SUSE Security Update: Security update for kvm
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0870-1
Rating: important
References: #920571 #924018
Cross-References: CVE-2015-1779
Affected Products:
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available. It includes one version update.
Description:
This update for KVM fixes an issue in the virtio-blk driver which could
result in incorrectly setting its WCE configuration. Under some
circumstances, this misconfiguration could cause severe file system
corruption, because cache flushes were not generated as they ought to have
been.
The update also addresses one security vulnerability:
* CVE-2015-1779: Insufficient resource limiting in VNC websockets
decoder. (bsc#924018)
Security Issues:
* CVE-2015-1779
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kvm=10645
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kvm=10645
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 (i586 s390x x86_64) [New Version: 1.4.2]:
kvm-1.4.2-0.22.25.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 1.4.2]:
kvm-1.4.2-0.22.25.1
References:
https://www.suse.com/security/cve/CVE-2015-1779.htmlhttps://bugzilla.suse.com/920571https://bugzilla.suse.com/924018https://download.suse.com/patch/finder/?keywords=5ce7157b96103bdd850e596ab6…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for php5
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0868-1
Rating: important
References: #922022 #922451 #922452 #923946 #924970 #924972
#925109 #928408 #928506 #928511
Cross-References: CVE-2014-9705 CVE-2014-9709 CVE-2015-2301
CVE-2015-2305 CVE-2015-2348 CVE-2015-2783
CVE-2015-2787 CVE-2015-3329 CVE-2015-3330
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________
An update that solves 9 vulnerabilities and has one errata
is now available.
Description:
PHP was updated to fix ten security issues.
The following vulnerabilities were fixed:
* CVE-2014-9709: A specially crafted GIF file could cause a buffer read
overflow in php-gd (bnc#923946)
* CVE-2015-2301: Memory was use after it was freed in PHAR (bnc#922022)
* CVE-2015-2305: heap overflow vulnerability in regcomp.c (bnc#922452)
* CVE-2014-9705: heap buffer overflow in Enchant (bnc#922451)
* CVE-2015-2787: use-after-free vulnerability in the process_nested_data
function (bnc#924972)
* unserialize SoapClient type confusion (bnc#925109)
* CVE-2015-2348: move_uploaded_file truncates a pathNAME upon encountering
a x00 character (bnc#924970)
* CVE-2015-3330: Specially crafted PHAR files could, when executed under
Apache httpd 2.4 (apache2handler), allow arbitrary code execution
(bnc#928506)
* CVE-2015-3329: Specially crafted PHAR data could lead to disclosure of
sensitive information due to a buffer overflow (bnc#928506)
* CVE-2015-2783: Specially crafted PHAR data could lead to disclosure of
sensitive information due to a buffer over-read (bnc#928511)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-192=1
- SUSE Linux Enterprise Module for Web Scripting 12:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2015-192=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
php5-debuginfo-5.5.14-22.1
php5-debugsource-5.5.14-22.1
php5-devel-5.5.14-22.1
- SUSE Linux Enterprise Module for Web Scripting 12 (ppc64le s390x x86_64):
apache2-mod_php5-5.5.14-22.1
apache2-mod_php5-debuginfo-5.5.14-22.1
php5-5.5.14-22.1
php5-bcmath-5.5.14-22.1
php5-bcmath-debuginfo-5.5.14-22.1
php5-bz2-5.5.14-22.1
php5-bz2-debuginfo-5.5.14-22.1
php5-calendar-5.5.14-22.1
php5-calendar-debuginfo-5.5.14-22.1
php5-ctype-5.5.14-22.1
php5-ctype-debuginfo-5.5.14-22.1
php5-curl-5.5.14-22.1
