SUSE Security Update: Security update for Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0459-1
Rating: important
References: #599263 #827670 #833968 #844513 #846790 #847672
#852488 #852967 #853162 #853166 #853455 #854025
#854445 #855825 #855885 #856848 #857358 #857643
#858604 #859225 #859342 #861093 #862796 #862957
#863178 #863526 #864025 #864058 #864833 #864880
#865342 #865783 #866253 #866428
Cross-References: CVE-2013-4470 CVE-2013-6885 CVE-2013-7263
CVE-2013-7264 CVE-2013-7265 CVE-2014-0069
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 6 vulnerabilities and has 28 fixes is
now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel was
updated to fix various bugs and security issues.
------------------------------------------------------------
------------ WARNING: If you are running KVM with PCI
pass-through on a system with one of the following Intel
chipsets: 5500 (revision 0x13), 5520 (revision 0x13) or
X58 (revisions 0x12, 0x13, 0x22), please make sure to read
the following support document before installing this
update:
https://www.suse.com/support/kb/doc.php?id=7014344
<https://www.suse.com/support/kb/doc.php?id=7014344> . You
will have to update your KVM setup to no longer make use
of PCI pass-through before rebooting to the updated
kernel.
------------------------------------------------------------
------------
The following security bugs were fixed:
*
CVE-2013-4470: The Linux kernel before 3.12, when UDP
Fragmentation Offload (UFO) is enabled, does not properly
initialize certain data structures, which allows local
users to cause a denial of service (memory corruption and
system crash) or possibly gain privileges via a crafted
application that uses the UDP_CORK option in a setsockopt
system call and sends both short and long packets, related
to the ip_ufo_append_data function in net/ipv4/ip_output.c
and the ip6_ufo_append_data function in
net/ipv6/ip6_output.c. (bnc#847672)
*
CVE-2013-6885: The microcode on AMD 16h 00h through
0Fh processors does not properly handle the interaction
between locked instructions and write-combined memory
types, which allows local users to cause a denial of
service (system hang) via a crafted application, aka the
errata 793 issue. (bnc#852967)
*
CVE-2013-7263: The Linux kernel before 3.12.4 updates
certain length values before ensuring that associated data
structures have been initialized, which allows local users
to obtain sensitive information from kernel stack memory
via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system
call, related to net/ipv4/ping.c, net/ipv4/raw.c,
net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
(bnc#857643)
*
CVE-2013-7264: The l2tp_ip_recvmsg function in
net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4
updates a certain length value before ensuring that an
associated data structure has been initialized, which
allows local users to obtain sensitive information from
kernel stack memory via a (1) recvfrom, (2) recvmmsg, or
(3) recvmsg system call. (bnc#857643)
*
CVE-2013-7265: The pn_recvmsg function in
net/phonet/datagram.c in the Linux kernel before 3.12.4
updates a certain length value before ensuring that an
associated data structure has been initialized, which
allows local users to obtain sensitive information from
kernel stack memory via a (1) recvfrom, (2) recvmmsg, or
(3) recvmsg system call. (bnc#857643)
*
CVE-2014-0069: The cifs_iovec_write function in
fs/cifs/file.c in the Linux kernel through 3.13.5 does not
properly handle uncached write operations that copy fewer
than the requested number of bytes, which allows local
users to obtain sensitive information from kernel memory,
cause a denial of service (memory corruption and system
crash), or possibly gain privileges via a writev system
call with a crafted pointer. (bnc#864025)
The following non-security bugs were fixed:
* kabi: protect symbols modified by bnc#864833 fix
(bnc#864833).
* mm: mempolicy: fix mbind_range() && vma_adjust()
interaction (VM Functionality (bnc#866428)).
* mm: merging memory blocks resets mempolicy (VM
Functionality (bnc#866428)).
* mm/page-writeback.c: do not count anon pages as
dirtyable memory (High memory utilisation performance
(bnc#859225)).
* mm: vmscan: Do not force reclaim file pages until it
exceeds anon (High memory utilisation performance
(bnc#859225)).
* mm: vmscan: fix endless loop in kswapd balancing
(High memory utilisation performance (bnc#859225)).
* mm: vmscan: Update rotated and scanned when force
reclaimed (High memory utilisation performance
(bnc#859225)).
* mm: exclude memory less nodes from zone_reclaim
(bnc#863526).
* mm: fix return type for functions nr_free_*_pages
kabi fixup (bnc#864058).
* mm: fix return type for functions nr_free_*_pages
(bnc#864058).
