SUSE Security Update: Security update for pidgin-otr
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:0912-1
Rating: important
References: #970498
Cross-References: CVE-2015-8833
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Desktop 12-SP1
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pidgin-otr fixes the following issues:
- CVE-2015-8833: A heap based use-after-free issue was fixed in pidgin-otr
that could lead to crashes or potential code execution.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-523=1
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2016-523=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-523=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-523=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
pidgin-otr-4.0.0-8.1
pidgin-otr-debuginfo-4.0.0-8.1
pidgin-otr-debugsource-4.0.0-8.1
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
pidgin-otr-4.0.0-8.1
pidgin-otr-debuginfo-4.0.0-8.1
pidgin-otr-debugsource-4.0.0-8.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
pidgin-otr-4.0.0-8.1
pidgin-otr-debuginfo-4.0.0-8.1
pidgin-otr-debugsource-4.0.0-8.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
pidgin-otr-4.0.0-8.1
pidgin-otr-debuginfo-4.0.0-8.1
pidgin-otr-debugsource-4.0.0-8.1
References:
https://www.suse.com/security/cve/CVE-2015-8833.htmlhttps://bugzilla.suse.com/970498
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:0911-1
Rating: important
References: #758040 #904035 #912738 #915183 #924919 #933782
#937444 #940017 #940946 #942082 #947128 #948330
#949298 #951392 #951815 #952976 #953369 #954992
#955308 #955654 #955837 #955925 #956084 #956375
#956514 #956708 #956949 #957986 #957988 #957990
#958000 #958463 #958886 #958906 #958912 #958951
#959190 #959312 #959399 #959649 #959705 #961500
#961509 #961516 #961658 #962965 #963276 #963561
#963765 #963767 #964201 #964818 #966094 #966137
#966437 #966693 #967042 #967972 #967973 #967974
#967975 #968011 #968012 #968013 #969307
Cross-References: CVE-2013-7446 CVE-2015-7515 CVE-2015-7550
CVE-2015-8539 CVE-2015-8543 CVE-2015-8550
CVE-2015-8551 CVE-2015-8552 CVE-2015-8569
CVE-2015-8575 CVE-2015-8767 CVE-2015-8785
CVE-2015-8812 CVE-2016-0723 CVE-2016-2069
CVE-2016-2384 CVE-2016-2543 CVE-2016-2544
CVE-2016-2545 CVE-2016-2546 CVE-2016-2547
CVE-2016-2548 CVE-2016-2549
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-EXTRA
SUSE Linux Enterprise Desktop 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that solves 23 vulnerabilities and has 42 fixes
is now available.
Description:
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.
Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O
bandwidth. (FATE#320200) It is called xen-blkfront in PV, and
xen-vbd-upstream in HVM mode.
The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the
Linux kernel allowed local users to bypass intended AF_UNIX socket
permissions or cause a denial of service (panic) via crafted epoll_ctl
calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB driver
could be used by physical local attackers to crash the kernel
(bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in
the Linux kernel did not properly use a semaphore, which allowed local
users to cause a denial of service (NULL pointer dereference and system
crash) or possibly have unspecified other impact via a crafted
application that leverages a race condition between keyctl_revoke and
keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local
users to gain privileges or cause a denial of service (BUG) via crafted
keyctl commands that negatively instantiate a key, related to
security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and
security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel did not
validate protocol identifiers for certain protocol families, which
allowed local users to cause a denial of service (NULL function pointer
dereference and system crash) or possibly gain privileges by leveraging
CLONE_NEWUSER support to execute a crafted SOCK_RAW application
(bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
could have lead to double fetch vulnerabilities, causing denial of
service
or arbitrary code execution (depending on the configuration)
(bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
(bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
length, which allowed local users to obtain sensitive information from
kernel memory and bypass the KASLR protection mechanism via a crafted
application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
Linux kernel did not verify an address length, which allowed local users
to obtain sensitive information from kernel memory and bypass the KASLR
protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
properly manage the relationship between a lock and a socket, which
allowed local users to cause a denial of service (deadlock) via a
crafted sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in
the Linux kernel allowed local users to cause a denial of service
(infinite loop) via a writev system call that triggers a zero length for
the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
driver when the network was considered to be congested. This could be
used by local attackers to cause machine crashes or potentially code
execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory or cause a denial of service
(use-after-free and system crash) by making a TIOCGETD ioctl call during
processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could leak
to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in the
umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in ALSA
that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
bsc#968012, bsc#968013).
