openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3310-1
Rating: important
References: #1011922 #1015422
Cross-References: CVE-2016-9080 CVE-2016-9893 CVE-2016-9894
CVE-2016-9895 CVE-2016-9896 CVE-2016-9897
CVE-2016-9898 CVE-2016-9899 CVE-2016-9900
CVE-2016-9901 CVE-2016-9902 CVE-2016-9903
CVE-2016-9904
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
This update to MozillaFirefox 50.1.0 fixes the following
vulnerabilities:
- CVE-2016-9894: Buffer overflow in SkiaGL
- CVE-2016-9899: Use-after-free while manipulating DOM events and audio
elements
- CVE-2016-9895: CSP bypass using marquee tag
- CVE-2016-9896: Use-after-free with WebVR
- CVE-2016-9897: Memory corruption in libGLES
- CVE-2016-9898: Use-after-free in Editor while manipulating DOM
subtrees
- CVE-2016-9900: Restricted external resources can be loaded by SVG
images through data URLs
- CVE-2016-9904: Cross-origin information leak in shared atoms
- CVE-2016-9901: Data from Pocket server improperly sanitized before
execution
- CVE-2016-9902: Pocket extension does not validate the origin of events
- CVE-2016-9903: XSS injection vulnerability in add-ons SDK
- CVE-2016-9080: Memory safety bugs fixed in Firefox 50.1
- CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox
ESR 45.6
The following bugs were fixed:
- boo#1011922: fix crash after a few seconds of usage on AArch64
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch 2016-1534=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
MozillaFirefox-50.1.0-134.1
MozillaFirefox-branding-upstream-50.1.0-134.1
MozillaFirefox-buildsymbols-50.1.0-134.1
MozillaFirefox-debuginfo-50.1.0-134.1
MozillaFirefox-debugsource-50.1.0-134.1
MozillaFirefox-devel-50.1.0-134.1
MozillaFirefox-translations-common-50.1.0-134.1
MozillaFirefox-translations-other-50.1.0-134.1
References:
https://www.suse.com/security/cve/CVE-2016-9080.htmlhttps://www.suse.com/security/cve/CVE-2016-9893.htmlhttps://www.suse.com/security/cve/CVE-2016-9894.htmlhttps://www.suse.com/security/cve/CVE-2016-9895.htmlhttps://www.suse.com/security/cve/CVE-2016-9896.htmlhttps://www.suse.com/security/cve/CVE-2016-9897.htmlhttps://www.suse.com/security/cve/CVE-2016-9898.htmlhttps://www.suse.com/security/cve/CVE-2016-9899.htmlhttps://www.suse.com/security/cve/CVE-2016-9900.htmlhttps://www.suse.com/security/cve/CVE-2016-9901.htmlhttps://www.suse.com/security/cve/CVE-2016-9902.htmlhttps://www.suse.com/security/cve/CVE-2016-9903.htmlhttps://www.suse.com/security/cve/CVE-2016-9904.htmlhttps://bugzilla.suse.com/1011922https://bugzilla.suse.com/1015422
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3309-1
Rating: important
References: #1001856 #1012493 #982003
Cross-References: CVE-2016-5103
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for roundcubemail fixes the following issues:
- A maliciously crafted email could cause untrusted code to be executed
(cross site scripting using $lt;area href=javascript:...>)
(boo#982003, CVE-2016-5103)
- Avoid HTML styles that could cause potential click jacking
(boo#1001856)
- A maliciously crafted FROM value could cause extra parameters to be
passed to the sendmail command (boo#1012493)
- Avoid sending completely empty text parts for multipart/alternative
messages
- Don't create multipart/alternative messages with empty text/plain part
- Improved validation of FROM argument when sending mails
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch 2016-1533=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (noarch):
roundcubemail-1.0.9-2.36.1
References:
https://www.suse.com/security/cve/CVE-2016-5103.htmlhttps://bugzilla.suse.com/1001856https://bugzilla.suse.com/1012493https://bugzilla.suse.com/982003
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3304-1
Rating: important
References: #1000189 #1000287 #1000304 #1000776 #1001419
#1001486 #1002165 #1003079 #1003153 #1003400
#1003568 #1003925 #1004252 #1004418 #1004462
#1004517 #1004520 #1005666 #1006691 #1007615
#1007886 #744692 #789311 #857397 #860441
#865545 #866130 #868923 #874131 #875631 #876145
#876463 #898675 #904489 #909994 #911687 #915183
#921338 #921784 #922064 #922634 #924381 #924384
#930399 #934067 #937086 #937888 #941420 #946309
#955446 #956514 #959463 #961257 #962846 #963655
#963767 #966864 #967640 #970943 #971975 #971989
#974406 #974620 #975596 #975772 #976195 #977687
#978094 #979451 #979681 #979928 #980371 #981597
#982783 #983619 #984194 #984419 #984779 #984992
#985562 #986362 #986365 #986445 #987192 #987333
#987542 #987565 #987621 #987805 #988440 #988617
#988715 #989152 #989953 #990058 #990245 #991247
#991608 #991665 #991667 #992244 #992555 #992568
#992591 #992593 #992712 #993392 #993841 #993890
#993891 #994167 #994296 #994438 #994520 #994758
#995153 #995968 #996664 #997059 #997299 #997708
#997896 #998689 #998795 #998825 #999577 #999584
#999600 #999779 #999907 #999932
Cross-References: CVE-2015-8956 CVE-2016-2069 CVE-2016-4998
CVE-2016-5195 CVE-2016-5696 CVE-2016-6130
CVE-2016-6327 CVE-2016-6480 CVE-2016-6828
CVE-2016-7042 CVE-2016-7097 CVE-2016-7425
CVE-2016-8658
Affected Products:
SUSE Linux Enterprise Real Time Extension 12-SP1
______________________________________________________________________________
An update that solves 13 vulnerabilities and has 118 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to
receive various security and bugfixes.