* mm: swap: Use swapfiles in priority order (Use swap
files in priority order (bnc#862957)).
* x86: Save cr2 in NMI in case NMIs take a page fault
(follow-up for
patches.fixes/x86-Add-workaround-to-NMI-iret-woes.patch).
* powerpc: Add VDSO version of getcpu (fate#316816,
bnc#854445).
* vmscan: change type of vm_total_pages to unsigned
long (bnc#864058).
* audit: dynamically allocate audit_names when not
enough space is in the names array (bnc#857358).
* audit: make filetype matching consistent with other
filters (bnc#857358).
* arch/x86/mm/srat: Skip NUMA_NO_NODE while parsing
SLIT (bnc#863178).
* hwmon: (coretemp) Fix truncated name of alarm
attributes.
* privcmd: allow preempting long running user-mode
originating hypercalls (bnc#861093).
* nohz: Check for nohz active instead of nohz enabled
(bnc#846790).
* nohz: Fix another inconsistency between
CONFIG_NO_HZ=n and nohz=off (bnc#846790).
* iommu/vt-d: add quirk for broken interrupt remapping
on 55XX chipsets (bnc#844513)
* balloon: do not crash in HVM-with-PoD guests.
* crypto: s390 - fix des and des3_ede ctr concurrency
issue (bnc#862796, LTC#103744).
* crypto: s390 - fix des and des3_ede cbc concurrency
issue (bnc#862796, LTC#103743).
* kernel: oops due to linkage stack instructions
(bnc#862796, LTC#103860).
* crypto: s390 - fix concurrency issue in aes-ctr mode
(bnc#862796, LTC#103742).
* dump: Fix dump memory detection
(bnc#862796,LTC#103575).
* net: change type of virtio_chan->p9_max_pages
(bnc#864058).
* inet: Avoid potential NULL peer dereference
(bnc#864833).
* inet: Hide route peer accesses behind helpers
(bnc#864833).
* inet: Pass inetpeer root into inet_getpeer*()
interfaces (bnc#864833).
* tcp: syncookies: reduce cookie lifetime to 128
seconds (bnc#833968).
* tcp: syncookies: reduce mss table to four values
(bnc#833968).
* ipv6 routing, NLM_F_* flag support: REPLACE and EXCL
flags support, warn about missing CREATE flag (bnc#865783).
* ipv6: send router reachability probe if route has an
unreachable gateway (bnc#853162).
* sctp: Implement quick failover draft from tsvwg
(bnc#827670).
* ipvs: fix AF assignment in ip_vs_conn_new()
(bnc#856848).
* NFSD/sunrpc: avoid deadlock on TCP connection due to
memory pressure (bnc#853455).
* btrfs: bugfix collection
* fs/nfsd: change type of max_delegations,
nfsd_drc_max_mem and nfsd_drc_mem_used (bnc#864058).
* fs/buffer.c: change type of max_buffer_heads to
unsigned long (bnc#864058).
* ncpfs: fix rmdir returns Device or resource busy
(bnc#864880).
* fs/fscache: Handle removal of unadded object to the
fscache_object_list rb tree (bnc#855885).
* scsi_dh_alua: fixup RTPG retry delay miscalculation
(bnc#854025).
* scsi_dh_alua: Simplify state machine (bnc#854025).
* xhci: Fix resume issues on Renesas chips in Samsung
laptops (bnc#866253).
* bonding: disallow enslaving a bond to itself
(bnc#599263).
* USB: hub: handle -ETIMEDOUT during enumeration
(bnc#855825).
* dm-multipath: Do not stall on invalid ioctls
(bnc#865342).
* scsi_dh_alua: endless STPG retries for a failed LUN
(bnc#865342).
* net/mlx4_en: Fix pages never dma unmapped on rx
(bnc#858604).
* dlm: remove get_comm (bnc#827670).
* dlm: Avoid LVB truncation (bnc#827670).
* dlm: disable nagle for SCTP (bnc#827670).
* dlm: retry failed SCTP sends (bnc#827670).
* dlm: try other IPs when sctp init assoc fails
(bnc#827670).
* dlm: clear correct bit during sctp init failure
handling (bnc#827670).
* dlm: set sctp assoc id during setup (bnc#827670).
* dlm: clear correct init bit during sctp setup
(bnc#827670).
* dlm: fix deadlock between dlm_send and dlm_controld
(bnc#827670).
* dlm: Fix return value from lockspace_busy()
(bnc#827670).
* Avoid occasional hang with NFS (bnc#852488).