The following non-security bugs were fixed:
- alsa: hda - Add one more node in the EAPD supporting candidate list
(bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT
(bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset
(bsc#966137).
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver
implementation (bsc#957986, bsc#956084, bsc#961658).
- Fix handling of re-write-before-commit for mmapped NFS pages
(bsc#964201).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too
(bsc#951815).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch
(bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also
address bsc#966094).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT
when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and
TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- Update
patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch
(bnc#940017, bnc#949298, bnc#947128).
- xen: Update Xen config files (enable upstream block frontend).
- ec2: Update kabi files and start tracking ec2
- xen: consolidate and simplify struct xenbus_driver instantiation
(bsc#961658 fate#320200).
- blktap: also call blkif_disconnect() when frontend switched to closed
(bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658
fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place
(bsc#961658 fate#320200).
- drivers: xen-blkfront: only talk_to_blkback() when in
XenbusStateInitialising (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode
(bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no
external, 3rd party modules use the symbol and the
bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver.
(bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry
(bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- s390/cio: collect format 1 channel-path description data (bnc#958000,
LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000,
LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000,
LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000,
LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file
(bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation
(bsc#956949).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen, blkfront: factor out flush-related checks from do_blkif_request()
(bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation
(bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of
indirect segments (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658
fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658
fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed
(XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent
(bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658
fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658
fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658
fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658
fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request
(bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658
fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path
(bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658
fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658
fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend
(bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658
fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658
fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support
(bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard
together (bsc#961658 fate#320200).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658
fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states
(bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658
fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA
(bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658
fate#320200).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush
synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags()
(bsc#948330).
- xfs: Skip dirty pages in ->releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-kernel-201603-12480=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-kernel-201603-12480=1
- SUSE Linux Enterprise Server 11-EXTRA:
zypper in -t patch slexsp3-kernel-201603-12480=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-kernel-201603-12480=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-kernel-201603-12480=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch):
kernel-docs-3.0.101-71.2
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
kernel-default-3.0.101-71.1
kernel-default-base-3.0.101-71.1
kernel-default-devel-3.0.101-71.1
kernel-source-3.0.101-71.1
kernel-syms-3.0.101-71.1
kernel-trace-3.0.101-71.1
kernel-trace-base-3.0.101-71.1
kernel-trace-devel-3.0.101-71.1
- SUSE Linux Enterprise Server 11-SP4 (i586 x86_64):
kernel-ec2-3.0.101-71.1
kernel-ec2-base-3.0.101-71.1
kernel-ec2-devel-3.0.101-71.1
kernel-xen-3.0.101-71.1
kernel-xen-base-3.0.101-71.1
kernel-xen-devel-3.0.101-71.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64):
kernel-ppc64-3.0.101-71.1
kernel-ppc64-base-3.0.101-71.1
kernel-ppc64-devel-3.0.101-71.1
- SUSE Linux Enterprise Server 11-SP4 (s390x):
kernel-default-man-3.0.101-71.1
- SUSE Linux Enterprise Server 11-SP4 (i586):
kernel-pae-3.0.101-71.1
kernel-pae-base-3.0.101-71.1
kernel-pae-devel-3.0.101-71.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-71.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64):
kernel-xen-extra-3.0.101-71.1
- SUSE Linux Enterprise Server 11-EXTRA (x86_64):
kernel-trace-extra-3.0.101-71.1
- SUSE Linux Enterprise Server 11-EXTRA (ppc64):
kernel-ppc64-extra-3.0.101-71.1
- SUSE Linux Enterprise Server 11-EXTRA (i586):
kernel-pae-extra-3.0.101-71.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
kernel-default-3.0.101-71.1
kernel-default-base-3.0.101-71.1
kernel-default-devel-3.0.101-71.1
kernel-default-extra-3.0.101-71.1
kernel-source-3.0.101-71.1
kernel-syms-3.0.101-71.1
kernel-trace-devel-3.0.101-71.1
kernel-xen-3.0.101-71.1
kernel-xen-base-3.0.101-71.1
kernel-xen-devel-3.0.101-71.1
kernel-xen-extra-3.0.101-71.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586):
kernel-pae-3.0.101-71.1
kernel-pae-base-3.0.101-71.1
kernel-pae-devel-3.0.101-71.1
kernel-pae-extra-3.0.101-71.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
kernel-default-debuginfo-3.0.101-71.1
kernel-default-debugsource-3.0.101-71.1
kernel-trace-debuginfo-3.0.101-71.1
kernel-trace-debugsource-3.0.101-71.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 s390x x86_64):
kernel-default-devel-debuginfo-3.0.101-71.1
kernel-trace-devel-debuginfo-3.0.101-71.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
kernel-ec2-debuginfo-3.0.101-71.1
kernel-ec2-debugsource-3.0.101-71.1
kernel-xen-debuginfo-3.0.101-71.1
kernel-xen-debugsource-3.0.101-71.1
kernel-xen-devel-debuginfo-3.0.101-71.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64):
kernel-ppc64-debuginfo-3.0.101-71.1
kernel-ppc64-debugsource-3.0.101-71.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586):
kernel-pae-debuginfo-3.0.101-71.1
kernel-pae-debugsource-3.0.101-71.1
kernel-pae-devel-debuginfo-3.0.101-71.1
References:
https://www.suse.com/security/cve/CVE-2013-7446.htmlhttps://www.suse.com/security/cve/CVE-2015-7515.htmlhttps://www.suse.com/security/cve/CVE-2015-7550.htmlhttps://www.suse.com/security/cve/CVE-2015-8539.htmlhttps://www.suse.com/security/cve/CVE-2015-8543.htmlhttps://www.suse.com/security/cve/CVE-2015-8550.htmlhttps://www.suse.com/security/cve/CVE-2015-8551.htmlhttps://www.suse.com/security/cve/CVE-2015-8552.htmlhttps://www.suse.com/security/cve/CVE-2015-8569.htmlhttps://www.suse.com/security/cve/CVE-2015-8575.htmlhttps://www.suse.com/security/cve/CVE-2015-8767.htmlhttps://www.suse.com/security/cve/CVE-2015-8785.htmlhttps://www.suse.com/security/cve/CVE-2015-8812.htmlhttps://www.suse.com/security/cve/CVE-2016-0723.htmlhttps://www.suse.com/security/cve/CVE-2016-2069.htmlhttps://www.suse.com/security/cve/CVE-2016-2384.htmlhttps://www.suse.com/security/cve/CVE-2016-2543.htmlhttps://www.suse.com/security/cve/CVE-2016-2544.htmlhttps://www.suse.com/security/cve/CVE-2016-2545.htmlhttps://www.suse.com/security/cve/CVE-2016-2546.htmlhttps://www.suse.com/security/cve/CVE-2016-2547.htmlhttps://www.suse.com/security/cve/CVE-2016-2548.htmlhttps://www.suse.com/security/cve/CVE-2016-2549.htmlhttps://bugzilla.suse.com/758040https://bugzilla.suse.com/904035https://bugzilla.suse.com/912738https://bugzilla.suse.com/915183https://bugzilla.suse.com/924919https://bugzilla.suse.com/933782https://bugzilla.suse.com/937444https://bugzilla.suse.com/940017https://bugzilla.suse.com/940946https://bugzilla.suse.com/942082https://bugzilla.suse.com/947128https://bugzilla.suse.com/948330https://bugzilla.suse.com/949298https://bugzilla.suse.com/951392https://bugzilla.suse.com/951815https://bugzilla.suse.com/952976https://bugzilla.suse.com/953369https://bugzilla.suse.com/954992https://bugzilla.suse.com/955308https://bugzilla.suse.com/955654https://bugzilla.suse.com/955837https://bugzilla.suse.com/955925https://bugzilla.suse.com/956084https://bugzilla.suse.com/956375https://bugzilla.suse.com/956514https://bugzilla.suse.com/956708https://bugzilla.suse.com/956949https://bugzilla.suse.com/957986https://bugzilla.suse.com/957988https://bugzilla.suse.com/957990https://bugzilla.suse.com/958000https://bugzilla.suse.com/958463https://bugzilla.suse.com/958886https://bugzilla.suse.com/958906https://bugzilla.suse.com/958912https://bugzilla.suse.com/958951https://bugzilla.suse.com/959190https://bugzilla.suse.com/959312https://bugzilla.suse.com/959399https://bugzilla.suse.com/959649https://bugzilla.suse.com/959705https://bugzilla.suse.com/961500https://bugzilla.suse.com/961509https://bugzilla.suse.com/961516https://bugzilla.suse.com/961658https://bugzilla.suse.com/962965https://bugzilla.suse.com/963276https://bugzilla.suse.com/963561https://bugzilla.suse.com/963765https://bugzilla.suse.com/963767https://bugzilla.suse.com/964201https://bugzilla.suse.com/964818https://bugzilla.suse.com/966094https://bugzilla.suse.com/966137https://bugzilla.suse.com/966437https://bugzilla.suse.com/966693https://bugzilla.suse.com/967042https://bugzilla.suse.com/967972https://bugzilla.suse.com/967973https://bugzilla.suse.com/967974https://bugzilla.suse.com/967975https://bugzilla.suse.com/968011https://bugzilla.suse.com/968012https://bugzilla.suse.com/968013https://bugzilla.suse.com/969307
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for MozillaFirefox, mozilla-nspr, mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:0909-1
Rating: important
References: #969894
Cross-References: CVE-2016-1950 CVE-2016-1952 CVE-2016-1953
CVE-2016-1954 CVE-2016-1957 CVE-2016-1958
CVE-2016-1960 CVE-2016-1961 CVE-2016-1962
CVE-2016-1964 CVE-2016-1965 CVE-2016-1966
CVE-2016-1974 CVE-2016-1977 CVE-2016-1978
CVE-2016-1979 CVE-2016-2790 CVE-2016-2791
CVE-2016-2792 CVE-2016-2793 CVE-2016-2794
CVE-2016-2795 CVE-2016-2796 CVE-2016-2797
CVE-2016-2798 CVE-2016-2799 CVE-2016-2800
CVE-2016-2801 CVE-2016-2802
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________
An update that fixes 29 vulnerabilities is now available.