This feature was added:
- fate#320805: Execute in place (XIP) support for the ext2 filesystem.
The following security bugs were fixed:
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel
allowed local users to gain privileges by triggering access to a paging
structure by a different CPU (bnc#963767).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the
netfilter subsystem in the Linux kernel allowed local users to cause a
denial of service (out-of-bounds read) or possibly obtain sensitive
information from kernel heap memory by leveraging in-container root
access to provide a crafted offset value that leads to crossing a
ruleset blob boundary (bnc#986362).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed,
which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
determine the rate of challenge ACK segments, which made it easier for
man-in-the-middle attackers to hijack TCP sessions via a blind in-window
attack (bnc#989152)
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by changing a certain
length value, aka a "double fetch" vulnerability (bnc#987542)
- CVE-2016-6327: System using the infiniband support module ib_srpt were
vulnerable to a denial of service by system crash by a local attacker
who is able to abort writes by sending the ABORT_TASK command
(bsc#994758)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
to cause a denial of service (out-of-bounds access or system crash) by
changing a certain size value, aka a "double fetch" vulnerability
(bnc#991608)
- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other
tcp_ functions (bsc#994296)
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel used an incorrect buffer size for certain timeout data,
which allowed local users to cause a denial of service (stack memory
corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserved the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bsc#995968).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in
arcmsr_iop_message_xfer() could have caused kernel heap corruption and
arbitraty kernel code execution (bsc#999932)
- CVE-2016-8658: Stack-based buffer overflow in the
brcmf_cfg80211_start_ap function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (system crash)
or possibly have unspecified other impact via a long SSID Information
Element in a command to a Netlink socket (bsc#1004462).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed
(bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies
(bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null
terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement
(bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked
(bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present
(bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr()
(bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref
(bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent
(bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement
(bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent()
(Automatic NUMA Balancing).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).
- be2net: fix BE3-R FW download compatibility check (bsc#921784
FATE#318561).
- be2net: fix wrong return value in be_check_ufi_compatibility()
(bsc#921784 FATE#318561).
- be2net: remove vlan promisc capability from VF's profile descriptors
(bsc#921784 FATE#318561).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size().
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback
(bsc#1003925, CVE-2015-8956).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.
- bonding: always set recv_probe to bond_arp_rcv in arp monitor
(bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.
- bonding: Prevent IPv6 link local address on enslaved devices.
- bonding: prevent out of bound accesses.
- bonding: set carrier off for devices created through netlink
(bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction
(bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard
(bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector
boundaries (bsc#904489).
- btrfs: Disable
btrfs-8448-improve-performance-on-fsync-against-new-inode.patch
(bsc#981597).
- btrfs: do not create or leak aliased root while cleaning up orphans
(bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir
(bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and
ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596,
bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use
(bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock
(bsc#904489).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free
space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible
(bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cephfs: ignore error from invalidate_inode_pages2_range() in direct
write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page
(bsc#995153).
- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch.
After a write, we must free the 'request', not the 'response'
(bsc#995153).
- clockevents: export clockevents_unbind_device instead of
clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition
(bsc#966864).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195).
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch
(bsc#1003153).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short
jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in
the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545
FATE#316891).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU in
patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch.
(bsc#961257).
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555,
bsc#987805).
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk: fix faulty logic in the case of recursive printk
(bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use
(bsc#959463).
- kvm: vmx: defer load of APIC access page address during reset
(bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op
(bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS
response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED
(VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mpt3sas: Update
patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch
(bsc#967640, bsc#992244).
- msi-x: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation
voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding
(bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common()
(bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success
(bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a
nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of
lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is
one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT
(bnc#866130).
- oops on restarting network with bonding mode4 (lacp) (bsc#876145).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for "cycles:p" and "cycles:pp" on SLM
(bsc#997896).
- PM / hibernate: Fix 2G size issue of snapshot image verification
(bsc#1004252).
- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends
(bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in
qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time
(bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert "Input: i8042 - break load dependency between atkbd/psmouse and
i8042".
- Revert "Input: i8042 - set up shared ps2_cmd_mutex for AUX ports".
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays.
- RTNL: assertion failed at dev.c (bsc#875631).
- s390: add SMT support (bnc#994438).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule()
(bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task
(bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT
(bnc#868923).
- SUNRPC: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP
(bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK
(bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not
set.
- tcp: fix cwnd limited checking to improve congestion control
(bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation
(bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices
(bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors
(bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86: Removed the free memblock of hibernat keys to avoid memory
corruption (bsc#990058).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance
git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify
(bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly
(bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: Check if slot is already in default state before moving it there
(FATE#315518).