* mpt2sas: Fix unsafe using smp_processor_id() in
preemptible (bnc#853166).
* lockd: send correct lock when granting a delayed lock
(bnc#859342).
Security Issues references:
* CVE-2013-4470
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
>
* CVE-2013-6885
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885
>
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263
>
* CVE-2013-7264
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264
>
* CVE-2013-7265
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265
>
* CVE-2014-0069
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069
>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel-9050 slessp3-kernel-9051
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-9045 slessp3-kernel-9046 slessp3-kernel-9047 slessp3-kernel-9050 slessp3-kernel-9051
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-9045 slehasp3-kernel-9046 slehasp3-kernel-9047 slehasp3-kernel-9050 slehasp3-kernel-9051
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel-9050 sledsp3-kernel-9051
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.18.1
kernel-default-base-3.0.101-0.18.1
kernel-default-devel-3.0.101-0.18.1
kernel-source-3.0.101-0.18.1
kernel-syms-3.0.101-0.18.1
kernel-trace-3.0.101-0.18.1
kernel-trace-base-3.0.101-0.18.1
kernel-trace-devel-3.0.101-0.18.1
kernel-xen-devel-3.0.101-0.18.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.18.1
kernel-pae-base-3.0.101-0.18.1
kernel-pae-devel-3.0.101-0.18.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.18.1
kernel-default-base-3.0.101-0.18.1
kernel-default-devel-3.0.101-0.18.1
kernel-source-3.0.101-0.18.1
kernel-syms-3.0.101-0.18.1
kernel-trace-3.0.101-0.18.1
kernel-trace-base-3.0.101-0.18.1
kernel-trace-devel-3.0.101-0.18.1
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]:
kernel-ec2-3.0.101-0.18.1
kernel-ec2-base-3.0.101-0.18.1
kernel-ec2-devel-3.0.101-0.18.1
kernel-xen-3.0.101-0.18.1
kernel-xen-base-3.0.101-0.18.1
kernel-xen-devel-3.0.101-0.18.1
xen-kmp-default-4.2.4_02_3.0.101_0.18-0.7.5
- SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]:
kernel-default-man-3.0.101-0.18.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]:
kernel-ppc64-3.0.101-0.18.1
kernel-ppc64-base-3.0.101-0.18.1
kernel-ppc64-devel-3.0.101-0.18.1
- SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.18.1
kernel-pae-base-3.0.101-0.18.1
kernel-pae-devel-3.0.101-0.18.1
xen-kmp-pae-4.2.4_02_3.0.101_0.18-0.7.5
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):
cluster-network-kmp-default-1.4_3.0.101_0.18-2.27.49
cluster-network-kmp-trace-1.4_3.0.101_0.18-2.27.49
gfs2-kmp-default-2_3.0.101_0.18-0.16.55
gfs2-kmp-trace-2_3.0.101_0.18-0.16.55
ocfs2-kmp-default-1.6_3.0.101_0.18-0.20.49
ocfs2-kmp-trace-1.6_3.0.101_0.18-0.20.49
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64):
cluster-network-kmp-xen-1.4_3.0.101_0.18-2.27.49
gfs2-kmp-xen-2_3.0.101_0.18-0.16.55
ocfs2-kmp-xen-1.6_3.0.101_0.18-0.20.49
- SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64):
cluster-network-kmp-ppc64-1.4_3.0.101_0.18-2.27.49
gfs2-kmp-ppc64-2_3.0.101_0.18-0.16.55
ocfs2-kmp-ppc64-1.6_3.0.101_0.18-0.20.49
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586):
cluster-network-kmp-pae-1.4_3.0.101_0.18-2.27.49
gfs2-kmp-pae-2_3.0.101_0.18-0.16.55
ocfs2-kmp-pae-1.6_3.0.101_0.18-0.20.49
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.18.1
kernel-default-base-3.0.101-0.18.1
kernel-default-devel-3.0.101-0.18.1
kernel-default-extra-3.0.101-0.18.1
kernel-source-3.0.101-0.18.1
kernel-syms-3.0.101-0.18.1
kernel-trace-devel-3.0.101-0.18.1
kernel-xen-3.0.101-0.18.1
kernel-xen-base-3.0.101-0.18.1
kernel-xen-devel-3.0.101-0.18.1
kernel-xen-extra-3.0.101-0.18.1
xen-kmp-default-4.2.4_02_3.0.101_0.18-0.7.5
- SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.18.1
kernel-pae-base-3.0.101-0.18.1
kernel-pae-devel-3.0.101-0.18.1
kernel-pae-extra-3.0.101-0.18.1
xen-kmp-pae-4.2.4_02_3.0.101_0.18-0.7.5
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-0.18.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-3.0.101-0.18.1
