SUSE Security Update: Security update for kvm
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1455-1
Rating: important
References: #938344
Cross-References: CVE-2015-5154
Affected Products:
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Desktop 11-SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
kvm was updated to fix one security issue.
This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-kvm-12053=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-kvm-12053=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP4 (i586 s390x x86_64):
kvm-1.4.2-32.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
kvm-1.4.2-32.1
References:
https://www.suse.com/security/cve/CVE-2015-5154.htmlhttps://bugzilla.suse.com/938344
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for MozillaFirefox, mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1449-1
Rating: important
References: #935033 #935979 #940806 #940918
Cross-References: CVE-2015-2721 CVE-2015-2722 CVE-2015-2724
CVE-2015-2725 CVE-2015-2726 CVE-2015-2728
CVE-2015-2730 CVE-2015-2733 CVE-2015-2734
CVE-2015-2735 CVE-2015-2736 CVE-2015-2737
CVE-2015-2738 CVE-2015-2739 CVE-2015-2740
CVE-2015-2743 CVE-2015-4000 CVE-2015-4473
CVE-2015-4474 CVE-2015-4475 CVE-2015-4478
CVE-2015-4479 CVE-2015-4484 CVE-2015-4485
CVE-2015-4486 CVE-2015-4487 CVE-2015-4488
CVE-2015-4489 CVE-2015-4491 CVE-2015-4492
CVE-2015-4495
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Server 11-SP1-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
SUSE Linux Enterprise Debuginfo 11-SP1
______________________________________________________________________________
An update that fixes 31 vulnerabilities is now available.
Description:
Mozilla Firefox is being updated to the current Firefox 38ESR branch
(specifically the 38.2.0ESR release).
Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file
stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety
hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable
JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in
JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling
bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx
when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489:
Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with
shared workers
The following vulnerabilities were fixed in ESR31 and are also included
here:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety
hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some
signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using
XMLHttpRequest (bsc#935979).
-
CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2
015-2739/CVE-2015-2740: Vulnerabilities found through code inspection
(bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE
cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange
(bsc#935979).
This update also contains a lot of feature improvements and bug fixes from
31ESR to 38ESR.
Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which
is what Firefox 38ESR uses.
Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-mozilla-201507-12049=1
- SUSE Linux Enterprise Server 11-SP1-LTSS:
zypper in -t patch slessp1-mozilla-201507-12049=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-mozilla-201507-12049=1
- SUSE Linux Enterprise Debuginfo 11-SP1:
zypper in -t patch dbgsp1-mozilla-201507-12049=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
MozillaFirefox-38.2.0esr-10.1
MozillaFirefox-branding-SLED-31.0-0.5.7.11
MozillaFirefox-translations-38.2.0esr-10.1