php5-curl-debuginfo-5.5.14-22.1
php5-dba-5.5.14-22.1
php5-dba-debuginfo-5.5.14-22.1
php5-debuginfo-5.5.14-22.1
php5-debugsource-5.5.14-22.1
php5-dom-5.5.14-22.1
php5-dom-debuginfo-5.5.14-22.1
php5-enchant-5.5.14-22.1
php5-enchant-debuginfo-5.5.14-22.1
php5-exif-5.5.14-22.1
php5-exif-debuginfo-5.5.14-22.1
php5-fastcgi-5.5.14-22.1
php5-fastcgi-debuginfo-5.5.14-22.1
php5-fileinfo-5.5.14-22.1
php5-fileinfo-debuginfo-5.5.14-22.1
php5-fpm-5.5.14-22.1
php5-fpm-debuginfo-5.5.14-22.1
php5-ftp-5.5.14-22.1
php5-ftp-debuginfo-5.5.14-22.1
php5-gd-5.5.14-22.1
php5-gd-debuginfo-5.5.14-22.1
php5-gettext-5.5.14-22.1
php5-gettext-debuginfo-5.5.14-22.1
php5-gmp-5.5.14-22.1
php5-gmp-debuginfo-5.5.14-22.1
php5-iconv-5.5.14-22.1
php5-iconv-debuginfo-5.5.14-22.1
php5-intl-5.5.14-22.1
php5-intl-debuginfo-5.5.14-22.1
php5-json-5.5.14-22.1
php5-json-debuginfo-5.5.14-22.1
php5-ldap-5.5.14-22.1
php5-ldap-debuginfo-5.5.14-22.1
php5-mbstring-5.5.14-22.1
php5-mbstring-debuginfo-5.5.14-22.1
php5-mcrypt-5.5.14-22.1
php5-mcrypt-debuginfo-5.5.14-22.1
php5-mysql-5.5.14-22.1
php5-mysql-debuginfo-5.5.14-22.1
php5-odbc-5.5.14-22.1
php5-odbc-debuginfo-5.5.14-22.1
php5-openssl-5.5.14-22.1
php5-openssl-debuginfo-5.5.14-22.1
php5-pcntl-5.5.14-22.1
php5-pcntl-debuginfo-5.5.14-22.1
php5-pdo-5.5.14-22.1
php5-pdo-debuginfo-5.5.14-22.1
php5-pgsql-5.5.14-22.1
php5-pgsql-debuginfo-5.5.14-22.1
php5-pspell-5.5.14-22.1
php5-pspell-debuginfo-5.5.14-22.1
php5-shmop-5.5.14-22.1
php5-shmop-debuginfo-5.5.14-22.1
php5-snmp-5.5.14-22.1
php5-snmp-debuginfo-5.5.14-22.1
php5-soap-5.5.14-22.1
php5-soap-debuginfo-5.5.14-22.1
php5-sockets-5.5.14-22.1
php5-sockets-debuginfo-5.5.14-22.1
php5-sqlite-5.5.14-22.1
php5-sqlite-debuginfo-5.5.14-22.1
php5-suhosin-5.5.14-22.1
php5-suhosin-debuginfo-5.5.14-22.1
php5-sysvmsg-5.5.14-22.1
php5-sysvmsg-debuginfo-5.5.14-22.1
php5-sysvsem-5.5.14-22.1
php5-sysvsem-debuginfo-5.5.14-22.1
php5-sysvshm-5.5.14-22.1
php5-sysvshm-debuginfo-5.5.14-22.1
php5-tokenizer-5.5.14-22.1
php5-tokenizer-debuginfo-5.5.14-22.1
php5-wddx-5.5.14-22.1
php5-wddx-debuginfo-5.5.14-22.1
php5-xmlreader-5.5.14-22.1
php5-xmlreader-debuginfo-5.5.14-22.1
php5-xmlrpc-5.5.14-22.1
php5-xmlrpc-debuginfo-5.5.14-22.1
php5-xmlwriter-5.5.14-22.1
php5-xmlwriter-debuginfo-5.5.14-22.1
php5-xsl-5.5.14-22.1
php5-xsl-debuginfo-5.5.14-22.1
php5-zip-5.5.14-22.1
php5-zip-debuginfo-5.5.14-22.1
php5-zlib-5.5.14-22.1
php5-zlib-debuginfo-5.5.14-22.1
- SUSE Linux Enterprise Module for Web Scripting 12 (noarch):
php5-pear-5.5.14-22.1
References:
https://www.suse.com/security/cve/CVE-2014-9705.htmlhttps://www.suse.com/security/cve/CVE-2014-9709.htmlhttps://www.suse.com/security/cve/CVE-2015-2301.htmlhttps://www.suse.com/security/cve/CVE-2015-2305.htmlhttps://www.suse.com/security/cve/CVE-2015-2348.htmlhttps://www.suse.com/security/cve/CVE-2015-2783.htmlhttps://www.suse.com/security/cve/CVE-2015-2787.htmlhttps://www.suse.com/security/cve/CVE-2015-3329.htmlhttps://www.suse.com/security/cve/CVE-2015-3330.htmlhttps://bugzilla.suse.com/922022https://bugzilla.suse.com/922451https://bugzilla.suse.com/922452https://bugzilla.suse.com/923946https://bugzilla.suse.com/924970https://bugzilla.suse.com/924972https://bugzilla.suse.com/925109https://bugzilla.suse.com/928408https://bugzilla.suse.com/928506https://bugzilla.suse.com/928511
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for DirectFB
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0839-1
Rating: important
References: #878345 #878349
Cross-References: CVE-2014-2977 CVE-2014-2978
Affected Products:
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
DirectFB was updated to fix two security issues.
