openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
November 2016
- 4 participants
- 45 discussions
[security-announce] SUSE-SU-2016:2942-1: important: Security update for vim
by opensuse-security@opensuse.org 29 Nov '16
by opensuse-security@opensuse.org 29 Nov '16
29 Nov '16
SUSE Security Update: Security update for vim
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2942-1
Rating: important
References: #1010685 #988903
Cross-References: CVE-2016-1248
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for vim fixes the following security issues:
- Fixed CVE-2016-1248 an arbitrary command execution vulnerability
(bsc#1010685)
This update for vim fixes the following issues:
- Fix build with Python 3.5. (bsc#988903)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1721=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1721=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1721=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1721=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1721=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
gvim-7.4.326-7.1
gvim-debuginfo-7.4.326-7.1
vim-7.4.326-7.1
vim-debuginfo-7.4.326-7.1
vim-debugsource-7.4.326-7.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
vim-data-7.4.326-7.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
gvim-7.4.326-7.1
gvim-debuginfo-7.4.326-7.1
vim-7.4.326-7.1
vim-debuginfo-7.4.326-7.1
vim-debugsource-7.4.326-7.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
vim-data-7.4.326-7.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
gvim-7.4.326-7.1
gvim-debuginfo-7.4.326-7.1
vim-7.4.326-7.1
vim-debuginfo-7.4.326-7.1
vim-debugsource-7.4.326-7.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
vim-data-7.4.326-7.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
vim-data-7.4.326-7.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
gvim-7.4.326-7.1
gvim-debuginfo-7.4.326-7.1
vim-7.4.326-7.1
vim-debuginfo-7.4.326-7.1
vim-debugsource-7.4.326-7.1
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
vim-data-7.4.326-7.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
gvim-7.4.326-7.1
gvim-debuginfo-7.4.326-7.1
vim-7.4.326-7.1
vim-debuginfo-7.4.326-7.1
vim-debugsource-7.4.326-7.1
References:
https://www.suse.com/security/cve/CVE-2016-1248.html
https://bugzilla.suse.com/1010685
https://bugzilla.suse.com/988903
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2938-1: important: Security update for vim
by opensuse-security@opensuse.org 29 Nov '16
by opensuse-security@opensuse.org 29 Nov '16
29 Nov '16
SUSE Security Update: Security update for vim
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2938-1
Rating: important
References: #1010685
Cross-References: CVE-2016-1248
Affected Products:
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for vim fixes the following security issues:
- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
(bsc#1010685)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-vim-12862=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-vim-12862=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
gvim-7.2-8.17.1
vim-7.2-8.17.1
vim-base-7.2-8.17.1
vim-data-7.2-8.17.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
vim-debuginfo-7.2-8.17.1
vim-debugsource-7.2-8.17.1
References:
https://www.suse.com/security/cve/CVE-2016-1248.html
https://bugzilla.suse.com/1010685
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2936-1: important: Security update for qemu
by opensuse-security@opensuse.org 29 Nov '16
by opensuse-security@opensuse.org 29 Nov '16
29 Nov '16
SUSE Security Update: Security update for qemu
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2936-1
Rating: important
References: #1001151 #1002116 #1002550 #1002557 #1003878
#1003893 #1003894 #1004702 #1004707 #1006536
#1006538 #1007391 #1007450 #1007454 #1007493
#1007494 #1007495 #998516 #999661
Cross-References: CVE-2016-7161 CVE-2016-7170 CVE-2016-7421
CVE-2016-7908 CVE-2016-7909 CVE-2016-8576
CVE-2016-8577 CVE-2016-8578 CVE-2016-8667
CVE-2016-8669 CVE-2016-8909 CVE-2016-8910
CVE-2016-9101 CVE-2016-9102 CVE-2016-9103
CVE-2016-9104 CVE-2016-9105 CVE-2016-9106
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves 18 vulnerabilities and has one errata
is now available.
Description:
This update for qemu fixes the following issues:
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git
SLE12
- Change package post script udevadm trigger calls to be device specific
(bsc#1002116)
- Address various security/stability issues
* Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161
bsc#1001151)
* Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
* Fix DOS in Vmware pv scsi interface (CVE-2016-7421 bsc#999661)
* Fix DOS in ColdFire Fast Ethernet Controller emulation (CVE-2016-7908
bsc#1002550)
* Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
* Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
* Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
* Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
* Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
* Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
* Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
* Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
* Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
* Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
* Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
* Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
* Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
* Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2016-1719=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2016-1719=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
qemu-2.0.2-48.25.1
qemu-block-curl-2.0.2-48.25.1
qemu-block-curl-debuginfo-2.0.2-48.25.1
qemu-block-rbd-2.0.2-48.25.1
qemu-block-rbd-debuginfo-2.0.2-48.25.1
qemu-debugsource-2.0.2-48.25.1
qemu-guest-agent-2.0.2-48.25.1
qemu-guest-agent-debuginfo-2.0.2-48.25.1
qemu-kvm-2.0.2-48.25.1
qemu-lang-2.0.2-48.25.1
qemu-tools-2.0.2-48.25.1
qemu-tools-debuginfo-2.0.2-48.25.1
qemu-x86-2.0.2-48.25.1
qemu-x86-debuginfo-2.0.2-48.25.1
- SUSE Linux Enterprise Server for SAP 12 (noarch):
qemu-ipxe-1.0.0-48.25.1
qemu-seabios-1.7.4-48.25.1
qemu-sgabios-8-48.25.1
qemu-vgabios-1.7.4-48.25.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
qemu-2.0.2-48.25.1
qemu-block-curl-2.0.2-48.25.1
qemu-block-curl-debuginfo-2.0.2-48.25.1
qemu-debugsource-2.0.2-48.25.1
qemu-guest-agent-2.0.2-48.25.1
qemu-guest-agent-debuginfo-2.0.2-48.25.1
qemu-lang-2.0.2-48.25.1
qemu-tools-2.0.2-48.25.1
qemu-tools-debuginfo-2.0.2-48.25.1
- SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):
qemu-kvm-2.0.2-48.25.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le):
qemu-ppc-2.0.2-48.25.1
qemu-ppc-debuginfo-2.0.2-48.25.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
qemu-block-rbd-2.0.2-48.25.1
qemu-block-rbd-debuginfo-2.0.2-48.25.1
qemu-x86-2.0.2-48.25.1
qemu-x86-debuginfo-2.0.2-48.25.1
- SUSE Linux Enterprise Server 12-LTSS (noarch):
qemu-ipxe-1.0.0-48.25.1
qemu-seabios-1.7.4-48.25.1
qemu-sgabios-8-48.25.1
qemu-vgabios-1.7.4-48.25.1
- SUSE Linux Enterprise Server 12-LTSS (s390x):
qemu-s390-2.0.2-48.25.1
qemu-s390-debuginfo-2.0.2-48.25.1
References:
https://www.suse.com/security/cve/CVE-2016-7161.html
https://www.suse.com/security/cve/CVE-2016-7170.html
https://www.suse.com/security/cve/CVE-2016-7421.html
https://www.suse.com/security/cve/CVE-2016-7908.html
https://www.suse.com/security/cve/CVE-2016-7909.html
https://www.suse.com/security/cve/CVE-2016-8576.html
https://www.suse.com/security/cve/CVE-2016-8577.html
https://www.suse.com/security/cve/CVE-2016-8578.html
https://www.suse.com/security/cve/CVE-2016-8667.html
https://www.suse.com/security/cve/CVE-2016-8669.html
https://www.suse.com/security/cve/CVE-2016-8909.html
https://www.suse.com/security/cve/CVE-2016-8910.html
https://www.suse.com/security/cve/CVE-2016-9101.html
https://www.suse.com/security/cve/CVE-2016-9102.html
https://www.suse.com/security/cve/CVE-2016-9103.html
https://www.suse.com/security/cve/CVE-2016-9104.html
https://www.suse.com/security/cve/CVE-2016-9105.html
https://www.suse.com/security/cve/CVE-2016-9106.html
https://bugzilla.suse.com/1001151
https://bugzilla.suse.com/1002116
https://bugzilla.suse.com/1002550
https://bugzilla.suse.com/1002557
https://bugzilla.suse.com/1003878
https://bugzilla.suse.com/1003893
https://bugzilla.suse.com/1003894
https://bugzilla.suse.com/1004702
https://bugzilla.suse.com/1004707
https://bugzilla.suse.com/1006536
https://bugzilla.suse.com/1006538
https://bugzilla.suse.com/1007391
https://bugzilla.suse.com/1007450
https://bugzilla.suse.com/1007454
https://bugzilla.suse.com/1007493
https://bugzilla.suse.com/1007494
https://bugzilla.suse.com/1007495
https://bugzilla.suse.com/998516
https://bugzilla.suse.com/999661
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2933-1: important: Recommended update for mariadb
by opensuse-security@opensuse.org 28 Nov '16
by opensuse-security@opensuse.org 28 Nov '16
28 Nov '16
SUSE Security Update: Recommended update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2933-1
Rating: important
References: #1001367 #1003800 #1004477 #1005555 #1005558
#1005562 #1005564 #1005566 #1005569 #1005581
#1005582 #1006539 #1008318 #990890
Cross-References: CVE-2016-3492 CVE-2016-5584 CVE-2016-5616
CVE-2016-5624 CVE-2016-5626 CVE-2016-5629
CVE-2016-6663 CVE-2016-7440 CVE-2016-8283
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 9 vulnerabilities and has 5 fixes is
now available.