Description:
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the
following issues:
Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing following
security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953 Miscellaneous memory safety
hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954 Local file overwriting and potential
privilege escalation through CSP reports
* MFSA 2016-20/CVE-2016-1957 Memory leak in libstagefright when deleting
an array during MP4 processing
* MFSA 2016-21/CVE-2016-1958 Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960 Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961 Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962 Use-after-free when using multiple WebRTC
data channels
* MFSA 2016-27/CVE-2016-1964 Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965 Addressbar spoofing though history navigation
and Location protocol property
* MFSA 2016-31/CVE-2016-1966 Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974 Out-of-bounds read in HTML parser following a
failed allocation
* MFSA 2016-35/CVE-2016-1950 Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
CVE-2016-2800/CVE-2016-2801/CVE-2016-2802 Font vulnerabilities in the
Graphite 2 library
Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following
bugs:
* added a PR_GetEnvSecure function, which attempts to detect if the
program is being executed with elevated privileges, and returns NULL if
detected. It is recommended to use this function in general purpose
library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been added in
NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978 Use-after-free in NSS during SSL connections
in low memory
* MFSA 2016-35/CVE-2016-1950 Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979 Use-after-free during processing of DER
encoded keys in NSS
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-firefox-20160310-12483=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-firefox-20160310-12483=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
MozillaFirefox-38.7.0esr-36.3
MozillaFirefox-translations-38.7.0esr-36.3
libfreebl3-3.20.2-20.1
mozilla-nspr-4.12-19.1
mozilla-nspr-devel-4.12-19.1
mozilla-nss-3.20.2-20.1
mozilla-nss-devel-3.20.2-20.1
mozilla-nss-tools-3.20.2-20.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):
libfreebl3-32bit-3.20.2-20.1
mozilla-nspr-32bit-4.12-19.1
mozilla-nss-32bit-3.20.2-20.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):
MozillaFirefox-debuginfo-38.7.0esr-36.3
MozillaFirefox-debugsource-38.7.0esr-36.3
mozilla-nspr-debuginfo-4.12-19.1
mozilla-nspr-debugsource-4.12-19.1
mozilla-nss-debuginfo-3.20.2-20.1
mozilla-nss-debugsource-3.20.2-20.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):
mozilla-nspr-debuginfo-32bit-4.12-19.1
mozilla-nss-debuginfo-32bit-3.20.2-20.1
References:
https://www.suse.com/security/cve/CVE-2016-1950.htmlhttps://www.suse.com/security/cve/CVE-2016-1952.htmlhttps://www.suse.com/security/cve/CVE-2016-1953.htmlhttps://www.suse.com/security/cve/CVE-2016-1954.htmlhttps://www.suse.com/security/cve/CVE-2016-1957.htmlhttps://www.suse.com/security/cve/CVE-2016-1958.htmlhttps://www.suse.com/security/cve/CVE-2016-1960.htmlhttps://www.suse.com/security/cve/CVE-2016-1961.htmlhttps://www.suse.com/security/cve/CVE-2016-1962.htmlhttps://www.suse.com/security/cve/CVE-2016-1964.htmlhttps://www.suse.com/security/cve/CVE-2016-1965.htmlhttps://www.suse.com/security/cve/CVE-2016-1966.htmlhttps://www.suse.com/security/cve/CVE-2016-1974.htmlhttps://www.suse.com/security/cve/CVE-2016-1977.htmlhttps://www.suse.com/security/cve/CVE-2016-1978.htmlhttps://www.suse.com/security/cve/CVE-2016-1979.htmlhttps://www.suse.com/security/cve/CVE-2016-2790.htmlhttps://www.suse.com/security/cve/CVE-2016-2791.htmlhttps://www.suse.com/security/cve/CVE-2016-2792.htmlhttps://www.suse.com/security/cve/CVE-2016-2793.htmlhttps://www.suse.com/security/cve/CVE-2016-2794.htmlhttps://www.suse.com/security/cve/CVE-2016-2795.htmlhttps://www.suse.com/security/cve/CVE-2016-2796.htmlhttps://www.suse.com/security/cve/CVE-2016-2797.htmlhttps://www.suse.com/security/cve/CVE-2016-2798.htmlhttps://www.suse.com/security/cve/CVE-2016-2799.htmlhttps://www.suse.com/security/cve/CVE-2016-2800.htmlhttps://www.suse.com/security/cve/CVE-2016-2801.htmlhttps://www.suse.com/security/cve/CVE-2016-2802.htmlhttps://bugzilla.suse.com/969894
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for samba
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:0905-1
Rating: important
References: #936909 #953382 #967017 #968222
Cross-References: CVE-2015-7560
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for samba fixes the following issues:
Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change
permissions on link target; (bso#11648); (bsc#968222).
