----------------------------------------- Version unknown 2021-08-14T07:45:23 ----------------------------------------- Patch: SUSE-2014-85 Released: Tue Nov 4 16:29:29 2014 Summary: Recommended update for dirmngr Severity: moderate References: 901845 Description: This update for dirmngr fixes a segmentation fault at start up. (bnc#901845) ----------------------------------------- Patch: SUSE-2014-72 Released: Tue Nov 4 16:41:11 2014 Summary: Recommended update for xmlstarlet Severity: low References: 900891 Description: This update for xmlstarlet adds a symbolic link /usr/bin/xmlstarlet pointing to the 'xml' binary. ----------------------------------------- Patch: SUSE-2014-68 Released: Tue Nov 4 16:52:21 2014 Summary: Security update for java-1_7_0-openjdk Severity: important References: 901242,CVE-2014-6457,CVE-2014-6502,CVE-2014-6504,CVE-2014-6506,CVE-2014-6511,CVE-2014-6512,CVE-2014-6513,CVE-2014-6517,CVE-2014-6519,CVE-2014-6531,CVE-2014-6558 Description: OpenJDK was updated to icedtea 2.5.3 (OpenJDK 7u71) fixing security issues and bugs. * Security: - S8015256: Better class accessibility - S8022783, CVE-2014-6504: Optimize C2 optimizations - S8035162: Service printing service - S8035781: Improve equality for annotations - S8036805: Correct linker method lookup. - S8036810: Correct linker field lookup - S8036936: Use local locales - S8037066, CVE-2014-6457: Secure transport layer - S8037846, CVE-2014-6558: Ensure streaming of input cipher streams - S8038364: Use certificate exceptions correctly - S8038899: Safer safepoints - S8038903: More native monitor monitoring - S8038908: Make Signature more robust - S8038913: Bolster XML support - S8039509, CVE-2014-6512: Wrap sockets more thoroughly - S8039533, CVE-2014-6517: Higher resolution resolvers - S8041540, CVE-2014-6511: Better use of pages in font processing - S8041529: Better parameterization of parameter lists - S8041545: Better validation of generated rasters - S8041564, CVE-2014-6506: Improved management of logger resources - S8041717, CVE-2014-6519: Issue with class file parser - S8042609, CVE-2014-6513: Limit splashiness of splash images - S8042797, CVE-2014-6502: Avoid strawberries in LogRecord - S8044274, CVE-2014-6531: Proper property processing * Backports: - S4963723: Implement SHA-224 - S7044060: Need to support NSA Suite B Cryptography algorithms - S7122142: (ann) Race condition between isAnnotationPresent and getAnnotations - S7160837: DigestOutputStream does not turn off digest calculation when 'close()' is called - S8006935: Need to take care of long secret keys in HMAC/PRF computation - S8012637: Adjust CipherInputStream class to work in AEAD/GCM mode - S8028192: Use of PKCS11-NSS provider in FIPS mode broken - S8038000: java.awt.image.RasterFormatException: Incorrect scanline stride - S8039396: NPE when writing a class descriptor object to a custom ObjectOutputStream - S8042603: 'SafepointPollOffset' was not declared in static member function 'static bool Arguments::check_vm_args_consistency()' - S8042850: Extra unused entries in ICU ScriptCodes enum - S8052162: REGRESSION: sun/java2d/cmm/ColorConvertOp tests fail since 7u71 b01 - S8053963: (dc) Use DatagramChannel.receive() instead of read() in connect() - S8055176: 7u71 l10n resource file translation update * Bugfixes: - PR1988: C++ Interpreter should no longer be used on ppc64 - PR1989: Make jdk_generic_profile.sh handle missing programs better and be more verbose - PR1992, RH735336: Support retrieving proxy settings on GNOME 3.12.2 - PR2000: Synchronise HEAD tarball paths with release branch paths - PR2002: Fix references to hotspot.map following PR2000 - PR2003: --disable-system-gtk option broken by refactoring in PR1736 - PR2009: Checksum of policy JAR files changes on every build - PR2014: Use version from hotspot.map to create tarball filename - PR2015: Update hotspot.map documentation in INSTALL - PR2025: LCMS_CFLAGS and LCMS_LIBS should not be used unless SYSTEM_LCMS is enabled - RH1015432: java-1.7.0-openjdk: Fails on PPC with StackOverflowError (revised comprehensive fix) * CACAO - PR2030, G453612, CA172: ARM hardfloat support for CACAO * AArch64 port - AArch64 C2 instruct for smull - Add frame anchor fences. - Add MacroAssembler::maybe_isb() - Add missing instruction synchronization barriers and cache flushes. - Add support for a few simple intrinsics - Add support for builtin crc32 instructions - Add support for Neon implementation of CRC32 - All address constants are 48 bits in size. - array load must only read 32 bits - Define uabs(). Use it everywhere an absolute value is wanted. - Fast string comparison - Fast String.equals() - Fix register