Description:
This mariadb update to version 10.0.28 fixes the following issues
(bsc#1008318):
Security fixes:
- CVE-2016-8283: Unspecified vulnerability in subcomponent Types
(bsc#1005582)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption
(bsc#1005581)
- CVE-2016-5629: Unspecified vulnerability in subcomponent Federated
(bsc#1005569)
- CVE-2016-5626: Unspecified vulnerability in subcomponent GIS
(bsc#1005566)
- CVE-2016-5624: Unspecified vulnerability in subcomponent DML
(bsc#1005564)
- CVE-2016-5616: Unspecified vulnerability in subcomponent MyISAM
(bsc#1005562)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption
(bsc#1005558)
- CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer
(bsc#1005555)
- CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367)
Bugfixes:
- mysql_install_db can't find data files (bsc#1006539)
- mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800)
- Remove useless mysql(a)default.service (bsc#1004477)
- Replace all occurrences of the string "@sysconfdir@" with "/etc" as it
wasn't expanded properly (bsc#990890)
- Notable changes:
* XtraDB updated to 5.6.33-79.0
* TokuDB updated to 5.6.33-79.0
* Innodb updated to 5.6.33
* Performance Schema updated to 5.6.33
- Release notes and upstream changelog:
* https://kb.askmonty.org/en/mariadb-10028-release-notes
* https://kb.askmonty.org/en/mariadb-10028-changelog
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1717=1
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1717=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1717=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1717=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1717=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1717=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1717=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1717=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1717=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
libmysqlclient_r18-10.0.28-17.2
libmysqlclient_r18-32bit-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
libmysqlclient_r18-10.0.28-17.2
libmysqlclient_r18-32bit-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
libmysqlclient-devel-10.0.28-17.2
libmysqlclient_r18-10.0.28-17.2
libmysqld-devel-10.0.28-17.2
libmysqld18-10.0.28-17.2
libmysqld18-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
libmysqlclient-devel-10.0.28-17.2
libmysqlclient_r18-10.0.28-17.2
libmysqld-devel-10.0.28-17.2
libmysqld18-10.0.28-17.2
libmysqld18-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libmysqlclient18-10.0.28-17.2
libmysqlclient18-debuginfo-10.0.28-17.2
mariadb-10.0.28-17.2
mariadb-client-10.0.28-17.2
mariadb-client-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
mariadb-errormessages-10.0.28-17.2
mariadb-tools-10.0.28-17.2
mariadb-tools-debuginfo-10.0.28-17.2
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
libmysqlclient18-10.0.28-17.2
libmysqlclient18-debuginfo-10.0.28-17.2
mariadb-10.0.28-17.2
mariadb-client-10.0.28-17.2
mariadb-client-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
mariadb-errormessages-10.0.28-17.2
mariadb-tools-10.0.28-17.2
mariadb-tools-debuginfo-10.0.28-17.2
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
libmysqlclient18-32bit-10.0.28-17.2
libmysqlclient18-debuginfo-32bit-10.0.28-17.2
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libmysqlclient18-10.0.28-17.2
libmysqlclient18-debuginfo-10.0.28-17.2
mariadb-10.0.28-17.2
mariadb-client-10.0.28-17.2
mariadb-client-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
mariadb-errormessages-10.0.28-17.2
mariadb-tools-10.0.28-17.2
mariadb-tools-debuginfo-10.0.28-17.2
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libmysqlclient18-32bit-10.0.28-17.2
libmysqlclient18-debuginfo-32bit-10.0.28-17.2
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libmysqlclient18-10.0.28-17.2
libmysqlclient18-32bit-10.0.28-17.2
libmysqlclient18-debuginfo-10.0.28-17.2
libmysqlclient18-debuginfo-32bit-10.0.28-17.2
libmysqlclient_r18-10.0.28-17.2
libmysqlclient_r18-32bit-10.0.28-17.2
mariadb-10.0.28-17.2
mariadb-client-10.0.28-17.2
mariadb-client-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
mariadb-errormessages-10.0.28-17.2
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libmysqlclient18-10.0.28-17.2
libmysqlclient18-32bit-10.0.28-17.2
libmysqlclient18-debuginfo-10.0.28-17.2
libmysqlclient18-debuginfo-32bit-10.0.28-17.2
libmysqlclient_r18-10.0.28-17.2
libmysqlclient_r18-32bit-10.0.28-17.2
mariadb-10.0.28-17.2
mariadb-client-10.0.28-17.2
mariadb-client-debuginfo-10.0.28-17.2
mariadb-debuginfo-10.0.28-17.2
mariadb-debugsource-10.0.28-17.2
mariadb-errormessages-10.0.28-17.2
References:
https://www.suse.com/security/cve/CVE-2016-3492.html
https://www.suse.com/security/cve/CVE-2016-5584.html
https://www.suse.com/security/cve/CVE-2016-5616.html
https://www.suse.com/security/cve/CVE-2016-5624.html
https://www.suse.com/security/cve/CVE-2016-5626.html
https://www.suse.com/security/cve/CVE-2016-5629.html
https://www.suse.com/security/cve/CVE-2016-6663.html
https://www.suse.com/security/cve/CVE-2016-7440.html
https://www.suse.com/security/cve/CVE-2016-8283.html
https://bugzilla.suse.com/1001367
https://bugzilla.suse.com/1003800
https://bugzilla.suse.com/1004477
https://bugzilla.suse.com/1005555
https://bugzilla.suse.com/1005558
https://bugzilla.suse.com/1005562
https://bugzilla.suse.com/1005564
https://bugzilla.suse.com/1005566
https://bugzilla.suse.com/1005569
https://bugzilla.suse.com/1005581
https://bugzilla.suse.com/1005582
https://bugzilla.suse.com/1006539
https://bugzilla.suse.com/1008318
https://bugzilla.suse.com/990890
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2932-1: important: Security update for mariadb
by opensuse-security@opensuse.org 28 Nov '16
by opensuse-security@opensuse.org 28 Nov '16
28 Nov '16
SUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2932-1
Rating: important
References: #1001367 #1003800 #1005555 #1005558 #1005562
#1005564 #1005566 #1005569 #1005581 #1005582
#1006539 #1008318
Cross-References: CVE-2016-3492 CVE-2016-5584 CVE-2016-5616
CVE-2016-5624 CVE-2016-5626 CVE-2016-5629
CVE-2016-6663 CVE-2016-7440 CVE-2016-8283
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves 9 vulnerabilities and has three fixes
is now available.