- xhci: silence warnings in switch (bnc#991665).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Real Time Extension 12-SP1:
zypper in -t patch SUSE-SLE-RT-12-SP1-2016-1938=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Real Time Extension 12-SP1 (x86_64):
kernel-compute-3.12.67-60.27.1
kernel-compute-base-3.12.67-60.27.1
kernel-compute-base-debuginfo-3.12.67-60.27.1
kernel-compute-debuginfo-3.12.67-60.27.1
kernel-compute-debugsource-3.12.67-60.27.1
kernel-compute-devel-3.12.67-60.27.1
kernel-compute_debug-debuginfo-3.12.67-60.27.1
kernel-compute_debug-debugsource-3.12.67-60.27.1
kernel-compute_debug-devel-3.12.67-60.27.1
kernel-compute_debug-devel-debuginfo-3.12.67-60.27.1
kernel-rt-3.12.67-60.27.1
kernel-rt-base-3.12.67-60.27.1
kernel-rt-base-debuginfo-3.12.67-60.27.1
kernel-rt-debuginfo-3.12.67-60.27.1
kernel-rt-debugsource-3.12.67-60.27.1
kernel-rt-devel-3.12.67-60.27.1
kernel-rt_debug-debuginfo-3.12.67-60.27.1
kernel-rt_debug-debugsource-3.12.67-60.27.1
kernel-rt_debug-devel-3.12.67-60.27.1
kernel-rt_debug-devel-debuginfo-3.12.67-60.27.1
kernel-syms-rt-3.12.67-60.27.1
- SUSE Linux Enterprise Real Time Extension 12-SP1 (noarch):
kernel-devel-rt-3.12.67-60.27.1
kernel-source-rt-3.12.67-60.27.1
References:
https://www.suse.com/security/cve/CVE-2015-8956.htmlhttps://www.suse.com/security/cve/CVE-2016-2069.htmlhttps://www.suse.com/security/cve/CVE-2016-4998.htmlhttps://www.suse.com/security/cve/CVE-2016-5195.htmlhttps://www.suse.com/security/cve/CVE-2016-5696.htmlhttps://www.suse.com/security/cve/CVE-2016-6130.htmlhttps://www.suse.com/security/cve/CVE-2016-6327.htmlhttps://www.suse.com/security/cve/CVE-2016-6480.htmlhttps://www.suse.com/security/cve/CVE-2016-6828.htmlhttps://www.suse.com/security/cve/CVE-2016-7042.htmlhttps://www.suse.com/security/cve/CVE-2016-7097.htmlhttps://www.suse.com/security/cve/CVE-2016-7425.htmlhttps://www.suse.com/security/cve/CVE-2016-8658.htmlhttps://bugzilla.suse.com/1000189https://bugzilla.suse.com/1000287https://bugzilla.suse.com/1000304https://bugzilla.suse.com/1000776https://bugzilla.suse.com/1001419https://bugzilla.suse.com/1001486https://bugzilla.suse.com/1002165https://bugzilla.suse.com/1003079https://bugzilla.suse.com/1003153https://bugzilla.suse.com/1003400https://bugzilla.suse.com/1003568https://bugzilla.suse.com/1003925https://bugzilla.suse.com/1004252https://bugzilla.suse.com/1004418https://bugzilla.suse.com/1004462https://bugzilla.suse.com/1004517https://bugzilla.suse.com/1004520https://bugzilla.suse.com/1005666https://bugzilla.suse.com/1006691https://bugzilla.suse.com/1007615https://bugzilla.suse.com/1007886https://bugzilla.suse.com/744692https://bugzilla.suse.com/789311https://bugzilla.suse.com/857397https://bugzilla.suse.com/860441https://bugzilla.suse.com/865545https://bugzilla.suse.com/866130https://bugzilla.suse.com/868923https://bugzilla.suse.com/874131https://bugzilla.suse.com/875631https://bugzilla.suse.com/876145https://bugzilla.suse.com/876463https://bugzilla.suse.com/898675https://bugzilla.suse.com/904489https://bugzilla.suse.com/909994https://bugzilla.suse.com/911687https://bugzilla.suse.com/915183https://bugzilla.suse.com/921338https://bugzilla.suse.com/921784https://bugzilla.suse.com/922064https://bugzilla.suse.com/922634https://bugzilla.suse.com/924381https://bugzilla.suse.com/924384https://bugzilla.suse.com/930399https://bugzilla.suse.com/934067https://bugzilla.suse.com/937086https://bugzilla.suse.com/937888https://bugzilla.suse.com/941420https://bugzilla.suse.com/946309https://bugzilla.suse.com/955446https://bugzilla.suse.com/956514https://bugzilla.suse.com/959463https://bugzilla.suse.com/961257https://bugzilla.suse.com/962846https://bugzilla.suse.com/963655https://bugzilla.suse.com/963767https://bugzilla.suse.com/966864https://bugzilla.suse.com/967640https://bugzilla.suse.com/970943https://bugzilla.suse.com/971975https://bugzilla.suse.com/971989https://bugzilla.suse.com/974406https://bugzilla.suse.com/974620https://bugzilla.suse.com/975596https://bugzilla.suse.com/975772https://bugzilla.suse.com/976195https://bugzilla.suse.com/977687https://bugzilla.suse.com/978094https://bugzilla.suse.com/979451https://bugzilla.suse.com/979681https://bugzilla.suse.com/979928https://bugzilla.suse.com/980371https://bugzilla.suse.com/981597https://bugzilla.suse.com/982783https://bugzilla.suse.com/983619https://bugzilla.suse.com/984194https://bugzilla.suse.com/984419https://bugzilla.suse.com/984779https://bugzilla.suse.com/984992https://bugzilla.suse.com/985562https://bugzilla.suse.com/986362https://bugzilla.suse.com/986365https://bugzilla.suse.com/986445https://bugzilla.suse.com/987192https://bugzilla.suse.com/987333https://bugzilla.suse.com/987542https://bugzilla.suse.com/987565https://bugzilla.suse.com/987621https://bugzilla.suse.com/987805https://bugzilla.suse.com/988440https://bugzilla.suse.com/988617https://bugzilla.suse.com/988715https://bugzilla.suse.com/989152https://bugzilla.suse.com/989953https://bugzilla.suse.com/990058https://bugzilla.suse.com/990245https://bugzilla.suse.com/991247https://bugzilla.suse.com/991608https