firefox-libgcc_s1-4.7.2_20130108-0.37.2
firefox-libstdc++6-4.7.2_20130108-0.37.2
libfreebl3-3.19.2.0-0.7.1
mozilla-nss-3.19.2.0-0.7.1
mozilla-nss-devel-3.19.2.0-0.7.1
mozilla-nss-tools-3.19.2.0-0.7.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):
libfreebl3-32bit-3.19.2.0-0.7.1
mozilla-nss-32bit-3.19.2.0-0.7.1
- SUSE Linux Enterprise Server 11-SP1-LTSS (i586 s390x x86_64):
MozillaFirefox-38.2.0esr-10.1
MozillaFirefox-branding-SLED-31.0-0.5.7.11
MozillaFirefox-translations-38.2.0esr-10.1
firefox-libgcc_s1-4.7.2_20130108-0.37.2
firefox-libstdc++6-4.7.2_20130108-0.37.2
libfreebl3-3.19.2.0-0.7.1
mozilla-nss-3.19.2.0-0.7.1
mozilla-nss-devel-3.19.2.0-0.7.1
mozilla-nss-tools-3.19.2.0-0.7.1
- SUSE Linux Enterprise Server 11-SP1-LTSS (s390x x86_64):
libfreebl3-32bit-3.19.2.0-0.7.1
mozilla-nss-32bit-3.19.2.0-0.7.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):
MozillaFirefox-debuginfo-38.2.0esr-10.1
MozillaFirefox-debugsource-38.2.0esr-10.1
mozilla-nss-debuginfo-3.19.2.0-0.7.1
mozilla-nss-debugsource-3.19.2.0-0.7.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):
mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1
- SUSE Linux Enterprise Debuginfo 11-SP1 (i586 s390x x86_64):
MozillaFirefox-debuginfo-38.2.0esr-10.1
MozillaFirefox-debugsource-38.2.0esr-10.1
mozilla-nss-debuginfo-3.19.2.0-0.7.1
mozilla-nss-debugsource-3.19.2.0-0.7.1
- SUSE Linux Enterprise Debuginfo 11-SP1 (s390x x86_64):
mozilla-nss-debuginfo-32bit-3.19.2.0-0.7.1
References:
https://www.suse.com/security/cve/CVE-2015-2721.htmlhttps://www.suse.com/security/cve/CVE-2015-2722.htmlhttps://www.suse.com/security/cve/CVE-2015-2724.htmlhttps://www.suse.com/security/cve/CVE-2015-2725.htmlhttps://www.suse.com/security/cve/CVE-2015-2726.htmlhttps://www.suse.com/security/cve/CVE-2015-2728.htmlhttps://www.suse.com/security/cve/CVE-2015-2730.htmlhttps://www.suse.com/security/cve/CVE-2015-2733.htmlhttps://www.suse.com/security/cve/CVE-2015-2734.htmlhttps://www.suse.com/security/cve/CVE-2015-2735.htmlhttps://www.suse.com/security/cve/CVE-2015-2736.htmlhttps://www.suse.com/security/cve/CVE-2015-2737.htmlhttps://www.suse.com/security/cve/CVE-2015-2738.htmlhttps://www.suse.com/security/cve/CVE-2015-2739.htmlhttps://www.suse.com/security/cve/CVE-2015-2740.htmlhttps://www.suse.com/security/cve/CVE-2015-2743.htmlhttps://www.suse.com/security/cve/CVE-2015-4000.htmlhttps://www.suse.com/security/cve/CVE-2015-4473.htmlhttps://www.suse.com/security/cve/CVE-2015-4474.htmlhttps://www.suse.com/security/cve/CVE-2015-4475.htmlhttps://www.suse.com/security/cve/CVE-2015-4478.htmlhttps://www.suse.com/security/cve/CVE-2015-4479.htmlhttps://www.suse.com/security/cve/CVE-2015-4484.htmlhttps://www.suse.com/security/cve/CVE-2015-4485.htmlhttps://www.suse.com/security/cve/CVE-2015-4486.htmlhttps://www.suse.com/security/cve/CVE-2015-4487.htmlhttps://www.suse.com/security/cve/CVE-2015-4488.htmlhttps://www.suse.com/security/cve/CVE-2015-4489.htmlhttps://www.suse.com/security/cve/CVE-2015-4491.htmlhttps://www.suse.com/security/cve/CVE-2015-4492.htmlhttps://www.suse.com/security/cve/CVE-2015-4495.htmlhttps://bugzilla.suse.com/935033https://bugzilla.suse.com/935979https://bugzilla.suse.com/940806https://bugzilla.suse.com/940918
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for kvm
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1426-1
Rating: important
References: #932770 #938344
Cross-References: CVE-2015-3209 CVE-2015-5154
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
kvm was updated to fix two security issues.
