1
kernel-xen-debuginfo-3.0.101-94.1
kernel-xen-debugsource-3.0.101-94.1
kernel-xen-devel-debuginfo-3.0.101-94.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64):
kernel-bigmem-debuginfo-3.0.101-94.1
kernel-bigmem-debugsource-3.0.101-94.1
kernel-ppc64-debuginfo-3.0.101-94.1
kernel-ppc64-debugsource-3.0.101-94.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586):
kernel-pae-debuginfo-3.0.101-94.1
kernel-pae-debugsource-3.0.101-94.1
kernel-pae-devel-debuginfo-3.0.101-94.1
References:
https://www.suse.com/security/cve/CVE-2004-0230.html
https://www.suse.com/security/cve/CVE-2012-6704.html
https://www.suse.com/security/cve/CVE-2013-6368.html
https://www.suse.com/security/cve/CVE-2015-1350.html
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2016-10088.html
https://www.suse.com/security/cve/CVE-2016-5696.html
https://www.suse.com/security/cve/CVE-2016-7910.html
https://www.suse.com/security/cve/CVE-2016-7911.html
https://www.suse.com/security/cve/CVE-2016-7916.html
https://www.suse.com/security/cve/CVE-2016-8399.html
https://www.suse.com/security/cve/CVE-2016-8632.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8646.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://www.suse.com/security/cve/CVE-2016-9685.html
https://www.suse.com/security/cve/CVE-2016-9756.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://bugzilla.suse.com/1003813
https://bugzilla.suse.com/1005877
https://bugzilla.suse.com/1007615
https://bugzilla.suse.com/1008557
https://bugzilla.suse.com/1008645
https://bugzilla.suse.com/1008831
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1008893
https://bugzilla.suse.com/1009875
https://bugzilla.suse.com/1010150
https://bugzilla.suse.com/1010175
https://bugzilla.suse.com/1010201
https://bugzilla.suse.com/1010467
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010711
https://bugzilla.suse.com/1010713
https://bugzilla.suse.com/1010716
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1011820
https://bugzilla.suse.com/1012183
https://bugzilla.suse.com/1012411
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1012832
https://bugzilla.suse.com/1012851
https://bugzilla.suse.com/1012852
https://bugzilla.suse.com/1012917
https://bugzilla.suse.com/1013018
https://bugzilla.suse.com/1013038
https://bugzilla.suse.com/1013042
https://bugzilla.suse.com/1013070
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013542
https://bugzilla.suse.com/1014410
https://bugzilla.suse.com/1014454
https://bugzilla.suse.com/1014746
https://bugzilla.suse.com/1015561
https://bugzilla.suse.com/1015752
https://bugzilla.suse.com/1015760
https://bugzilla.suse.com/1015796
https://bugzilla.suse.com/1015803
https://bugzilla.suse.com/1015817
https://bugzilla.suse.com/1015828
https://bugzilla.suse.com/1015844
https://bugzilla.suse.com/1015848
https://bugzilla.suse.com/1015878
https://bugzilla.suse.com/1015932
https://bugzilla.suse.com/1016320
https://bugzilla.suse.com/1016505
https://bugzilla.suse.com/1016520
https://bugzilla.suse.com/1016668
https://bugzilla.suse.com/1016688
https://bugzilla.suse.com/1016824
https://bugzilla.suse.com/1016831
https://bugzilla.suse.com/1017686
https://bugzilla.suse.com/1017710
https://bugzilla.suse.com/1019079
https://bugzilla.suse.com/1019148
https://bugzilla.suse.com/1019165
https://bugzilla.suse.com/1019348
https://bugzilla.suse.com/1019783
https://bugzilla.suse.com/1020214
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/748806
https://bugzilla.suse.com/786036
https://bugzilla.suse.com/790588
https://bugzilla.suse.com/795297
https://bugzilla.suse.com/800999
https://bugzilla.suse.com/821612
https://bugzilla.suse.com/824171
https://bugzilla.suse.com/851603
https://bugzilla.suse.com/853052
https://bugzilla.suse.com/871728
https://bugzilla.suse.com/901809
https://bugzilla.suse.com/909350
https://bugzilla.suse.com/909491
https://bugzilla.suse.com/913387
https://bugzilla.suse.com/914939
https://bugzilla.suse.com/919382
https://bugzilla.suse.com/924708
https://bugzilla.suse.com/925065
https://bugzilla.suse.com/953233
https://bugzilla.suse.com/961589
https://bugzilla.suse.com/962846
https://bugzilla.suse.com/969340
https://bugzilla.suse.com/973691
https://bugzilla.suse.com/987333
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/989152
https://bugzilla.suse.com/989680
https://bugzilla.suse.com/989896
https://bugzilla.suse.com/990245
https://bugzilla.suse.com/992991
https://bugzilla.suse.com/993739
https://bugzilla.suse.com/993832
https://bugzilla.suse.com/996541
https://bugzilla.suse.com/996557
https://bugzilla.suse.com/997401
https://bugzilla.suse.com/999101
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0436-1: important: Security update for opus
by opensuse-security@opensuse.org 09 Feb '17
by opensuse-security@opensuse.org 09 Feb '17
09 Feb '17
SUSE Security Update: Security update for opus
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0436-1
Rating: important
References: #1020102
Cross-References: CVE-2017-0381
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for opus fixes the following issues:
- CVE-2017-0381: Fixed a remote code execution vulnerability in
silk/NLSF_stabilize.c when playing certain media files (bsc#1020102)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-223=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-223=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-223=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-223=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-223=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-223=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-223=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
libopus-devel-1.1-3.1
libopus-devel-static-1.1-3.1
opus-debugsource-1.1-3.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
libopus-devel-1.1-3.1
libopus-devel-static-1.1-3.1
opus-debugsource-1.1-3.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libopus0-1.1-3.1
libopus0-debuginfo-1.1-3.1
opus-debugsource-1.1-3.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
libopus0-1.1-3.1
libopus0-debuginfo-1.1-3.1
opus-debugsource-1.1-3.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libopus0-1.1-3.1
libopus0-debuginfo-1.1-3.1
opus-debugsource-1.1-3.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libopus0-1.1-3.1
libopus0-debuginfo-1.1-3.1
opus-debugsource-1.1-3.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libopus0-1.1-3.1
libopus0-debuginfo-1.1-3.1
opus-debugsource-1.1-3.1
References:
https://www.suse.com/security/cve/CVE-2017-0381.html
https://bugzilla.suse.com/1020102
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0427-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 09 Feb '17
by opensuse-security@opensuse.org 09 Feb '17
09 Feb '17
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0427-1
Rating: important
References: #1021814 #1021817 #1021818 #1021819 #1021820
#1021821 #1021822 #1021823 #1021824 #1021991
Cross-References: CVE-2017-5373 CVE-2017-5375 CVE-2017-5376
CVE-2017-5378 CVE-2017-5380 CVE-2017-5383
CVE-2017-5386 CVE-2017-5390 CVE-2017-5396
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 9 vulnerabilities and has one errata
is now available.
Description:
MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues
(bsc#1021991):
* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript
objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder
(bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to
affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM
manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer
Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and
Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass
of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode
characters (bsc#1021822)
Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-217=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-217=1
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-217=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-217=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-217=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-217=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-217=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-217=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-217=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-devel-45.7.0esr-99.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-devel-45.7.0esr-99.1
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
MozillaFirefox-45.7.0esr-99.1
MozillaFirefox-debuginfo-45.7.0esr-99.1
MozillaFirefox-debugsource-45.7.0esr-99.1
MozillaFirefox-translations-45.7.0esr-99.1
References:
https://www.suse.com/security/cve/CVE-2017-5373.html
https://www.suse.com/security/cve/CVE-2017-5375.html
https://www.suse.com/security/cve/CVE-2017-5376.html
https://www.suse.com/security/cve/CVE-2017-5378.html
https://www.suse.com/security/cve/CVE-2017-5380.html
https://www.suse.com/security/cve/CVE-2017-5383.html
https://www.suse.com/security/cve/CVE-2017-5386.html
https://www.suse.com/security/cve/CVE-2017-5390.html
https://www.suse.com/security/cve/CVE-2017-5396.html
https://bugzilla.suse.com/1021814
https://bugzilla.suse.com/1021817
https://bugzilla.suse.com/1021818
https://bugzilla.suse.com/1021819
https://bugzilla.suse.com/1021820
https://bugzilla.suse.com/1021821
https://bugzilla.suse.com/1021822
https://bugzilla.suse.com/1021823
https://bugzilla.suse.com/1021824
https://bugzilla.suse.com/1021991
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0426-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 08 Feb '17
by opensuse-security@opensuse.org 08 Feb '17
08 Feb '17
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0426-1
Rating: important
References: #1021814 #1021817 #1021818 #1021819 #1021820
#1021821 #1021822 #1021823 #1021824 #1021991
Cross-References: CVE-2017-5373 CVE-2017-5375 CVE-2017-5376
CVE-2017-5378 CVE-2017-5380 CVE-2017-5383
CVE-2017-5386 CVE-2017-5390 CVE-2017-5396
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves 9 vulnerabilities and has one errata
is now available.