://bugzilla.suse.com/991665https://bugzilla.suse.com/991667https://bugzilla.suse.com/992244https://bugzilla.suse.com/992555https://bugzilla.suse.com/992568https://bugzilla.suse.com/992591https://bugzilla.suse.com/992593https://bugzilla.suse.com/992712https://bugzilla.suse.com/993392https://bugzilla.suse.com/993841https://bugzilla.suse.com/993890https://bugzilla.suse.com/993891https://bugzilla.suse.com/994167https://bugzilla.suse.com/994296https://bugzilla.suse.com/994438https://bugzilla.suse.com/994520https://bugzilla.suse.com/994758https://bugzilla.suse.com/995153https://bugzilla.suse.com/995968https://bugzilla.suse.com/996664https://bugzilla.suse.com/997059https://bugzilla.suse.com/997299https://bugzilla.suse.com/997708https://bugzilla.suse.com/997896https://bugzilla.suse.com/998689https://bugzilla.suse.com/998795https://bugzilla.suse.com/998825https://bugzilla.suse.com/999577https://bugzilla.suse.com/999584https://bugzilla.suse.com/999600https://bugzilla.suse.com/999779https://bugzilla.suse.com/999907https://bugzilla.suse.com/999932
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for gstreamer-plugins-good
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3303-1
Rating: important
References: #1012102 #1012103 #1012104 #1013653 #1013655
#1013663
Cross-References: CVE-2016-9634 CVE-2016-9635 CVE-2016-9636
CVE-2016-9807 CVE-2016-9808 CVE-2016-9810
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for gstreamer-plugins-good fixes the following security issues:
- CVE-2016-9807: Flic decoder invalid read could lead to crash.
(bsc#1013655)
- CVE-2016-9634: Flic out-of-bounds write could lead to code execution.
(bsc#1012102)
- CVE-2016-9635: Flic out-of-bounds write could lead to code execution.
(bsc#1012103)
- CVE-2016-9635: Flic out-of-bounds write could lead to code execution.
(bsc#1012104)
- CVE-2016-9808: A maliciously crafted flic file can still cause invalid
memory accesses. (bsc#1013653)
- CVE-2016-9810: A maliciously crafted flic file can still cause invalid
memory accesses. (bsc#1013663)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1939=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1939=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1939=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
gstreamer-plugins-good-1.8.3-9.1
gstreamer-plugins-good-debuginfo-1.8.3-9.1
gstreamer-plugins-good-debugsource-1.8.3-9.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
gstreamer-plugins-good-lang-1.8.3-9.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
gstreamer-plugins-good-1.8.3-9.1
gstreamer-plugins-good-debuginfo-1.8.3-9.1
gstreamer-plugins-good-debugsource-1.8.3-9.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
gstreamer-plugins-good-lang-1.8.3-9.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
gstreamer-plugins-good-lang-1.8.3-9.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
gstreamer-plugins-good-1.8.3-9.1
gstreamer-plugins-good-debuginfo-1.8.3-9.1
gstreamer-plugins-good-debugsource-1.8.3-9.1
References:
https://www.suse.com/security/cve/CVE-2016-9634.htmlhttps://www.suse.com/security/cve/CVE-2016-9635.htmlhttps://www.suse.com/security/cve/CVE-2016-9636.htmlhttps://www.suse.com/security/cve/CVE-2016-9807.htmlhttps://www.suse.com/security/cve/CVE-2016-9808.htmlhttps://www.suse.com/security/cve/CVE-2016-9810.htmlhttps://bugzilla.suse.com/1012102https://bugzilla.suse.com/1012103https://bugzilla.suse.com/1012104https://bugzilla.suse.com/1013653https://bugzilla.suse.com/1013655https://bugzilla.suse.com/1013663
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for gstreamer-plugins-bad
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3297-1
Rating: important
References: #1010829 #1013659 #1013678 #1013680
Cross-References: CVE-2016-9445 CVE-2016-9446 CVE-2016-9809
CVE-2016-9812 CVE-2016-9813
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for gstreamer-plugins-bad fixes the following issues:
- CVE-2016-9809: Malicious mkv/h264 file could cause an off by one out of
bounds read and lead to crash (bsc#1013659)
- CVE-2016-9812: Malicious mpeg file could cause invalid a null pointer
access and lead to crash (bsc#1013678)
- CVE-2016-9813: Malicious mpegts file could cause invalid a null pointer
access and lead to crash (bsc#1013680)
- CVE-2016-9445, CVE-2016-9446: Check an integer overflow and initialize a
buffer in vmncdec (bsc#1010829)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1932=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1932=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1932=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1932=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1932=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1932=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
gstreamer-plugins-bad-debuginfo-1.2.4-3.4.1
gstreamer-plugins-bad-debugsource-1.2.4-3.4.1
gstreamer-plugins-bad-devel-1.2.4-3.4.1
libgstinsertbin-1_0-0-1.2.4-3.4.1
libgstinsertbin-1_0-0-debuginfo-1.2.4-3.4.1
libgsturidownloader-1_0-0-1.2.4-3.4.1