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-3.0.101-0.18.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-3.0.101-0.18.1
References:
http://support.novell.com/security/cve/CVE-2013-4470.htmlhttp://support.novell.com/security/cve/CVE-2013-6885.htmlhttp://support.novell.com/security/cve/CVE-2013-7263.htmlhttp://support.novell.com/security/cve/CVE-2013-7264.htmlhttp://support.novell.com/security/cve/CVE-2013-7265.htmlhttp://support.novell.com/security/cve/CVE-2014-0069.htmlhttps://bugzilla.novell.com/599263https://bugzilla.novell.com/827670https://bugzilla.novell.com/833968https://bugzilla.novell.com/844513https://bugzilla.novell.com/846790https://bugzilla.novell.com/847672https://bugzilla.novell.com/852488https://bugzilla.novell.com/852967https://bugzilla.novell.com/853162https://bugzilla.novell.com/853166https://bugzilla.novell.com/853455https://bugzilla.novell.com/854025https://bugzilla.novell.com/854445https://bugzilla.novell.com/855825https://bugzilla.novell.com/855885https://bugzilla.novell.com/856848https://bugzilla.novell.com/857358https://bugzilla.novell.com/857643https://bugzilla.novell.com/858604https://bugzilla.novell.com/859225https://bugzilla.novell.com/859342https://bugzilla.novell.com/861093https://bugzilla.novell.com/862796https://bugzilla.novell.com/862957https://bugzilla.novell.com/863178https://bugzilla.novell.com/863526https://bugzilla.novell.com/864025https://bugzilla.novell.com/864058https://bugzilla.novell.com/864833https://bugzilla.novell.com/864880https://bugzilla.novell.com/865342https://bugzilla.novell.com/865783https://bugzilla.novell.com/866253https://bugzilla.novell.com/866428http://download.suse.com/patch/finder/?keywords=0e36f5897fccb20ea48f7e58e74…http://download.suse.com/patch/finder/?keywords=2bba527d042fa2524206bfe310b…http://download.suse.com/patch/finder/?keywords=486aa2eada02c76d1cac74b15b7…http://download.suse.com/patch/finder/?keywords=50402d33a8c1451b2166727adc1…http://download.suse.com/patch/finder/?keywords=7129036742186e61dc9c40e8d68…http://download.suse.com/patch/finder/?keywords=7186c0ca1717924a99aab4250b1…http://download.suse.com/patch/finder/?keywords=7ab3c7cf9fa1047f360fd862740…http://download.suse.com/patch/finder/?keywords=828b5201cfab14cc87d2e941056…http://download.suse.com/patch/finder/?keywords=aacac5b010d7cf23355177e902b…http://download.suse.com/patch/finder/?keywords=bf8427bba89958884290889fb50…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for crowbar-barclamp-network
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0452-1
Rating: important
References: #864183
Cross-References: CVE-2014-0592
Affected Products:
SUSE Cloud 3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for crowbar-barclamp-network fixes handling of
security groups where new instances with floating IPs
would not be protected by the firewall and could end up
reachable from the outside.
Security Issue reference:
* CVE-2014-0592
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0592
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Cloud 3:
zypper in -t patch sleclo30sp3-crowbar-barclamp-network-8957
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Cloud 3 (noarch):
crowbar-barclamp-network-1.7+git.1392820032.ebfa91f-0.7.2
References:
http://support.novell.com/security/cve/CVE-2014-0592.htmlhttps://bugzilla.novell.com/864183http://download.suse.com/patch/finder/?keywords=7418b173a70ef35b0ea76128c0d…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: lighttpd to 1.4.35
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:0449-1
Rating: important
References: #867350
Cross-References: CVE-2014-2323 CVE-2014-2324
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
lighttpd was updated to version 1.4.35, fixing bugs and
security issues:
CVE-2014-2323: SQL injection vulnerability in
mod_mysql_vhost.c in lighttpd allowed remote attackers to
execute arbitrary SQL commands via the host name, related
to request_check_hostname.
CVE-2014-2323: Multiple directory traversal vulnerabilities
in (1) mod_evhost and (2) mod_simple_vhost in lighttpd
allowed remote attackers to read arbitrary files via a ..
(dot dot) in the host name, related to
request_check_hostname.