Description:
This mariadb update to version 10.0.28 fixes the following issues
(bsc#1008318):
Security fixes:
- CVE-2016-8283: Unspecified vulnerability in subcomponent Types
(bsc#1005582)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption
(bsc#1005581)
- CVE-2016-5629: Unspecified vulnerability in subcomponent Federated
(bsc#1005569)
- CVE-2016-5626: Unspecified vulnerability in subcomponent GIS
(bsc#1005566)
- CVE-2016-5624: Unspecified vulnerability in subcomponent DML
(bsc#1005564)
- CVE-2016-5616: Unspecified vulnerability in subcomponent MyISAM
(bsc#1005562)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption
(bsc#1005558)
- CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer
(bsc#1005555)
- CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367)
Bugfixes:
- mysql_install_db can't find data files (bsc#1006539)
- mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800)
- Notable changes:
* XtraDB updated to 5.6.33-79.0
* TokuDB updated to 5.6.33-79.0
* Innodb updated to 5.6.33
* Performance Schema updated to 5.6.33
- Release notes and upstream changelog:
* https://kb.askmonty.org/en/mariadb-10028-release-notes
* https://kb.askmonty.org/en/mariadb-10028-changelog
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2016-1718=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2016-1718=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
libmysqlclient-devel-10.0.28-20.16.2
libmysqlclient18-10.0.28-20.16.2
libmysqlclient18-32bit-10.0.28-20.16.2
libmysqlclient18-debuginfo-10.0.28-20.16.2
libmysqlclient18-debuginfo-32bit-10.0.28-20.16.2
libmysqlclient_r18-10.0.28-20.16.2
libmysqld-devel-10.0.28-20.16.2
libmysqld18-10.0.28-20.16.2
libmysqld18-debuginfo-10.0.28-20.16.2
mariadb-10.0.28-20.16.2
mariadb-client-10.0.28-20.16.2
mariadb-client-debuginfo-10.0.28-20.16.2
mariadb-debuginfo-10.0.28-20.16.2
mariadb-debugsource-10.0.28-20.16.2
mariadb-errormessages-10.0.28-20.16.2
mariadb-tools-10.0.28-20.16.2
mariadb-tools-debuginfo-10.0.28-20.16.2
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
libmysqlclient-devel-10.0.28-20.16.2
libmysqlclient18-10.0.28-20.16.2
libmysqlclient18-debuginfo-10.0.28-20.16.2
libmysqlclient_r18-10.0.28-20.16.2
libmysqld-devel-10.0.28-20.16.2
libmysqld18-10.0.28-20.16.2
libmysqld18-debuginfo-10.0.28-20.16.2
mariadb-10.0.28-20.16.2
mariadb-client-10.0.28-20.16.2
mariadb-client-debuginfo-10.0.28-20.16.2
mariadb-debuginfo-10.0.28-20.16.2
mariadb-debugsource-10.0.28-20.16.2
mariadb-errormessages-10.0.28-20.16.2
mariadb-tools-10.0.28-20.16.2
mariadb-tools-debuginfo-10.0.28-20.16.2
- SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):
libmysqlclient18-32bit-10.0.28-20.16.2
libmysqlclient18-debuginfo-32bit-10.0.28-20.16.2
References:
https://www.suse.com/security/cve/CVE-2016-3492.html
https://www.suse.com/security/cve/CVE-2016-5584.html
https://www.suse.com/security/cve/CVE-2016-5616.html
https://www.suse.com/security/cve/CVE-2016-5624.html
https://www.suse.com/security/cve/CVE-2016-5626.html
https://www.suse.com/security/cve/CVE-2016-5629.html
https://www.suse.com/security/cve/CVE-2016-6663.html
https://www.suse.com/security/cve/CVE-2016-7440.html
https://www.suse.com/security/cve/CVE-2016-8283.html
https://bugzilla.suse.com/1001367
https://bugzilla.suse.com/1003800
https://bugzilla.suse.com/1005555
https://bugzilla.suse.com/1005558
https://bugzilla.suse.com/1005562
https://bugzilla.suse.com/1005564
https://bugzilla.suse.com/1005566
https://bugzilla.suse.com/1005569
https://bugzilla.suse.com/1005581
https://bugzilla.suse.com/1005582
https://bugzilla.suse.com/1006539
https://bugzilla.suse.com/1008318
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2912-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 25 Nov '16
by opensuse-security@opensuse.org 25 Nov '16
25 Nov '16
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2912-1
Rating: important
References: #1000189 #1000287 #1000304 #1000776 #1001419
#1001486 #1002165 #1003079 #1003153 #1003400
#1003568 #1003866 #1003925 #1003964 #1004252
#1004462 #1004517 #1004520 #1005666 #1006691
#1007615 #1007886 #744692 #772786 #789311
#857397 #860441 #865545 #866130 #868923 #874131
#876463 #898675 #904489 #909994 #911687 #915183
#921338 #921784 #922064 #922634 #924381 #924384
#930399 #931454 #934067 #937086 #937888 #940545
#941420 #946309 #955446 #956514 #959463 #961257
#962846 #966864 #967640 #970943 #971975 #971989
#974406 #974620 #975596 #975772 #976195 #977687
#978094 #979451 #979928 #982783 #983619 #984194
#984419 #984779 #984992 #985562 #986445 #987192
#987333 #987542 #987565 #987621 #987805 #988440
#988617 #988715 #989152 #989953 #990245 #991247
#991608 #991665 #992244 #992555 #992591 #992593
#992712 #993392 #993841 #993890 #993891 #994296
#994438 #994520 #994748 #995153 #995968 #996664
#997059 #997299 #997708 #997896 #998689 #998795
#998825 #999577 #999584 #999600 #999779 #999907
#999932
Cross-References: CVE-2015-8956 CVE-2016-5696 CVE-2016-6130
CVE-2016-6327 CVE-2016-6480 CVE-2016-6828
CVE-2016-7042 CVE-2016-7097 CVE-2016-7425
CVE-2016-8658 CVE-2016-8666
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 11 vulnerabilities and has 111 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel used an incorrect buffer size for certain timeout data,
which allowed local users to cause a denial of service (stack memory
corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserved the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bsc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in
net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
obtain sensitive information or cause a denial of service (NULL pointer
dereference) via vectors involving a bind system call on a Bluetooth
RFCOMM socket (bnc#1003925).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
determine the rate of challenge ACK segments, which made it easier for
man-in-the-middle attackers to hijack TCP sessions via a blind in-window
attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by changing a certain
length value, aka a "double fetch" vulnerability (bnc#987542).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel
allowed local users to cause a denial of service (NULL pointer
dereference and system crash) by using an ABORT_TASK command to abort a
device write operation (bnc#994748).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
to cause a denial of service (out-of-bounds access or system crash) by
changing a certain size value, aka a "double fetch" vulnerability
(bnc#991608).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in
the Linux kernel did not properly maintain certain SACK state after a
failed data copy, which allowed local users to cause a denial of service
(tcp_xmit_retransmit_queue use-after-free and system crash) via a
crafted SACK option (bnc#994296).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a
certain length field, which allowed local users to gain privileges
or cause a denial of service (heap-based buffer overflow) via an
ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-8658: Stack-based buffer overflow in the
brcmf_cfg80211_start_ap function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (system crash)
or possibly have unspecified other impact via a long SSID Information
Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
to cause a denial of service (stack consumption and panic) or possibly
have unspecified other impact by triggering use of the GRO path for
packets with tunnel stacking, as demonstrated by interleaved IPv4
headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up
(FATE#315621).