libgsturidownloader-1_0-0-debuginfo-1.2.4-3.4.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libgstegl-1_0-0-1.2.4-3.4.1
libgstegl-1_0-0-debuginfo-1.2.4-3.4.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
libgstegl-1_0-0-1.2.4-3.4.1
libgstegl-1_0-0-debuginfo-1.2.4-3.4.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
gstreamer-plugins-bad-1.2.4-3.4.1
gstreamer-plugins-bad-debuginfo-1.2.4-3.4.1
gstreamer-plugins-bad-debugsource-1.2.4-3.4.1
libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1
libgstbasecamerabinsrc-1_0-0-debuginfo-1.2.4-3.4.1
libgstcodecparsers-1_0-0-1.2.4-3.4.1
libgstcodecparsers-1_0-0-debuginfo-1.2.4-3.4.1
libgstegl-1_0-0-1.2.4-3.4.1
libgstegl-1_0-0-debuginfo-1.2.4-3.4.1
libgstmpegts-1_0-0-1.2.4-3.4.1
libgstmpegts-1_0-0-debuginfo-1.2.4-3.4.1
libgstphotography-1_0-0-1.2.4-3.4.1
libgstphotography-1_0-0-debuginfo-1.2.4-3.4.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
gstreamer-plugins-bad-lang-1.2.4-3.4.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libgstegl-1_0-0-1.2.4-3.4.1
libgstegl-1_0-0-debuginfo-1.2.4-3.4.1
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
gstreamer-plugins-bad-lang-1.2.4-3.4.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
gstreamer-plugins-bad-1.2.4-3.4.1
gstreamer-plugins-bad-debuginfo-1.2.4-3.4.1
gstreamer-plugins-bad-debugsource-1.2.4-3.4.1
libgstbasecamerabinsrc-1_0-0-1.2.4-3.4.1
libgstbasecamerabinsrc-1_0-0-debuginfo-1.2.4-3.4.1
libgstcodecparsers-1_0-0-1.2.4-3.4.1
libgstcodecparsers-1_0-0-debuginfo-1.2.4-3.4.1
libgstegl-1_0-0-1.2.4-3.4.1
libgstegl-1_0-0-debuginfo-1.2.4-3.4.1
libgstmpegts-1_0-0-1.2.4-3.4.1
libgstmpegts-1_0-0-debuginfo-1.2.4-3.4.1
libgstphotography-1_0-0-1.2.4-3.4.1
libgstphotography-1_0-0-debuginfo-1.2.4-3.4.1
References:
https://www.suse.com/security/cve/CVE-2016-9445.htmlhttps://www.suse.com/security/cve/CVE-2016-9446.htmlhttps://www.suse.com/security/cve/CVE-2016-9809.htmlhttps://www.suse.com/security/cve/CVE-2016-9812.htmlhttps://www.suse.com/security/cve/CVE-2016-9813.htmlhttps://bugzilla.suse.com/1010829https://bugzilla.suse.com/1013659https://bugzilla.suse.com/1013678https://bugzilla.suse.com/1013680
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for gstreamer-plugins-good
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3288-1
Rating: important
References: #1012102 #1012103 #1012104 #1013653 #1013655
#1013663
Cross-References: CVE-2016-9634 CVE-2016-9635 CVE-2016-9636
CVE-2016-9807 CVE-2016-9808 CVE-2016-9810
Affected Products:
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for gstreamer-plugins-good fixes the following issues:
* CVE-2016-9807: flic decoder invalid read could lead to crash
[bsc#1013655]
* CVE-2016-9634: flic out-of-bounds write could lead to code execution
[bsc#1012102]
* CVE-2016-9635: flic out-of-bounds write could lead to code execution
[bsc#1012103]
* CVE-2016-9635: flic out-of-bounds write could lead to code execution
[bsc#1012104]
* CVE-2016-9808: A maliciously crafted flic file can still cause invalid
memory accesses. [bsc#1013653]
* CVE-2016-9810: A maliciously crafted flic file can still cause invalid
memory accesses [bsc#1013663]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1922=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1922=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
gstreamer-plugins-good-1.2.4-2.3.1
gstreamer-plugins-good-debuginfo-1.2.4-2.3.1
gstreamer-plugins-good-debugsource-1.2.4-2.3.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
gstreamer-plugins-good-lang-1.2.4-2.3.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
gstreamer-plugins-good-1.2.4-2.3.1
gstreamer-plugins-good-debuginfo-1.2.4-2.3.1
gstreamer-plugins-good-debugsource-1.2.4-2.3.1
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
gstreamer-plugins-good-lang-1.2.4-2.3.1
References:
https://www.suse.com/security/cve/CVE-2016-9634.htmlhttps://www.suse.com/security/cve/CVE-2016-9635.htmlhttps://www.suse.com/security/cve/CVE-2016-9636.htmlhttps://www.suse.com/security/cve/CVE-2016-9807.htmlhttps://www.suse.com/security/cve/CVE-2016-9808.htmlhttps://www.suse.com/security/cve/CVE-2016-9810.htmlhttps://bugzilla.suse.com/1012102https://bugzilla.suse.com/1012103https://bugzilla.suse.com/1012104https://bugzilla.suse.com/1013653https://bugzilla.suse.com/1013655https://bugzilla.suse.com/1013663
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3273-1
Rating: important
References: #1000106 #1000893 #1003030 #1003032 #1005004
#1005005 #1007157 #1007160 #1009100 #1009103
#1009107 #1009109 #1009111 #1011652
Cross-References: CVE-2016-7777 CVE-2016-7908 CVE-2016-7909
CVE-2016-8667 CVE-2016-8669 CVE-2016-8909
CVE-2016-8910 CVE-2016-9379 CVE-2016-9380
CVE-2016-9381 CVE-2016-9382 CVE-2016-9383
CVE-2016-9386 CVE-2016-9637
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2016-9637: ioport array overflow allowing a malicious guest
administrator can escalate their privilege to that of the host
(bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable
allowing an unprivileged guest user program to elevate its privilege to
that of the guest operating system. Exploit of this vulnerability is
easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a
unprivileged guest process to escalate its privilege to that of the
guest operating system on AMD hardware. On Intel hardware a malicious
unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken,
allowing a guest to modify arbitrary memory leading to arbitray code
execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest
administrators take over the qemu process, elevating their privilege to
that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed
guest administrators to obtain the contents of sensitive host files or
delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed
guest administrators to obtain the contents of sensitive host files or
delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which
allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM
register state information belonging to arbitrary tasks on the guest by
modifying an instruction while the hypervisor is preparing to emulate it
(bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c
allowed local guest OS administrators to cause a denial of service
(infinite loop and CPU consumption) by leveraging failure to limit the
ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c
allowed local guest OS administrators to cause a denial of service
(infinite loop and CPU consumption) via an entry with the same value for
buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed
local guest OS administrators to cause a denial of service
(divide-by-zero error and QEMU process crash) via a large interval timer
reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c
allowed local guest OS administrators to cause a denial of service
(divide-by-zero error and QEMU process crash) via vectors involving a
value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not
properly limit the buffer descriptor count when transmitting packets,
which allowed local guest OS administrators to cause a denial of service
(infinite loop and QEMU process crash) via vectors involving a buffer
descriptor with a length of 0 and crafted values in bd.flags
(bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed
local guest OS administrators to cause a denial of service (infinite
loop and QEMU process crash) by setting the (1) receive or (2) transmit
descriptor ring length to 0 (bsc#1003032)
This non-security issue was fixed:
- bsc#1000893: virsh setmem didn't allow to set current guest memory to
max limit
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-xen-12919=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-xen-12919=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-xen-12919=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-xen-12919=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-xen-12919=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-xen-12919=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
xen-4.2.5_21-30.1
xen-doc-html-4.2.5_21-30.1
xen-doc-pdf-4.2.5_21-30.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1
xen-libs-32bit-4.2.5_21-30.1
xen-libs-4.2.5_21-30.1
xen-tools-4.2.5_21-30.1
xen-tools-domU-4.2.5_21-30.1
- SUSE Manager Proxy 2.1 (x86_64):
xen-4.2.5_21-30.1
xen-doc-html-4.2.5_21-30.1
xen-doc-pdf-4.2.5_21-30.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1
xen-libs-32bit-4.2.5_21-30.1
xen-libs-4.2.5_21-30.1
xen-tools-4.2.5_21-30.1
xen-tools-domU-4.2.5_21-30.1
- SUSE Manager 2.1 (x86_64):
xen-4.2.5_21-30.1
xen-doc-html-4.2.5_21-30.1
xen-doc-pdf-4.2.5_21-30.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1
xen-libs-32bit-4.2.5_21-30.1
xen-libs-4.2.5_21-30.1
xen-tools-4.2.5_21-30.1
xen-tools-domU-4.2.5_21-30.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):
xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1
xen-libs-4.2.5_21-30.1
xen-tools-domU-4.2.5_21-30.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64):
xen-4.2.5_21-30.1
xen-doc-html-4.2.5_21-30.1
xen-doc-pdf-4.2.5_21-30.1
xen-libs-32bit-4.2.5_21-30.1
xen-tools-4.2.5_21-30.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586):
xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1
xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30.1
xen-libs-4.2.5_21-30.1
xen-tools-domU-4.2.5_21-30.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64):
xen-debuginfo-4.2.5_21-30.1
xen-debugsource-4.2.5_21-30.1
References:
https://www.suse.com/security/cve/CVE-2016-7777.htmlhttps://www.suse.com/security/cve/CVE-2016-7908.htmlhttps://www.suse.com/security/cve/CVE-2016-7909.htmlhttps://www.suse.com/security/cve/CVE-2016-8667.htmlhttps://www.suse.com/security/cve/CVE-2016-8669.htmlhttps://www.suse.com/security/cve/CVE-2016-8909.htmlhttps://www.suse.com/security/cve/CVE-2016-8910.htmlhttps://www.suse.com/security/cve/CVE-2016-9379.htmlhttps://www.suse.com/security/cve/CVE-2016-9380.htmlhttps://www.suse.com/security/cve/CVE-2016-9381.htmlhttps://www.suse.com/security/cve/CVE-2016-9382.htmlhttps://www.suse.com/security/cve/CVE-2016-9383.htmlhttps://www.suse.com/security/cve/CVE-2016-9386.htmlhttps://www.suse.com/security/cve/CVE-2016-9637.htmlhttps://bugzilla.suse.com/1000106https://bugzilla.suse.com/1000893https://bugzilla.suse.com/1003030https://bugzilla.suse.com/1003032https://bugzilla.suse.com/1005004https://bugzilla.suse.com/1005005https://bugzilla.suse.com/1007157https://bugzilla.suse.com/1007160https://bugzilla.suse.com/1009100https://bugzilla.suse.com/1009103https://bugzilla.suse.com/1009107https://bugzilla.suse.com/1009109https://bugzilla.suse.com/1009111https://bugzilla.suse.com/1011652
