openSUSE Security Update: Security update for postgresql93
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:2425-1
Rating: important
References: #993453 #993454
Cross-References: CVE-2016-5423 CVE-2016-5424
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The postgresql server postgresql93 was updated to 9.3.14 fixes the
following issues:
Update to version 9.3.14:
* Fix possible mis-evaluation of nested CASE-WHEN expressions
(CVE-2016-5423, boo#993454)
* Fix client programs' handling of special characters in database and role
names (CVE-2016-5424, boo#993453)
* Fix corner-case misbehaviors for IS NULL/IS NOT NULL applied to nested
composite values
* Make the inet and cidr data types properly reject IPv6 addresses with
too many colon-separated fields
* Prevent crash in close_ps() (the point ## lseg operator) for NaN input
coordinates
* Fix several one-byte buffer over-reads in to_number()
* Avoid unsafe intermediate state during expensive paths through
heap_update()
* For the other bug fixes, see the release notes:
https://www.postgresql.org/docs/9.3/static/release-9-3-14.html
Update to version 9.3.13:
This update fixes several problems which caused downtime for users,
including:
- Clearing the OpenSSL error queue before OpenSSL calls, preventing errors
in SSL connections, particularly when using the Python, Ruby or PHP
OpenSSL wrappers
- Fixed the "failed to build N-way joins" planner error
- Fixed incorrect handling of equivalence in multilevel nestloop query
plans, which could emit rows which didn't match the WHERE clause.
- Prevented two memory leaks with using GIN indexes, including a potential
index corruption risk. The release also includes many other bug fixes
for reported issues, many of which affect all supported versions:
- Fix corner-case parser failures occurring when
operator_precedence_warning is turned on
- Prevent possible misbehavior of TH, th, and Y,YYY format codes in
to_timestamp()
- Correct dumping of VIEWs and RULEs which use ANY (array) in a subselect
- Disallow newlines in ALTER SYSTEM parameter values
- Avoid possible misbehavior after failing to remove a tablespace symlink
- Fix crash in logical decoding on alignment-picky platforms
- Avoid repeated requests for feedback from receiver while shutting down
walsender
- Multiple fixes for pg_upgrade
- Support building with Visual Studio 2015
- This update also contains tzdata release 2016d, with updates for Russia,
Venezuela, Kirov, and Tomsk.
http://www.postgresql.org/docs/current/static/release-9-3-13.html
Update to version 9.3.12:
- Fix two bugs in indexed ROW() comparisons
- Avoid data loss due to renaming files
- Prevent an error in rechecking rows in SELECT FOR UPDATE/SHARE
- Fix bugs in multiple json_ and jsonb_ functions
- Log lock waits for INSERT ON CONFLICT correctly
- Ignore recovery_min_apply_delay until reaching a consistent state
- Fix issue with pg_subtrans XID wraparound
- Fix assorted bugs in Logical Decoding
- Fix planner error with nested security barrier views
- Prevent memory leak in GIN indexes
- Fix two issues with ispell dictionaries
- Avoid a crash on old Windows versions
- Skip creating an erroneous delete script in pg_upgrade
- Correctly translate empty arrays into PL/Perl
- Make PL/Python cope with identifier names
For the full release notes, see:
http://www.postgresql.org/docs/9.4/static/release-9-3-12.html
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-1140=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
libecpg6-9.3.14-2.13.1
libecpg6-debuginfo-9.3.14-2.13.1
libpq5-9.3.14-2.13.1
libpq5-debuginfo-9.3.14-2.13.1
postgresql93-9.3.14-2.13.1
postgresql93-contrib-9.3.14-2.13.1
postgresql93-contrib-debuginfo-9.3.14-2.13.1
postgresql93-debuginfo-9.3.14-2.13.1
postgresql93-debugsource-9.3.14-2.13.1
postgresql93-devel-9.3.14-2.13.1
postgresql93-devel-debuginfo-9.3.14-2.13.1
postgresql93-libs-debugsource-9.3.14-2.13.1
postgresql93-plperl-9.3.14-2.13.1
postgresql93-plperl-debuginfo-9.3.14-2.13.1
postgresql93-plpython-9.3.14-2.13.1
postgresql93-plpython-debuginfo-9.3.14-2.13.1
postgresql93-pltcl-9.3.14-2.13.1
postgresql93-pltcl-debuginfo-9.3.14-2.13.1
postgresql93-server-9.3.14-2.13.1
postgresql93-server-debuginfo-9.3.14-2.13.1
postgresql93-test-9.3.14-2.13.1
- openSUSE 13.2 (noarch):
postgresql93-docs-9.3.14-2.13.1
- openSUSE 13.2 (x86_64):
libecpg6-32bit-9.3.14-2.13.1
libecpg6-debuginfo-32bit-9.3.14-2.13.1
libpq5-32bit-9.3.14-2.13.1
libpq5-debuginfo-32bit-9.3.14-2.13.1
References:
https://www.suse.com/security/cve/CVE-2016-5423.htmlhttps://www.suse.com/security/cve/CVE-2016-5424.htmlhttps://bugzilla.suse.com/993453https://bugzilla.suse.com/993454
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for postgresql94
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2418-1
Rating: important
References: #993453 #993454
Cross-References: CVE-2016-5423 CVE-2016-5424
Affected Products:
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for postgresql94 to version 9.4.9 fixes the several issues.