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed
(bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies
(bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null
terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement
(bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked
(bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present
(bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr()
(bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref
(bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent
(bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement
(bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent()
(Automatic NUMA Balancing (fate#315482)).
- arm64: mm: remove broken &= operator from pmd_mknotpresent (Automatic
NUMA Balancing (fate#315482)).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784).
- be2net: fix BE3-R FW download compatibility check (bsc#921784).
- be2net: fix wrong return value in be_check_ufi_compatibility()
(bsc#921784).
- be2net: remove vlan promisc capability from VF's profile descriptors
(bsc#921784).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor
(bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring
(fate#316924).
- bonding: Prevent IPv6 link local address on enslaved devices
(fate#316924).
- bonding: prevent out of bound accesses (fate#316924).
- bonding: set carrier off for devices created through netlink
(bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction
(bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard
(bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector
boundaries (bsc#904489).
- btrfs: do not create or leak aliased root while cleaning up orphans
(bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir
(bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and
ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596,
bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use
(bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock
(bsc#904489).
- btrfs: reorder patches to place local patches back at the end of the
series
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free
space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible
(bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ceph: After a write, we must free the 'request', not the 'response'.
This error crept in during the backport. bsc#995153
- cephfs: ignore error from invalidate_inode_pages2_range() in direct
write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page
(bsc#995153).
- clockevents: export clockevents_unbind_device instead of
clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition
(bsc#966864).
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- Document the process to blacklist upstream commit-ids
- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).
- drivers: hv: vmbus: avoid scheduling in interrupt context in
vmbus_initiate_unload() (bnc#937888).
- drivers: hv: vmbus: avoid unneeded compiler optimizations in
vmbus_wait_for_unload() (bnc#937888).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).
- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages
(bnc#937888).
- drivers: hv: vmbus: do not manipulate with clocksources on crash
(bnc#937888).
- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0
(bnc#937888).
- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).
- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).
- drivers: hv: vmbus: remove code duplication in message handling
(bnc#937888).
- drivers: hv: vmbus: Support handling messages on multiple CPUs
(bnc#937888).
- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs.
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short
jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in
the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545
FATE#316891).
- input: Revert "can: dev: fix deadlock reported after bus-off".
- input: Revert "Input: i8042 - break load dependency between
atkbd/psmouse and i8042".
- input: Revert "Input: i8042 - set up shared ps2_cmd_mutex for AUX ports".
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU (bsc#961257)
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: KABI workaround for ipv6: add complete rcu protection around
np->opt.
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555,
bsc#987805).
- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).
- kabi: clockevents: export clockevents_unbind again.
- kabi: Fix kabi change cause by adding flock_owner to open_context
(bsc#998689).
- kabi: hide harmless change in struct inet_connection_sock (fate#318553).
- kABI: protect backing-dev include in mm/migrate.
- kABI: protect enum usb_device_speed.
- kABI: protect struct mlx5_modify_qp_mbox_in.
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk/printk.c: fix faulty logic in the case of recursive printk
(bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use
(bsc#959463).
- Kvm: vmx: defer load of APIC access page address during reset
(bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op
(bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS
response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- memcg: convert threshold to bytes (bnc#931454).
- memcg: fix thresholds for 32b architectures (bnc#931454).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975
VM performance -- git fixes).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED
(VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- MSI-X: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation
voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding
(bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common()
(bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success
(bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a
nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of
lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is
one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT
(bnc#866130).
- oom: print nodemask in the oom report (bnc#1003866).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for "cycles:p" and "cycles:pp" on SLM
(bsc#997896).
- pm / hibernate: Fix 2G size issue of snapshot image verification
(bsc#1004252).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends
(bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in
qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time
(bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- rpm/config.sh: Set the SP1 release string to 60.<RELEASE> (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays (fate#316924).
- s390: add SMT support (bnc#994438, LTC#144756).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule()
(bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task
(bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT
(bnc#868923).
- sunrpc: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP
(bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK
(bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not
set (fate#318553).
- tcp: fix cwnd limited checking to improve congestion control
(bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation
(bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- Update
patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch
(bsc#967640, bsc#992244).
- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).
- uprobes: Fix the memcg accounting (bnc#931454).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices
(bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors
(bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance
git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: Linux 3.12.63.
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify
(bsc#1003153).
- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch
(bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly
(bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1700=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1700=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1700=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1700=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1700=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1700=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
kernel-default-debuginfo-3.12.67-60.64.18.1
kernel-default-debugsource-3.12.67-60.64.18.1
kernel-default-extra-3.12.67-60.64.18.1
kernel-default-extra-debuginfo-3.12.67-60.64.18.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
kernel-obs-build-3.12.67-60.64.18.1
kernel-obs-build-debugsource-3.12.67-60.64.18.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):
kernel-docs-3.12.67-60.64.18.3
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
kernel-default-3.12.67-60.64.18.1
kernel-default-base-3.12.67-60.64.18.1
kernel-default-base-debuginfo-3.12.67-60.64.18.1
kernel-default-debuginfo-3.12.67-60.64.18.1
kernel-default-debugsource-3.12.67-60.64.18.1
kernel-default-devel-3.12.67-60.64.18.1
kernel-syms-3.12.67-60.64.18.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
kernel-devel-3.12.67-60.64.18.1
kernel-macros-3.12.67-60.64.18.1
kernel-source-3.12.67-60.64.18.1
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
kernel-xen-3.12.67-60.64.18.1
kernel-xen-base-3.12.67-60.64.18.1
kernel-xen-base-debuginfo-3.12.67-60.64.18.1
kernel-xen-debuginfo-3.12.67-60.64.18.1
kernel-xen-debugsource-3.12.67-60.64.18.1
kernel-xen-devel-3.12.67-60.64.18.1
- SUSE Linux Enterprise Server 12-SP1 (s390x):
kernel-default-man-3.12.67-60.64.18.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.67-60.64.18.1
kernel-ec2-debuginfo-3.12.67-60.64.18.1
kernel-ec2-debugsource-3.12.67-60.64.18.1
kernel-ec2-devel-3.12.67-60.64.18.1
kernel-ec2-extra-3.12.67-60.64.18.1
kernel-ec2-extra-debuginfo-3.12.67-60.64.18.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_67-60_64_18-default-1-6.3