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for openjpeg2
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3270-1
Rating: important
References: #1002414 #1007739 #1007740 #1007741 #1007742
#1007743 #1007744 #1007747 #1014543 #1014975
#999817
Cross-References: CVE-2016-7445 CVE-2016-8332 CVE-2016-9112
CVE-2016-9113 CVE-2016-9114 CVE-2016-9115
CVE-2016-9116 CVE-2016-9117 CVE-2016-9118
CVE-2016-9572 CVE-2016-9573 CVE-2016-9580
CVE-2016-9581
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
This update for openjpeg2 fixes the following issues:
* CVE-2016-9114: NULL Pointer Access in function imagetopnm of
convert.c:1943(jp2) could lead to crash [bsc#1007740]
* CVE-2016-9115: Heap Buffer Overflow in function imagetotga of
convert.c(jp2) [bsc#1007741]
* CVE-2016-9580, CVE-2016-9581: Possible Heap buffer overflow via integer
overflow and infite loop [bsc#1014975]
* CVE-2016-9117: NULL Pointer Access in function imagetopnm of
convert.c(jp2):1289 [bsc#1007743]
* CVE-2016-9118: Heap Buffer Overflow in function pnmtoimage of convert.c
[bsc#1007744]
* CVE-2016-9112: FPE(Floating Point Exception) in lib/openjp2/pi.c:523
[bsc#1007747]
* CVE-2016-9116: NULL Pointer Access in function imagetopnm of
convert.c:2226(jp2) [bsc#1007742]
* CVE-2016-9113: NULL point dereference in function imagetobmp of
convertbmp.c could lead to crash [bsc#1007739]
* CVE-2016-9572 CVE-2016-9573: Insuficient check in imagetopnm() could
lead to heap buffer overflow [bsc#1014543]
* CVE-2016-8332: Malicious file in OpenJPEG JPEG2000 format could lead to
code execution [bsc#1002414]
* CVE-2016-7445: Null pointer dereference in convert.c could lead to crash
[bsc#999817]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1914=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1914=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1914=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
libopenjp2-7-2.1.0-3.1
libopenjp2-7-debuginfo-2.1.0-3.1
openjpeg2-debuginfo-2.1.0-3.1
openjpeg2-debugsource-2.1.0-3.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
libopenjp2-7-2.1.0-3.1
libopenjp2-7-debuginfo-2.1.0-3.1
openjpeg2-debuginfo-2.1.0-3.1
openjpeg2-debugsource-2.1.0-3.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
libopenjp2-7-2.1.0-3.1
libopenjp2-7-debuginfo-2.1.0-3.1
openjpeg2-debuginfo-2.1.0-3.1
openjpeg2-debugsource-2.1.0-3.1
References:
https://www.suse.com/security/cve/CVE-2016-7445.htmlhttps://www.suse.com/security/cve/CVE-2016-8332.htmlhttps://www.suse.com/security/cve/CVE-2016-9112.htmlhttps://www.suse.com/security/cve/CVE-2016-9113.htmlhttps://www.suse.com/security/cve/CVE-2016-9114.htmlhttps://www.suse.com/security/cve/CVE-2016-9115.htmlhttps://www.suse.com/security/cve/CVE-2016-9116.htmlhttps://www.suse.com/security/cve/CVE-2016-9117.htmlhttps://www.suse.com/security/cve/CVE-2016-9118.htmlhttps://www.suse.com/security/cve/CVE-2016-9572.htmlhttps://www.suse.com/security/cve/CVE-2016-9573.htmlhttps://www.suse.com/security/cve/CVE-2016-9580.htmlhttps://www.suse.com/security/cve/CVE-2016-9581.htmlhttps://bugzilla.suse.com/1002414https://bugzilla.suse.com/1007739https://bugzilla.suse.com/1007740https://bugzilla.suse.com/1007741https://bugzilla.suse.com/1007742https://bugzilla.suse.com/1007743https://bugzilla.suse.com/1007744https://bugzilla.suse.com/1007747https://bugzilla.suse.com/1014543https://bugzilla.suse.com/1014975https://bugzilla.suse.com/999817
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for dnsmasq
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3269-1
Rating: important
References: #983273
Cross-References: CVE-2015-8899
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for dnsmasq fixes the following issues:
- CVE-2015-8899: Denial of service between local and remote dns entries
(bsc#983273)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2016-1912=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1912=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1912=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1912=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1912=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1912=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (x86_64):
dnsmasq-debuginfo-2.71-13.1
dnsmasq-debugsource-2.71-13.1
dnsmasq-utils-2.71-13.1
dnsmasq-utils-debuginfo-2.71-13.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
dnsmasq-2.71-13.1
dnsmasq-debuginfo-2.71-13.1
dnsmasq-debugsource-2.71-13.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
dnsmasq-2.71-13.1
dnsmasq-debuginfo-2.71-13.1
dnsmasq-debugsource-2.71-13.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