Description:
MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues
(bsc#1021991):
* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript
objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder
(bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to
affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM
manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer
Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and
Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass
of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode
characters (bsc#1021822)
Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-MozillaFirefox-12973=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-MozillaFirefox-12973=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-MozillaFirefox-12973=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-MozillaFirefox-12973=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-MozillaFirefox-12973=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-MozillaFirefox-12973=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-MozillaFirefox-12973=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-MozillaFirefox-12973=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-MozillaFirefox-12973=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
MozillaFirefox-45.7.0esr-65.2
MozillaFirefox-translations-45.7.0esr-65.2
- SUSE Manager Proxy 2.1 (x86_64):
MozillaFirefox-45.7.0esr-65.2
MozillaFirefox-translations-45.7.0esr-65.2
- SUSE Manager 2.1 (s390x x86_64):
MozillaFirefox-45.7.0esr-65.2
MozillaFirefox-translations-45.7.0esr-65.2
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-devel-45.7.0esr-65.2
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-45.7.0esr-65.2
MozillaFirefox-translations-45.7.0esr-65.2
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
MozillaFirefox-45.7.0esr-65.2
MozillaFirefox-translations-45.7.0esr-65.2
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
MozillaFirefox-45.7.0esr-65.2
MozillaFirefox-translations-45.7.0esr-65.2
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-debuginfo-45.7.0esr-65.2
MozillaFirefox-debugsource-45.7.0esr-65.2
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
MozillaFirefox-debuginfo-45.7.0esr-65.2
MozillaFirefox-debugsource-45.7.0esr-65.2
References:
https://www.suse.com/security/cve/CVE-2017-5373.html
https://www.suse.com/security/cve/CVE-2017-5375.html
https://www.suse.com/security/cve/CVE-2017-5376.html
https://www.suse.com/security/cve/CVE-2017-5378.html
https://www.suse.com/security/cve/CVE-2017-5380.html
https://www.suse.com/security/cve/CVE-2017-5383.html
https://www.suse.com/security/cve/CVE-2017-5386.html
https://www.suse.com/security/cve/CVE-2017-5390.html
https://www.suse.com/security/cve/CVE-2017-5396.html
https://bugzilla.suse.com/1021814
https://bugzilla.suse.com/1021817
https://bugzilla.suse.com/1021818
https://bugzilla.suse.com/1021819
https://bugzilla.suse.com/1021820
https://bugzilla.suse.com/1021821
https://bugzilla.suse.com/1021822
https://bugzilla.suse.com/1021823
https://bugzilla.suse.com/1021824
https://bugzilla.suse.com/1021991
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0421-1: important: Security update for spice
by opensuse-security@opensuse.org 08 Feb '17
by opensuse-security@opensuse.org 08 Feb '17
08 Feb '17
openSUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0421-1
Rating: important
References: #1023078 #1023079
Cross-References: CVE-2016-9577 CVE-2016-9578
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This security update for spice fixes the following issues:
CVE-2016-9577: A buffer overflow in the spice server could have
potentially been used by unauthenticated attackers to execute arbitrary
code. (bsc#1023078) CVE-2016-9578: Unauthenticated attackers could have
caused a denial of service via a crafted message. (bsc#1023079)
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-227=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i586 x86_64):
libspice-server-devel-0.12.5-11.1
libspice-server1-0.12.5-11.1
libspice-server1-debuginfo-0.12.5-11.1
spice-client-0.12.5-11.1
spice-client-debuginfo-0.12.5-11.1
spice-debugsource-0.12.5-11.1
References:
https://www.suse.com/security/cve/CVE-2016-9577.html
https://www.suse.com/security/cve/CVE-2016-9578.html
https://bugzilla.suse.com/1023078
https://bugzilla.suse.com/1023079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0419-1: important: Security update for spice
by opensuse-security@opensuse.org 08 Feb '17
by opensuse-security@opensuse.org 08 Feb '17
08 Feb '17
openSUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0419-1
Rating: important
References: #1023078 #1023079
Cross-References: CVE-2016-9577 CVE-2016-9578
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This security update for spice fixes the following issues:
- CVE-2016-9577: A buffer overflow in the spice server could have
potentially been used by unauthenticated attackers to execute arbitrary
code. (bsc#1023078)
- CVE-2016-9578: Unauthenticated attackers could have caused a denial of
service via a crafted message. (bsc#1023079)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-228=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
libspice-server-devel-0.12.7-3.1
libspice-server1-0.12.7-3.1
libspice-server1-debuginfo-0.12.7-3.1
spice-client-0.12.7-3.1
spice-debugsource-0.12.7-3.1
References:
https://www.suse.com/security/cve/CVE-2016-9577.html
https://www.suse.com/security/cve/CVE-2016-9578.html
https://bugzilla.suse.com/1023078
https://bugzilla.suse.com/1023079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0412-1: important: Security update for mariadb
by opensuse-security@opensuse.org 07 Feb '17
by opensuse-security@opensuse.org 07 Feb '17
07 Feb '17
SUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0412-1
Rating: important
References: #1008253 #1020868 #1020873 #1020875 #1020877
#1020878 #1020882 #1020884 #1020885 #1020891
#1020894 #1020896 #1022428
Cross-References: CVE-2016-6664 CVE-2017-3238 CVE-2017-3243
CVE-2017-3244 CVE-2017-3257 CVE-2017-3258
CVE-2017-3265 CVE-2017-3291 CVE-2017-3312
CVE-2017-3317 CVE-2017-3318
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 11 vulnerabilities and has two fixes
is now available.
Description:
This mariadb version update to 10.0.29 fixes the following issues:
- CVE-2017-3318: unspecified vulnerability affecting Error Handling
(bsc#1020896)
- CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3312: insecure error log file handling in mysqld_safe,
incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: unspecified vulnerability in the DDL component
(bsc#1020875)
- CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878)
- CVE-2017-3244: unspecified vulnerability affecing the DML component
(bsc#1020877)
- CVE-2017-3243: unspecified vulnerability affecting the Charsets
component (bsc#1020891)
- CVE-2017-3238: unspecified vulnerability affecting the Optimizer
component (bsc#1020882)
- CVE-2016-6664: Root Privilege Escalation (bsc#1008253)
- Applications using the client library for MySQL (libmysqlclient.so) had
a use-after-free issue that could cause the applications to crash
(bsc#1022428)
- notable changes:
* XtraDB updated to 5.6.34-79.1
* TokuDB updated to 5.6.34-79.1
* Innodb updated to 5.6.35
* Performance Schema updated to 5.6.35
Release notes and changelog:
* https://kb.askmonty.org/en/mariadb-10029-release-notes
* https://kb.askmonty.org/en/mariadb-10029-changelog
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-207=1
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-207=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-207=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-207=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-207=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-207=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-207=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-207=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-207=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
libmysqlclient_r18-10.0.29-22.1
libmysqlclient_r18-32bit-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
libmysqlclient_r18-10.0.29-22.1
libmysqlclient_r18-32bit-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
libmysqlclient-devel-10.0.29-22.1
libmysqlclient_r18-10.0.29-22.1
libmysqld-devel-10.0.29-22.1
libmysqld18-10.0.29-22.1
libmysqld18-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
libmysqlclient-devel-10.0.29-22.1