These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer
dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in
database and role names (bsc#993453).
For the non-security issues please refer to
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Manager 2.1:
zypper in -t patch sleman21-postgresql94-12766=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-postgresql94-12766=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-postgresql94-12766=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-postgresql94-12766=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager 2.1 (s390x x86_64):
postgresql94-pltcl-9.4.9-0.19.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
postgresql94-devel-9.4.9-0.19.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libecpg6-9.4.9-0.19.1
libpq5-9.4.9-0.19.1
postgresql94-9.4.9-0.19.1
postgresql94-contrib-9.4.9-0.19.1
postgresql94-docs-9.4.9-0.19.1
postgresql94-server-9.4.9-0.19.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
libpq5-32bit-9.4.9-0.19.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
postgresql94-debuginfo-9.4.9-0.19.1
postgresql94-debugsource-9.4.9-0.19.1
postgresql94-libs-debuginfo-9.4.9-0.19.1
postgresql94-libs-debugsource-9.4.9-0.19.1
References:
https://www.suse.com/security/cve/CVE-2016-5423.htmlhttps://www.suse.com/security/cve/CVE-2016-5424.htmlhttps://bugzilla.suse.com/993453https://bugzilla.suse.com/993454
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for pidgin
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2416-1
Rating: important
References: #991691 #991709 #991711 #991712 #991715
Cross-References: CVE-2016-2367 CVE-2016-2370 CVE-2016-2371
CVE-2016-2372 CVE-2016-2373
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for pidgin fixes the following issues:
Security issues fixed:
- CVE-2016-2367: Fixed a MXIT Avatar Length Memory Disclosure
Vulnerability (bsc#991715).
- CVE-2016-2370: Fixed a MXIT Custom Resource Denial of Service
Vulnerability (bsc#991712).
- CVE-2016-2371: Fixed a MXIT Extended Profiles Code Execution
Vulnerability (bsc#991691).
- CVE-2016-2372: Fixed a MXIT File Transfer Length Memory Disclosure
Vulnerability (bsc#991711).
- CVE-2016-2373: Fixed a MXIT Contact Mood Denial of Service Vulnerability
(bsc#991709)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-pidgin-12767=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-pidgin-12767=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
finch-2.6.6-0.29.1
finch-devel-2.6.6-0.29.1
libpurple-2.6.6-0.29.1
libpurple-devel-2.6.6-0.29.1
libpurple-lang-2.6.6-0.29.1
pidgin-2.6.6-0.29.1
pidgin-devel-2.6.6-0.29.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
pidgin-debuginfo-2.6.6-0.29.1
pidgin-debugsource-2.6.6-0.29.1
References:
https://www.suse.com/security/cve/CVE-2016-2367.htmlhttps://www.suse.com/security/cve/CVE-2016-2370.htmlhttps://www.suse.com/security/cve/CVE-2016-2371.htmlhttps://www.suse.com/security/cve/CVE-2016-2372.htmlhttps://www.suse.com/security/cve/CVE-2016-2373.htmlhttps://bugzilla.suse.com/991691https://bugzilla.suse.com/991709https://bugzilla.suse.com/991711https://bugzilla.suse.com/991712https://bugzilla.suse.com/991715
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for postgresql94
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2415-1
Rating: important
References: #973660 #993453 #993454
Cross-References: CVE-2016-5423 CVE-2016-5424
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for postgresql94 to version 9.4.9 fixes the several issues.
These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer
dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in
database and role names (bsc#993453).