The following vulnerabilities were fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
- CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-kvm-12041=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-kvm-12041=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64):
kvm-0.15.1-0.32.2
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 x86_64):
kvm-debuginfo-0.15.1-0.32.2
kvm-debugsource-0.15.1-0.32.2
References:
https://www.suse.com/security/cve/CVE-2015-3209.htmlhttps://www.suse.com/security/cve/CVE-2015-5154.htmlhttps://bugzilla.suse.com/932770https://bugzilla.suse.com/938344
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for glibc
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1424-1
Rating: important
References: #830257 #851280 #918187 #920338 #927080 #928723
#932059 #933770 #933903 #935286
Cross-References: CVE-2013-2207 CVE-2014-8121 CVE-2015-1781
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Software Development Kit 11-SP3
SUSE Linux Enterprise Server for VMWare 11-SP3
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3
SUSE Linux Enterprise Desktop 11-SP4
SUSE Linux Enterprise Desktop 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves three vulnerabilities and has 7 fixes
is now available.
Description:
This update for glibc provides fixes for security and non-security issues.
These security issues have been fixed:
- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c.
(bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty
files, which allowed local users to change the permission on the files
and obtain access to arbitrary pseudo-terminals by leveraging a FUSE
file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not
properly check if a file is open, which allowed remote attackers to
cause a denial of service (infinite loop) by performing a look-up while
the database is iterated over the database, which triggers the file
pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)
These non-security issues have been fixed:
- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in
applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and
friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-glibc-12042=1
- SUSE Linux Enterprise Software Development Kit 11-SP3:
zypper in -t patch sdksp3-glibc-12042=1
- SUSE Linux Enterprise Server for VMWare 11-SP3:
zypper in -t patch slessp3-glibc-12042=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-glibc-12042=1
- SUSE Linux Enterprise Server 11-SP3:
zypper in -t patch slessp3-glibc-12042=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-glibc-12042=1
- SUSE Linux Enterprise Desktop 11-SP3:
zypper in -t patch sledsp3-glibc-12042=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-glibc-12042=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-glibc-12042=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
glibc-html-2.11.3-17.87.3
glibc-info-2.11.3-17.87.3
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 x86_64):
glibc-html-2.11.3-17.87.3
glibc-info-2.11.3-17.87.3
- SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64):
glibc-2.11.3-17.87.3
glibc-devel-2.11.3-17.87.3
glibc-html-2.11.3-17.87.3
glibc-i18ndata-2.11.3-17.87.3
glibc-info-2.11.3-17.87.3
glibc-locale-2.11.3-17.87.3
glibc-profile-2.11.3-17.87.3
nscd-2.11.3-17.87.3
- SUSE Linux Enterprise Server for VMWare 11-SP3 (x86_64):
glibc-32bit-2.11.3-17.87.3
glibc-devel-32bit-2.11.3-17.87.3
glibc-locale-32bit-2.11.3-17.87.3
glibc-profile-32bit-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP4 (i586 i686 ia64 ppc64 s390x x86_64):
glibc-2.11.3-17.87.3
glibc-devel-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
glibc-html-2.11.3-17.87.3
glibc-i18ndata-2.11.3-17.87.3
glibc-info-2.11.3-17.87.3
glibc-locale-2.11.3-17.87.3
glibc-profile-2.11.3-17.87.3
nscd-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
glibc-32bit-2.11.3-17.87.3
glibc-devel-32bit-2.11.3-17.87.3
glibc-locale-32bit-2.11.3-17.87.3
glibc-profile-32bit-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP4 (ia64):
glibc-locale-x86-2.11.3-17.87.3