libmysqlclient_r18-10.0.29-22.1
libmysqld-devel-10.0.29-22.1
libmysqld18-10.0.29-22.1
libmysqld18-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libmysqlclient18-10.0.29-22.1
libmysqlclient18-debuginfo-10.0.29-22.1
mariadb-10.0.29-22.1
mariadb-client-10.0.29-22.1
mariadb-client-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
mariadb-errormessages-10.0.29-22.1
mariadb-tools-10.0.29-22.1
mariadb-tools-debuginfo-10.0.29-22.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
libmysqlclient18-10.0.29-22.1
libmysqlclient18-debuginfo-10.0.29-22.1
mariadb-10.0.29-22.1
mariadb-client-10.0.29-22.1
mariadb-client-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
mariadb-errormessages-10.0.29-22.1
mariadb-tools-10.0.29-22.1
mariadb-tools-debuginfo-10.0.29-22.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
libmysqlclient18-32bit-10.0.29-22.1
libmysqlclient18-debuginfo-32bit-10.0.29-22.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libmysqlclient18-10.0.29-22.1
libmysqlclient18-debuginfo-10.0.29-22.1
mariadb-10.0.29-22.1
mariadb-client-10.0.29-22.1
mariadb-client-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
mariadb-errormessages-10.0.29-22.1
mariadb-tools-10.0.29-22.1
mariadb-tools-debuginfo-10.0.29-22.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libmysqlclient18-32bit-10.0.29-22.1
libmysqlclient18-debuginfo-32bit-10.0.29-22.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libmysqlclient18-10.0.29-22.1
libmysqlclient18-32bit-10.0.29-22.1
libmysqlclient18-debuginfo-10.0.29-22.1
libmysqlclient18-debuginfo-32bit-10.0.29-22.1
libmysqlclient_r18-10.0.29-22.1
libmysqlclient_r18-32bit-10.0.29-22.1
mariadb-10.0.29-22.1
mariadb-client-10.0.29-22.1
mariadb-client-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
mariadb-errormessages-10.0.29-22.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libmysqlclient18-10.0.29-22.1
libmysqlclient18-32bit-10.0.29-22.1
libmysqlclient18-debuginfo-10.0.29-22.1
libmysqlclient18-debuginfo-32bit-10.0.29-22.1
libmysqlclient_r18-10.0.29-22.1
libmysqlclient_r18-32bit-10.0.29-22.1
mariadb-10.0.29-22.1
mariadb-client-10.0.29-22.1
mariadb-client-debuginfo-10.0.29-22.1
mariadb-debuginfo-10.0.29-22.1
mariadb-debugsource-10.0.29-22.1
mariadb-errormessages-10.0.29-22.1
References:
https://www.suse.com/security/cve/CVE-2016-6664.html
https://www.suse.com/security/cve/CVE-2017-3238.html
https://www.suse.com/security/cve/CVE-2017-3243.html
https://www.suse.com/security/cve/CVE-2017-3244.html
https://www.suse.com/security/cve/CVE-2017-3257.html
https://www.suse.com/security/cve/CVE-2017-3258.html
https://www.suse.com/security/cve/CVE-2017-3265.html
https://www.suse.com/security/cve/CVE-2017-3291.html
https://www.suse.com/security/cve/CVE-2017-3312.html
https://www.suse.com/security/cve/CVE-2017-3317.html
https://www.suse.com/security/cve/CVE-2017-3318.html
https://bugzilla.suse.com/1008253
https://bugzilla.suse.com/1020868
https://bugzilla.suse.com/1020873
https://bugzilla.suse.com/1020875
https://bugzilla.suse.com/1020877
https://bugzilla.suse.com/1020878
https://bugzilla.suse.com/1020882
https://bugzilla.suse.com/1020884
https://bugzilla.suse.com/1020885
https://bugzilla.suse.com/1020891
https://bugzilla.suse.com/1020894
https://bugzilla.suse.com/1020896
https://bugzilla.suse.com/1022428
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0411-1: important: Security update for mariadb
by opensuse-security@opensuse.org 07 Feb '17
by opensuse-security@opensuse.org 07 Feb '17
07 Feb '17
SUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0411-1
Rating: important
References: #1008253 #1020868 #1020873 #1020875 #1020877
#1020878 #1020882 #1020884 #1020885 #1020891
#1020894 #1020896 #1022428
Cross-References: CVE-2016-6664 CVE-2017-3238 CVE-2017-3243
CVE-2017-3244 CVE-2017-3257 CVE-2017-3258
CVE-2017-3265 CVE-2017-3291 CVE-2017-3312
CVE-2017-3317 CVE-2017-3318
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves 11 vulnerabilities and has two fixes
is now available.
Description:
This mariadb version update to 10.0.29 fixes the following issues:
- CVE-2017-3318: unspecified vulnerability affecting Error Handling
(bsc#1020896)
- CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3312: insecure error log file handling in mysqld_safe,
incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: unspecified vulnerability in the DDL component
(bsc#1020875)
- CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878)
- CVE-2017-3244: unspecified vulnerability affecing the DML component
(bsc#1020877)
- CVE-2017-3243: unspecified vulnerability affecting the Charsets
component (bsc#1020891)
- CVE-2017-3238: unspecified vulnerability affecting the Optimizer
component (bsc#1020882)
- CVE-2016-6664: Root Privilege Escalation (bsc#1008253)
- Applications using the client library for MySQL (libmysqlclient.so) had
a use-after-free issue that could cause the applications to crash
(bsc#1022428)
- notable changes:
* XtraDB updated to 5.6.34-79.1
* TokuDB updated to 5.6.34-79.1
* Innodb updated to 5.6.35
* Performance Schema updated to 5.6.35
Release notes and changelog:
* https://kb.askmonty.org/en/mariadb-10029-release-notes
* https://kb.askmonty.org/en/mariadb-10029-changelog
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-205=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-205=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
libmysqlclient-devel-10.0.29-20.23.1
libmysqlclient18-10.0.29-20.23.1
libmysqlclient18-32bit-10.0.29-20.23.1
libmysqlclient18-debuginfo-10.0.29-20.23.1
libmysqlclient18-debuginfo-32bit-10.0.29-20.23.1
libmysqlclient_r18-10.0.29-20.23.1
libmysqld-devel-10.0.29-20.23.1
libmysqld18-10.0.29-20.23.1
libmysqld18-debuginfo-10.0.29-20.23.1
mariadb-10.0.29-20.23.1
mariadb-client-10.0.29-20.23.1
mariadb-client-debuginfo-10.0.29-20.23.1
mariadb-debuginfo-10.0.29-20.23.1
mariadb-debugsource-10.0.29-20.23.1
mariadb-errormessages-10.0.29-20.23.1
mariadb-tools-10.0.29-20.23.1
mariadb-tools-debuginfo-10.0.29-20.23.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
libmysqlclient-devel-10.0.29-20.23.1
libmysqlclient18-10.0.29-20.23.1
libmysqlclient18-debuginfo-10.0.29-20.23.1
libmysqlclient_r18-10.0.29-20.23.1
libmysqld-devel-10.0.29-20.23.1
libmysqld18-10.0.29-20.23.1
libmysqld18-debuginfo-10.0.29-20.23.1
mariadb-10.0.29-20.23.1
mariadb-client-10.0.29-20.23.1
mariadb-client-debuginfo-10.0.29-20.23.1
mariadb-debuginfo-10.0.29-20.23.1
mariadb-debugsource-10.0.29-20.23.1
mariadb-errormessages-10.0.29-20.23.1
mariadb-tools-10.0.29-20.23.1
mariadb-tools-debuginfo-10.0.29-20.23.1
- SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):
libmysqlclient18-32bit-10.0.29-20.23.1
libmysqlclient18-debuginfo-32bit-10.0.29-20.23.1
References:
https://www.suse.com/security/cve/CVE-2016-6664.html
https://www.suse.com/security/cve/CVE-2017-3238.html
https://www.suse.com/security/cve/CVE-2017-3243.html
https://www.suse.com/security/cve/CVE-2017-3244.html
https://www.suse.com/security/cve/CVE-2017-3257.html
https://www.suse.com/security/cve/CVE-2017-3258.html
https://www.suse.com/security/cve/CVE-2017-3265.html
https://www.suse.com/security/cve/CVE-2017-3291.html
https://www.suse.com/security/cve/CVE-2017-3312.html
https://www.suse.com/security/cve/CVE-2017-3317.html
https://www.suse.com/security/cve/CVE-2017-3318.html
https://bugzilla.suse.com/1008253
https://bugzilla.suse.com/1020868
https://bugzilla.suse.com/1020873
https://bugzilla.suse.com/1020875
https://bugzilla.suse.com/1020877
https://bugzilla.suse.com/1020878
https://bugzilla.suse.com/1020882
https://bugzilla.suse.com/1020884
https://bugzilla.suse.com/1020885
https://bugzilla.suse.com/1020891
https://bugzilla.suse.com/1020894
https://bugzilla.suse.com/1020896
https://bugzilla.suse.com/1022428
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0408-1: important: Security update for mysql
by opensuse-security@opensuse.org 06 Feb '17
by opensuse-security@opensuse.org 06 Feb '17
06 Feb '17
SUSE Security Update: Security update for mysql
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0408-1
Rating: important
References: #1020868 #1020873 #1020875 #1020877 #1020882
#1020884 #1020885 #1020890 #1020891 #1020894
#1020896 #1022428
Cross-References: CVE-2017-3238 CVE-2017-3243 CVE-2017-3244
CVE-2017-3258 CVE-2017-3265 CVE-2017-3291
CVE-2017-3312 CVE-2017-3313 CVE-2017-3317
CVE-2017-3318
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves 10 vulnerabilities and has two fixes
is now available.