This non-security issue was fixed:
- bsc#973660: Added "Requires: timezone" to Service Pack
For additional non-security issues please refer to
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1409=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1409=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1409=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
postgresql94-devel-9.4.9-14.1
postgresql94-devel-debuginfo-9.4.9-14.1
postgresql94-libs-debugsource-9.4.9-14.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libecpg6-9.4.9-14.1
libecpg6-debuginfo-9.4.9-14.1
libpq5-9.4.9-14.1
libpq5-debuginfo-9.4.9-14.1
postgresql94-9.4.9-14.1
postgresql94-contrib-9.4.9-14.1
postgresql94-contrib-debuginfo-9.4.9-14.1
postgresql94-debuginfo-9.4.9-14.1
postgresql94-debugsource-9.4.9-14.1
postgresql94-libs-debugsource-9.4.9-14.1
postgresql94-server-9.4.9-14.1
postgresql94-server-debuginfo-9.4.9-14.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libpq5-32bit-9.4.9-14.1
libpq5-debuginfo-32bit-9.4.9-14.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
postgresql94-docs-9.4.9-14.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libecpg6-9.4.9-14.1
libecpg6-debuginfo-9.4.9-14.1
libpq5-32bit-9.4.9-14.1
libpq5-9.4.9-14.1
libpq5-debuginfo-32bit-9.4.9-14.1
libpq5-debuginfo-9.4.9-14.1
postgresql94-9.4.9-14.1
postgresql94-debuginfo-9.4.9-14.1
postgresql94-debugsource-9.4.9-14.1
postgresql94-libs-debugsource-9.4.9-14.1
References:
https://www.suse.com/security/cve/CVE-2016-5423.htmlhttps://www.suse.com/security/cve/CVE-2016-5424.htmlhttps://bugzilla.suse.com/973660https://bugzilla.suse.com/993453https://bugzilla.suse.com/993454
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for postgresql93
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2414-1
Rating: important
References: #973660 #993453 #993454
Cross-References: CVE-2016-5423 CVE-2016-5424
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for postgresql93 to version 9.3.14 fixes the several issues.
These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer
dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in
database and role names (bsc#993453).
This non-security issue was fixed:
- bsc#973660: Added "Requires: timezone" to Service Pack
For additional non-security issues please refer to
- http://www.postgresql.org/docs/9.3/static/release-9-3-14.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-13.html
- http://www.postgresql.org/docs/9.4/static/release-9-3-12.html
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2016-1407=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2016-1407=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (noarch):
postgresql93-docs-9.3.14-19.2
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
postgresql93-9.3.14-19.2
postgresql93-contrib-9.3.14-19.2
postgresql93-contrib-debuginfo-9.3.14-19.2
postgresql93-debuginfo-9.3.14-19.2
postgresql93-debugsource-9.3.14-19.2
postgresql93-server-9.3.14-19.2
postgresql93-server-debuginfo-9.3.14-19.2
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
postgresql93-9.3.14-19.2
postgresql93-contrib-9.3.14-19.2
postgresql93-contrib-debuginfo-9.3.14-19.2
postgresql93-debuginfo-9.3.14-19.2
postgresql93-debugsource-9.3.14-19.2
postgresql93-server-9.3.14-19.2
postgresql93-server-debuginfo-9.3.14-19.2
- SUSE Linux Enterprise Server 12-LTSS (noarch):
postgresql93-docs-9.3.14-19.2
References:
https://www.suse.com/security/cve/CVE-2016-5423.htmlhttps://www.suse.com/security/cve/CVE-2016-5424.htmlhttps://bugzilla.suse.com/973660https://bugzilla.suse.com/993453https://bugzilla.suse.com/993454
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for bind
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:2406-1
Rating: critical
References: #1000362
Cross-References: CVE-2016-2776
Affected Products:
openSUSE Leap 42.1
openSUSE 13.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort.
(CVE-2016-2776, bsc#1000362)
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2016-1133=1
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-1133=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i586 x86_64):
bind-9.9.9P1-39.1
bind-chrootenv-9.9.9P1-39.1
bind-debuginfo-9.9.9P1-39.1
bind-debugsource-9.9.9P1-39.1
bind-devel-9.9.9P1-39.1
bind-libs-9.9.9P1-39.1
bind-libs-debuginfo-9.9.9P1-39.1
bind-lwresd-9.9.9P1-39.1
bind-lwresd-debuginfo-9.9.9P1-39.1
bind-utils-9.9.9P1-39.1
bind-utils-debuginfo-9.9.9P1-39.1
- openSUSE Leap 42.1 (x86_64):
bind-libs-32bit-9.9.9P1-39.1
bind-libs-debuginfo-32bit-9.9.9P1-39.1
- openSUSE Leap 42.1 (noarch):
bind-doc-9.9.9P1-39.1
- openSUSE 13.2 (i586 x86_64):
bind-9.9.6P1-2.22.1
bind-chrootenv-9.9.6P1-2.22.1
bind-debuginfo-9.9.6P1-2.22.1
bind-debugsource-9.9.6P1-2.22.1
bind-devel-9.9.6P1-2.22.1
bind-libs-9.9.6P1-2.22.1
bind-libs-debuginfo-9.9.6P1-2.22.1
bind-lwresd-9.9.6P1-2.22.1
bind-lwresd-debuginfo-9.9.6P1-2.22.1
bind-utils-9.9.6P1-2.22.1
bind-utils-debuginfo-9.9.6P1-2.22.1
- openSUSE 13.2 (noarch):
bind-doc-9.9.6P1-2.22.1
- openSUSE 13.2 (x86_64):
bind-libs-32bit-9.9.6P1-2.22.1
bind-libs-debuginfo-32bit-9.9.6P1-2.22.1
References:
https://www.suse.com/security/cve/CVE-2016-2776.htmlhttps://bugzilla.suse.com/1000362
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for bind
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2405-1
Rating: critical
References: #1000362
Cross-References: CVE-2016-2776
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort.