kgraft-patch-3_12_67-60_64_18-xen-1-6.3
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
kernel-devel-3.12.67-60.64.18.1
kernel-macros-3.12.67-60.64.18.1
kernel-source-3.12.67-60.64.18.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
kernel-default-3.12.67-60.64.18.1
kernel-default-debuginfo-3.12.67-60.64.18.1
kernel-default-debugsource-3.12.67-60.64.18.1
kernel-default-devel-3.12.67-60.64.18.1
kernel-default-extra-3.12.67-60.64.18.1
kernel-default-extra-debuginfo-3.12.67-60.64.18.1
kernel-syms-3.12.67-60.64.18.1
kernel-xen-3.12.67-60.64.18.1
kernel-xen-debuginfo-3.12.67-60.64.18.1
kernel-xen-debugsource-3.12.67-60.64.18.1
kernel-xen-devel-3.12.67-60.64.18.1
References:
https://www.suse.com/security/cve/CVE-2015-8956.html
https://www.suse.com/security/cve/CVE-2016-5696.html
https://www.suse.com/security/cve/CVE-2016-6130.html
https://www.suse.com/security/cve/CVE-2016-6327.html
https://www.suse.com/security/cve/CVE-2016-6480.html
https://www.suse.com/security/cve/CVE-2016-6828.html
https://www.suse.com/security/cve/CVE-2016-7042.html
https://www.suse.com/security/cve/CVE-2016-7097.html
https://www.suse.com/security/cve/CVE-2016-7425.html
https://www.suse.com/security/cve/CVE-2016-8658.html
https://www.suse.com/security/cve/CVE-2016-8666.html
https://bugzilla.suse.com/1000189
https://bugzilla.suse.com/1000287
https://bugzilla.suse.com/1000304
https://bugzilla.suse.com/1000776
https://bugzilla.suse.com/1001419
https://bugzilla.suse.com/1001486
https://bugzilla.suse.com/1002165
https://bugzilla.suse.com/1003079
https://bugzilla.suse.com/1003153
https://bugzilla.suse.com/1003400
https://bugzilla.suse.com/1003568
https://bugzilla.suse.com/1003866
https://bugzilla.suse.com/1003925
https://bugzilla.suse.com/1003964
https://bugzilla.suse.com/1004252
https://bugzilla.suse.com/1004462
https://bugzilla.suse.com/1004517
https://bugzilla.suse.com/1004520
https://bugzilla.suse.com/1005666
https://bugzilla.suse.com/1006691
https://bugzilla.suse.com/1007615
https://bugzilla.suse.com/1007886
https://bugzilla.suse.com/744692
https://bugzilla.suse.com/772786
https://bugzilla.suse.com/789311
https://bugzilla.suse.com/857397
https://bugzilla.suse.com/860441
https://bugzilla.suse.com/865545
https://bugzilla.suse.com/866130
https://bugzilla.suse.com/868923
https://bugzilla.suse.com/874131
https://bugzilla.suse.com/876463
https://bugzilla.suse.com/898675
https://bugzilla.suse.com/904489
https://bugzilla.suse.com/909994
https://bugzilla.suse.com/911687
https://bugzilla.suse.com/915183
https://bugzilla.suse.com/921338
https://bugzilla.suse.com/921784
https://bugzilla.suse.com/922064
https://bugzilla.suse.com/922634
https://bugzilla.suse.com/924381
https://bugzilla.suse.com/924384
https://bugzilla.suse.com/930399
https://bugzilla.suse.com/931454
https://bugzilla.suse.com/934067
https://bugzilla.suse.com/937086
https://bugzilla.suse.com/937888
https://bugzilla.suse.com/940545
https://bugzilla.suse.com/941420
https://bugzilla.suse.com/946309
https://bugzilla.suse.com/955446
https://bugzilla.suse.com/956514
https://bugzilla.suse.com/959463
https://bugzilla.suse.com/961257
https://bugzilla.suse.com/962846
https://bugzilla.suse.com/966864
https://bugzilla.suse.com/967640
https://bugzilla.suse.com/970943
https://bugzilla.suse.com/971975
https://bugzilla.suse.com/971989
https://bugzilla.suse.com/974406
https://bugzilla.suse.com/974620
https://bugzilla.suse.com/975596
https://bugzilla.suse.com/975772
https://bugzilla.suse.com/976195
https://bugzilla.suse.com/977687
https://bugzilla.suse.com/978094
https://bugzilla.suse.com/979451
https://bugzilla.suse.com/979928
https://bugzilla.suse.com/982783
https://bugzilla.suse.com/983619
https://bugzilla.suse.com/984194
https://bugzilla.suse.com/984419
https://bugzilla.suse.com/984779
https://bugzilla.suse.com/984992
https://bugzilla.suse.com/985562
https://bugzilla.suse.com/986445
https://bugzilla.suse.com/987192
https://bugzilla.suse.com/987333
https://bugzilla.suse.com/987542
https://bugzilla.suse.com/987565
https://bugzilla.suse.com/987621
https://bugzilla.suse.com/987805
https://bugzilla.suse.com/988440
https://bugzilla.suse.com/988617
https://bugzilla.suse.com/988715
https://bugzilla.suse.com/989152
https://bugzilla.suse.com/989953
https://bugzilla.suse.com/990245
https://bugzilla.suse.com/991247
https://bugzilla.suse.com/991608
https://bugzilla.suse.com/991665
https://bugzilla.suse.com/992244
https://bugzilla.suse.com/992555
https://bugzilla.suse.com/992591
https://bugzilla.suse.com/992593
https://bugzilla.suse.com/992712
https://bugzilla.suse.com/993392
https://bugzilla.suse.com/993841
https://bugzilla.suse.com/993890
https://bugzilla.suse.com/993891
https://bugzilla.suse.com/994296
https://bugzilla.suse.com/994438
https://bugzilla.suse.com/994520
https://bugzilla.suse.com/994748
https://bugzilla.suse.com/995153
https://bugzilla.suse.com/995968
https://bugzilla.suse.com/996664
https://bugzilla.suse.com/997059
https://bugzilla.suse.com/997299
https://bugzilla.suse.com/997708
https://bugzilla.suse.com/997896
https://bugzilla.suse.com/998689
https://bugzilla.suse.com/998795
https://bugzilla.suse.com/998825
https://bugzilla.suse.com/999577
https://bugzilla.suse.com/999584
https://bugzilla.suse.com/999600
https://bugzilla.suse.com/999779
https://bugzilla.suse.com/999907
https://bugzilla.suse.com/999932
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2902-1: important: Security update for kvm
by opensuse-security@opensuse.org 24 Nov '16
by opensuse-security@opensuse.org 24 Nov '16
24 Nov '16
SUSE Security Update: Security update for kvm
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2902-1
Rating: important
References: #1001151 #1002550 #1002557 #1003878 #1003893
#1003894 #1004702 #1004707 #1006536 #1006538
#1007391 #1007450 #1007454 #1007493 #1007494
#1007495 #998516
Cross-References: CVE-2016-7161 CVE-2016-7170 CVE-2016-7908
CVE-2016-7909 CVE-2016-8576 CVE-2016-8577
CVE-2016-8578 CVE-2016-8667 CVE-2016-8669
CVE-2016-8909 CVE-2016-8910 CVE-2016-9101
CVE-2016-9102 CVE-2016-9103 CVE-2016-9104
CVE-2016-9105 CVE-2016-9106
Affected Products:
SUSE Linux Enterprise Server 11-SP4
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
This update for kvm fixes the following issues:
- Address various security/stability issues
* Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161
bsc#1001151)
* Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
* Fix DOS in ColdFire Fast Ethernet Controller emulation (CVE-2016-7908
bsc#1002550)
* Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
* Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
* Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
* Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
* Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
* Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
* Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
* Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
* Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
* Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
* Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
* Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
* Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
* Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git
SLE11-SP4
- Remove semi-contradictory and now determined erroneous statement in
kvm-supported.txt regarding not running ntp in kvm guest when kvm-clock
is used. It is now recommended to use ntp in guest in this case.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-kvm-12855=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP4 (i586 s390x x86_64):
kvm-1.4.2-50.1
References:
https://www.suse.com/security/cve/CVE-2016-7161.html
https://www.suse.com/security/cve/CVE-2016-7170.html
https://www.suse.com/security/cve/CVE-2016-7908.html
https://www.suse.com/security/cve/CVE-2016-7909.html
https://www.suse.com/security/cve/CVE-2016-8576.html
https://www.suse.com/security/cve/CVE-2016-8577.html
https://www.suse.com/security/cve/CVE-2016-8578.html
https://www.suse.com/security/cve/CVE-2016-8667.html
https://www.suse.com/security/cve/CVE-2016-8669.html
https://www.suse.com/security/cve/CVE-2016-8909.html
https://www.suse.com/security/cve/CVE-2016-8910.html
https://www.suse.com/security/cve/CVE-2016-9101.html
https://www.suse.com/security/cve/CVE-2016-9102.html
https://www.suse.com/security/cve/CVE-2016-9103.html
https://www.suse.com/security/cve/CVE-2016-9104.html
https://www.suse.com/security/cve/CVE-2016-9105.html
https://www.suse.com/security/cve/CVE-2016-9106.html
https://bugzilla.suse.com/1001151
https://bugzilla.suse.com/1002550
https://bugzilla.suse.com/1002557
https://bugzilla.suse.com/1003878
https://bugzilla.suse.com/1003893
https://bugzilla.suse.com/1003894
https://bugzilla.suse.com/1004702
https://bugzilla.suse.com/1004707
https://bugzilla.suse.com/1006536
https://bugzilla.suse.com/1006538
https://bugzilla.suse.com/1007391
https://bugzilla.suse.com/1007450
https://bugzilla.suse.com/1007454
https://bugzilla.suse.com/1007493
https://bugzilla.suse.com/1007494
https://bugzilla.suse.com/1007495
https://bugzilla.suse.com/998516
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2887-1: important: Security update for java-1_8_0-openjdk
by opensuse-security@opensuse.org 23 Nov '16
by opensuse-security@opensuse.org 23 Nov '16
23 Nov '16
SUSE Security Update: Security update for java-1_8_0-openjdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2887-1
Rating: important
References: #1005522 #1005523 #1005524 #1005525 #1005526
#1005527 #1005528 #988651
Cross-References: CVE-2016-5542 CVE-2016-5554 CVE-2016-5556
CVE-2016-5568 CVE-2016-5573 CVE-2016-5582
CVE-2016-5597
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves 7 vulnerabilities and has one errata
is now available.