Description:
This mysql version update to 5.5.54 fixes the following issues:
- CVE-2017-3318: Unspecified vulnerability affecting Error Handling
(bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component
(bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe,
incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component
(bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component
(bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets
component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer
component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had
a use-after-free issue that could cause the applications to crash
(bsc#1022428)
Release Notes:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-mysql-12971=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-mysql-12971=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-mysql-12971=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-mysql-12971=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-mysql-12971=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-mysql-12971=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-mysql-12971=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-mysql-12971=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-mysql-12971=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
libmysql55client18-32bit-5.5.54-0.35.1
libmysql55client18-5.5.54-0.35.1
libmysql55client_r18-5.5.54-0.35.1
mysql-5.5.54-0.35.1
mysql-client-5.5.54-0.35.1
mysql-tools-5.5.54-0.35.1
- SUSE Manager Proxy 2.1 (x86_64):
libmysql55client18-32bit-5.5.54-0.35.1
libmysql55client18-5.5.54-0.35.1
libmysql55client_r18-5.5.54-0.35.1
mysql-5.5.54-0.35.1
mysql-client-5.5.54-0.35.1
mysql-tools-5.5.54-0.35.1
- SUSE Manager 2.1 (s390x x86_64):
libmysql55client18-32bit-5.5.54-0.35.1
libmysql55client18-5.5.54-0.35.1
libmysql55client_r18-5.5.54-0.35.1
mysql-5.5.54-0.35.1
mysql-client-5.5.54-0.35.1
mysql-tools-5.5.54-0.35.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):
libmysql55client_r18-32bit-5.5.54-0.35.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ia64):
libmysql55client_r18-x86-5.5.54-0.35.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libmysql55client18-5.5.54-0.35.1
libmysql55client_r18-5.5.54-0.35.1
mysql-5.5.54-0.35.1
mysql-client-5.5.54-0.35.1
mysql-tools-5.5.54-0.35.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
libmysql55client18-32bit-5.5.54-0.35.1
libmysql55client_r18-32bit-5.5.54-0.35.1
- SUSE Linux Enterprise Server 11-SP4 (ia64):
libmysql55client18-x86-5.5.54-0.35.1
libmysql55client_r18-x86-5.5.54-0.35.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
libmysql55client18-5.5.54-0.35.1
libmysql55client_r18-5.5.54-0.35.1
mysql-5.5.54-0.35.1
mysql-client-5.5.54-0.35.1
mysql-tools-5.5.54-0.35.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):
libmysql55client18-32bit-5.5.54-0.35.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
libmysql55client18-5.5.54-0.35.1
libmysql55client_r18-5.5.54-0.35.1
mysql-5.5.54-0.35.1
mysql-client-5.5.54-0.35.1
mysql-tools-5.5.54-0.35.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
mysql-debuginfo-5.5.54-0.35.1
mysql-debugsource-5.5.54-0.35.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
mysql-debuginfo-5.5.54-0.35.1
mysql-debugsource-5.5.54-0.35.1
References:
https://www.suse.com/security/cve/CVE-2017-3238.html
https://www.suse.com/security/cve/CVE-2017-3243.html
https://www.suse.com/security/cve/CVE-2017-3244.html
https://www.suse.com/security/cve/CVE-2017-3258.html
https://www.suse.com/security/cve/CVE-2017-3265.html
https://www.suse.com/security/cve/CVE-2017-3291.html
https://www.suse.com/security/cve/CVE-2017-3312.html
https://www.suse.com/security/cve/CVE-2017-3313.html
https://www.suse.com/security/cve/CVE-2017-3317.html
https://www.suse.com/security/cve/CVE-2017-3318.html
https://bugzilla.suse.com/1020868
https://bugzilla.suse.com/1020873
https://bugzilla.suse.com/1020875
https://bugzilla.suse.com/1020877
https://bugzilla.suse.com/1020882
https://bugzilla.suse.com/1020884
https://bugzilla.suse.com/1020885
https://bugzilla.suse.com/1020890
https://bugzilla.suse.com/1020891
https://bugzilla.suse.com/1020894
https://bugzilla.suse.com/1020896
https://bugzilla.suse.com/1022428
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0407-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 06 Feb '17
by opensuse-security@opensuse.org 06 Feb '17
06 Feb '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0407-1
Rating: important
References: #1003813 #1005666 #1007197 #1008557 #1008567
#1008831 #1008833 #1008876 #1008979 #1009062
#1009969 #1010040 #1010213 #1010294 #1010475
#1010478 #1010501 #1010502 #1010507 #1010612
#1010711 #1010716 #1011685 #1012060 #1012422
#1012754 #1012917 #1012985 #1013001 #1013038
#1013479 #1013531 #1013533 #1013540 #1013604
#1014410 #1014746 #1016713 #1016725 #1016961
#1017164 #1017170 #1017410 #1017710 #1018100
#1019032 #1019148 #1019260 #1019300 #1019783
#1019851 #1020214 #1020602 #1021258 #856380
#857394 #858727 #921338 #921778 #922052 #922056
#923036 #923037 #924381 #938963 #972993 #980560
#981709 #983087 #983348 #984194 #984419 #985850
#987192 #987576 #990384 #991273 #993739 #997807
#999101
Cross-References: CVE-2015-8962 CVE-2015-8963 CVE-2015-8964
CVE-2016-10088 CVE-2016-7910 CVE-2016-7911
CVE-2016-7913 CVE-2016-7914 CVE-2016-8399
CVE-2016-8632 CVE-2016-8633 CVE-2016-8645
CVE-2016-8655 CVE-2016-9083 CVE-2016-9084
CVE-2016-9555 CVE-2016-9576 CVE-2016-9756
CVE-2016-9793 CVE-2016-9794 CVE-2016-9806
CVE-2017-2583 CVE-2017-2584 CVE-2017-5551
Affected Products:
SUSE Linux Enterprise Real Time Extension 12-SP1
______________________________________________________________________________
An update that solves 24 vulnerabilities and has 56 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 rt-kernel was updated to 3.12.69 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8962: Fixed a double free vulnerability in the SCSI subsystem
that allowed local users to gain privileges or cause a denial of service
(memory corruption and system crash) (bnc#1010501).
- CVE-2015-8963: Fixed a race condition in kernel/events/core.c that
allowed local users to gain privileges or cause a denial of service
(use-after-free) (bnc#1010502).
- CVE-2015-8964: Fixed a bug in the tty_set_termios_ldisc function that
allowed local users to obtain sensitive information from kernel memory
(bnc#1010507).
- CVE-2016-10088: The sg implementation in the Linux kernel did not
properly restrict write operations in situations where the KERNEL_DS
option is set, which allowed local users to read or write to arbitrary
kernel memory locations or cause a denial of service (use-after-free)
(bnc#1017710).
- CVE-2016-7910: Fixed a use-after-free vulnerability in the block
subsystem that allowed local users to gain privileges (bnc#1010716).
- CVE-2016-7911: Fixed a race condition in the get_task_ioprio function
that allowed local users to gain privileges or cause a denial of service
(use-after-free) (bnc#1010711).
- CVE-2016-7913: Fixed a bug in the xc2028_set_config function that
allowed local users to gain privileges or cause a denial of service
(use-after-free) (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function did
not check whether a slot is a leaf, which allowed local users to obtain
sensitive information from kernel memory or cause a denial of service
(invalid pointer dereference and out-of-bounds read) (bnc#1010475).
- CVE-2016-8399: Fixed a bug in the kernel networking subsystem that could
have enabled a local malicious application to execute arbitrary code
within the context of the kernel. (bnc#1014746).
- CVE-2016-8632: The net subsystem did not validate the relationship
between the minimum fragment length and the maximum packet size, which
allowed local users to gain privileges or cause a denial of service
(heap-based buffer overflow) (bnc#1008831).
- CVE-2016-8633: The firewire subsystem allowed remote attackers to
execute arbitrary code via crafted fragmented packets in certain unusual
hardware configurations (bnc#1008833).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb
truncation, which allowed local users to cause a denial of service
(system crash) (bnc#1009969).
- CVE-2016-8655: Fixed a race condition in the network subsystem that
allowed local users to gain privileges or cause a denial of service
(use-after-free) (bnc#1012754).
- CVE-2016-9083: The PCI subsystem local users to bypass integer overflow
checks and cause a denial of service (memory corruption) or have
unspecified other impact (bnc#1007197).
- CVE-2016-9084: The PCI subsystem misused the kzalloc() function, which
allowed local users to cause a denial of service (integer overflow) or
have unspecified other impact (bnc#1007197).
- CVE-2016-9555: Fixed a bug in the network subsystem that allowed remote
attackers to cause a denial of service (out-of-bounds slab access) or
possibly have unspecified other impact via crafted SCTP data
(bnc#1011685).
- CVE-2016-9576: The block subsystem did not properly restrict the type of
iterator, which allowed local users to read or write to arbitrary kernel
memory locations or cause a denial of service (use-after-free)
(bnc#1013604).
- CVE-2016-9756: The kernel did not properly initialize Code Segment (CS)
in certain error cases, which allowed local users to obtain sensitive
information from kernel stack memory (bnc#1013038).