(CVE-2016-2776, bsc#1000362)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-bind-12763=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-bind-12763=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-bind-12763=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-bind-12763=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-bind-12763=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-bind-12763=1
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-bind-12763=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-bind-12763=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-bind-12763=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-bind-12763=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-bind-12763=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-32bit-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Manager Proxy 2.1 (x86_64):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-32bit-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Manager 2.1 (s390x x86_64):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-32bit-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bind-devel-9.9.6P1-0.30.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64):
bind-devel-32bit-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
bind-libs-32bit-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP4 (ia64):
bind-libs-x86-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):
bind-libs-32bit-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-devel-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):
bind-libs-32bit-9.9.6P1-0.30.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
bind-9.9.6P1-0.30.1
bind-chrootenv-9.9.6P1-0.30.1
bind-doc-9.9.6P1-0.30.1
bind-libs-9.9.6P1-0.30.1
bind-utils-9.9.6P1-0.30.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bind-debuginfo-9.9.6P1-0.30.1
bind-debugsource-9.9.6P1-0.30.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
bind-debuginfo-9.9.6P1-0.30.1
bind-debugsource-9.9.6P1-0.30.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):
bind-debuginfo-9.9.6P1-0.30.1
bind-debugsource-9.9.6P1-0.30.1
References:
https://www.suse.com/security/cve/CVE-2016-2776.htmlhttps://bugzilla.suse.com/1000362
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2404-1
Rating: important
References: #949520 #998309
Cross-References: CVE-2016-6662
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for mariadb to 1.0.0.27 fixes the following issues:
Security issue fixed:
* CVE-2016-6662: A malicious user with SQL and filesystem access could
create a my.cnf in the datadir and, under certain circumstances, execute
arbitrary code as mysql (or even root) user. (bsc#998309)
* release notes:
* https://kb.askmonty.org/en/mariadb-10027-release-notes
* changelog:
* https://kb.askmonty.org/en/mariadb-10027-changelog
Bugs fixed:
- Make ORDER BY optimization functions take into account multiple
equalities. (bsc#949520)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1397=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1397=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1397=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1397=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
libmysqlclient_r18-10.0.27-12.1
libmysqlclient_r18-32bit-10.0.27-12.1
mariadb-debuginfo-10.0.27-12.1
mariadb-debugsource-10.0.27-12.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
libmysqlclient-devel-10.0.27-12.1
libmysqlclient_r18-10.0.27-12.1
libmysqld-devel-10.0.27-12.1
libmysqld18-10.0.27-12.1
libmysqld18-debuginfo-10.0.27-12.1
mariadb-debuginfo-10.0.27-12.1
mariadb-debugsource-10.0.27-12.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libmysqlclient18-10.0.27-12.1
libmysqlclient18-debuginfo-10.0.27-12.1
mariadb-10.0.27-12.1
mariadb-client-10.0.27-12.1
mariadb-client-debuginfo-10.0.27-12.1
mariadb-debuginfo-10.0.27-12.1
mariadb-debugsource-10.0.27-12.1
mariadb-errormessages-10.0.27-12.1
mariadb-tools-10.0.27-12.1
mariadb-tools-debuginfo-10.0.27-12.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libmysqlclient18-32bit-10.0.27-12.1
libmysqlclient18-debuginfo-32bit-10.0.27-12.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libmysqlclient18-10.0.27-12.1
libmysqlclient18-32bit-10.0.27-12.1
libmysqlclient18-debuginfo-10.0.27-12.1
libmysqlclient18-debuginfo-32bit-10.0.27-12.1
libmysqlclient_r18-10.0.27-12.1
libmysqlclient_r18-32bit-10.0.27-12.1
mariadb-10.0.27-12.1
mariadb-client-10.0.27-12.1
mariadb-client-debuginfo-10.0.27-12.1
mariadb-debuginfo-10.0.27-12.1
mariadb-debugsource-10.0.27-12.1
mariadb-errormessages-10.0.27-12.1
References:
https://www.suse.com/security/cve/CVE-2016-6662.htmlhttps://bugzilla.suse.com/949520https://bugzilla.suse.com/998309
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org