----------------------------------------- Version 0.0.6-Build1.388 2020-08-22T07:55:56 ----------------------------------------- Patch: SUSE-2015-384 Released: Thu Jul 9 20:15:07 2015 Summary: Recommended update for xorg-x11-driver-input Severity: low References: 863946,924142 Description: This update for xorg-x11-driver-input adds device information files for Elographics and Atmel touch screens. ----------------------------------------- Patch: SUSE-2015-337 Released: Mon Jul 13 18:31:18 2015 Summary: Security update for krb5 Severity: moderate References: 910457,910458,918595,CVE-2014-5353,CVE-2014-5354,CVE-2014-5355 Description: krb5 was updated to fix three security issues. Remote authenticated users could cause denial of service. These security issues were fixed: - CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457). - CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458). - CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595). ----------------------------------------- Patch: SUSE-2015-331 Released: Tue Jul 14 17:49:42 2015 Summary: Recommended update for sles-manuals_en Severity: moderate References: 936211 Description: This update provides the following changes to the SLED manuals: - Document how to get packages from older SLE 11 SPs for SLE 11 SP4 (FATE#318262) - Make clear that the registration has to be re-entered for Add-Ons (bnc#936211) ----------------------------------------- Patch: SUSE-2015-362 Released: Fri Jul 17 11:59:18 2015 Summary: Security update for xorg-x11-libX11 Severity: moderate References: 927220,CVE-2013-7439 Description: xorg-x11-libX11 was updated to fix one security issue. This security issue was fixed: - CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220). ----------------------------------------- Patch: SUSE-2015-434 Released: Wed Jul 22 11:30:53 2015 Summary: Recommended update for udev Severity: moderate References: 922702,931863 Description: udev was updated to fix two bugs: * libudev: fix udev_queue_get_seqnum_sequence_is_finished() with empty queue file (bsc#922702). * libudev: fix for move_later in udev_enumerate_get_list_entry (bsc#931863). ----------------------------------------- Patch: SUSE-2015-443 Released: Fri Jul 24 19:19:24 2015 Summary: Recommended update for sax2 Severity: moderate References: 936349,936351 Description: sax2 was updated to fix bugs: * Disable 'Test' button when only fbdev driver is used. When only the fbdev driver is used, there is no use testing the mode as a VESA framebuffer mode cannot be changed without rebooting (bsc#936351). * Fix mode of KMSStatus.sh to be executable (bsc#936349). ----------------------------------------- Patch: SUSE-2015-388 Released: Mon Jul 27 23:12:52 2015 Summary: Recommended update for sysconfig Severity: moderate References: 929191 Description: This update for sysconfig fixes the following issue in ifup(8): - Use gratuitous arp requests instead of replies. (bnc#929191) ----------------------------------------- Patch: SUSE-2015-347 Released: Tue Jul 28 15:49:46 2015 Summary: Security update for bind Severity: important References: 939567,CVE-2015-5477 Description: bind was updated to fix one security issue. This security issue was fixed: - CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567) Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling. ----------------------------------------- Patch: SUSE-2015-348 Released: Tue Jul 28 22:27:03 2015 Summary: Initial release of SUSE Manager Client Tools for SLE 11-SP4 Severity: low References: 931873 Description: This update provides SUSE Manager Client Tools 2.1 for SUSE Linux Enterprise 11-SP4. ----------------------------------------- Patch: SUSE-2015-479 Released: Wed Jul 29 17:20:07 2015 Summary: Recommended update for openldap2 Severity: moderate References: 924496,932773,937766,CVE-2015-4000 Description: openldap2 was updated to fix one security issue. This security issue was fixed: - CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766). This non-security issue was fixed: - bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator. ----------------------------------------- Patch: SUSE-2015-431 Released: Fri Jul 31 20:02:36 2015 Summary: Security update for glibc Severity: important References: 830257,851280,918187,920338,927080,928723,932059,933770,933903,935286,CVE-2013-2207,CVE-2014-8121,CVE-2015-1781 Description: This update for glibc provides fixes for security and non-security issues. These security issues have been fixed: - CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080) - CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system. (bsc#830257) - CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a file is open, which allowed remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over the database, which triggers the file pointer to be reset. (bsc#918187) - Fix read past end of pattern in fnmatch. (bsc#920338) These non-security issues have been fixed: - Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280) - Record TTL also for DNS PTR queries. (bsc#928723) - Fix invalid free in ld.so. (bsc#932059) - Make PowerPC64 default to non-executable stack. (bsc#933770) - Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903) - Fix bad TEXTREL in glibc.i686. (bsc#935286) ----------------------------------------- Patch: SUSE-2015-379 Released: Mon Aug 3 19:24:15 2015 Summary: Recommended update for open-iscsi Severity: moderate References: 869278,929855,939923 Description: This update for open-iscsi provides the following fixes: - Allow non-tcp transport for discovery daemon. (bsc#939923) - The iBFT 'origin' field is now evaluated to determine if iBFT IP address came from DHCP. (bsc#929855) - Added iscsi_fw_login helper script and new udev rule to call script when iBFT/iscsi boot targets added. (bsc#869278) ----------------------------------------- Patch: SUSE-2015-435 Released: Tue Aug 4 02:16:14 2015 Summary: Recommended update for udev Severity: moderate References: 789825,793936,934307 Description: This update for udev provides the following fixes: - Blacklist tdmp devices in 60-persistent-storage.rules. (bsc#934307) - Make 'reload' and 'force-reload' LSB compliant. (bsc#793936) - Implement the conversion of udev db as a %post script. (bsc#789825) ----------------------------------------- Patch: SUSE-2015-516 Released: Tue Aug 4 09:29:22 2015 Summary: Security update for gnutls Severity: moderate References: 925499,932026,CVE-2015-4000 Description: This security update of gnutls fixes the following issues: - use minimal padding for CBC, the default random length padding causes problems with some servers (bsc#925499) * added gnutls-use_minimal_cbc_padding.patch - use the default DH minimum for gnutls-cli instead of hardcoding 512 * CVE-2015-4000 (Logjam) (bsc#932026) * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch ----------------------------------------- Patch: SUSE-2015-455 Released: Wed Aug 5 15:37:32 2015 Summary: Recommended update for release-notes-sles Severity: low References: 936166,936375,936376,938417 Description: This update provides the latest revision of the Release Notes for SUSE Linux Enterprise Server 11 SP4. - Updated: Fix support statement (SP3: 2016-01-31). - Updated: Add /tmp symlink attack protection. (fate#314496) - New: Installing the open-fcoe Package Manually. (fate#319239) - New: Infiniband driver configuration. (bsc#936166 via fate#319120) - New: Note about having registration key available. (bsc#936375 via fate#319123) - New: Power8 support. (fate#317619) ----------------------------------------- Patch: SUSE-2015-466 Released: Thu Aug 6 11:52:00 2015 Summary: Recommended update for openssl Severity: moderate References: 937492,CVE-2015-0287 Description: This update of openssl fixes a regression caused by the security fix for CVE-2015-0287, after which DSA keys could occasionaly not loaded from disk. (bsc#937492) ----------------------------------------- Patch: SUSE-2015-417 Released: Tue Aug 11 18:01:47 2015 Summary: Recommended update for timezone Severity: low References: 941249 Description: This update provides the latest timezone information (2015f) for your system, including the following changes: - North Korea switches to +0830 on 2015-08-15. The abbreviation remains 'KST'. - Uruguay no longer observes DST. - Moldova starts and ends DST at 00:00 UTC, not at 01:00 UTC. This release also includes changes affecting past time stamps, documentation and some minor code fixes. For a comprehensive list, refer to the release announcement from ICANN: http://mm.icann.org/pipermail/tz-announce/2015-August/000033.html ----------------------------------------- Patch: SUSE-2015-425 Released: Wed Aug 12 17:15:06 2015 Summary: Security update for tiff Severity: moderate References: 914890,916927,CVE-2014-8127,CVE-2014-8128,CVE-2014-8129,CVE-2014-8130,CVE-2014-9655 Description: tiff was updated to fix six security issues found by fuzzing initiatives. These security issues were fixed: - CVE-2014-8127: Out-of-bounds write (bnc#914890). - CVE-2014-8128: Out-of-bounds write (bnc#914890). - CVE-2014-8129: Out-of-bounds write (bnc#914890). - CVE-2014-8130: Out-of-bounds write (bnc#914890). - CVE-2014-9655: Access of uninitialized memory (bnc#916927). ----------------------------------------- Patch: SUSE-2015-410 Released: Wed Aug 12 20:26:22 2015 Summary: Recommended update for cpio Severity: low References: 938930 Description: This update ensures cpio(1) will return a proper error code when errors happen in pass-through mode. ----------------------------------------- Patch: SUSE-2015-590 Released: Mon Aug 17 10:29:25 2015 Summary: Security update for libgcrypt Severity: moderate References: 920057,CVE-2014-3591,CVE-2015-0837 Description: This update fixes the following issues: * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. (bsc#920057) * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical] ----------------------------------------- Patch: SUSE-2015-497 Released: Fri Aug 21 17:44:29 2015 Summary: Security update for java-1_6_0-ibm Severity: important References: 935540,936844,938895,941939,CVE-2015-1931,CVE-2015-2590,CVE-2015-2601,CVE-2015-2621,CVE-2015-2625,CVE-2015-2632,CVE-2015-2637,CVE-2015-2638,CVE-2015-2664,CVE-2015-2808,CVE-2015-4000,CVE-2015-4731,CVE-2015-4732,CVE-2015-4733,CVE-2015-4748,CVE-2015-4749,CVE-2015-4760 Description: IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs. The following vulnerabilities were fixed: * CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system. * CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data. * CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data. * CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data. * CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data. * CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data. * CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data. * CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540) * CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. * CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS). * CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution. The following non-security bugs were fixed: * bsc#936844: misconfigured update-alternative entries * bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir ----------------------------------------- Patch: SUSE-2015-482 Released: Tue Aug 25 21:55:05 2015 Summary: Optional update for quota Severity: low References: 941765 Description: The quota package has been rebuilt to increase its release number, which was lower than the latest builds from SLE 11-SP3. ----------------------------------------- Patch: SUSE-2015-532 Released: Tue Aug 25 22:25:34 2015 Summary: Recommended update for sed Severity: low References: 933022 Description: This update for sed fixes handling of the --follow-symlinks option. ----------------------------------------- Patch: SUSE-2015-477 Released: Wed Sep 2 14:02:50 2015 Summary: Security update for bind Severity: important References: 944066,CVE-2015-5722 Description: The nameserver bind was updated to fix a remote denial of service (crash) attack against bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066). ----------------------------------------- Patch: SUSE-2015-536 Released: Thu Sep 3 13:56:53 2015 Summary: Recommended update for usbutils Severity: low References: 941820 Description: This update for usbutils adds new IDs to the devices' database. ----------------------------------------- Patch: SUSE-2015-565 Released: Wed Sep 9 19:51:24 2015 Summary: Recommended update for mcelog Severity: low References: 942670 Description: This update for mcelog adds support for Intel's Skylake platform. ----------------------------------------- Patch: SUSE-2015-551 Released: Fri Sep 11 03:50:46 2015 Summary: Recommended update for release-notes-sles Severity: low References: 938757,938880,940594,942090,943479 Description: This update provides the latest revision of the Release Notes for SUSE Linux Enterprise Server 11 SP4. - Updated: Support for 10GbE RoCE Express. (bsc#942090, fate#319065) - Updated: List more kernel modules which were updated. (fate#318442) - Updated: Adjust XEN VM guest memory limit. (bsc#938757) - Obsoleted: Migrating SUSE Linux Enterprise Server with WebYaST installed via Wagon. (bsc#940594) - Obsoleted: SMT 11 SP2 to SP3 migration, and other update related entries. (bsc#940594) - Fix minor spelling issues. (bsc#943479) ----------------------------------------- Patch: SUSE-2015-695 Released: Sat Sep 12 00:49:56 2015 Summary: Recommended update for xorg-x11-server Severity: moderate References: 934643,941230,945423 Description: This update for xorg-x11-server provides the following fixes: - Fix crash on VT switch on a 2nd generation server (ie. after a server reset). (bsc#945423) - Fix jpeg in tightvnc encoding. (bsc#941230) - Fix pointer events in VNC. (bsc#934643) ----------------------------------------- Patch: SUSE-2015-658 Released: Fri Sep 18 09:01:09 2015 Summary: Security update for rpcbind Severity: moderate References: 940191,946204,CVE-2015-7236 Description: A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service. ----------------------------------------- Patch: SUSE-2015-723 Released: Thu Sep 24 14:55:49 2015 Summary: Recommended update for postfix Severity: low References: 838165,863350 Description: This update for Postfix fixes an issue in the SuSEconfig.postfix script which could cause misleading warnings when the package was updated. ----------------------------------------- Patch: SUSE-2015-780 Released: Tue Sep 29 20:13:01 2015 Summary: Recommended update for xorg-x11-driver-video Severity: moderate References: 758040 Description: xorg-x11-driver-video was updated to remove a temporary workaround that disabled DRI2 and 2D acceleration. The underlying issue has been fixed in the kernel. ----------------------------------------- Patch: SUSE-2015-734 Released: Thu Oct 1 18:11:27 2015 Summary: Optional update for gcc5, binutils and gdb Severity: low References: 776968,877566,891040,896586,936050,943792,945634,CVE-2012-3509 Description: The core toolchain components were updated to newer version to bring various features, improved performance and usability, and also bugfixes. This GNU Compiler Collection feature update is provided for the Intel/AMD x86_64, IBM zSeries and IBM PowerPC 64bit architectures. The GNU Compiler Collection 5.2 is provided new with this update. Changes to previously released GCC 4.8 series are documented on: https://gcc.gnu.org/gcc-4.9/changes.html and https://gcc.gnu.org/gcc-5/changes.html Major features: * AddressSanitzer, UndefinedBehaviour and PointerBoundsChecker checking frameworks were added. * Lots of Register Allocation, Link Time, Interprocedural and Feedback Directed optimization improvements were done. * Architecture support for IBM zSeries z13. * The new libstdc++ CXX11 ABI is available, (The old ABI is still used by default.) The binutils suite was updated to version 2.25.0, bringing new platform support, features and and bugfixes, including: * IBM zSeries z13 hardware support (fate#318036, bnc#936050). * various IBM Power8 improvements (fate#318238, bnc#926412). * AVX512 support on the Intel EM64T platform (fate#318520). * CVE-2012-3509: Fixed a integer overflow in libiberty. The GNU Debugger gdb was updated to version 7.9.1, bringing new platform support, features and bugfixes. The gdb update also includes IBM zSeries z13 support. ----------------------------------------- Patch: SUSE-2015-683 Released: Fri Oct 2 19:18:15 2015 Summary: Recommended update for timezone Severity: low References: 948227,948568 Description: This update provides the latest timezone information (2015g) for your system, including the following changes: - Turkey's 2015 fall-back transition is scheduled for Nov. 8, not Oct. 25. - Norfolk moves from +1130 to +1100 on 2015-10-04 at 02:00 local time. - Fiji's 2016 fall-back transition is scheduled for January 17, not 24. - Fort Nelson, British Columbia will not fall back on 2015-11-01. It has effectively been on MST (-0700) since it advanced its clocks on 2015-03-08. Add new zone America/Fort_Nelson. This release also includes changes affecting past time stamps, documentation and some minor code fixes. For a comprehensive list, refer to the release announcement from ICANN: http://mm.icann.org/pipermail/tz/2015-October/022728.html ----------------------------------------- Patch: SUSE-2015-650 Released: Mon Oct 5 19:52:45 2015 Summary: Security update for openssh Severity: moderate References: 903649,932483,936695,938746,939932,943006,943010,945484,945493,947458,CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564 Description: OpenSSH was updated to fix several security issues and bugs. Please note that due to a bug in the previous shipped openssh version, sshd might not correctly restart. Please verify that the ssh daemon is running after installing this update. These security issues were fixed: * CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. (bsc#936695) * CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list. (bsc#938746) * CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM. (bsc#932483) * Hardening patch to fix sftp RCE. (bsc#903649) * CVE-2015-6563: The monitor component in sshd accepted extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. * CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd might have allowed local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. Additional a bug was fixed that could lead to openssh not working in chroot (bsc#947458). ----------------------------------------- Patch: SUSE-2015-794 Released: Tue Oct 6 10:03:29 2015 Summary: Recommended update for yast2-fcoe-client Severity: moderate References: 838739 Description: The YaST module for fiber channel over ethernet was updated to increase number of retries for fipvlan to try harder to connect (bnc#838739) ----------------------------------------- Patch: SUSE-2015-686 Released: Wed Oct 7 03:15:17 2015 Summary: Recommended update for gconf2 Severity: low References: 909045 Description: This update for gconf2 modifies gconftool to use fdatasync() instead of fsync(), as the latter comes with a significant performance penalty. Additionally, when the tool detects that the operating system is being installed, explicit calls to data synchronization functions are skipped. ----------------------------------------- Patch: SUSE-2015-719 Released: Wed Oct 7 12:33:46 2015 Summary: Security update for gtk2 Severity: moderate References: 922741,942801,948791,CVE-2015-4491,CVE-2015-7674 Description: gtk2 was updated to fix two security issues. These security issues were fixed: - CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801). - CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791). This non-security issue was fixed: - Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741). ----------------------------------------- Patch: SUSE-2015-688 Released: Fri Oct 9 04:03:15 2015 Summary: Recommended update for glibc Severity: moderate References: 942317,945779 Description: glibc was updated to fix a regression in a previous security fix, where users from large groups could go missing (bsc#945779, GLIBC BZ #18991). Also on PowerPC links to Power7 libraries are created for Power8 platform (bsc#942317) ----------------------------------------- Patch: SUSE-2015-726 Released: Fri Oct 9 14:26:44 2015 Summary: Security update for augeas Severity: moderate References: 925225,CVE-2014-8119 Description: This update fixes an untrusted argument escaping problem (CVE-2014-8119): * new API - aug_escape_name() - which can be used to escape untrusted inputs before using them as part of path expressions * aug_match() is changed to return properly escaped output ----------------------------------------- Patch: SUSE-2015-769 Released: Fri Oct 9 20:42:30 2015 Summary: Recommended update for mkinitrd Severity: moderate References: 932042,938470 Description: This update for mkinitrd provides the following fixes: - Ignore non-existent extra dependencies. (bsc#932042) - Find driver for nvme devices. (bsc#938470) ----------------------------------------- Patch: SUSE-2015-717 Released: Wed Oct 14 16:20:19 2015 Summary: Recommended update for ksh Severity: moderate References: 887320,924043,924318,926172,934437 Description: This update for the Korn Shell (ksh) provides the following fixes: - Close the correct file descriptor when renumbering and avoid extra fork. (bsc#926172, bsc#934437) - Fix freeing memory twice if an array is turned into a compound variable and then unset. (bsc#924043) - Fix potential hangs in command substitution with large output. (bsc#887320) - Fix potential job list corruption that could lead to segmentation fault. (bsc#924318) - Fix segmentation fault with 'typeset -RF'. ----------------------------------------- Patch: SUSE-2015-728 Released: Wed Oct 14 23:46:56 2015 Summary: Recommended update for release-notes-sles Severity: low References: 943017,947139,948760 Description: This update provides the latest revision of the Release Notes for SUSE Linux Enterprise Server 11 SP4. - New: NTP 4.2.8. (bsc#943017, fate#319526) - New: TLS 1.2 for OpenVPN. (fate#319013) - Fix typo (LTSS for SLES 11 SP3). (bsc#948760) ----------------------------------------- Patch: SUSE-2015-724 Released: Thu Oct 15 15:25:10 2015 Summary: Security update for icu Severity: moderate References: 917129,CVE-2014-9654 Description: icu was updated to fix one security issue. This security issue was fixed: - CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129). ----------------------------------------- Patch: SUSE-2015-818 Released: Fri Oct 16 03:39:06 2015 Summary: Recommended update for rsh Severity: low References: 723593,926954 Description: This update for rsh fixes an attempt to free invalid memory in rshd. ----------------------------------------- Patch: SUSE-2015-731 Released: Mon Oct 19 17:35:52 2015 Summary: Recommended update for sapconf Severity: moderate References: 892517 Description: This update for sapconf provides the following fixes: - Take new defaults to the config file when the new value is greater. (bsc#892517) The preference to takeover the new (greater) value is recommended by SAP. - Set new default value for number of open files. (bsc#892517) ----------------------------------------- Patch: SUSE-2015-809 Released: Thu Oct 22 08:47:45 2015 Summary: Recommended update for openssl Severity: moderate References: 947833 Description: OpenSSL was updated to fix a bug in TLS session renegotiation. This renegotiation is for instance used with Apache2 client certificate handling, which would fail if ECDHE key exchange is used, which is happening more often after the last openssl update. ----------------------------------------- Patch: SUSE-2015-843 Released: Fri Nov 13 13:43:28 2015 Summary: Recommended update for krb5 Severity: important References: 954270 Description: This update fixes a potential segmentation fault introduced with a previous security fix. ----------------------------------------- Patch: SUSE-2015-847 Released: Mon Nov 16 14:21:12 2015 Summary: Recommended update for ConsoleKit Severity: moderate References: 942421 Description: This update for ConsoleKit provides the following fixes: - Properly unset reference to the dbus proxy when finalizing the session, avoiding a leak that could result in a loop using 100% CPU. (bsc#942421) ----------------------------------------- Patch: SUSE-2015-853 Released: Wed Nov 18 10:39:13 2015 Summary: Security update for libpng12-0 Severity: moderate References: 952051,954980,CVE-2015-7981,CVE-2015-8126 Description: The libpng12-0 package was updated to fix the following security issues: - CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980). - CVE-2015-7981: Fixed an out-of-bound read (bsc#952051). ----------------------------------------- Patch: SUSE-2015-856 Released: Wed Nov 18 12:21:13 2015 Summary: Recommended update for gcc5 Severity: important References: 954002 Description: This update for gcc5 and its runtime libraries adjusts the build flags on the s390x architecture to be compatible with IBM z9 and z10 systems. ----------------------------------------- Patch: SUSE-2015-871 Released: Fri Nov 20 10:21:18 2015 Summary: Security update for ntp Severity: moderate References: 905885,910063,936327,942441,942587,944300,951608,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871 Description: This ntp update provides the following security and non security fixes: - Update to 4.2.8p4 to fix several security issues (bsc#951608): * CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK * CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values * CVE-2015-7854: Password Length Memory Corruption Vulnerability * CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability * CVE-2015-7851 saveconfig Directory Traversal Vulnerability * CVE-2015-7850 remote config logfile-keyfile * CVE-2015-7849 trusted key use-after-free * CVE-2015-7848 mode 7 loop counter underrun * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC * CVE-2015-7703 configuration directives 'pidfile' and 'driftfile' should only be allowed locally * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should validate the origin timestamp field * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey data packet length checks - Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327). - Add a controlkey to ntp.conf to make the above work. - Improve runtime configuration: * Read keytype from ntp.conf * Don't write ntp keys to syslog. - Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser. - Fix the comment regarding addserver in ntp.conf (bnc#910063). - Remove ntp.1.gz, it wasn't installed anymore. - Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz. The rest is partially irrelevant, partially redundant and potentially outdated (bsc#942587). - Remove 'kod' from the restrict line in ntp.conf (bsc#944300). - Use SHA1 instead of MD5 for symmetric keys (bsc#905885). - Require perl-Socket6 (bsc#942441). - Fix incomplete backporting of 'rcntp ntptimemset'. ----------------------------------------- Patch: SUSE-2015-875 Released: Fri Nov 20 14:06:25 2015 Summary: Recommended update for yast2-update Severity: low References: 941132 Description: This update for yast2-update provides the following fixes: - Allow root partitions formatted with btrfs to be selected for system upgrades. (bsc#941132) ----------------------------------------- Patch: SUSE-2015-880 Released: Mon Nov 