- CVE-2016-9793: The net subsystem mishandled negative values of sk_sndbuf
and sk_rcvbuf, which allowed local users to cause a denial of service
(memory corruption and system crash) or possibly have unspecified other
impact (bnc#1013531).
- CVE-2016-9794: Fixed a race condition in the ALSA subsystem that allowed
local users to cause a denial of service (use-after-free) or possibly
have unspecified other impact (bnc#1013533).
- CVE-2016-9806: Fixed a race condition in the netlink_dump() function
which could have allowed local users to cause a denial of service
(double free) or possibly have unspecified other impact (bnc#1013540).
- CVE-2017-2583: kvm: x86: fixed emulation of "MOV SS, null selector"
(bsc#1020602).
- CVE-2017-2584: arch: x86: kvm: fixed a bug that could have allowed local
users to obtain sensitive information from kernel memory or cause a
denial of service (use-after-free) (bnc#1019851).
- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set
setgid bits on files they don't down. (bsc#1021258, CVE-2017-5551).
The following non-security bugs were fixed:
- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- block_dev: do not test bdev->bd_contains when it is not stable
(bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052
bsc#922056).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#922052 bsc#922056).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space
(bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c
(bsc#983087).
- btrfs: Revert "do not delay inode ref updates during log replay"
(bsc#987192).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in
btrfs_ioctl (bsc#1018100).
- btrfs: do not delay inode ref updates during log replay (bsc#987192).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir
(bsc#981709).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing
(bsc#983087).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir()
(bsc#981709).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL)
(bsc#1008876).
- cpuset: fix sched_load_balance that was accidentally broken in a
previous update (bsc#1010294).
- ext4: fix data exposure after a crash (bsc#1012985).
- fs/dcache: move the call of __d_drop(anon) into
__d_materialise_unique(dentry, anon) (bsc#984194).
- fuse: do not use iocb after it may have been freed (bsc#1012985).
- hpilo: Add support for iLO5 (bsc#999101).
- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381
bsc#921338).
- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036).
- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727).
- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727).
- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit
(bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Fix oops caused by missing queue pairing (bnc#857394).
- ipmi_si: create hardware-independent softdep for ipmi_devintf
(bsc#1009062).
- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963).
- kabi: protect __sk_mem_reclaim (kabi).
- kabi: protect struct perf_event_context (kabi).
- kabi: reintroduce sk_filter (kabi).
- kernel: remove broken memory detection sanity check (bnc#1008567,
LTC#148072).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread
(bsc#1010612).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727).
- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036).
- net/mlx5e: Do not modify CQ before it was created (bnc#923036).
- net/mlx5e: Do not try to modify CQ moderation if it is not supported
(bnc#923036).
- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036).
- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036).
- netback: correct array index (bsc#983348).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period
(bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Fix "NFS Lock reclaim failed" errors (bsc#1014410).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix_acl: Fixup acl reference leak and missing conversions in ext3,
gfs2, jfs, hfsplus.
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec
(bsc#1003813).
- proc: avoid including "mountproto=" with no protocol in /proc/mounts
(bsc#1019260).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter
(bsc#1012060)
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- serial: 8250_pci: Detach low-level driver during PCI error recovery
(bsc#1013001).
- sfc: clear napi_hash state when copying channels (bsc#923037).
- sfc: fix potential stack corruption from running past stat bitmask
(bsc#923037).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380).
- sunrpc: Enforce an upper limit on the number of cached credentials
(bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout
(bsc#1014410).
- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT
REACHABLE (bsc#991273).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense
(bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected()
(bsc#921778).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq()
(bsc#1013479).
- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short
jumps to it (bsc#984419).
- xenbus: correctly signal errors from xenstored_local_init() (luckily
none so far).
- xfs: allow lazy sb counter sync during filesystem freeze sequence
(bsc#980560).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Real Time Extension 12-SP1:
zypper in -t patch SUSE-SLE-RT-12-SP1-2017-202=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Real Time Extension 12-SP1 (noarch):
kernel-devel-rt-3.12.69-60.30.1
kernel-source-rt-3.12.69-60.30.1
- SUSE Linux Enterprise Real Time Extension 12-SP1 (x86_64):
kernel-compute-3.12.69-60.30.1
kernel-compute-base-3.12.69-60.30.1
kernel-compute-base-debuginfo-3.12.69-60.30.1
kernel-compute-debuginfo-3.12.69-60.30.1
kernel-compute-debugsource-3.12.69-60.30.1
kernel-compute-devel-3.12.69-60.30.1
kernel-compute_debug-debuginfo-3.12.69-60.30.1
kernel-compute_debug-debugsource-3.12.69-60.30.1
kernel-compute_debug-devel-3.12.69-60.30.1
kernel-compute_debug-devel-debuginfo-3.12.69-60.30.1
kernel-rt-3.12.69-60.30.1
kernel-rt-base-3.12.69-60.30.1
kernel-rt-base-debuginfo-3.12.69-60.30.1
kernel-rt-debuginfo-3.12.69-60.30.1
kernel-rt-debugsource-3.12.69-60.30.1
kernel-rt-devel-3.12.69-60.30.1
kernel-rt_debug-debuginfo-3.12.69-60.30.1
kernel-rt_debug-debugsource-3.12.69-60.30.1
kernel-rt_debug-devel-3.12.69-60.30.1
kernel-rt_debug-devel-debuginfo-3.12.69-60.30.1
kernel-syms-rt-3.12.69-60.30.1
References:
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8963.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2016-10088.html
https://www.suse.com/security/cve/CVE-2016-7910.html
https://www.suse.com/security/cve/CVE-2016-7911.html
https://www.suse.com/security/cve/CVE-2016-7913.html
https://www.suse.com/security/cve/CVE-2016-7914.html
https://www.suse.com/security/cve/CVE-2016-8399.html
https://www.suse.com/security/cve/CVE-2016-8632.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8645.html
https://www.suse.com/security/cve/CVE-2016-8655.html
https://www.suse.com/security/cve/CVE-2016-9083.html
https://www.suse.com/security/cve/CVE-2016-9084.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://www.suse.com/security/cve/CVE-2016-9576.html
https://www.suse.com/security/cve/CVE-2016-9756.html
https://www.suse.com/security/cve/CVE-2016-9793.html
https://www.suse.com/security/cve/CVE-2016-9794.html
https://www.suse.com/security/cve/CVE-2016-9806.html
https://www.suse.com/security/cve/CVE-2017-2583.html
https://www.suse.com/security/cve/CVE-2017-2584.html
https://www.suse.com/security/cve/CVE-2017-5551.html
https://bugzilla.suse.com/1003813
https://bugzilla.suse.com/1005666
https://bugzilla.suse.com/1007197
https://bugzilla.suse.com/1008557
https://bugzilla.suse.com/1008567
https://bugzilla.suse.com/1008831
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1008876
https://bugzilla.suse.com/1008979
https://bugzilla.suse.com/1009062
https://bugzilla.suse.com/1009969
https://bugzilla.suse.com/1010040
https://bugzilla.suse.com/1010213
https://bugzilla.suse.com/1010294
https://bugzilla.suse.com/1010475
https://bugzilla.suse.com/1010478
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010502
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010612
https://bugzilla.suse.com/1010711
https://bugzilla.suse.com/1010716
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1012060
https://bugzilla.suse.com/1012422
https://bugzilla.suse.com/1012754
https://bugzilla.suse.com/1012917
https://bugzilla.suse.com/1012985
https://bugzilla.suse.com/1013001
https://bugzilla.suse.com/1013038
https://bugzilla.suse.com/1013479
https://bugzilla.suse.com/1013531
https://bugzilla.suse.com/1013533
https://bugzilla.suse.com/1013540
https://bugzilla.suse.com/1013604
https://bugzilla.suse.com/1014410
https://bugzilla.suse.com/1014746
https://bugzilla.suse.com/1016713
https://bugzilla.suse.com/1016725
https://bugzilla.suse.com/1016961
https://bugzilla.suse.com/1017164
https://bugzilla.suse.com/1017170
https://bugzilla.suse.com/1017410
https://bugzilla.suse.com/1017710
https://bugzilla.suse.com/1018100
https://bugzilla.suse.com/1019032
https://bugzilla.suse.com/1019148
https://bugzilla.suse.com/1019260
https://bugzilla.suse.com/1019300
https://bugzilla.suse.com/1019783
https://bugzilla.suse.com/1019851
https://bugzilla.suse.com/1020214
https://bugzilla.suse.com/1020602
https://bugzilla.suse.com/1021258
https://bugzilla.suse.com/856380
https://bugzilla.suse.com/857394
https://bugzilla.suse.com/858727
https://bugzilla.suse.com/921338
https://bugzilla.suse.com/921778
https://bugzilla.suse.com/922052
https://bugzilla.suse.com/922056
https://bugzilla.suse.com/923036
https://bugzilla.suse.com/923037
https://bugzilla.suse.com/924381