Description:
OpenJDK Java was updated to jdk8u111 (icedtea 3.2.0) to fix the following
issues:
* Security fixes
+ S8146490: Direct indirect CRL checks
+ S8151921: Improved page resolution
+ S8155968: Update command line options
+ S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
+ S8156794: Extend data sharing
+ S8157176: Improved classfile parsing
+ S8157739, CVE-2016-5554: Classloader Consistency Checking
(bsc#1005523)
+ S8157749: Improve handling of DNS error replies
+ S8157753: Audio replay enhancement
+ S8157759: LCMS Transform Sampling Enhancement
+ S8157764: Better handling of interpolation plugins
+ S8158302: Handle contextual glyph substitutions
+ S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
+ S8159495: Fix index offsets
+ S8159503: Amend Annotation Actions
+ S8159511: Stack map validation
+ S8159515: Improve indy validation
+ S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
+ S8160090: Better signature handling in pack200
+ S8160094: Improve pack200 layout
+ S8160098: Clean up color profiles
+ S8160591, CVE-2016-5582: Improve internal array handling
(bsc#1005527)
+ S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
+ PR3206, RH1367357: lcms2: Out-of-bounds read in Type_MLU_Read()
+ CVE-2016-5556 (bsc#1005524)
* New features
+ PR1370: Provide option to build without debugging
+ PR1375: Provide option to strip and link debugging info after build
+ PR1537: Handle alternative Kerberos credential cache locations
+ PR1978: Allow use of system PCSC
+ PR2445: Support system libsctp
+ PR3182: Support building without pre-compiled headers
+ PR3183: Support Fedora/RHEL system crypto policy
+ PR3221: Use pkgconfig to detect Kerberos CFLAGS and libraries
* Import of OpenJDK 8 u102 build 14
+ S4515292: ReferenceType.isStatic() returns true for arrays
+ S4858370: JDWP: Memory Leak: GlobalRefs never deleted when
processing invokeMethod command
+ S6976636: JVM/TI test ex03t001 fails assertion
+ S7185591: jcmd-big-script.sh ERROR: could not find app's Java pid.
+ S8017462: G1: guarantee fails with UseDynamicNumberOfGCThreads
+ S8034168: ThreadMXBean/Locks.java failed, blocked on wrong
object
+ S8036006: [TESTBUG] sun/tools/native2ascii/NativeErrors.java fails:
Process exit code was 0, but error was expected.
+ S8041781: Need new regression tests for PBE keys
+ S8041787: Need new regressions tests for buffer handling for PBE
algorithms
+ S8043836: Need new tests for AES cipher
+ S8044199: Tests for RSA keys and key specifications
+ S8044772: TempDirTest.java still times out with -Xcomp
+ S8046339: sun.rmi.transport.DGCAckHandler leaks memory
+ S8047031: Add SocketPermission tests for legacy socket types
+ S8048052: Permission tests for setFactory
+ S8048138: Tests for JAAS callbacks
+ S8048147: Privilege tests with JAAS Subject.doAs
+ S8048356: SecureRandom default provider tests
+ S8048357: PKCS basic tests
+ S8048360: Test signed jar files
+ S8048362: Tests for doPrivileged with accomplice
+ S8048596: Tests for AEAD ciphers
+ S8048599: Tests for key wrap and unwrap operations
+ S8048603: Additional tests for MAC algorithms
+ S8048604: Tests for strong crypto ciphers
+ S8048607: Test key generation of DES and DESEDE
+ S8048610: Implement regression test for bug fix of 4686632 in JCE
+ S8048617: Tests for PKCS12 read operations
+ S8048618: Tests for PKCS12 write operations.
+ S8048619: Implement tests for converting PKCS12 keystores
+ S8048624: Tests for SealedObject
+ S8048819: Implement reliability test for DH algorithm
+ S8048820: Implement tests for SecretKeyFactory
+ S8048830: Implement tests for new functionality provided in JEP 166
+ S8049237: Need new tests for X509V3 certificates
+ S8049321: Support SHA256WithDSA in JSSE
+ S8049429: Tests for java client server communications with various
TLS/SSL combinations.