23 15:53:05 2015 Summary: Recommended update for supportutils Severity: low References: 875831,890604,918641,931390,939079,941773,950432,951218,952024 Description: This update for supportutils includes the following fixes: - Fixed DNS hang. (bsc#951218) - Fixed find error in YaST. (bsc#952024) - Fixed kernel taint flags. (bsc#941773) - Fixed s390-tools reference. (bsc#931390) - Fixed volmn DFS hang with timer. (bsc#950432) - Added OPTION_NIT for novell-nit.txt. (bsc#939079) - Fixed DNS hang on files. (bsc#918641) - Added crm config show. (bsc#875831) - Fixed drbd check using drbd.conf. (bsc#890604) ----------------------------------------- Patch: SUSE-2015-891 Released: Tue Nov 24 19:19:18 2015 Summary: Recommended update for sysstat Severity: low References: 926135,945044 Description: This update for sysstat provides the following fixes: - When device-mapper isn't found in /proc/devices, assume it's not running at all. (bsc#926135) - Set umask in sa1 before creating the data file. (bsc#945044) ----------------------------------------- Patch: SUSE-2015-893 Released: Wed Nov 25 13:32:09 2015 Summary: Recommended update for syslog-ng Severity: moderate References: 883403 Description: This update for syslog-ng provides the following fixes: - Do not fail to start if a remote log server name cannot be resolved. (bsc#883403) ----------------------------------------- Patch: 1538 Released: Thu Nov 26 07:58:59 2015 Summary: Security update for java-1_6_0-ibm Severity: important References: 955131,CVE-2015-0204,CVE-2015-0458,CVE-2015-0459,CVE-2015-0469,CVE-2015-0477,CVE-2015-0478,CVE-2015-0480,CVE-2015-0488,CVE-2015-0491,CVE-2015-2625,CVE-2015-2808,CVE-2015-4734,CVE-2015-4803,CVE-2015-4805,CVE-2015-4806,CVE-2015-4810,CVE-2015-4835,CVE-2015-4840,CVE-2015-4842,CVE-2015-4843,CVE-2015-4844,CVE-2015-4860,CVE-2015-4871,CVE-2015-4872,CVE-2015-4882,CVE-2015-4883,CVE-2015-4893,CVE-2015-4902,CVE-2015-4903,CVE-2015-4911,CVE-2015-5006 Description: This update for java-1_6_0-ibm fixes the following issues: - Version update to 6.0-16.15 bsc#955131: CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810 CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844 CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883 CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006 CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469 CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477 CVE-2015-0204 ----------------------------------------- Patch: SUSE-2015-898 Released: Thu Nov 26 12:09:03 2015 Summary: Recommended update for yast2-slp-server Severity: low References: 878892,954494 Description: This update for yast2-slp-server fixes handling of comments on slp.conf. ----------------------------------------- Patch: SUSE-2015-905 Released: Fri Nov 27 11:02:55 2015 Summary: Recommended update for pciutils-ids Severity: low References: 911528,944104,944436 Description: The system's PCI IDs database has been updated to version 2015.10.07. Additionally, the merge-pciids.pl script was fixed to not print warnings about conflicting definitions by default. ----------------------------------------- Patch: SUSE-2015-916 Released: Mon Nov 30 15:44:24 2015 Summary: Recommended update for crash Severity: low References: 940720 Description: This update for crash provides the following fixes: - Fix mis-labeled per-cpu exception stacks. (bsc#940720) ----------------------------------------- Patch: SUSE-2015-917 Released: Mon Nov 30 18:26:53 2015 Summary: Recommended update for libsoup Severity: moderate References: 935201 Description: This update for libsoup disables support for SSLv3 connections. For security reasons, only TLS 1.x and newer will be used. ----------------------------------------- Patch: SUSE-2015-924 Released: Wed Dec 2 13:46:58 2015 Summary: Security update for gpg2 Severity: moderate References: 918089,918090,CVE-2015-1606,CVE-2015-1607 Description: This update for gpg2 fixes the following issues: - Fix cve-2015-1606 (bsc#918089) * Invalid memory read using a garbled keyring * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch - Fix cve-2015-1607 (bsc#918090) * Memcpy with overlapping ranges * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch ----------------------------------------- Patch: SUSE-2015-927 Released: Wed Dec 2 16:48:27 2015 Summary: Recommended update for yast2-users Severity: low References: 805275 Description: This update for yast2-users fixes validation of AutoYaST profiles. ----------------------------------------- Patch: SUSE-2015-932 Released: Thu Dec 3 12:46:32 2015 Summary: Recommended update for lvm2 Severity: moderate References: 938419,942888 Description: This update for lvm2 provides the following fixes: - Fix segmentation fault when extending a LV with a smaller number of stripes than originally used. (bsc#942888) - Fix vgchange to check if there are no mounted file systems preventing deactivation of the volume group. (bsc#938419) ----------------------------------------- Patch: SUSE-2015-944 Released: Thu Dec 3 19:13:46 2015 Summary: Recommended update for yast2-kdump Severity: low References: 805275 Description: This update for yast2-kdump fixes validation of AutoYaST profiles. ----------------------------------------- Patch: SUSE-2015-948 Released: Mon Dec 7 15:08:09 2015 Summary: Security update for libmspack Severity: moderate References: 934524,934525,934526,934527,934528,934529,CVE-2014-9732,CVE-2015-4467,CVE-2015-4469,CVE-2015-4470,CVE-2015-4471,CVE-2015-4472 Description: libmspack was updated to fix several security vulnerabilities. - Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732) - Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467) - Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472) - Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469) - Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470) - Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471) ----------------------------------------- Patch: SUSE-2015-925 Released: Mon Dec 7 15:11:59 2015 Summary: Security update for dhcpcd Severity: important References: 955762,CVE-2012-6698,CVE-2012-6699,CVE-2012-6700 Description: dhcpcd was updated to fix three security issues. These security issues were fixed: - CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers. - CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers. - CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers. ----------------------------------------- Patch: SUSE-2015-970 Released: Tue Dec 15 16:32:13 2015 Summary: Recommended update for ethtool Severity: low References: 927309 Description: The list of advertised speed modes recognized by Ethtool has been updated to include the following full-duplex modes: 56000baseKR4, 56000baseCR4, 56000baseSR4, 56000baseLR4 and 10000baseKX4. ----------------------------------------- Patch: SUSE-2015-976 Released: Tue Dec 15 21:29:18 2015 Summary: Security update for openssl Severity: moderate References: 952099,957812,CVE-2015-3195 Description: This update for openssl fixes the following issues: - CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected. (bsc#957812) - Prevent segfault in s_client with invalid options (bsc#952099) ----------------------------------------- Patch: SUSE-2015-981 Released: Wed Dec 16 11:11:12 2015 Summary: Recommended update for yast2-ntp-client Severity: low References: 805275,940881,954442 Description: This update for yast2-ntp-client provides the following fixes: - Also remove the 'restrict' server option from /etc/ntp.conf when a server is removed or changed, do not leave unused values. (bsc#954442) - Always use a server from pool.ntp.org as default. (bsc#940881) - Fix validation of AutoYaST profiles. (bsc#805275) ----------------------------------------- Patch: SUSE-2015-318 Released: Thu Dec 17 05:55:02 2015 Summary: Recommended update for inst-source-utils Severity: low References: 937385 Description: The inst-source-utils package was updated to allow building medias with specific EULA. ----------------------------------------- Patch: SUSE-2015-984 Released: Thu Dec 17 12:11:26 2015 Summary: Security update for krb5 Severity: moderate References: 954270,954470,CVE-2015-2695 Description: The krb5 package was updated to fix the following security and non security issues: - CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270). - Fixed a memory leak in the handling of error messages (bsc#954470). ----------------------------------------- Patch: SUSE-2015-990 Released: Fri Dec 18 12:23:40 2015 Summary: Recommended update for yast2-network Severity: low References: 805275,951330 Description: This update for yast2-network provides the following fixes: - Fix validation of AutoYaST profiles. (bsc#805275) - Drop entry from /etc/hosts when deleting NIC configuration. (bsc#951330) ----------------------------------------- Patch: SUSE-2015-1010 Released: Tue Dec 22 13:04:17 2015 Summary: Security update for bind Severity: important References: 923281,958861,CVE-2015-8000 Description: This update fixes the following security issue: - CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861). It also fixes a bug: - Fix a regression in caching entries with a TTL of 0 (bsc#923281). ----------------------------------------- Patch: 1482 Released: Wed Dec 23 10:31:03 2015 Summary: Security update for libksba Severity: moderate References: 926826 Description: The libksba package was updated to fix the following security issues: - Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826). ----------------------------------------- Patch: SUSE-2015-1014 Released: Wed Dec 23 14:19:01 2015 Summary: Recommended update for parted Severity: low References: 932116 Description: This update improves handling of busy extended partitions in libparted. ----------------------------------------- Patch: SUSE-2015-1017 Released: Fri Dec 25 11:49:25 2015 Summary: Recommended update for ksh Severity: moderate References: 951430,953533,954856,955221 Description: This update for ksh fixes the following issues: - File descriptor leak when doing redirects in a subshell. (bsc#954856) - Hangs when processing commands in backticks that output too much data. (bsc#953533, bsc#955221, bsc#951430) ----------------------------------------- Patch: SUSE-2015-1023 Released: Mon Dec 28 17:42:36 2015 Summary: Security update for xfsprogs Severity: moderate References: 911866,939367,CVE-2012-2150 Description: xfsprogs was updated to fix one security vulnerability and several bugs. - Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150) - Fix segfault during xfs_repair run (bsc#911866) - Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition ----------------------------------------- Patch: SUSE-2015-1030 Released: Tue Dec 29 13:55:34 2015 Summary: Recommended update for xorg-x11-libs Severity: moderate References: 958383,CVE-2015-1804 Description: This update for xorg-x11-libs fixes the following issues: - The original fix for CVE-2015-1804 prevented DWIDTH to be negative. However, the spec states that 'DWIDTH [...] is a vector indicating the position of the next glyph's origin relative to the origin of this glyph'. Consequently, negative DWIDTH values should be allowed. (bsc#958383) ----------------------------------------- Patch: SUSE-2016-14 Released: Tue Jan 5 14:10:55 2016 Summary: Recommended update for yast2-bootloader Severity: low References: 805275,937108 Description: This update for yast2-bootloader provides the following fixes: - Fix validation of AutoYaST profiles. (bsc#805275) - Unify Xen names to fix removal of duplicated entries at the end of installation. (bsc#937108) ----------------------------------------- Patch: SUSE-2016-21 Released: Tue Jan 5 16:21:16 2016 Summary: Security update for libxml2 Severity: moderate References: 928193,951734,951735,956018,956021,956260,957105,957106,957107,957109,957110,CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Description: This update fixes the following security issues: * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193] * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734] * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735] * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018] * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021] * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260] * CVE-2015-5312 Fix another entity expansion issue [bnc#957105] * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106] * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107] * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109] * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110] ----------------------------------------- Patch: SUSE-2016-23 Released: Wed Jan 6 11:38:30 2016 Summary: Recommended update for yast2-ldap-client Severity: low References: 805275 Description: This update for yast2-ldap-client fixes validation of AutoYaST profiles. ----------------------------------------- Patch: SUSE-2016-45 Released: Fri Jan 8 12:20:09 2016 Summary: Recommended update for sg3_utils Severity: moderate References: 943817 Description: This update for sg3_utils fixes the following issues: - Fix regular expression in rescan-scsi-bus.sh to not produce strings with white spaces. (bsc#943817) ----------------------------------------- Patch: SUSE-2016-47 Released: Fri Jan 8 14:49:21 2016 Summary: Recommended update for open-iscsi Severity: moderate References: 950441 Description: This update for open-iscsi provides the following fixes: - Convert iscsiadm's '-r' argument to an integer before checking if it is a path. (bsc#950441) ----------------------------------------- Patch: SUSE-2016-49 Released: Fri Jan 8 15:50:58 2016 Summary: Security update for libpng12-0 Severity: moderate References: 954980,CVE-2015-8126 Description: - security update: This update fixes the following securit issue: * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact [bsc#954980] ----------------------------------------- Patch: SUSE-2016-50 Released: Fri Jan 8 16:13:46 2016 Summary: Recommended update for yast2-printer Severity: low References: 805275 Description: This update for yast2-printer provides the following fixes: - Add X-SuSE-YaST-AutoInstSchema declaration so printer.rnc could be included in yast2-schema package. ----------------------------------------- Patch: SUSE-2016-54 Released: Mon Jan 11 16:39:26 2016 Summary: Security update for gnutls Severity: moderate References: 924828,947271,957568,CVE-2015-2806,CVE-2015-8313 Description: This update for gnutls fixes the following security issues: - CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568) - CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828) ----------------------------------------- Patch: SUSE-2016-57 Released: Tue Jan 12 11:32:10 2016 Summary: Recommended update for yast2-audit-laf Severity: low References: 702654,805275 Description: This update for yast2-audit-laf provides the following fixes: - Add X-SuSE-YaST-AutoInstSchema declaration so audit-laf.rnc could be included in yast2-schema package. (bsc#805275) - Typos corrected in help text. (bsc#702654) ----------------------------------------- Patch: SUSE-2016-63 Released: Tue Jan 12 16:38:01 2016 Summary: Security update for openldap2 Severity: moderate References: 945582,CVE-2015-6908 Description: This update fixes the following security issue: - CVE-2015-6908. Passing a crafted packet to the function ber_get_next(), an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582). ----------------------------------------- Patch: SUSE-2016-64 Released: Tue Jan 12 17:04:14 2016 Summary: Recommended update for deltarpm Severity: low References: 948504 Description: This update for deltarpm provides the following fixes: - Fix off-by-one error in delta generation code which could lead to a segmentation fault in some rare circumstances. (bsc#948504) - Return error rather than crashing if memory allocation fails. - Add newline in missing prelink error. - Do not finish applydeltarpm jobs when in the middle of a request. - Fix failing applydeltarpm with gzip -9 compression. - Add a couple of man pages. ----------------------------------------- Patch: SUSE-2016-73 Released: Wed Jan 13 12:51:14 2016 Summary: Recommended update for release-notes-sles Severity: low References: 950143,955779 Description: This update provides the latest revision of the Release Notes for SUSE Linux Enterprise Server 11 SP4: - Remove misleading statement about zypper. (bsc#955779) - Document availability of updated toolchain for SLES 11 SP4. (fate#319015) - List YaST modules deprecated on SLE 12. (fate#319469) ----------------------------------------- Patch: SUSE-2016-84 Released: Thu Jan 14 16:32:18 2016 Summary: Security update for openssh Severity: critical References: 961642,961645,CVE-2016-0777,CVE-2016-0778 Description: This update for openssh fixes the following issues: - CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642) - CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645) This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server. ----------------------------------------- Patch: SUSE-2016-106 Released: Tue Jan 19 09:48:53 2016 Summary: Security update for samba Severity: important References: 295284,912457,934299,936909,948244,949022,953382,958582,958583,958584,958586,CVE-2015-5252,CVE-2015-5296,CVE-2015-5299,CVE-2015-5330 Description: This update for Samba fixes the following security issues: - CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586) - CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582) - CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584) - CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583) Non-security issues fixed: - Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022) - Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382) - Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382) - Address unrecoverable winbind failure: 'key length too large' (bnc#934299) - Take resource group sids into account when caching netsamlogon data (bnc#912457) - Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244) - dependency issue with samba-winbind (bnc#936909) ----------------------------------------- Patch: SUSE-2016-115 Released: Tue Jan 19 22:15:35 2016 Summary: Recommended update for yast2-schema Severity: low References: 805275 Description: This update for yast2-schema fixes validation of AutoYaST