glibc-profile-x86-2.11.3-17.87.3
glibc-x86-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP3 (i586 i686 ia64 ppc64 s390x x86_64):
glibc-2.11.3-17.87.3
glibc-devel-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64):
glibc-html-2.11.3-17.87.3
glibc-i18ndata-2.11.3-17.87.3
glibc-info-2.11.3-17.87.3
glibc-locale-2.11.3-17.87.3
glibc-profile-2.11.3-17.87.3
nscd-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP3 (ppc64 s390x x86_64):
glibc-32bit-2.11.3-17.87.3
glibc-devel-32bit-2.11.3-17.87.3
glibc-locale-32bit-2.11.3-17.87.3
glibc-profile-32bit-2.11.3-17.87.3
- SUSE Linux Enterprise Server 11-SP3 (ia64):
glibc-locale-x86-2.11.3-17.87.3
glibc-profile-x86-2.11.3-17.87.3
glibc-x86-2.11.3-17.87.3
- SUSE Linux Enterprise Desktop 11-SP4 (i586 i686 x86_64):
glibc-2.11.3-17.87.3
glibc-devel-2.11.3-17.87.3
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
glibc-i18ndata-2.11.3-17.87.3
glibc-locale-2.11.3-17.87.3
nscd-2.11.3-17.87.3
- SUSE Linux Enterprise Desktop 11-SP4 (x86_64):
glibc-32bit-2.11.3-17.87.3
glibc-devel-32bit-2.11.3-17.87.3
glibc-locale-32bit-2.11.3-17.87.3
- SUSE Linux Enterprise Desktop 11-SP3 (i586 i686 x86_64):
glibc-2.11.3-17.87.3
glibc-devel-2.11.3-17.87.3
- SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64):
glibc-i18ndata-2.11.3-17.87.3
glibc-locale-2.11.3-17.87.3
nscd-2.11.3-17.87.3
- SUSE Linux Enterprise Desktop 11-SP3 (x86_64):
glibc-32bit-2.11.3-17.87.3
glibc-devel-32bit-2.11.3-17.87.3
glibc-locale-32bit-2.11.3-17.87.3
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 i686 ia64 ppc64 s390x x86_64):
glibc-debuginfo-2.11.3-17.87.3
glibc-debugsource-2.11.3-17.87.3
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 i686 ia64 ppc64 s390x x86_64):
glibc-debuginfo-2.11.3-17.87.3
glibc-debugsource-2.11.3-17.87.3
References:
https://www.suse.com/security/cve/CVE-2013-2207.htmlhttps://www.suse.com/security/cve/CVE-2014-8121.htmlhttps://www.suse.com/security/cve/CVE-2015-1781.htmlhttps://bugzilla.suse.com/830257https://bugzilla.suse.com/851280https://bugzilla.suse.com/918187https://bugzilla.suse.com/920338https://bugzilla.suse.com/927080https://bugzilla.suse.com/928723https://bugzilla.suse.com/932059https://bugzilla.suse.com/933770https://bugzilla.suse.com/933903https://bugzilla.suse.com/935286
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1421-1
Rating: important
References: #938344 #939712
Cross-References: CVE-2015-5154 CVE-2015-5165
Affected Products:
SUSE Linux Enterprise Server 11-SP1-LTSS
SUSE Linux Enterprise Debuginfo 11-SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
Xen was updated to fix the following security issues:
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device
model (XSA-140, bsc#939712)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP1-LTSS:
zypper in -t patch slessp1-xen-12039=1
- SUSE Linux Enterprise Debuginfo 11-SP1:
zypper in -t patch dbgsp1-xen-12039=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP1-LTSS (i586 x86_64):
xen-4.0.3_21548_18-29.1
xen-doc-html-4.0.3_21548_18-29.1
xen-doc-pdf-4.0.3_21548_18-29.1
xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-29.1
xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-29.1
xen-libs-4.0.3_21548_18-29.1
xen-tools-4.0.3_21548_18-29.1
xen-tools-domU-4.0.3_21548_18-29.1
- SUSE Linux Enterprise Server 11-SP1-LTSS (i586):
xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-29.1
- SUSE Linux Enterprise Debuginfo 11-SP1 (i586 x86_64):
xen-debuginfo-4.0.3_21548_18-29.1
xen-debugsource-4.0.3_21548_18-29.1
References:
https://www.suse.com/security/cve/CVE-2015-5154.htmlhttps://www.suse.com/security/cve/CVE-2015-5165.htmlhttps://bugzilla.suse.com/938344https://bugzilla.suse.com/939712
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for kvm
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1409-1
Rating: important
References: #938344
Cross-References: CVE-2015-5154
Affected Products:
SUSE Linux Enterprise Server 11-SP1-LTSS
SUSE Linux Enterprise Debuginfo 11-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
kvm was updated to fix one security issue.