+ S8049432: New tests for TLS property jdk.tls.client.protocols
+ S8049814: Additional SASL client-server tests
+ S8050281: New permission tests for JEP 140
+ S8050370: Need new regressions tests for messageDigest with
DigestIOStream
+ S8050371: More MessageDigest tests
+ S8050374: More Signature tests
+ S8050427: LoginContext tests to cover JDK-4703361
+ S8050460: JAAS login/logout tests with LoginContext
+ S8050461: Tests for syntax checking of JAAS configuration file
+ S8054278: Refactor jps utility tests
+ S8055530: assert(_exits.control()->is_top() ||
!_gvn.type(ret_phi)->empty()) failed: return value must be well
defined
+ S8055844: [TESTBUG]
test/runtime/NMT/VirtualAllocCommitUncommitRecommit.java fails on
Solaris Sparc due to incorrect page size being used
+ S8059677: Thread.getName() instantiates Strings
+ S8061464: A typo in CipherTestUtils test
+ S8062536: [TESTBUG] Conflicting GC combinations in jdk tests
+ S8065076: java/net/SocketPermission/SocketPermissionTest.java fails
intermittently
+ S8065078: NetworkInterface.getNetworkInterfaces() triggers
intermittent test failures
+ S8066871: java.lang.VerifyError: Bad local variable type - local
final String
+ S8068427: Hashtable deserialization reconstitutes table with wrong
capacity
+ S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be
updated for JDK-8061210
+ S8069253: javax/net/ssl/TLS/TestJSSE.java failed on Mac
+ S8071125: Improve exception messages in URLPermission
+ S8072081: Supplementary characters are rejected in comments
+ S8072463: Remove requirement that AKID and SKID have to match when
building certificate chain
+ S8072725: Provide more granular levels for GC verification
+ S8073400: Some Monospaced logical fonts have a different width
+ S8073872: Schemagen fails with StackOverflowError if element
references containing class
+ S8074931: Additional tests for CertPath API
+ S8075286: Additional tests for signature algorithm OIDs and
transformation string
+ S8076486: [TESTBUG]
javax/security/auth/Subject/doAs/NestedActions.java fails if extra
VM options are given
+ S8076545: Text size is twice bigger under Windows L&F on Win 8.1
with HiDPI display
+ S8076995: gc/ergonomics/TestDynamicNumberOfGCThreads.java failed
with java.lang.RuntimeException: 'new_active_workers' missing from
stdout/stderr
+ S8079138: Additional negative tests for XML signature processing
+ S8081512: Remove sun.invoke.anon classes, or move / co-locate them
with tests
+ S8081771: ProcessTool.createJavaProcessBuilder() needs new
addTestVmAndJavaOptions argument
+ S8129419: heapDumper.cpp: assert(length_in_bytes > 0) failed:
nothing to copy
+ S8130150: Implement BigInteger.montgomeryMultiply intrinsic
+ S8130242: DataFlavorComparator transitivity exception
+ S8130304: Inference: NodeNotFoundException thrown with deep generic
method call chain
+ S8130425: libjvm crash due to stack overflow in executables with 32k
tbss/tdata
+ S8133023: ParallelGCThreads is not calculated correctly
+ S8134111: Unmarshaller unmarshalls XML element which doesn't have
the expected namespace
+ S8135259: InetAddress.getAllByName only reports "unknown error"
instead of actual cause
+ S8136506: Include sun.arch.data.model as a property that can be
queried by jtreg
+ S8137068: Tests added in JDK-8048604 fail to compile
+ S8139040: Fix initializations before ShouldNotReachHere() etc. and
enable -Wuninitialized on linux.
+ S8139581: AWT components are not drawn after removal and addition to
a container
+ S8141243: Unexpected timezone returned after parsing a date
+ S8141420: Compiler runtime entries don't hold Klass* from being GCed
+ S8141445: Use of Solaris/SPARC M7 libadimalloc.so can generate
unknown signal in hs_err file
+ S8141551: C2 can not handle returns with inccompatible interface
arrays
+ S8143377: Test PKCS8Test.java fails
+ S8143647: Javac compiles method reference that allows results in an
IllegalAccessError
+ S8144144: ORB destroy() leaks filedescriptors after unsuccessful
connection
+ S8144593: Suppress not recognized property/feature warning messages
from SAXParser
+ S8144957: Remove PICL warning message
+ S8145039: JAXB marshaller fails with ClassCastException on classes
generated by xjc
+ S8145228: Java Access Bridge, getAccessibleStatesStringFromContext
doesn't wrap the call to getAccessibleRole
+ S8145388: URLConnection.guessContentTypeFromStream returns image/jpg
for some JPEG images
+ S8145974: XMLStreamWriter produces invalid XML for surrogate pairs
on OutputStreamWriter
+ S8146035: Windows - With LCD antialiasing, some glyphs are not
rendered correctly
+ S8146192: Add test for JDK-8049321
+ S8146274: Thread spinning on WeakHashMap.getEntry() with concurrent
use of nashorn
+ S8147468: Allow users to bound the size of buffers cached in the
per-thread buffer caches
+ S8147645: get_ctrl_no_update() code is wrong
+ S8147807: crash in libkcms.so on linux-sparc
+ S8148379: jdk.nashorn.api.scripting spec. adjustments, clarifications
+ S8148627: RestrictTestMaxCachedBufferSize.java to 64-bit platforms
+ S8148820: Missing @since Javadoc tag in Logger.log(Level, Supplier)
+ S8148926: Call site profiling fails on braces-wrapped anonymous
function
+ S8149017: Delayed provider selection broken in RSA client key
exchange
+ S8149029: Secure validation of XML based digital signature always
enabled when checking wrapping attacks
+ S8149330: Capacity of StringBuilder should not get close to
Integer.MAX_VALUE unless necessary
+ S8149334: JSON.parse(JSON.stringify([])).push(10) creates an array
containing two elements
+ S8149368: [hidpi] JLabel font is twice bigger than JTextArea font on
Windows 7,HiDPI, Windows L&F
+ S8149411: PKCS12KeyStore cannot extract AES Secret Keys
+ S8149417: Use final restricted flag
+ S8149450: LdapCtx.processReturnCode() throwing Null Pointer Exception
+ S8149453: [hidpi] JFileChooser does not scale properly on Windows
with HiDPI display and Windows L&F
+ S8149543: range check CastII nodes should not be split through Phi
+ S8149743: JVM crash after debugger hotswap with lambdas
+ S8149744: fix testng.jar delivery in Nashorn build.xml
+ S8149915: enabling validate-annotations feature for xsd schema with
annotation causes NPE
+ S8150002: Check for the validity of oop before printing it in
verify_remembered_set
+ S8150470: JCK: api/xsl/conf/copy/copy19 test failure
+ S8150518: G1 GC crashes at
G1CollectedHeap::do_collection_pause_at_safepoint(double)
+ S8150533: Test java/util/logging/LogManagerAppContextDeadlock.java
times out intermittently.
+ S8150704: XALAN: ERROR: 'No more DTM IDs are available' when
transforming with lots of temporary result trees
+ S8150780: Repeated offer and remove on ConcurrentLinkedQueue lead to
an OutOfMemoryError
+ S8151064: com/sun/jdi/RedefineAddPrivateMethod.sh fails
intermittently
+ S8151197: [TEST_BUG] Need to backport fix for
test/javax/net/ssl/TLS/TestJSSE.java
+ S8151352: jdk/test/sample fails with "effective library path is
outside the test suite"
+ S8151431: DateFormatSymbols triggers this.clone() in the constructor
+ S8151535: TESTBUG: java/lang/invoke/AccessControlTest.java should be
modified to run with JTREG 4.1 b13
+ S8151731: Add new jtreg keywords to jdk 8
+ S8151998: VS2010 ThemeReader.cpp(758) : error C3861: 'round':
identifier not found
+ S8152927: Incorrect GPL header in StubFactoryDynamicBase.java
reported
+ S8153252: SA: Hotspot build on Windows fails if make/closed folder
does not exist
+ S8153531: Improve exception messaging for RSAClientKeyExchange
+ S8153641: assert(thread_state == _thread_in_native) failed: Assumed
thread_in_native while heap dump
+ S8153673: [BACKOUT] JDWP: Memory Leak: GlobalRefs never deleted when
processing invokeMethod command
+ S8154304: NullpointerException at
LdapReferralException.getReferralContext
+ S8154722: Test gc/ergonomics/TestDynamicNumberOfGCThreads.java fails
+ S8157078: 8u102 L10n resource file updates
+ S8157838: Personalized Windows Font Size is not taken into account
in Java8u102
* Import of OpenJDK 8 u111 build 14
+ S6882559: new JEditorPane("text/plain","") fails for null context
class loader
+ S8049171: Additional tests for jarsigner's warnings
+ S8063086: Math.pow yields different results upon repeated calls
+ S8140530: Creating a VolatileImage with size 0,0 results in no
longer working g2d.drawString
+ S8142926: OutputAnalyzer's shouldXXX() calls return this
+ S8147077: IllegalArgumentException thrown by
api/java_awt/Component/FlipBufferStrategy/indexTGF_General
+ S8148127: IllegalArgumentException thrown by JCK test
api/java_awt/Component/FlipBufferStrategy/indexTGF_General in opengl
pipeline
+ S8150611: Security problem on sun.misc.resources.Messages*
+ S8153399: Constrain AppCDS behavior (back port)
+ S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
+ S8158734: JEditorPane.createEditorKitForContentType throws NPE after
6882559
+ S8158994: Service Menu services
+ S8159684: (tz) Support tzdata2016f
+ S8160904: Typo in code from 8079718 fix : enableCustomValueHanlde
+ S8160934: isnan() is not available on older MSVC compilers
+ S8161141: correct bugId for JDK-8158994 fix push
+ S8162411: Service Menu services 2
+ S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh failing
after JDK-8155968
+ S8162511: 8u111 L10n resource file updates
+ S8162792: Remove constraint DSA keySize < 1024 from
jdk.jar.disabledAlgorithms in jdk8
+ S8164452: 8u111 L10n resource file update - msgdrop 20
+ S8165816: jarsigner -verify shows jar unsigned if it was signed with
a weak algorithm
+ S8166381: Back out changes to the java.security file to not disable
MD5
* Backports
+ S8078628, PR3208: Zero build fails with pre-compiled headers disabled
+ S8141491, PR3159, G592292: Unaligned memory access in Bits.c
+ S8157306, PR3121: Random infrequent null pointer exceptions in javac
(enabled on AArch64 only)
+ S8162384, PR3122: Performance regression: bimorphic inlining may be
bypassed by type speculation
* Bug fixes
+ PR3123: Some object files built without -fPIC on x86 only
+ PR3126: pax-mark-vm script calls "exit -1" which is invalid in dash
+ PR3127, G590348: Only apply PaX markings by default on running PaX
kernels
+ PR3199: Invalid nashorn URL
+ PR3201: Update infinality configure test
+ PR3218: PR3159 leads to build failure on clean tree
* AArch64 port
+ S8131779, PR3220: AARCH64: add Montgomery multiply intrinsic
+ S8167200, PR3220: AArch64: Broken stack pointer adjustment in
interpreter
+ S8167421, PR3220: AArch64: in one core system, fatal error: Illegal
threadstate encountered
+ S8167595, PR3220: AArch64: SEGV in stub code
cipherBlockChaining_decryptAESCrypt
+ S8168888, PR3220: Port 8160591: Improve internal array handling to
AArch64.