https://bugzilla.suse.com/938963
https://bugzilla.suse.com/972993
https://bugzilla.suse.com/980560
https://bugzilla.suse.com/981709
https://bugzilla.suse.com/983087
https://bugzilla.suse.com/983348
https://bugzilla.suse.com/984194
https://bugzilla.suse.com/984419
https://bugzilla.suse.com/985850
https://bugzilla.suse.com/987192
https://bugzilla.suse.com/987576
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/991273
https://bugzilla.suse.com/993739
https://bugzilla.suse.com/997807
https://bugzilla.suse.com/999101
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0400-1: important: Security update for spice
by opensuse-security@opensuse.org 06 Feb '17
by opensuse-security@opensuse.org 06 Feb '17
06 Feb '17
SUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0400-1
Rating: important
References: #1023078 #1023079
Cross-References: CVE-2016-9577 CVE-2016-9578
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This security update for spice fixes the following issues:
CVE-2016-9577: A buffer overflow in the spice server could have
potentially been used by unauthenticated attackers to execute arbitrary
code. (bsc#1023078) CVE-2016-9578: Unauthenticated attackers could have
caused a denial of service via a crafted message. (bsc#1023079)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-198=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-198=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-198=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (x86_64):
libspice-server-devel-0.12.5-7.1
spice-debugsource-0.12.5-7.1
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
libspice-server1-0.12.5-7.1
libspice-server1-debuginfo-0.12.5-7.1
spice-debugsource-0.12.5-7.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libspice-server1-0.12.5-7.1
libspice-server1-debuginfo-0.12.5-7.1
spice-debugsource-0.12.5-7.1
References:
https://www.suse.com/security/cve/CVE-2016-9577.html
https://www.suse.com/security/cve/CVE-2016-9578.html
https://bugzilla.suse.com/1023078
https://bugzilla.suse.com/1023079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0396-1: important: Security update for spice
by opensuse-security@opensuse.org 06 Feb '17
by opensuse-security@opensuse.org 06 Feb '17
06 Feb '17
SUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0396-1
Rating: important
References: #1023078 #1023079
Cross-References: CVE-2016-9577 CVE-2016-9578
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This security update for spice fixes the following issues:
CVE-2016-9577: A buffer overflow in the spice server could have
potentially been used by unauthenticated attackers to execute arbitrary
code. (bsc#1023078) CVE-2016-9578: Unauthenticated attackers could have
caused a denial of service via a crafted message. (bsc#1023079)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-spice-12970=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-spice-12970=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-spice-12970=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
libspice-server-devel-0.12.4-8.1
- SUSE Linux Enterprise Server 11-SP4 (i586 x86_64):
libspice-server1-0.12.4-8.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
spice-debuginfo-0.12.4-8.1
spice-debugsource-0.12.4-8.1
References:
https://www.suse.com/security/cve/CVE-2016-9577.html
https://www.suse.com/security/cve/CVE-2016-9578.html
https://bugzilla.suse.com/1023078
https://bugzilla.suse.com/1023079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0393-1: important: Security update for spice
by opensuse-security@opensuse.org 06 Feb '17
by opensuse-security@opensuse.org 06 Feb '17
06 Feb '17
SUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0393-1
Rating: important
References: #1023078 #1023079
Cross-References: CVE-2016-9577 CVE-2016-9578
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This security update for spice fixes the following issues:
CVE-2016-9577: A buffer overflow in the spice server could have
potentially been used by unauthenticated attackers to execute arbitrary
code. (bsc#1023078) CVE-2016-9578: Unauthenticated attackers could have
caused a denial of service via a crafted message. (bsc#1023079)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-199=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-199=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
libspice-server1-0.12.4-8.12.1
libspice-server1-debuginfo-0.12.4-8.12.1
spice-debugsource-0.12.4-8.12.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
libspice-server1-0.12.4-8.12.1
libspice-server1-debuginfo-0.12.4-8.12.1
spice-debugsource-0.12.4-8.12.1
References:
https://www.suse.com/security/cve/CVE-2016-9577.html
https://www.suse.com/security/cve/CVE-2016-9578.html
https://bugzilla.suse.com/1023078
https://bugzilla.suse.com/1023079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0392-1: important: Security update for spice
by opensuse-security@opensuse.org 06 Feb '17
by opensuse-security@opensuse.org 06 Feb '17
06 Feb '17
SUSE Security Update: Security update for spice
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0392-1
Rating: important
References: #1023078 #1023079
Cross-References: CVE-2016-9577 CVE-2016-9578
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This security update for spice fixes the following issues:
CVE-2016-9577: A buffer overflow in the spice server could have
potentially been used by unauthenticated attackers to execute arbitrary
code. (bsc#1023078) CVE-2016-9578: Unauthenticated attackers could have
caused a denial of service via a crafted message. (bsc#1023079)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-200=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-200=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-200=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (x86_64):
libspice-server-devel-0.12.7-8.1
spice-debugsource-0.12.7-8.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
libspice-server1-0.12.7-8.1
libspice-server1-debuginfo-0.12.7-8.1
spice-debugsource-0.12.7-8.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libspice-server1-0.12.7-8.1
libspice-server1-debuginfo-0.12.7-8.1
spice-debugsource-0.12.7-8.1
References:
https://www.suse.com/security/cve/CVE-2016-9577.html
https://www.suse.com/security/cve/CVE-2016-9578.html
https://bugzilla.suse.com/1023078
https://bugzilla.suse.com/1023079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0386-1: important: Security update for gnutls
by opensuse-security@opensuse.org 04 Feb '17
by opensuse-security@opensuse.org 04 Feb '17
04 Feb '17
openSUSE Security Update: Security update for gnutls
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0386-1
Rating: important
References: #1005879 #1018832 #999646
Cross-References: CVE-2016-7444 CVE-2016-8610 CVE-2017-5335
CVE-2017-5336 CVE-2017-5337
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for gnutls fixes the following security issues:
- GnuTLS could have crashed when processing maliciously crafted OpenPGP
certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335,
CVE-2017-5337, CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
(GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL
alert packets during the handshake (bsc#1005879, CVE-2016-8610)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-207=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-207=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
gnutls-3.2.15-9.1
gnutls-debuginfo-3.2.15-9.1
gnutls-debugsource-3.2.15-9.1
libgnutls-devel-3.2.15-9.1
libgnutls-openssl-devel-3.2.15-9.1
libgnutls-openssl27-3.2.15-9.1
libgnutls-openssl27-debuginfo-3.2.15-9.1
libgnutls28-3.2.15-9.1
libgnutls28-debuginfo-3.2.15-9.1
libgnutlsxx-devel-3.2.15-9.1
libgnutlsxx28-3.2.15-9.1
libgnutlsxx28-debuginfo-3.2.15-9.1
- openSUSE Leap 42.2 (x86_64):
libgnutls-devel-32bit-3.2.15-9.1
libgnutls28-32bit-3.2.15-9.1
libgnutls28-debuginfo-32bit-3.2.15-9.1
- openSUSE Leap 42.1 (i586 x86_64):
gnutls-3.2.15-8.1
gnutls-debuginfo-3.2.15-8.1
gnutls-debugsource-3.2.15-8.1
libgnutls-devel-3.2.15-8.1
libgnutls-openssl-devel-3.2.15-8.1
libgnutls-openssl27-3.2.15-8.1
libgnutls-openssl27-debuginfo-3.2.15-8.1
libgnutls28-3.2.15-8.1
libgnutls28-debuginfo-3.2.15-8.1
libgnutlsxx-devel-3.2.15-8.1
libgnutlsxx28-3.2.15-8.1
libgnutlsxx28-debuginfo-3.2.15-8.1
- openSUSE Leap 42.1 (x86_64):
libgnutls-devel-32bit-3.2.15-8.1
libgnutls28-32bit-3.2.15-8.1
libgnutls28-debuginfo-32bit-3.2.15-8.1
References:
https://www.suse.com/security/cve/CVE-2016-7444.html
https://www.suse.com/security/cve/CVE-2016-8610.html
https://www.suse.com/security/cve/CVE-2017-5335.html
https://www.suse.com/security/cve/CVE-2017-5336.html
https://www.suse.com/security/cve/CVE-2017-5337.html
https://bugzilla.suse.com/1005879
https://bugzilla.suse.com/1018832
https://bugzilla.suse.com/999646
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0382-1: important: Security update for virtualbox
by opensuse-security@opensuse.org 04 Feb '17
by opensuse-security@opensuse.org 04 Feb '17
04 Feb '17
openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0382-1
Rating: important
References: #1020856
Cross-References: CVE-2016-5545 CVE-2017-3290 CVE-2017-3316
CVE-2017-3332
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for virtualbox to version 5.1.14 fixes the following issues:
These security issues were fixed:
- CVE-2016-5545: Vulnerability in the GUI subcomponent of virtualbox
allows unauthenticated attacker unauthorized update, insert or delete
access to some data as well as unauthorized read access to a subset of
VirtualBox accessible data and unauthorized ability to cause a partial
denial of service (bsc#1020856).