profiles. ----------------------------------------- Patch: SUSE-2016-116 Released: Wed Jan 20 09:59:11 2016 Summary: Security update for rsync Severity: moderate References: 900914,915410,CVE-2014-8242,CVE-2014-9512 Description: This update for rsync fixes two security issues: - CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914) - CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410) ----------------------------------------- Patch: SUSE-2016-123 Released: Wed Jan 20 16:36:03 2016 Summary: Recommended update for release-notes-sles Severity: low References: 954889,958635,960322 Description: This update provides the latest revision of the Release Notes for SUSE Linux Enterprise Server 11 SP4: - Clarify IBM Java 1.7.1 support status. (bsc#954889, fate#317600) - Fix Security Module description. (bsc#958635) - Document support for OpenSSH in the SLE 11 Security module. (fate#318862) ----------------------------------------- Patch: SUSE-2016-125 Released: Thu Jan 21 13:31:47 2016 Summary: Security update for libxml2 Severity: moderate References: 960674,CVE-2015-8710 Description: This update for libxml2 fixes the following security issue: - CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674) ----------------------------------------- Patch: SUSE-2016-135 Released: Fri Jan 22 11:23:00 2016 Summary: Security update for bind Severity: important References: 962189,CVE-2015-8704 Description: This update for bind fixes the following issues: - CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189) ----------------------------------------- Patch: SUSE-2016-159 Released: Tue Jan 26 16:09:31 2016 Summary: Recommended update for mdadm Severity: moderate References: 930417,939124,952644,958597 Description: This update for mdadm fixes the following issues: - Fix corruption of DDF anchor. (bsc#930417) - Fix problem with adding spare to degraded array. (bsc#958597) - Fix regression in 'mdadm /dev/mdXX --remove failed' handling. (bsc#952644) - Fix crash when running --detail on a dm device which contains an md device. (bsc#939124) ----------------------------------------- Patch: SUSE-2016-164 Released: Wed Jan 27 13:41:51 2016 Summary: Recommended update for udev Severity: moderate References: 958208 Description: This update for udev adjusts the persistent network device name rules to skip Mellanox virtual devices. ----------------------------------------- Patch: SUSE-2016-175 Released: Fri Jan 29 12:43:18 2016 Summary: Security update for gdk2 Severity: moderate References: 958963,960155,CVE-2015-7552 Description: This update for gdk2 fixes the following security issues: - CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963) The following non-security issues were fixed: - bsc#960155: fix a possible divide by zero ----------------------------------------- Patch: SUSE-2016-178 Released: Fri Jan 29 17:19:16 2016 Summary: Recommended update for zypper Severity: moderate References: 793424,893833 Description: This update for zypper fixes the following issues: - Fix different data returned in xml and text output of lu/lp commands. (bsc#793424, bsc#893833) - Also report needed but locked patches in 'pchk'. ----------------------------------------- Patch: SUSE-2016-180 Released: Fri Jan 29 17:41:48 2016 Summary: Recommended update for xorg-x11-server Severity: moderate References: 960068 Description: This update for xorg-x11-server fixes the following issue: The Xserver did not handle the unwrapping/(re)wrapping on EnterVT correctly. After the 1st VT switch, the function chain was incorrect, so after the 2nd VT switch, some functions were missed and thus a DRI2 client blocked. ----------------------------------------- Patch: SUSE-2016-211 Released: Fri Feb 5 14:51:06 2016 Summary: Security update for curl Severity: moderate References: 926511,962983,962996,CVE-2016-0755 Description: This update for curl fixes the following issues: - CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983) The following non-security bugs were fixed: - bsc#926511: Check for errors on the control connection during FTP transfers The following tracked bugs only affect the test suite: - bsc#962996: Expired cookie in test 46 caused test failures ----------------------------------------- Patch: SUSE-2016-216 Released: Fri Feb 5 17:26:23 2016 Summary: Recommended update for perl-Bootloader Severity: moderate References: 956885,958608 Description: This update for perl-Bootloader fixes the following issues: - Strip superfluous '/boot' parts of path if there's a symbolic link 'boot' pointing to '.' (bsc#956885) - Correctly handle quoting in /etc/fstab (bsc#958608) ----------------------------------------- Patch: SUSE-2016-217 Released: Fri Feb 5 17:41:59 2016 Summary: Security update for tiff Severity: moderate References: 960341,964225,CVE-2015-7554,CVE-2015-8781,CVE-2015-8782,CVE-2015-8783 Description: This update for tiff fixes the following issues: - CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225) - CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341) ----------------------------------------- Patch: SUSE-2016-242 Released: Thu Feb 11 11:50:38 2016 Summary: Security update for krb5 Severity: moderate References: 963968,963975,CVE-2015-8629,CVE-2015-8631 Description: This update for krb5 fixes the following issues: - CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968) - CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975) ----------------------------------------- Patch: SUSE-2016-246 Released: Thu Feb 11 11:52:34 2016 Summary: Security update for java-1_6_0-ibm Severity: important References: 960286,960402,963937,CVE-2015-5041,CVE-2015-7575,CVE-2015-7981,CVE-2015-8126,CVE-2015-8472,CVE-2015-8540,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Description: This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937) - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed: - bsc#960402: resolve package conflicts in devel package - bsc#960286: resolve package conflicts in the fonts subpackage ----------------------------------------- Patch: SUSE-2016-254 Released: Fri Feb 12 15:16:47 2016 Summary: Recommended update for timezone Severity: low References: 963921 Description: This update provides the latest timezone information (2016a) for your system, including the following changes: - America/Cayman will not observe daylight saving this year. - Asia/Chita switches from +0800 to +0900 on 2016-03-27 at 02:00. - Asia/Tehran now has DST predictions for the year 2038 and later. - America/Metlakatla switched from PST all year to AKST/AKDT on 2015-11-01 at 02:00. - America/Santa_Isabel has been removed, and replaced with a backward compatibility link to America/Tijuana. - Asia/Karachi's two transition times in 2002 were off by a minute. This release also includes changes affecting past time stamps, documentation and some minor code fixes. For a comprehensive list, refer to the release announcement from ICANN: http://mm.icann.org/pipermail/tz/2016-January/023106.html ----------------------------------------- Patch: SUSE-2016-268 Released: Tue Feb 16 13:43:59 2016 Summary: Recommended update for sg3_utils Severity: moderate References: 943168,955222 Description: This update for sg3_utils provides several fixes: rescan-scsi-bus.sh: - Enhanced the udevadm_settle function, and changed calls to udevadm trigger to only use sd devices, to prevent it from hanging when a udev event is stuck on a dm-multipath device in recovery mode. - Enhanced findremapped and findmultipath to handle another case where udev might have already updated the scsi id, but multipath has not. - Added retries when flushing removed multipaths, as it can sometimes fail transiently. - Enhanced findresized to print the before and after sizes of multipath devices. - When passing the flag to find remapped LUNs, it will now also try to update the size. sg_inq: - Fixed display of software version and date, and added decoding of additional features for rdac page c2. - Updated decoding of rdac c9 page to be current. sg_rdac: - Added support for rdac extended page 2c and mode select(10) to all functionality. - Fixed mode select(6) logic, as there was an invalid parameter preventing it from working. - Updated feature decoding in print_rdac_mode to be current. - Added -6 flag to force to use 6 byte CDBs. sg_vpd_vendor: - vp_arr[] data structure had rdac incorrectly listed as an EMC array. - Updated rdac page names. - Fixed rdac page c0 decoding to get correct number of bytes for board identifier. - Same fixes and enhancements for decoding as in sg_inq for pages c2 and c9. - Updated rdac pages c3 and c4 decoding to decode additional information. - Updated rdac page c8 to decode initiator transport IDs for FC, SAS, iSCSI, and SRP. ----------------------------------------- Patch: SUSE-2016-274 Released: Tue Feb 16 16:39:06 2016 Summary: Security update for glibc Severity: important References: 930721,942317,950944,956988,961721,962736,962737,962738,962739,CVE-2014-9761,CVE-2015-7547,CVE-2015-8776,CVE-2015-8777,CVE-2015-8778,CVE-2015-8779 Description: This update for glibc fixes the following issues: - CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721) - CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944) - CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736) - CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737) - CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738) - CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739) The following non-security bugs were fixed: - bsc#930721: Accept leading and trailing spaces in getdate input string - bsc#942317: Recognize power8 platform - bsc#950944: Always enable pointer guard - bsc#956988: Fix deadlock in __dl_iterate_phdr ----------------------------------------- Patch: SUSE-2016-275 Released: Tue Feb 16 17:03:43 2016 Summary: Recommended update for yast2-kdump Severity: low References: 480466,962008,962341 Description: This update for yast2-kdump fixes the following issues: - Preserve existing content of XEN_APPEND in /etc/sysconfig/bootloader. (bsc#962008) - Avoid exporting unknown settings when cloning a system. (bsc#962341, bsc#480466) ----------------------------------------- Patch: SUSE-2016-278 Released: Tue Feb 16 18:33:20 2016 Summary: Security update for dhcp Severity: moderate References: 880984,919959,926159,928390,936923,947780,961305,CVE-2015-8605 Description: This update for dhcp fixes the following issues: - CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305) The following bugs were fixed: - bsc#936923: Improper lease duration checking - bsc#880984: Integer overflows in the date and time handling code - bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes - bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly - bsc#928390: dhclient dit not expose next-server DHCPv4 option to script - bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly ----------------------------------------- Patch: SUSE-2016-283 Released: Thu Feb 18 11:25:07 2016 Summary: Recommended update for kdump Severity: moderate References: 932339,934581,941834,943214,962103 Description: This update for kdump provides the following fixes: - Create a bind mount from /root to /kdump/root. (bsc#962103) - Update kdump initial ram disk at runlevels 3 or 5. (bsc#943214) - Refresh initrd if /etc/hosts is changed. (bsc#943214) - Create symlinks to /root instead of bind mounts. (bsc#941834) - Reload kdump only once if multiple udev events happen in parallel. (bsc#934581) - Fix an endianity issue. (bsc#932339) - Use kernel config to check if a kernel is relocatable. (bsc#932339) ----------------------------------------- Patch: SUSE-2016-303 Released: Tue Feb 23 16:08:59 2016 Summary: Recommended update for xorg-x11-driver-input Severity: low References: 951739 Description: This update for xorg-x11-driver-input provides the following fixes: - The Elo fdi file needs to get loaded after the synaptics one. The latter has a catch-all rule which needs to be overridden. This happens when the overriding rule is loaded after the one to override. (bsc#951739) ----------------------------------------- Patch: SUSE-2016-342 Released: Mon Feb 29 11:36:19 2016 Summary: Recommended update for sax2 Severity: low References: 952013,961731 Description: This update for sax2 provides the following fixes: - No longer use 'vesa' driver for a special combination of vendor/device/subvendor/ subdevice of i845 GPU used by IBM. This is no longer needed with the KMS driver meanwhile used on SLE 11. Use 'intel' driver for this hardware instead. (bsc#961731) - Check if the driver that's requested is really installed on the system. This is useful when starting SaX2 from a running X session. (bsc#952013) ----------------------------------------- Patch: SUSE-2016-347 Released: Mon Feb 29 19:37:58 2016 Summary: Optional update for libsatsolver Severity: low References: Description: Release libsatsolver to the SUSE:SLE-11-SP2:Update codestream to sync versions in ppc and s390. ----------------------------------------- Patch: SUSE-2016-358 Released: Tue Mar 1 16:05:20 2016 Summary: Security update for openssl Severity: important References: 952871,963415,967787,968046,968047,968048,968051,968053,968374,CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0705,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Description: This update for openssl fixes various security issues and bugs: Security issues fixed: - CVE-2016-0800 aka the 'DROWN' attack (bsc#968046): OpenSSL was vulnerable to a cross-protocol attack that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. This update changes the openssl library to: * Disable SSLv2 protocol support by default. This can be overridden by setting the environment variable 'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the SSL_OP_NO_SSLv2 flag. Note that various services and clients had already disabled SSL protocol 2 by default previously. * Disable all weak EXPORT ciphers by default. These can be reenabled if required by old legacy software using the environment variable 'OPENSSL_ALLOW_EXPORT'. - CVE-2016-0705 (bnc#968047): A double free() bug in the DSA ASN1 parser code was fixed that could be abused to facilitate a denial-of-service attack. - CVE-2016-0797 (bnc#968048): The BN_hex2bn() and BN_dec2bn() functions had a bug that could result in an attempt to de-reference a NULL pointer leading to crashes. This could have security consequences if these functions were ever called by user applications with large untrusted hex/decimal data. Also, internal usage of these functions in OpenSSL uses data from config files or application command line arguments. If user developed applications generated config file data based on untrusted data, then this could have had security consequences as well. - CVE-2016-0799 (bnc#968374) On many 64 bit systems, the internal fmtstr() and doapr_outch() functions could miscalculate the length of a string and attempt to access out-of-bounds memory locations. These problems could have enabled attacks where large amounts of untrusted data is passed to the BIO_*printf functions. If applications use these functions in this way then they could have been vulnerable. OpenSSL itself uses these functions when printing out human-readable dumps of ASN.1 data. Therefore applications that print this data could have been vulnerable if the data is from untrusted sources. OpenSSL command line applications could also have been vulnerable when they print out ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is not considered directly vulnerable. - CVE-2015-3197 (bsc#963415): The SSLv2 protocol did not block disabled ciphers. Note that the March 1st 2016 release also references following CVEs that were fixed by us with CVE-2015-0293 in 2015: - CVE-2016-0703 (bsc#968051): This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. It would have made the above 'DROWN' attack much easier. - CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2' This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. It would have made the above 'DROWN' attack much easier. Also fixes the following bug: - Avoid running OPENSSL_config twice. This avoids breaking engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787) ----------------------------------------- Patch: SUSE-2016-428 Released: Mon Mar 14 13:34:23 2016 Summary: Recommended update for zypper Severity: moderate References: 948566,961719,961724,967673,968006 Description: This update for zypper provides the following fixes: - Fix repository import to honor enable and auto-refresh flags. (bsc#967673) - Return error code 106 (ZYPPER_EXIT_INF_REPOS_SKIPPED) if repos were skipped due to a failing refresh. (bsc#968006) - Fix misaligned TAB stops in colored prompts. (bsc#948566) - Return non-zero on unexpected exceptions. (bsc#961724) - Propagate repository refresh errors even if main action succeeded. (bsc#961719) ----------------------------------------- Patch: SUSE-2016-449 Released: Tue Mar 15 13:58:11 2016 Summary: Security update for java-1_6_0-ibm Severity: important References: 960286,960402,963937,CVE-2015-5041,CVE-2015-7575,CVE-2015-7981,CVE-2015-8126,CVE-2015-8472,CVE-2015-8540,CVE-2016-0402,CVE-2016-0448,CVE-2016-0466,CVE-2016-0483,CVE-2016-0494 Description: This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937) - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed: - bsc#960402: resolve package conflicts in devel package - bsc#960286: resolve package conflicts in the fonts subpackage ----------------------------------------- Patch: SUSE-2016-461 Released: Wed Mar 16 14:26:24 2016 Summary: Optional update for wget and wget-openssl1 Severity: low References: 968724 Description: This update delivers an additional a wget version built against openssl1 to enable TLS 1.2 support for https downloads. (FATE#320164 bsc#968724) The main wget package is also updated to use update-alternatives to switch between the version built against openssl 0.9.8j and the one using openssl 1.0.1. The original wget package includes /usr/bin/wget.openssl0 and /usr/bin/wget links to this binary by default. A new package wget-openssl1 is supplied via the SECURITY module, including a /usr/bin/wget.openssl1 binary. To switch /usr/bin/wget to use openssl 1.0.1 and so support TLS 1.2 in https connections use: update-alternatives --set wget /usr/bin/wget.openssl1 to