* Shenandoah
+ PR3224: Shenandoah broken when building without pre-compiled headers
- Build against system kerberos
- Build against system pcsc and sctp
- S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt can lead to
the generation of illegal instructions (bsc#988651)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1683=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1683=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1683=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1683=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1683=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
java-1_8_0-openjdk-1.8.0.111-17.1
java-1_8_0-openjdk-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-debugsource-1.8.0.111-17.1
java-1_8_0-openjdk-demo-1.8.0.111-17.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-devel-1.8.0.111-17.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-headless-1.8.0.111-17.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.111-17.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
java-1_8_0-openjdk-1.8.0.111-17.1
java-1_8_0-openjdk-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-debugsource-1.8.0.111-17.1
java-1_8_0-openjdk-demo-1.8.0.111-17.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-devel-1.8.0.111-17.1
java-1_8_0-openjdk-devel-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-headless-1.8.0.111-17.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.111-17.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
java-1_8_0-openjdk-1.8.0.111-17.1
java-1_8_0-openjdk-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-debugsource-1.8.0.111-17.1
java-1_8_0-openjdk-demo-1.8.0.111-17.1
java-1_8_0-openjdk-demo-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-devel-1.8.0.111-17.1
java-1_8_0-openjdk-headless-1.8.0.111-17.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.111-17.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
java-1_8_0-openjdk-1.8.0.111-17.1
java-1_8_0-openjdk-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-debugsource-1.8.0.111-17.1
java-1_8_0-openjdk-headless-1.8.0.111-17.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.111-17.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
java-1_8_0-openjdk-1.8.0.111-17.1
java-1_8_0-openjdk-debuginfo-1.8.0.111-17.1
java-1_8_0-openjdk-debugsource-1.8.0.111-17.1
java-1_8_0-openjdk-headless-1.8.0.111-17.1
java-1_8_0-openjdk-headless-debuginfo-1.8.0.111-17.1
References:
https://www.suse.com/security/cve/CVE-2016-5542.html
https://www.suse.com/security/cve/CVE-2016-5554.html
https://www.suse.com/security/cve/CVE-2016-5556.html
https://www.suse.com/security/cve/CVE-2016-5568.html
https://www.suse.com/security/cve/CVE-2016-5573.html
https://www.suse.com/security/cve/CVE-2016-5582.html
https://www.suse.com/security/cve/CVE-2016-5597.html
https://bugzilla.suse.com/1005522
https://bugzilla.suse.com/1005523
https://bugzilla.suse.com/1005524
https://bugzilla.suse.com/1005525
https://bugzilla.suse.com/1005526
https://bugzilla.suse.com/1005527
https://bugzilla.suse.com/1005528
https://bugzilla.suse.com/988651
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:2869-1: important: Security update for pacemaker
by opensuse-security@opensuse.org 22 Nov '16
by opensuse-security@opensuse.org 22 Nov '16
22 Nov '16
SUSE Security Update: Security update for pacemaker
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2869-1
Rating: important
References: #1000743 #1002767 #1003565 #1007433 #967388
#986644 #987348
Cross-References: CVE-2016-7035 CVE-2016-7797
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise High Availability 12-SP2
______________________________________________________________________________
An update that solves two vulnerabilities and has 5 fixes
is now available.
Description:
This update for pacemaker fixes the following issues:
Security issues fixed:
- CVE-2016-7797: Notify other clients of a new connection only if the
handshake has completed (bsc#967388, bsc#1002767).
- CVE-2016-7035: Fixed improper IPC guarding in pacemaker (bsc#1007433).
Bug fixes:
- bsc#1003565: crmd: Record pending operations in the CIB before they are
performed
- bsc#1000743: pengine: Do not fence a maintenance node if it shuts down
cleanly
- bsc#987348: ping: Avoid temporary files for fping check
- bsc#986644: libcrmcommon: report errors consistently when waiting for
data on connection
- bsc#986644: remote: Correctly calculate the remaining timeouts when
receiving messages
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1679=1
- SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2016-1679=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
libpacemaker-devel-1.1.15-21.1
pacemaker-cts-1.1.15-21.1
pacemaker-cts-debuginfo-1.1.15-21.1
pacemaker-debuginfo-1.1.15-21.1
pacemaker-debugsource-1.1.15-21.1
- SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
libpacemaker3-1.1.15-21.1
libpacemaker3-debuginfo-1.1.15-21.1
pacemaker-1.1.15-21.1
pacemaker-cli-1.1.15-21.1
pacemaker-cli-debuginfo-1.1.15-21.1
pacemaker-cts-1.1.15-21.1
pacemaker-cts-debuginfo-1.1.15-21.1
pacemaker-debuginfo-1.1.15-21.1
pacemaker-debugsource-1.1.15-21.1
pacemaker-remote-1.1.15-21.1
pacemaker-remote-debuginfo-1.1.15-21.1
References:
https://www.suse.com/security/cve/CVE-2016-7035.html
https://www.suse.com/security/cve/CVE-2016-7797.html
https://bugzilla.suse.com/1000743
https://bugzilla.suse.com/1002767
https://bugzilla.suse.com/1003565
https://bugzilla.suse.com/1007433
https://bugzilla.suse.com/967388
https://bugzilla.suse.com/986644
https://bugzilla.suse.com/987348
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
21 Nov '16
Hi,
With the release of openSUSE Leap 42.2 the SUSE support of openSUSE 13.2 will
be ending in 2 months, around January 16th.
Please check https://en.opensuse.org/Lifetime for lifetime information.
Ciao, Marcus for the openSUSE Maintenance Team
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
3
2