- CVE-2017-3290: Vulnerability in the Shared Folder subcomponent of
virtualbox allows high privileged attacker unauthorized creation,
deletion or modification access to critical data and unauthorized
ability to cause a hang or frequently repeatable crash (bsc#1020856).
- CVE-2017-3316: Vulnerability in the GUI subcomponent of virtualbox
allows high privileged attacker with network access via multiple
protocols to compromise Oracle VM VirtualBox (bsc#1020856).
- CVE-2017-3332: Vulnerability in the SVGA Emulation subcomponent of
virtualbox allows low privileged attacker unauthorized creation,
deletion or modification access to critical data and unauthorized
ability to cause a hang or frequently repeatable crash (bsc#1020856).
For other changes please read the changelog.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-203=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (noarch):
virtualbox-guest-desktop-icons-5.1.14-9.2
virtualbox-host-source-5.1.14-9.2
- openSUSE Leap 42.2 (x86_64):
python-virtualbox-5.1.14-9.2
python-virtualbox-debuginfo-5.1.14-9.2
virtualbox-5.1.14-9.2
virtualbox-debuginfo-5.1.14-9.2
virtualbox-debugsource-5.1.14-9.2
virtualbox-devel-5.1.14-9.2
virtualbox-guest-kmp-default-5.1.14_k4.4.36_8-9.2
virtualbox-guest-kmp-default-debuginfo-5.1.14_k4.4.36_8-9.2
virtualbox-guest-tools-5.1.14-9.2
virtualbox-guest-tools-debuginfo-5.1.14-9.2
virtualbox-guest-x11-5.1.14-9.2
virtualbox-guest-x11-debuginfo-5.1.14-9.2
virtualbox-host-kmp-default-5.1.14_k4.4.36_8-9.2
virtualbox-host-kmp-default-debuginfo-5.1.14_k4.4.36_8-9.2
virtualbox-qt-5.1.14-9.2
virtualbox-qt-debuginfo-5.1.14-9.2
virtualbox-websrv-5.1.14-9.2
virtualbox-websrv-debuginfo-5.1.14-9.2
References:
https://www.suse.com/security/cve/CVE-2016-5545.html
https://www.suse.com/security/cve/CVE-2017-3290.html
https://www.suse.com/security/cve/CVE-2017-3316.html
https://www.suse.com/security/cve/CVE-2017-3332.html
https://bugzilla.suse.com/1020856
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0374-1: important: Security update for java-1_8_0-openjdk
by opensuse-security@opensuse.org 03 Feb '17
by opensuse-security@opensuse.org 03 Feb '17
03 Feb '17
openSUSE Security Update: Security update for java-1_8_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0374-1
Rating: important
References: #1020905 #1022053
Cross-References: CVE-2016-2183 CVE-2016-5546 CVE-2016-5547
CVE-2016-5548 CVE-2016-5549 CVE-2016-5552
CVE-2017-3231 CVE-2017-3241 CVE-2017-3252
CVE-2017-3253 CVE-2017-3260 CVE-2017-3261
CVE-2017-3272 CVE-2017-3289
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for java-1_8_0-openjdk fixes the following issues: Oracle
Critical Patch Update of January 2017 (bsc#1020905) Upgrade to version
jdk8u121 (icedtea 3.3.0):
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing performance
- S8167104, CVE-2017-3289: Additional class construction refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvements
- S8168724, CVE-2016-5549: ECDSA signing improvements
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-201=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-201=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
java-1_8_0-openjdk-1.8.0.121-6.4
java-1_8_0-openjdk-accessibility-1.8.0.121-6.4
java-1_8_0-openjdk-debuginfo-1.8.0.121-6.4
java-1_8_0-openjdk-debugsource-1.8.0.121-6.4
java-1_8_0-openjdk-demo-1.8.0.121-6.4
java-1_8_0-openjdk-demo-debuginfo-1.8.0.121-6.4
java-1_8_0-openjdk-devel-1.8.0.121-6.4
java-1_8_0-openjdk-devel-debuginfo-1.8.0.121-6.4
java-1_8_0-openjdk-headless-1.8.0.121-6.4
java-1_8_0-openjdk-headless-debuginfo-1.8.0.121-6.4
java-1_8_0-openjdk-src-1.8.0.121-6.4
- openSUSE Leap 42.2 (noarch):
java-1_8_0-openjdk-javadoc-1.8.0.121-6.4
- openSUSE Leap 42.1 (i586 x86_64):
java-1_8_0-openjdk-1.8.0.121-21.4
java-1_8_0-openjdk-accessibility-1.8.0.121-21.4
java-1_8_0-openjdk-debuginfo-1.8.0.121-21.4
java-1_8_0-openjdk-debugsource-1.8.0.121-21.4
java-1_8_0-openjdk-demo-1.8.0.121-21.4
java-1_8_0-openjdk-demo-debuginfo-1.8.0.121-21.4
java-1_8_0-openjdk-devel-1.8.0.121-21.4
java-1_8_0-openjdk-devel-debuginfo-1.8.0.121-21.4
java-1_8_0-openjdk-headless-1.8.0.121-21.4
java-1_8_0-openjdk-headless-debuginfo-1.8.0.121-21.4
java-1_8_0-openjdk-src-1.8.0.121-21.4
- openSUSE Leap 42.1 (noarch):
java-1_8_0-openjdk-javadoc-1.8.0.121-21.4
References:
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.suse.com/security/cve/CVE-2016-5546.html
https://www.suse.com/security/cve/CVE-2016-5547.html
https://www.suse.com/security/cve/CVE-2016-5548.html
https://www.suse.com/security/cve/CVE-2016-5549.html
https://www.suse.com/security/cve/CVE-2016-5552.html
https://www.suse.com/security/cve/CVE-2017-3231.html
https://www.suse.com/security/cve/CVE-2017-3241.html
https://www.suse.com/security/cve/CVE-2017-3252.html
https://www.suse.com/security/cve/CVE-2017-3253.html
https://www.suse.com/security/cve/CVE-2017-3260.html
https://www.suse.com/security/cve/CVE-2017-3261.html
https://www.suse.com/security/cve/CVE-2017-3272.html
https://www.suse.com/security/cve/CVE-2017-3289.html
https://bugzilla.suse.com/1020905
https://bugzilla.suse.com/1022053
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0358-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 01 Feb '17
by opensuse-security@opensuse.org 01 Feb '17
01 Feb '17
openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0358-1
Rating: important
References: #1017174 #1021814 #1021817 #1021818 #1021819
#1021820 #1021821 #1021822 #1021823 #1021824
#1021826 #1021827 #1021828 #1021830 #1021831
#1021832 #1021833 #1021835 #1021837 #1021839
#1021840 #1021841
Cross-References: CVE-2017-5373 CVE-2017-5374 CVE-2017-5375
CVE-2017-5376 CVE-2017-5377 CVE-2017-5378
CVE-2017-5379 CVE-2017-5380 CVE-2017-5381
CVE-2017-5382 CVE-2017-5383 CVE-2017-5384
CVE-2017-5385 CVE-2017-5386 CVE-2017-5387
CVE-2017-5388 CVE-2017-5389 CVE-2017-5390
CVE-2017-5391 CVE-2017-5392 CVE-2017-5393
CVE-2017-5394 CVE-2017-5395 CVE-2017-5396
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 24 vulnerabilities is now available.
Description:
This update for MozillaFirefox to version 51.0.1 fixes security issues and
bugs.