This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP1-LTSS:
zypper in -t patch slessp1-kvm-12036=1
- SUSE Linux Enterprise Debuginfo 11-SP1:
zypper in -t patch dbgsp1-kvm-12036=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP1-LTSS (i586 x86_64):
kvm-0.12.5-1.30.2
- SUSE Linux Enterprise Debuginfo 11-SP1 (i586 x86_64):
kvm-debuginfo-0.12.5-1.30.2
kvm-debugsource-0.12.5-1.30.2
References:
https://www.suse.com/security/cve/CVE-2015-5154.htmlhttps://bugzilla.suse.com/938344
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:1390-1
Rating: important
References: #940806 #940918
Cross-References: CVE-2015-4473 CVE-2015-4474 CVE-2015-4475
CVE-2015-4477 CVE-2015-4478 CVE-2015-4479
CVE-2015-4480 CVE-2015-4481 CVE-2015-4482
CVE-2015-4483 CVE-2015-4484 CVE-2015-4485
CVE-2015-4486 CVE-2015-4487 CVE-2015-4488
CVE-2015-4489 CVE-2015-4490 CVE-2015-4491
CVE-2015-4492 CVE-2015-4493 CVE-2015-4495
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes 21 vulnerabilities is now available.
Description:
- update to Firefox 40.0 (bnc#940806)
* Added protection against unwanted software downloads
* Suggested Tiles show sites of interest, based on categories from your
recent browsing history
* Hello allows adding a link to conversations to provide context
on what the conversation will be about
* New style for add-on manager based on the in-content preferences style
* Improved scrolling, graphics, and video playback performance with off
main thread compositing (GNU/Linux only)
* Graphic blocklist mechanism improved: Firefox version ranges can be
specified, limiting the number of devices blocked security fixes:
* MFSA 2015-79/CVE-2015-4473/CVE-2015-4474 Miscellaneous memory safety
hazards
* MFSA 2015-80/CVE-2015-4475 (bmo#1175396) Out-of-bounds read with
malformed MP3 file
* MFSA 2015-81/CVE-2015-4477 (bmo#1179484) Use-after-free in MediaStream
playback
* MFSA 2015-82/CVE-2015-4478 (bmo#1105914) Redefinition of
non-configurable JavaScript object properties
* MFSA 2015-83/CVE-2015-4479/CVE-2015-4480/CVE-2015-4493 Overflow issues
in libstagefright
* MFSA 2015-84/CVE-2015-4481 (bmo1171518) Arbitrary file overwriting
through Mozilla Maintenance Service with hard links (only affected
Windows)
* MFSA 2015-85/CVE-2015-4482 (bmo#1184500) Out-of-bounds write with
Updater and malicious MAR file (does not affect openSUSE RPM packages
which do not ship the updater)
* MFSA 2015-86/CVE-2015-4483 (bmo#1148732) Feed protocol with POST
bypasses mixed content protections
* MFSA 2015-87/CVE-2015-4484 (bmo#1171540) Crash when using shared
memory in JavaScript
* MFSA 2015-88/CVE-2015-4491 (bmo#1184009) Heap overflow in gdk-pixbuf
when scaling bitmap images
* MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 (bmo#1177948, bmo#1178148)
Buffer overflows on Libvpx when decoding WebM video
* MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 Vulnerabilities