More information can be found on the lighttpd advisory
page:
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2
014_01.txt
Other changes:
* [network/ssl] fix build error if TLSEXT is disabled
* [mod_fastcgi] fix use after free (only triggered if
fastcgi debug is active)
* [mod_rrdtool] fix invalid read (string not null
terminated)
* [mod_dirlisting] fix memory leak if pcre fails
* [mod_fastcgi,mod_scgi] fix resource leaks on spawning
backends
* [mod_magnet] fix memory leak
* add comments for switch fall throughs
* remove logical dead code
* [buffer] fix length check in buffer_is_equal_right_len
* fix resource leaks in error cases on config parsing and
other initializations
* add force_assert() to enforce assertions as simple
assert()s are disabled by -DNDEBUG (fixes #2546)
* [mod_cml_lua] fix null pointer dereference
* force assertion: setting FD_CLOEXEC must work (if
available)
* [network] check return value of lseek()
* fix unchecked return values from
stream_open/stat_cache_get_entry
* [mod_webdav] fix logic error in handling file creation
error
* check length of unix domain socket filenames
* fix SQL injection / host name validation (thx Jann Horn)
for all the changes see
/usr/share/doc/packages/lighttpd/NEWS
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-257
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-257
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
lighttpd-1.4.35-2.9.1
lighttpd-debuginfo-1.4.35-2.9.1
lighttpd-debugsource-1.4.35-2.9.1
lighttpd-mod_cml-1.4.35-2.9.1
lighttpd-mod_cml-debuginfo-1.4.35-2.9.1
lighttpd-mod_geoip-1.4.35-2.9.1
lighttpd-mod_geoip-debuginfo-1.4.35-2.9.1
lighttpd-mod_magnet-1.4.35-2.9.1
lighttpd-mod_magnet-debuginfo-1.4.35-2.9.1
lighttpd-mod_mysql_vhost-1.4.35-2.9.1
lighttpd-mod_mysql_vhost-debuginfo-1.4.35-2.9.1
lighttpd-mod_rrdtool-1.4.35-2.9.1
lighttpd-mod_rrdtool-debuginfo-1.4.35-2.9.1
lighttpd-mod_trigger_b4_dl-1.4.35-2.9.1
lighttpd-mod_trigger_b4_dl-debuginfo-1.4.35-2.9.1
lighttpd-mod_webdav-1.4.35-2.9.1
lighttpd-mod_webdav-debuginfo-1.4.35-2.9.1
- openSUSE 12.3 (i586 x86_64):
lighttpd-1.4.35-6.9.1
lighttpd-debuginfo-1.4.35-6.9.1
lighttpd-debugsource-1.4.35-6.9.1
lighttpd-mod_cml-1.4.35-6.9.1
lighttpd-mod_cml-debuginfo-1.4.35-6.9.1
lighttpd-mod_geoip-1.4.35-6.9.1
lighttpd-mod_geoip-debuginfo-1.4.35-6.9.1
lighttpd-mod_magnet-1.4.35-6.9.1
lighttpd-mod_magnet-debuginfo-1.4.35-6.9.1
lighttpd-mod_mysql_vhost-1.4.35-6.9.1
lighttpd-mod_mysql_vhost-debuginfo-1.4.35-6.9.1
lighttpd-mod_rrdtool-1.4.35-6.9.1
lighttpd-mod_rrdtool-debuginfo-1.4.35-6.9.1
lighttpd-mod_trigger_b4_dl-1.4.35-6.9.1
lighttpd-mod_trigger_b4_dl-debuginfo-1.4.35-6.9.1
lighttpd-mod_webdav-1.4.35-6.9.1
lighttpd-mod_webdav-debuginfo-1.4.35-6.9.1
References:
http://support.novell.com/security/cve/CVE-2014-2323.htmlhttp://support.novell.com/security/cve/CVE-2014-2324.htmlhttps://bugzilla.novell.com/867350
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: MozillaFirefox: Update to version 28.0
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:0448-1
Rating: important
References: #865539 #868603
Cross-References: CVE-2014-1493 CVE-2014-1494 CVE-2014-1497
CVE-2014-1498 CVE-2014-1499 CVE-2014-1500
CVE-2014-1502 CVE-2014-1504 CVE-2014-1505
CVE-2014-1508 CVE-2014-1509 CVE-2014-1510
CVE-2014-1511 CVE-2014-1512 CVE-2014-1513
CVE-2014-1514
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
Mozilla Firefox was updated to version 28.0, receiving
enhancements, bug and security fixes. Mozilla NSPR was
updated to 4.10.4 receiving enhancements, bug and security
fixes. Mozilla NSS was updated to 3.15.5 receiving
enhancements, bug and security fixes.