These security issues were fixed:
* CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and
DEP (bmo#1325200, boo#1021814)
* CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create gradients in
Skia (bmo#1306883, boo#1021826)
* CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
* CVE-2017-5379: Use-after-free in Web Animations (bmo#1309198,boo#1021827)
* CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
* CVE-2017-5390: Insecure communication methods in Developer Tools JSON
viewer (bmo#1297361, boo#1021820)
* CVE-2017-5389: WebExtensions can install additional add-ons via modified
host requests (bmo#1308688, boo#1021828)
* CVE-2017-5396: Use-after-free with Media Decoder (bmo#1329403,
boo#1021821)
* CVE-2017-5381: Certificate Viewer exporting can be used to navigate and
save to arbitrary filesystem locations (bmo#1017616, boo#1021830)
* CVE-2017-5382: Feed preview can expose privileged content errors and
exceptions (bmo#1295322, boo#1021831)
* CVE-2017-5383: Location bar spoofing with unicode characters
(bmo#1323338, bmo#1324716, boo#1021822)
* CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC)
(bmo#1255474, boo#1021832)
* CVE-2017-5385: Data sent in multipart channels ignores referrer-policy
response headers (bmo#1295945, boo#1021833)
* CVE-2017-5386: WebExtensions can use data: protocol to affect other
extensions (bmo#1319070, boo#1021823)
* CVE-2017-5391: Content about: pages can load privileged about: pages
(bmo#1309310, boo#1021835)
* CVE-2017-5393: Remove addons.mozilla.org CDN from whitelist for
mozAddonManager (bmo#1309282, boo#1021837)
* CVE-2017-5387: Disclosure of local file existence through TRACK tag
error messages (bmo#1295023, boo#1021839)
* CVE-2017-5388: WebRTC can be used to generate a large amount of UDP
traffic for DDOS attacks (bmo#1281482, boo#1021840)
* CVE-2017-5374: Memory safety bugs (boo#1021841)
* CVE-2017-5373: Memory safety bugs (boo#1021824)
These non-security issues in MozillaFirefox were fixed:
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not at
default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* Improve recognition of LANGUAGE env variable (boo#1017174)
* Multiprocess incompatibility did not correctly register with some
add-ons (bmo#1333423)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-187=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-187=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
MozillaFirefox-51.0.1-50.2
MozillaFirefox-branding-upstream-51.0.1-50.2
MozillaFirefox-buildsymbols-51.0.1-50.2
MozillaFirefox-debuginfo-51.0.1-50.2
MozillaFirefox-debugsource-51.0.1-50.2
MozillaFirefox-devel-51.0.1-50.2
MozillaFirefox-translations-common-51.0.1-50.2
MozillaFirefox-translations-other-51.0.1-50.2
- openSUSE Leap 42.1 (x86_64):
MozillaFirefox-51.0.1-50.2
MozillaFirefox-branding-upstream-51.0.1-50.2
MozillaFirefox-buildsymbols-51.0.1-50.2
MozillaFirefox-debuginfo-51.0.1-50.2
MozillaFirefox-debugsource-51.0.1-50.2
MozillaFirefox-devel-51.0.1-50.2
MozillaFirefox-translations-common-51.0.1-50.2
MozillaFirefox-translations-other-51.0.1-50.2
References:
https://www.suse.com/security/cve/CVE-2017-5373.html
https://www.suse.com/security/cve/CVE-2017-5374.html
https://www.suse.com/security/cve/CVE-2017-5375.html
https://www.suse.com/security/cve/CVE-2017-5376.html
https://www.suse.com/security/cve/CVE-2017-5377.html
https://www.suse.com/security/cve/CVE-2017-5378.html
https://www.suse.com/security/cve/CVE-2017-5379.html
https://www.suse.com/security/cve/CVE-2017-5380.html
https://www.suse.com/security/cve/CVE-2017-5381.html
https://www.suse.com/security/cve/CVE-2017-5382.html
https://www.suse.com/security/cve/CVE-2017-5383.html
https://www.suse.com/security/cve/CVE-2017-5384.html
https://www.suse.com/security/cve/CVE-2017-5385.html
https://www.suse.com/security/cve/CVE-2017-5386.html
https://www.suse.com/security/cve/CVE-2017-5387.html
https://www.suse.com/security/cve/CVE-2017-5388.html
https://www.suse.com/security/cve/CVE-2017-5389.html
https://www.suse.com/security/cve/CVE-2017-5390.html
https://www.suse.com/security/cve/CVE-2017-5391.html
https://www.suse.com/security/cve/CVE-2017-5392.html
https://www.suse.com/security/cve/CVE-2017-5393.html
https://www.suse.com/security/cve/CVE-2017-5394.html
https://www.suse.com/security/cve/CVE-2017-5395.html
https://www.suse.com/security/cve/CVE-2017-5396.html
https://bugzilla.suse.com/1017174
https://bugzilla.suse.com/1021814
https://bugzilla.suse.com/1021817
https://bugzilla.suse.com/1021818
https://bugzilla.suse.com/1021819
https://bugzilla.suse.com/1021820
https://bugzilla.suse.com/1021821
https://bugzilla.suse.com/1021822
https://bugzilla.suse.com/1021823
https://bugzilla.suse.com/1021824
https://bugzilla.suse.com/1021826
https://bugzilla.suse.com/1021827
https://bugzilla.suse.com/1021828
https://bugzilla.suse.com/1021830
https://bugzilla.suse.com/1021831
https://bugzilla.suse.com/1021832
https://bugzilla.suse.com/1021833
https://bugzilla.suse.com/1021835
https://bugzilla.suse.com/1021837
https://bugzilla.suse.com/1021839
https://bugzilla.suse.com/1021840
https://bugzilla.suse.com/1021841
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:0356-1: important: Security update for seamonkey
by opensuse-security@opensuse.org 01 Feb '17
by opensuse-security@opensuse.org 01 Feb '17
01 Feb '17
openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:0356-1
Rating: important
References: #1017174 #1021636 #984637 #990856
Cross-References: CVE-2016-6354
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for Seamonkey to version 2.46 fixes security issues and bugs.
The following vulnerabilities were fixed:
- Fix all Gecko related security issues between 43.0.1 and 49.0.2
- CVE-2016-6354: buffer overrun in flex (boo#990856)
The following non-security changes are included:
- improve recognition of LANGUAGE env variable (boo#1017174)
- improve TLS compatibility with certain websites (boo#1021636)
- Seamonkey now requires NSPR 4.12 and NSS 3.25
- based on Gecko 49.0.2
- Chatzilla and DOM Inspector were disabled
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-189=1
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2017-189=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
seamonkey-2.46-9.2
seamonkey-debuginfo-2.46-9.2
seamonkey-debugsource-2.46-9.2
seamonkey-translations-common-2.46-9.2
seamonkey-translations-other-2.46-9.2
- openSUSE Leap 42.1 (i586 x86_64):
seamonkey-2.46-9.2
seamonkey-debuginfo-2.46-9.2
seamonkey-debugsource-2.46-9.2
seamonkey-translations-common-2.46-9.2
seamonkey-translations-other-2.46-9.2
References:
https://www.suse.com/security/cve/CVE-2016-6354.html
https://bugzilla.suse.com/1017174
https://bugzilla.suse.com/1021636
https://bugzilla.suse.com/984637
https://bugzilla.suse.com/990856
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:0348-1: important: Security update for gnutls
by opensuse-security@opensuse.org 01 Feb '17
by opensuse-security@opensuse.org 01 Feb '17
01 Feb '17
SUSE Security Update: Security update for gnutls
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:0348-1
Rating: important
References: #1005879 #1018832 #999646
Cross-References: CVE-2016-7444 CVE-2016-8610 CVE-2017-5335
CVE-2017-5336 CVE-2017-5337
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for gnutls fixes the following security issues:
- GnuTLS could have crashed when processing maliciously crafted OpenPGP
certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335,
CVE-2017-5337, CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
(GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL
alert packets during the handshake (bsc#1005879, CVE-2016-8610)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-177=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-177=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-177=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-177=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-177=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-177=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-177=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls-devel-3.2.15-16.1
libgnutls-openssl-devel-3.2.15-16.1
libgnutlsxx-devel-3.2.15-16.1
libgnutlsxx28-3.2.15-16.1
libgnutlsxx28-debuginfo-3.2.15-16.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls-devel-3.2.15-16.1
libgnutls-openssl-devel-3.2.15-16.1
libgnutlsxx-devel-3.2.15-16.1
libgnutlsxx28-3.2.15-16.1
libgnutlsxx28-debuginfo-3.2.15-16.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
gnutls-3.2.15-16.1
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls-openssl27-debuginfo-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-debuginfo-3.2.15-16.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
gnutls-3.2.15-16.1
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls-openssl27-debuginfo-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-debuginfo-3.2.15-16.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
libgnutls28-32bit-3.2.15-16.1
libgnutls28-debuginfo-32bit-3.2.15-16.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
gnutls-3.2.15-16.1
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls-openssl27-debuginfo-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-debuginfo-3.2.15-16.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libgnutls28-32bit-3.2.15-16.1
libgnutls28-debuginfo-32bit-3.2.15-16.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
gnutls-3.2.15-16.1
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
libgnutls28-debuginfo-3.2.15-16.1
libgnutls28-debuginfo-32bit-3.2.15-16.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
gnutls-3.2.15-16.1
gnutls-debuginfo-3.2.15-16.1
gnutls-debugsource-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
libgnutls28-debuginfo-3.2.15-16.1
libgnutls28-debuginfo-32bit-3.2.15-16.1
References:
https://www.suse.com/security/cve/CVE-2016-7444.html
https://www.suse.com/security/cve/CVE-2016-8610.html
https://www.suse.com/security/cve/CVE-2017-5335.html
https://www.suse.com/security/cve/CVE-2017-5336.html
https://www.suse.com/security/cve/CVE-2017-5337.html
https://bugzilla.suse.com/1005879
https://bugzilla.suse.com/1018832
https://bugzilla.suse.com/999646
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0