found through code inspection
* MFSA 2015-91/CVE-2015-4490 (bmo#1086999) Mozilla Content Security
Policy allows for asterisk wildcards in violation of CSP specification
* MFSA 2015-92/CVE-2015-4492 (bmo#1185820) Use-after-free in
XMLHttpRequest with shared workers
- added mozilla-no-stdcxx-check.patch
- removed obsolete patches
* mozilla-add-glibcxx_use_cxx11_abi.patch
* firefox-multilocale-chrome.patch
- rebased patches
- requires version 40 of the branding package
- removed browser/searchplugins/ location as it's not valid anymore
- includes security update to Firefox 39.0.3 (bnc#940918)
* MFSA 2015-78/CVE-2015-4495 (bmo#1179262, bmo#1178058) Same origin
violation and local file stealing via PDF reader
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-547=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
MozillaFirefox-40.0-82.1
MozillaFirefox-branding-openSUSE-40-2.3.1
MozillaFirefox-branding-upstream-40.0-82.1
MozillaFirefox-buildsymbols-40.0-82.1
MozillaFirefox-debuginfo-40.0-82.1
MozillaFirefox-debugsource-40.0-82.1
MozillaFirefox-devel-40.0-82.1
MozillaFirefox-translations-common-40.0-82.1
MozillaFirefox-translations-other-40.0-82.1
References:
https://www.suse.com/security/cve/CVE-2015-4473.htmlhttps://www.suse.com/security/cve/CVE-2015-4474.htmlhttps://www.suse.com/security/cve/CVE-2015-4475.htmlhttps://www.suse.com/security/cve/CVE-2015-4477.htmlhttps://www.suse.com/security/cve/CVE-2015-4478.htmlhttps://www.suse.com/security/cve/CVE-2015-4479.htmlhttps://www.suse.com/security/cve/CVE-2015-4480.htmlhttps://www.suse.com/security/cve/CVE-2015-4481.htmlhttps://www.suse.com/security/cve/CVE-2015-4482.htmlhttps://www.suse.com/security/cve/CVE-2015-4483.htmlhttps://www.suse.com/security/cve/CVE-2015-4484.htmlhttps://www.suse.com/security/cve/CVE-2015-4485.htmlhttps://www.suse.com/security/cve/CVE-2015-4486.htmlhttps://www.suse.com/security/cve/CVE-2015-4487.htmlhttps://www.suse.com/security/cve/CVE-2015-4488.htmlhttps://www.suse.com/security/cve/CVE-2015-4489.htmlhttps://www.suse.com/security/cve/CVE-2015-4490.htmlhttps://www.suse.com/security/cve/CVE-2015-4491.htmlhttps://www.suse.com/security/cve/CVE-2015-4492.htmlhttps://www.suse.com/security/cve/CVE-2015-4493.htmlhttps://www.suse.com/security/cve/CVE-2015-4495.htmlhttps://bugzilla.suse.com/940806https://bugzilla.suse.com/940918
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:1389-1
Rating: important
References: #940806 #940918
Cross-References: CVE-2015-4473 CVE-2015-4474 CVE-2015-4475
CVE-2015-4477 CVE-2015-4478 CVE-2015-4479
CVE-2015-4480 CVE-2015-4481 CVE-2015-4482
CVE-2015-4483 CVE-2015-4484 CVE-2015-4485
CVE-2015-4486 CVE-2015-4487 CVE-2015-4488
CVE-2015-4489 CVE-2015-4490 CVE-2015-4491
CVE-2015-4492 CVE-2015-4493 CVE-2015-4495
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes 21 vulnerabilities is now available.