Bugs fixed:
- Fix leaking memory in libsmbclient: Add missing talloc stackframe;
(bso#11177); (bsc#967017).
- Ensure samlogon fallback requests are rerouted after kerberos failure;
(bsc#953382).
- Ensure attempt to ssh into locked account triggers "Your account is
disabled....." to the console; (bsc#953382).
- Make the winbind package depend on the matching libwbclient version and
vice versa; (bsc#936909).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-samba-12477=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-samba-12477=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
ldapsmb-1.34b-48.2
libldb1-3.6.3-48.2
libsmbclient0-3.6.3-48.2
libtalloc2-3.6.3-48.2
libtdb1-3.6.3-48.2
libtevent0-3.6.3-48.2
libwbclient0-3.6.3-48.2
samba-3.6.3-48.2
samba-client-3.6.3-48.2
samba-krb-printing-3.6.3-48.2
samba-winbind-3.6.3-48.2
- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):
libsmbclient0-32bit-3.6.3-48.2
libtalloc2-32bit-3.6.3-48.2
libtdb1-32bit-3.6.3-48.2
libtevent0-32bit-3.6.3-48.2
libwbclient0-32bit-3.6.3-48.2
samba-32bit-3.6.3-48.2
samba-client-32bit-3.6.3-48.2
samba-winbind-32bit-3.6.3-48.2
- SUSE Linux Enterprise Server 11-SP2-LTSS (noarch):
samba-doc-3.6.3-48.2
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):
samba-debuginfo-3.6.3-48.2
samba-debugsource-3.6.3-48.2
- SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):
samba-debuginfo-32bit-3.6.3-48.2
References:
https://www.suse.com/security/cve/CVE-2015-7560.htmlhttps://bugzilla.suse.com/936909https://bugzilla.suse.com/953382https://bugzilla.suse.com/967017https://bugzilla.suse.com/968222
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for graphite2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:0875-1
Rating: important
References: #965803 #965807 #965810
Cross-References: CVE-2016-1521 CVE-2016-1523 CVE-2016-1526
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for graphite2 fixes the following issues:
- CVE-2016-1521: The directrun function in directmachine.cpp in
Libgraphite did not validate a certain skip operation, which allowed
remote attackers to execute arbitrary code, obtain sensitive information,
or cause a denial of service (out-of-bounds read and application crash)
via a crafted Graphite smart font.
- CVE-2016-1523: The SillMap::readFace function in FeatureMap.cpp in
Libgraphite mishandled a return value, which allowed remote attackers to
cause a denial of service (missing initialization, NULL pointer
dereference, and application crash) via a crafted Graphite smart font.
- CVE-2016-1526: The TtfUtil:LocaLookup function in TtfUtil.cpp in
Libgraphite incorrectly validated a size value, which allowed remote
attackers to obtain sensitive information or cause a denial of service
(out-of-bounds read and application crash) via a crafted Graphite smart
font.
This update was imported from the SUSE:SLE-12:Update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2016-389=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i586 x86_64):
graphite2-1.3.1-3.1
graphite2-debuginfo-1.3.1-3.1
graphite2-debugsource-1.3.1-3.1
graphite2-devel-1.3.1-3.1
libgraphite2-3-1.3.1-3.1
libgraphite2-3-debuginfo-1.3.1-3.1
- openSUSE Leap 42.1 (x86_64):
libgraphite2-3-32bit-1.3.1-3.1
libgraphite2-3-debuginfo-32bit-1.3.1-3.1
References:
https://www.suse.com/security/cve/CVE-2016-1521.htmlhttps://www.suse.com/security/cve/CVE-2016-1523.htmlhttps://www.suse.com/security/cve/CVE-2016-1526.htmlhttps://bugzilla.suse.com/965803https://bugzilla.suse.com/965807https://bugzilla.suse.com/965810
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org