The following vulnerabilities were fixed:
* CVE-2014-2977: Multiple integer signedness errors could allow remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via the Voodoo interface, which triggers a stack-based
buffer overflow.
* CVE-2014-2978: Remote attackers could cause a denial of service (crash)
and possibly execute arbitrary code via the Voodoo interface, which
triggers an out-of-bounds write.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2015-185=1
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-185=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-185=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-185=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
libdirectfb-1_7-1-32bit-1.7.1-4.1
libdirectfb-1_7-1-debuginfo-32bit-1.7.1-4.1
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
DirectFB-debuginfo-1.7.1-4.1
DirectFB-debugsource-1.7.1-4.1
DirectFB-devel-1.7.1-4.1
lib++dfb-devel-1.7.1-4.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
DirectFB-1.7.1-4.1
DirectFB-debuginfo-1.7.1-4.1
DirectFB-debugsource-1.7.1-4.1
lib++dfb-1_7-1-1.7.1-4.1
lib++dfb-1_7-1-debuginfo-1.7.1-4.1
libdirectfb-1_7-1-1.7.1-4.1
libdirectfb-1_7-1-debuginfo-1.7.1-4.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
DirectFB-1.7.1-4.1
DirectFB-debuginfo-1.7.1-4.1
DirectFB-debugsource-1.7.1-4.1
lib++dfb-1_7-1-1.7.1-4.1
lib++dfb-1_7-1-debuginfo-1.7.1-4.1
libdirectfb-1_7-1-1.7.1-4.1
libdirectfb-1_7-1-32bit-1.7.1-4.1
libdirectfb-1_7-1-debuginfo-1.7.1-4.1
libdirectfb-1_7-1-debuginfo-32bit-1.7.1-4.1
References:
https://www.suse.com/security/cve/CVE-2014-2977.htmlhttps://www.suse.com/security/cve/CVE-2014-2978.htmlhttps://bugzilla.suse.com/878345https://bugzilla.suse.com/878349
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0832-1
Rating: important
References: #920633 #922004
Cross-References: CVE-2015-1421
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update supplies kgraft patches to fix one security vulnerability.
CVE-2015-1421: A use-after-free vulnerability in the sctp_assoc_update
function in net/sctp/associola.c in the Linux kernel allowed remote
attackers to cause a denial of service (slab corruption and panic) or
possibly have unspecified other impact by triggering an INIT collision
that leads to improper handling of shared-key data.
This patch supplies kgraft patches for the first kernel update and the
second kernel update published for SUSE Linux Enterprise Server 12. The
third kernel update contains the patch already.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2015-183=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_32-33-default-2-3.1
kgraft-patch-3_12_32-33-xen-2-3.1
kgraft-patch-3_12_36-38-default-2-3.1
kgraft-patch-3_12_36-38-xen-2-3.1
References:
https://www.suse.com/security/cve/CVE-2015-1421.htmlhttps://bugzilla.suse.com/920633https://bugzilla.suse.com/922004
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0813-1
Rating: important
References: #927558
Cross-References: CVE-2015-1863
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The wireless network encryption and authentication daemon wpa_supplicant
was updated to fix a security issue.
The following vulnerability was fixed:
* CVE-2015-1863: A buffer overflow in handling SSIDs in P2P management
frames allowed attackers in radio range to crash, expose memory content
or potentially execute arbitrary code.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-341=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-341=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
wpa_supplicant-2.2-5.4.1
wpa_supplicant-debuginfo-2.2-5.4.1
wpa_supplicant-debugsource-2.2-5.4.1
wpa_supplicant-gui-2.2-5.4.1
wpa_supplicant-gui-debuginfo-2.2-5.4.1
- openSUSE 13.1 (i586 x86_64):
wpa_supplicant-2.0-3.11.1
wpa_supplicant-debuginfo-2.0-3.11.1
wpa_supplicant-debugsource-2.0-3.11.1
wpa_supplicant-gui-2.0-3.11.1
wpa_supplicant-gui-debuginfo-2.0-3.11.1
References:
https://www.suse.com/security/cve/CVE-2015-1863.htmlhttps://bugzilla.suse.com/927558
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org