Description:
- update to Firefox 40.0 (bnc#940806)
* Added protection against unwanted software downloads
* Suggested Tiles show sites of interest, based on categories from your
recent browsing history
* Hello allows adding a link to conversations to provide context
on what the conversation will be about
* New style for add-on manager based on the in-content preferences style
* Improved scrolling, graphics, and video playback performance with off
main thread compositing (GNU/Linux only)
* Graphic blocklist mechanism improved: Firefox version ranges can be
specified, limiting the number of devices blocked security fixes:
* MFSA 2015-79/CVE-2015-4473/CVE-2015-4474 Miscellaneous memory safety
hazards
* MFSA 2015-80/CVE-2015-4475 (bmo#1175396) Out-of-bounds read with
malformed MP3 file
* MFSA 2015-81/CVE-2015-4477 (bmo#1179484) Use-after-free in MediaStream
playback
* MFSA 2015-82/CVE-2015-4478 (bmo#1105914) Redefinition of
non-configurable JavaScript object properties
* MFSA 2015-83/CVE-2015-4479/CVE-2015-4480/CVE-2015-4493 Overflow issues
in libstagefright
* MFSA 2015-84/CVE-2015-4481 (bmo1171518) Arbitrary file overwriting
through Mozilla Maintenance Service with hard links (only affected
Windows)
* MFSA 2015-85/CVE-2015-4482 (bmo#1184500) Out-of-bounds write with
Updater and malicious MAR file (does not affect openSUSE RPM packages
which do not ship the updater)
* MFSA 2015-86/CVE-2015-4483 (bmo#1148732) Feed protocol with POST
bypasses mixed content protections
* MFSA 2015-87/CVE-2015-4484 (bmo#1171540) Crash when using shared
memory in JavaScript
* MFSA 2015-88/CVE-2015-4491 (bmo#1184009) Heap overflow in gdk-pixbuf
when scaling bitmap images
* MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 (bmo#1177948, bmo#1178148)
Buffer overflows on Libvpx when decoding WebM video
* MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 Vulnerabilities
found through code inspection
* MFSA 2015-91/CVE-2015-4490 (bmo#1086999) Mozilla Content Security
Policy allows for asterisk wildcards in violation of CSP specification
* MFSA 2015-92/CVE-2015-4492 (bmo#1185820) Use-after-free in
XMLHttpRequest with shared workers
- added mozilla-no-stdcxx-check.patch
- removed obsolete patches
* mozilla-add-glibcxx_use_cxx11_abi.patch
* firefox-multilocale-chrome.patch
- rebased patches
- requires version 40 of the branding package
- removed browser/searchplugins/ location as it's not valid anymore
- includes security update to Firefox 39.0.3 (bnc#940918)
* MFSA 2015-78/CVE-2015-4495 (bmo#1179262, bmo#1178058) Same origin
violation and local file stealing via PDF reader
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-548=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
MozillaFirefox-40.0-38.1
MozillaFirefox-branding-openSUSE-40-4.3.1
MozillaFirefox-branding-upstream-40.0-38.1
MozillaFirefox-buildsymbols-40.0-38.1
MozillaFirefox-debuginfo-40.0-38.1
MozillaFirefox-debugsource-40.0-38.1
MozillaFirefox-devel-40.0-38.1
MozillaFirefox-translations-common-40.0-38.1
MozillaFirefox-translations-other-40.0-38.1
References:
https://www.suse.com/security/cve/CVE-2015-4473.htmlhttps://www.suse.com/security/cve/CVE-2015-4474.htmlhttps://www.suse.com/security/cve/CVE-2015-4475.htmlhttps://www.suse.com/security/cve/CVE-2015-4477.htmlhttps://www.suse.com/security/cve/CVE-2015-4478.htmlhttps://www.suse.com/security/cve/CVE-2015-4479.htmlhttps://www.suse.com/security/cve/CVE-2015-4480.htmlhttps://www.suse.com/security/cve/CVE-2015-4481.htmlhttps://www.suse.com/security/cve/CVE-2015-4482.htmlhttps://www.suse.com/security/cve/CVE-2015-4483.htmlhttps://www.suse.com/security/cve/CVE-2015-4484.htmlhttps://www.suse.com/security/cve/CVE-2015-4485.htmlhttps://www.suse.com/security/cve/CVE-2015-4486.htmlhttps://www.suse.com/security/cve/CVE-2015-4487.htmlhttps://www.suse.com/security/cve/CVE-2015-4488.htmlhttps://www.suse.com/security/cve/CVE-2015-4489.htmlhttps://www.suse.com/security/cve/CVE-2015-4490.htmlhttps://www.suse.com/security/cve/CVE-2015-4491.htmlhttps://www.suse.com/security/cve/CVE-2015-4492.htmlhttps://www.suse.com/security/cve/CVE-2015-4493.htmlhttps://www.suse.com/security/cve/CVE-2015-4495.htmlhttps://bugzilla.suse.com/940806https://bugzilla.suse.com/940918
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org