Changes in MozillaFirefox:
- update to Firefox 28.0 (bnc#868603)
* MFSA 2014-15/CVE-2014-1493/CVE-2014-1494 Miscellaneous
memory safety hazards
* MFSA 2014-17/CVE-2014-1497 (bmo#966311) Out of bounds
read during WAV file decoding
* MFSA 2014-18/CVE-2014-1498 (bmo#935618)
crypto.generateCRMFRequest does not validate type of key
* MFSA 2014-19/CVE-2014-1499 (bmo#961512) Spoofing attack
on WebRTC permission prompt
* MFSA 2014-20/CVE-2014-1500 (bmo#956524) onbeforeunload
and Javascript navigation DOS
* MFSA 2014-22/CVE-2014-1502 (bmo#972622) WebGL content
injection from one domain to rendering in another
* MFSA 2014-23/CVE-2014-1504 (bmo#911547) Content
Security Policy for data: documents not preserved by
session restore
* MFSA 2014-26/CVE-2014-1508 (bmo#963198) Information
disclosure through polygon rendering in MathML
* MFSA 2014-27/CVE-2014-1509 (bmo#966021) Memory
corruption in Cairo during PDF font rendering
* MFSA 2014-28/CVE-2014-1505 (bmo#941887) SVG filters
information disclosure through feDisplacementMap
* MFSA 2014-29/CVE-2014-1510/CVE-2014-1511 (bmo#982906,
bmo#982909) Privilege escalation using
WebIDL-implemented APIs
* MFSA 2014-30/CVE-2014-1512 (bmo#982957) Use-after-free
in TypeObject
* MFSA 2014-31/CVE-2014-1513 (bmo#982974) Out-of-bounds
read/write through neutering ArrayBuffer objects
* MFSA 2014-32/CVE-2014-1514 (bmo#983344) Out-of-bounds
write through TypedArrayObject after neutering
- requires NSPR 4.10.3 and NSS 3.15.5
- new build dependency (and recommends):
* libpulse
* JS math correctness issue (bmo#941381)
Changes in mozilla-nspr:
- update to version 4.10.4
* bmo#767759: Add support for new x32 abi
* bmo#844784: Thread data race in PR_EnterMonitor
* bmo#939786: data race
nsprpub/pr/src/pthreads/ptthread.c:137 _pt_root
* bmo#958796: Users of _beginthreadex that set a custom
stack size may not be getting the behavior they want
* bmo#963033: AArch64 support update for NSPR
* bmo#969061: Incorrect end-of-list test when iterating
over a PRCList in prcountr.c and prtrace.c
* bmo#971152: IPv6 detection on linux depends on
availability of /proc/net/if_inet6
- update to version 4.10.3
* bmo#749849: ensure we'll free the thread-specific data
key.
* bmo#941461: don't compile android with unaligned memory
access.
* bmo#932398: Add PR_SyncMemMap, a portable version of
msync/FlushViewOfFile.
* bmo#952621: Fix a thread-unsafe access to lock->owner
in PR_Lock.
* bmo#957458: Fix several bugs in the lock rank checking
code.
* bmo#936320: Use an alternative test for IPv6 support on
Linux to avoid opening a socket.
Changes in mozilla-nss:
- update to 3.15.5
* required for Firefox 28
* export FREEBL_LOWHASH to get the correct default
headers (bnc#865539) New functionality
* Added support for the TLS application layer protocol
negotiation (ALPN) extension. Two SSL socket options,
SSL_ENABLE_NPN and SSL_ENABLE_ALPN, can be used to
control whether NPN or ALPN (or both) should be used
for application layer protocol negotiation.
* Added the TLS padding extension. The extension type
value is 35655, which may change when an official
extension type value is assigned by IANA. NSS
automatically adds the padding extension to ClientHello
when necessary.