dnsmasq-2.71-13.1
dnsmasq-debuginfo-2.71-13.1
dnsmasq-debugsource-2.71-13.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
dnsmasq-2.71-13.1
dnsmasq-debuginfo-2.71-13.1
dnsmasq-debugsource-2.71-13.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
dnsmasq-2.71-13.1
dnsmasq-debuginfo-2.71-13.1
dnsmasq-debugsource-2.71-13.1
References:
https://www.suse.com/security/cve/CVE-2015-8899.htmlhttps://bugzilla.suse.com/983273
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3258-1
Rating: important
References: #1009318 #1011130 #1011136 #1013376 #1014159
Cross-References: CVE-2014-9848 CVE-2016-8707 CVE-2016-8866
CVE-2016-9556 CVE-2016-9559 CVE-2016-9773
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
* CVE-2016-9556 Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559 Possible Null pointer access found by fuzzing
[bsc#1011136]
* CVE-2016-8707 Possible code execution in Tiff conver utility
[bsc#1014159]
* CVE-2016-8866 Memory allocation failure in AcquireMagickMemory could
lead to Heap overflow [bsc#1009318]
* CVE-2016-9559 Possible Null pointer access found by fuzzing
[bsc#1011136]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1905=1
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1905=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1905=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1905=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1905=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1905=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1905=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1905=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1905=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
ImageMagick-6.8.8.1-54.1
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagick++-6_Q16-3-6.8.8.1-54.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-54.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-54.1
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
ImageMagick-6.8.8.1-54.1
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagick++-6_Q16-3-6.8.8.1-54.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-54.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-54.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
ImageMagick-6.8.8.1-54.1
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
ImageMagick-devel-6.8.8.1-54.1
libMagick++-6_Q16-3-6.8.8.1-54.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-54.1
libMagick++-devel-6.8.8.1-54.1
perl-PerlMagick-6.8.8.1-54.1
perl-PerlMagick-debuginfo-6.8.8.1-54.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
ImageMagick-6.8.8.1-54.1
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
ImageMagick-devel-6.8.8.1-54.1
libMagick++-6_Q16-3-6.8.8.1-54.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-54.1
libMagick++-devel-6.8.8.1-54.1
perl-PerlMagick-6.8.8.1-54.1
perl-PerlMagick-debuginfo-6.8.8.1-54.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagickCore-6_Q16-1-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-54.1
libMagickWand-6_Q16-1-6.8.8.1-54.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-54.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagickCore-6_Q16-1-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-54.1
libMagickWand-6_Q16-1-6.8.8.1-54.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-54.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagickCore-6_Q16-1-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-54.1
libMagickWand-6_Q16-1-6.8.8.1-54.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-54.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
ImageMagick-6.8.8.1-54.1
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagick++-6_Q16-3-6.8.8.1-54.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-54.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1
libMagickCore-6_Q16-1-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-54.1
libMagickWand-6_Q16-1-6.8.8.1-54.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-54.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
ImageMagick-6.8.8.1-54.1
ImageMagick-debuginfo-6.8.8.1-54.1
ImageMagick-debugsource-6.8.8.1-54.1
libMagick++-6_Q16-3-6.8.8.1-54.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-54.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-54.1
libMagickCore-6_Q16-1-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-54.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-54.1
libMagickWand-6_Q16-1-6.8.8.1-54.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-54.1
References:
https://www.suse.com/security/cve/CVE-2014-9848.htmlhttps://www.suse.com/security/cve/CVE-2016-8707.htmlhttps://www.suse.com/security/cve/CVE-2016-8866.htmlhttps://www.suse.com/security/cve/CVE-2016-9556.htmlhttps://www.suse.com/security/cve/CVE-2016-9559.htmlhttps://www.suse.com/security/cve/CVE-2016-9773.htmlhttps://bugzilla.suse.com/1009318https://bugzilla.suse.com/1011130https://bugzilla.suse.com/1011136https://bugzilla.suse.com/1013376https://bugzilla.suse.com/1014159
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org