usage in generate_verify_oop(). - Fix thinko in Atomic::xchg_ptr. - Fix typo in fsqrts - Improve C1 performance improvements in ic_cache checks - Performance improvement and ease of use changes pulled from upstream - Remove obsolete C1 patching code. - Replace hotspot jtreg test suite with tests from jdk7u - S8024648: 7141246 breaks Zero port - Save intermediate state before removing C1 patching code. - Unwind native AArch64 frames. - Use 2- and 3-instruction immediate form of movoop and mov_metadata in C2-generated code. - Various concurrency fixes. ----------------------------------------- Patch: SUSE-2014-76 Released: Wed Nov 5 16:41:10 2014 Summary: Security update for wget Severity: moderate References: 902709,CVE-2014-4877 Description: wget was updated to fix one security issue. This security issue was fixed: - FTP symlink arbitrary filesystem access (CVE-2014-4877). ----------------------------------------- Patch: SUSE-2014-66 Released: Thu Nov 6 06:23:15 2014 Summary: Recommended update for gcc48 Severity: moderate References: 899871 Description: This update for gcc48 fixes a performance degradation issue caused by generation of unneeded code whe using option -pg. ----------------------------------------- Patch: SUSE-2014-97 Released: Fri Nov 28 10:20:32 2014 Summary: Security update for file Severity: moderate References: 888308,902367,CVE-2014-3710 Description: file was updated to fix one security issue. This security issue was fixed: - Out-of-bounds read in elf note headers (CVE-2014-3710). This non-security issues was fixed: - Correctly identify GDBM files created by libgdbm4 (bnc#888308). ----------------------------------------- Patch: SUSE-2014-120 Released: Mon Dec 1 18:03:03 2014 Summary: Security update for openvpn Severity: important References: 907764,CVE-2014-8104 Description: A remote denial of service attack against openvpn was fixed, where a authenticated client cloud stop the server by triggering a server-side ASSERT (CVE-2014-8104), ----------------------------------------- Patch: SUSE-2014-123 Released: Mon Dec 1 18:03:36 2014 Summary: Recommended update for libXi Severity: moderate References: 883553 Description: This update for libXi fixes a double unlock issue when connecting to an X server with XInputExtension version lower than 2.0. This could result, for example, in a segmentation fault when starting YaST over an ssh connection from SUSE Linux Enterprise 11. ----------------------------------------- Patch: SUSE-2014-115 Released: Mon Dec 1 18:06:24 2014 Summary: Security update for flac Severity: moderate References: 906831,907016,CVE-2014-8962,CVE-2014-9028 Description: flac was updated to fix two security issues. These security issues were fixed: - Stack overflow may result in arbitrary code execution (CVE-2014-8962). - Heap overflow via specially crafted .flac files (CVE-2014-9028). ----------------------------------------- Patch: SUSE-2014-102 Released: Tue Dec 2 16:19:32 2014 Summary: Security update for ImageMagick Severity: moderate References: 903204,903216,903638,905260,CVE-2014-8354,CVE-2014-8355,CVE-2014-8562,CVE-2014-8716 Description: ImageMagick was updated to fix four security issues. These security issues were fixed: - Crafted JPEG file could lead to DOS (CVE-2014-8716). - Out-of-bounds memory access in PCX parser (CVE-2014-8355). - Out-of-bounds memory access in resize code (CVE-2014-8354). - Out-of-bounds memory error in DCM decode (CVE-2014-8562). ----------------------------------------- Patch: SUSE-2014-113 Released: Tue Dec 2 18:17:57 2014 Summary: Security update for cpio Severity: moderate References: 658010,907456,CVE-2014-9112 Description: This cpio security update fixes the following buffer overflow issue and two non security issues: - fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112) - prevent cpio from extracting over a symlink (bnc#658010) - fix a truncation check in mt ----------------------------------------- Patch: SUSE-2015-4 Released: Wed Dec 3 15:57:25 2014 Summary: Security update for libyaml Severity: moderate References: 907809,CVE-2014-9130 Description: This libyaml update fixes the following security issue: - bnc#907809: assert failure when processing wrapped strings (CVE-2014-9130) ----------------------------------------- Patch: SUSE-2015-15 Released: Thu Dec 4 15:24:10 2014 Summary: Security update for libjpeg-turbo, libjpeg62-turbo Severity: moderate References: 906761,CVE-2014-9092 Description: libjpeg-turbo, libjpeg62-turbo were updated to fix one security issue. This security issue was fixed: - Passing special crafted jpeg file smashes stack (CVE-2014-9092). ----------------------------------------- Patch: SUSE-2015-3 Released: Fri Dec 5 15:49:30 2014 Summary: Security update for mutt Severity: important References: 899712,907453,CVE-2014-9116 Description: mutt was updated to fix one security issue. This security issue was fixed: - Heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116). This non-security issue was fixed: - Handle text/html by default (bnc#899712) ----------------------------------------- Patch: SUSE-2014-81 Released: Sat Dec 6 17:14:40 2014 Summary: Security update for MozillaFirefox and mozilla-nss Severity: important References: 897890,900941,908009,CVE-2014-1568,CVE-2014-1574,CVE-2014-1575,CVE-2014-1576,CVE-2014-1577,CVE-2014-1578,CVE-2014-1581,CVE-2014-1583,CVE-2014-1585,CVE-2014-1586,CVE-2014-1587,CVE-2014-1588,CVE-2014-1590,CVE-2014-1592,CVE-2014-1593,CVE-2014-1594,CVE-2014-1595 Description: Mozilla Firefox was updated to 31.3.0 ESR (bnc#900941) (bnc#908009). Security issues fixed: MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from Rapid7 reported that passing a JavaScript object to XMLHttpRequest that mimics an input stream will a crash. This crash is not exploitable and can only be used for denial of service attacks. MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever reported a use-after-free created by triggering the creation of a second root element while parsing HTML written to a document created with document.open(). This leads to a potentially exploitable crash. MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover a buffer overflow during the parsing of media content. This leads to a potentially exploitable crash. MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee, Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security Center (GTISC) reported a bad casting from the BasicThebesLayer to BasicContainerLayer, resulting in undefined behavior. This behavior is potentially exploitable with some compilers but no clear mechanism to trigger it through web content was identified. MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard reported an Apple issue present in OS X 10.10 (Yosemite) where log files are created by the CoreGraphics framework of OS X in the /tmp local directory. These log files contain a record of all inputs into Mozilla programs during their operation. In versions of OS X from versions 10.6 through 10.9, the CoreGraphics had this logging ability but it was turned off by default. In OS X 10.10, this logging was turned on by default for some applications that use a custom memory allocator, such as jemalloc, because of an initialization bug in the framework. This issue has been addressed in Mozilla products by explicitly turning off the framework's logging of input events. On vulnerable systems, this issue can result in private data such as usernames, passwords, and other inputed data being saved to a log file on the local system. MFSA 2014-74 / CVE-2014-1574 / CVE-2014-1575: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Bobby Holley, Christian Holler, David Bolter, Byron Campen, and Jon Coppeard reported memory safety problems and crashes that affect Firefox ESR 31.1 and Firefox 32. Carsten Book, Christian Holler, Martijn Wargers, Shih-Chiang Chien, Terrence Cole, Eric Rahm , and Jeff Walden reported memory safety problems and crashes that affect Firefox 32. MFSA 2014-75 / CVE-2014-1576: Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered a buffer overflow when making capitalization style changes during CSS parsing. This can cause a crash that is potentially exploitable. MFSA 2014-76 / CVE-2014-1577: Security researcher Holger Fuhrmannek used the used the Address Sanitizer tool to discover an out-of-bounds read issue with Web Audio when interacting with custom waveforms with invalid values. This results in a crash and could allow for the reading of random memory which may contain sensitive data, or of memory addresses that could be used in combination with another bug. MFSA 2014-77 / CVE-2014-1578: Using the Address Sanitizer tool, security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team found an out-of-bounds write when buffering WebM format video containing frames with invalid tile sizes. This can lead to a potentially exploitable crash during WebM video playback. MFSA 2014-79 / CVE-2014-1581: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with text direction. This results in a crash which can lead to arbitrary code execution. MFSA 2014-81 / CVE-2014-1585 / CVE-2014-1586: Mozilla developers Eric Shepherd and Jan-Ivar Bruaroey reported issues with privacy and video sharing using WebRTC. Once video sharing has started within a WebRTC session running within an