* Added a new macro CERT_LIST_TAIL, defined in certt.h,
for getting the tail of a CERTCertList. Notable Changes
* bmo#950129: Improve the OCSP fetching policy when
verifying OCSP responses
* bmo#949060: Validate the iov input argument (an array
of PRIOVec structures) of ssl_WriteV (called via
PR_Writev). Applications should still take care when
converting struct iov to PRIOVec because the iov_len
members of the two structures have different types
(size_t vs. int). size_t is unsigned and may be larger
than int.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-256
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-256
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
MozillaFirefox-28.0-17.1
MozillaFirefox-branding-upstream-28.0-17.1
MozillaFirefox-buildsymbols-28.0-17.1
MozillaFirefox-debuginfo-28.0-17.1
MozillaFirefox-debugsource-28.0-17.1
MozillaFirefox-devel-28.0-17.1
MozillaFirefox-translations-common-28.0-17.1
MozillaFirefox-translations-other-28.0-17.1
libfreebl3-3.15.5-16.1
libfreebl3-debuginfo-3.15.5-16.1
libsoftokn3-3.15.5-16.1
libsoftokn3-debuginfo-3.15.5-16.1
mozilla-nspr-4.10.4-8.1
mozilla-nspr-debuginfo-4.10.4-8.1
mozilla-nspr-debugsource-4.10.4-8.1
mozilla-nspr-devel-4.10.4-8.1
mozilla-nss-3.15.5-16.1
mozilla-nss-certs-3.15.5-16.1
mozilla-nss-certs-debuginfo-3.15.5-16.1
mozilla-nss-debuginfo-3.15.5-16.1
mozilla-nss-debugsource-3.15.5-16.1
mozilla-nss-devel-3.15.5-16.1
mozilla-nss-sysinit-3.15.5-16.1
mozilla-nss-sysinit-debuginfo-3.15.5-16.1
mozilla-nss-tools-3.15.5-16.1
mozilla-nss-tools-debuginfo-3.15.5-16.1
- openSUSE 13.1 (x86_64):
libfreebl3-32bit-3.15.5-16.1
libfreebl3-debuginfo-32bit-3.15.5-16.1
libsoftokn3-32bit-3.15.5-16.1
libsoftokn3-debuginfo-32bit-3.15.5-16.1
mozilla-nspr-32bit-4.10.4-8.1
mozilla-nspr-debuginfo-32bit-4.10.4-8.1
mozilla-nss-32bit-3.15.5-16.1
mozilla-nss-certs-32bit-3.15.5-16.1
mozilla-nss-certs-debuginfo-32bit-3.15.5-16.1
mozilla-nss-debuginfo-32bit-3.15.5-16.1
mozilla-nss-sysinit-32bit-3.15.5-16.1
mozilla-nss-sysinit-debuginfo-32bit-3.15.5-16.1
- openSUSE 12.3 (i586 x86_64):
MozillaFirefox-28.0-1.56.1
MozillaFirefox-branding-upstream-28.0-1.56.1
MozillaFirefox-buildsymbols-28.0-1.56.1
MozillaFirefox-debuginfo-28.0-1.56.1
MozillaFirefox-debugsource-28.0-1.56.1
MozillaFirefox-devel-28.0-1.56.1
MozillaFirefox-translations-common-28.0-1.56.1
MozillaFirefox-translations-other-28.0-1.56.1
libfreebl3-3.15.5-1.32.1
libfreebl3-debuginfo-3.15.5-1.32.1
libsoftokn3-3.15.5-1.32.1
libsoftokn3-debuginfo-3.15.5-1.32.1
mozilla-nspr-4.10.4-1.26.1
mozilla-nspr-debuginfo-4.10.4-1.26.1
mozilla-nspr-debugsource-4.10.4-1.26.1
mozilla-nspr-devel-4.10.4-1.26.1
mozilla-nss-3.15.5-1.32.1
mozilla-nss-certs-3.15.5-1.32.1
mozilla-nss-certs-debuginfo-3.15.5-1.32.1
mozilla-nss-debuginfo-3.15.5-1.32.1
mozilla-nss-debugsource-3.15.5-1.32.1
mozilla-nss-devel-3.15.5-1.32.1
mozilla-nss-sysinit-3.15.5-1.32.1
mozilla-nss-sysinit-debuginfo-3.15.5-1.32.1
mozilla-nss-tools-3.15.5-1.32.1
mozilla-nss-tools-debuginfo-3.15.5-1.32.1
- openSUSE 12.3 (x86_64):
libfreebl3-32bit-3.15.5-1.32.1
libfreebl3-debuginfo-32bit-3.15.5-1.32.1
libsoftokn3-32bit-3.15.5-1.32.1
libsoftokn3-debuginfo-32bit-3.15.5-1.32.1
mozilla-nspr-32bit-4.10.4-1.26.1
mozilla-nspr-debuginfo-32bit-4.10.4-1.26.1
mozilla-nss-32bit-3.15.5-1.32.1
mozilla-nss-certs-32bit-3.15.5-1.32.1
mozilla-nss-certs-debuginfo-32bit-3.15.5-1.32.1
mozilla-nss-debuginfo-32bit-3.15.5-1.32.1
mozilla-nss-sysinit-32bit-3.15.5-1.32.1
mozilla-nss-sysinit-debuginfo-32bit-3.15.5-1.32.1
References:
http://support.novell.com/security/cve/CVE-2014-1493.htmlhttp://support.novell.com/security/cve/CVE-2014-1494.htmlhttp://support.novell.com/security/cve/CVE-2014-1497.htmlhttp://support.novell.com/security/cve/CVE-2014-1498.htmlhttp://support.novell.com/security/cve/CVE-2014-1499.htmlhttp://support.novell.com/security/cve/CVE-2014-1500.htmlhttp://support.novell.com/security/cve/CVE-2014-1502.htmlhttp://support.novell.com/security/cve/CVE-2014-1504.htmlhttp://support.novell.com/security/cve/CVE-2014-1505.htmlhttp://support.novell.com/security/cve/CVE-2014-1508.htmlhttp://support.novell.com/security/cve/CVE-2014-1509.htmlhttp://support.novell.com/security/cve/CVE-2014-1510.htmlhttp://support.novell.com/security/cve/CVE-2014-1511.htmlhttp://support.novell.com/security/cve/CVE-2014-1512.htmlhttp://support.novell.com/security/cve/CVE-2014-1513.htmlhttp://support.novell.com/security/cve/CVE-2014-1514.htmlhttps://bugzilla.novell.com/865539https://bugzilla.novell.com/868603
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for gnutls
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0445-1
Rating: important
References: #835760 #865804 #865993
Cross-References: CVE-2009-5138 CVE-2014-0092
Affected Products:
SUSE Manager 1.7 for SLE 11 SP2
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
The GNUTLS library received a critical security fix and
other updates:
* CVE-2014-0092: The X.509 certificate verification had
incorrect error handling, which could lead to broken
certificates marked as being valid.
* CVE-2009-5138: A verification problem in handling V1
certificates could also lead to V1 certificates incorrectly
being handled.
Additionally, a memory leak in PSK authentication was
fixed. (bnc#835760)
Security Issues references:
* CVE-2014-0092
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
>
* CVE-2009-5138
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5138
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Manager 1.7 for SLE 11 SP2:
zypper in -t patch sleman17sp2-gnutls-9028
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager 1.7 for SLE 11 SP2 (x86_64):
gnutls-2.4.1-24.39.49.1
libgnutls-extra26-2.4.1-24.39.49.1
libgnutls26-2.4.1-24.39.49.1
libgnutls26-32bit-2.4.1-24.39.49.1
References:
http://support.novell.com/security/cve/CVE-2009-5138.htmlhttp://support.novell.com/security/cve/CVE-2014-0092.htmlhttps://bugzilla.novell.com/835760https://bugzilla.novell.com/865804https://bugzilla.novell.com/865993http://download.suse.com/patch/finder/?keywords=3b773e3f5ab3d47e4e64a79e947…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for openssl-certs
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0444-1
Rating: important
References: #860581 #865080
Affected Products:
SUSE Manager 1.7 for SLE 11 SP2
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
The openssl-certs package was updated to match the
certificates contained in the Mozilla NSS 3.15.4 release.
Following changes were done to the list of root CAs:
* Added: ACCVRAIZ1.pem (Spain) (all trusts)
* Added: SG_TRUST_SERVICES_RACINE.pem (Singapore)
(email signing only)
* Added: TWCA_Global_Root_CA.pem (Taiwanese) (all
trusts)
* Removed: Wells_Fargo_Root_CA.pem.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Manager 1.7 for SLE 11 SP2:
zypper in -t patch sleman17sp2-openssl-certs-9027
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager 1.7 for SLE 11 SP2 (noarch):
openssl-certs-1.96-0.4.1
References:
https://bugzilla.novell.com/860581https://bugzilla.novell.com/865080http://download.suse.com/patch/finder/?keywords=0fc080682c8b3aec82c1b6479ab…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: perl-HTTP-Body: update to 1.19 release with security fixes
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:0433-1
Rating: important
References: #844951
Cross-References: CVE-2013-4407
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
perl-HTTP-Body was updated to 1.19 and also received a
security fix for a potential remote code injection when
upload files.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-247
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-247
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (noarch):
perl-HTTP-Body-1.19-2.4.1
- openSUSE 12.3 (noarch):
perl-HTTP-Body-1.19-4.4.1
References:
http://support.novell.com/security/cve/CVE-2013-4407.htmlhttps://bugzilla.novell.com/844951
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org