switch back, use: update-alternatives --set wget /usr/bin/wget.openssl0 to display the current state use: update-alternatives --display wget ----------------------------------------- Patch: SUSE-2016-469 Released: Wed Mar 16 21:37:46 2016 Summary: Recommended update for autofs Severity: low References: 952438 Description: This update adds support for sssd lookups to AutoFS. ----------------------------------------- Patch: SUSE-2016-482 Released: Fri Mar 18 16:32:14 2016 Summary: Security update for bind Severity: important References: 970072,970073,CVE-2016-1285,CVE-2016-1286 Description: This update for bind fixes the following issues: Fix two assertion failures that can lead to a remote denial of service attack: * CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072) * CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073) ----------------------------------------- Patch: SUSE-2016-486 Released: Mon Mar 21 11:05:26 2016 Summary: Security update for samba Severity: important References: 967017,968222,CVE-2015-7560 Description: This update for samba fixes the following issues: Security issue fixed: - CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link target; (bso#11648); (bsc#968222). Bug fixed: - Fix leaking memory in libsmbclient: Add missing talloc stackframe; (bso#11177); (bsc#967017). ----------------------------------------- Patch: SUSE-2016-499 Released: Wed Mar 23 13:34:42 2016 Summary: Recommended update for timezone Severity: low References: 971377 Description: This update provides the latest timezone information (2016b) for your system, including the following changes: - New zones Europe/Astrakhan and Europe/Ulyanovsk for Astrakhan and Ulyanovsk Oblasts, Russia, both of which will switch from +03 to +04 on 2016-03-27 at 02:00 local time. - New zone Asia/Barnaul for Altai Krai and Altai Republic, Russia, which will switch from +06 to +07 on the same date and local time. - Asia/Sakhalin moves from +10 to +11 on 2016-03-27 at 02:00. - As a trial of a new system that needs less information to be made up, the new zones use numeric time zone abbreviations like '+04' instead of invented abbreviations like 'ASTT'. - Haiti will not observe DST in 2016. - Palestine's spring-forward transition on 2016-03-26 is at 01:00, not 00:00. - tzselect's diagnostics and checking, and checktab.awk's checking, have been improved. - tzselect now tests Julian-date TZ settings more accurately. ----------------------------------------- Patch: SUSE-2016-506 Released: Thu Mar 24 08:56:50 2016 Summary: Recommended update for libqt4 Severity: moderate References: 865241 Description: This update for libqt4 fixes the following issues: Various unsafe SSL ciphers have been disabled in the standard SSL classes. Also the RC4 based ciphers have been disabled. (bsc#865241) ----------------------------------------- Patch: SUSE-2016-507 Released: Thu Mar 24 08:59:58 2016 Summary: Optional update for cyrus-sasl Severity: low References: 970494 Description: This update for cyrus-sasl fixes the following issues: - Some missing cyrus-sasl plugins were added. bsc#970494 ----------------------------------------- Patch: SUSE-2016-511 Released: Thu Mar 24 15:43:22 2016 Summary: Recommended update for timezone Severity: low References: 972433 Description: This update provides the latest timezone information (2016c) for your system, including the following changes: - Azerbaijan no longer observes DST (Asia/Baku) - Chile reverts from permanent to seasonal DST This release also includes changes affecting past time stamps and documentation. For a comprehensive list, please refer to the release announcement from ICANN: http://mm.icann.org/pipermail/tz-announce/2016-March/000037.html ----------------------------------------- Patch: SUSE-2016-520 Released: Wed Mar 30 12:02:23 2016 Summary: Optional update for curl-openssl1 Severity: low References: 968726 Description: This update for curl fixes the following issue: A new curl-openssl1 package is supplied in the 11-SECURITY Module, that provides a TLS 1.2 enabled curl binary in alternative to the current curl binary. (FATE#320210 bsc#968726) The new binary is built against openssl1 to support TLS 1.2. To switch /usr/bin/curl to use openssl 1.0.1 and so support TLS 1.2 in https connections use: update-alternatives --set curl /usr/bin/curl.openssl1 to switch back to the old version, use: update-alternatives --set curl /usr/bin/curl.openssl0 to display the current state use: update-alternatives --display curl ----------------------------------------- Patch: SUSE-2016-521 Released: Wed Mar 30 12:04:44 2016 Summary: Recommended update for openldap2 Severity: moderate References: 970085 Description: This update for the openssl1 enabled openldap2 supplies the client binaries also built against openssl1 (ldapsearch, ldapmodify, ldapadd ... ) This enables TLS 1.2 to be used from these LDAP client binaries. These additional binaries are located in /opt/suse/bin, you can change e.g. $PATH to also include /opt/suse/bin or use them explicitly from this location. ----------------------------------------- Patch: SUSE-2016-524 Released: Wed Mar 30 17:05:01 2016 Summary: Security update for gcc5 Severity: moderate References: 939460,945842,953831,955382,962765,964468,966220,968771,CVE-2015-5276 Description: The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes and enhancements. The following security issue has been fixed: - Fix C++11 std::random_device short read issue that could lead to predictable randomness. (CVE-2015-5276, bsc#945842) The following non-security issues have been fixed: - Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal compiler error when building Wine. (bsc#966220) - Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of Docker. (bsc#964468) - Fix HTM built-ins on PowerPC. (bsc#955382) - Fix libgo certificate lookup. (bsc#953831) - Suppress deprecated-declarations warnings for inline definitions of deprecated virtual methods. (bsc#939460) - Revert accidental libffi ABI breakage on aarch64. (bsc#968771) - On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586. - Add experimental File System TS library. ----------------------------------------- Patch: SUSE-2016-549 Released: Mon Apr 4 18:54:05 2016 Summary: Recommended update for release-notes-sles Severity: low References: 961078,961562,962785,966222,970928 Description: This update provides the latest revision of the Release Notes for SUSE Linux Enterprise Server 11 SP4: - Document that pmtools/dmidecode is not available on s390x. (bsc#966222) - KMS Graphics Drivers for Matrox G200, AST and Cirrus Chips. (bsc#961078, fate#320344) ----------------------------------------- Patch: SUSE-2016-574 Released: Thu Apr 7 15:44:52 2016 Summary: Recommended update for at Severity: low References: 945124,963434 Description: This update for at fixes the following issues: - Don't loop on corrupted files and prevent their creation. (bsc#945124) - Fix 'time_or_not date inc_or_dec' parsing problems. (bsc#963434) ----------------------------------------- Patch: SUSE-2016-585 Released: Fri Apr 8 15:19:00 2016 Summary: Recommended update for multipath-tools Severity: moderate References: 888378,933282,935312,940431,941405,941954,943157,947845,948929,956349 Description: This update for multipath-tools provides the following fixes: - Do not switch paths on empty multipath tables. (bsc#956349) - Fix hang in 'multipath -f'. (bsc#941954) - Add LIO-ORG/SUSE RBD backend hardware defaults. (bsc#947845) - Do not treat 'transport-offline' paths as 'offline'. (bsc#888378) - Call get_uid() for all paths in libmultipath. (bsc#935312) - Revert patch 'Handle blocked FC rports'. (bsc#941405, bsc#940431) - Reset alias if renaming fails. (bsc#943157) - Wrong sysfs attribute used for iSCSI settings. (bsc#948929) - Fix 'DM_DEVICE_RELOAD' handling in libmultipath. (bsc#933282) ----------------------------------------- Patch: SUSE-2016-603 Released: Tue Apr 12 20:36:15 2016 Summary: Security update for samba Severity: important References: 936862,967017,971965,973031,973032,973033,973034,973036,CVE-2015-5370,CVE-2016-2110,CVE-2016-2111,CVE-2016-2112,CVE-2016-2113,CVE-2016-2115,CVE-2016-2118 Description: samba was updated to fix seven security issues. These security issues were fixed: - CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862). - CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031). - CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032). - CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033). - CVE-2016-2113: TLS certificate validation were missing (bsc#973034). - CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036). - CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965). These non-security issues were fixed: - bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function - Getting and setting Windows ACLs on symlinks can change permissions on link ----------------------------------------- Patch: SUSE-2016-614 Released: Thu Apr 14 14:39:34 2016 Summary: Recommended update for openssl-certs Severity: moderate References: 973042 Description: The SSL Root Certificate store openssl-certs was updated to version 2.7 of the Mozilla NSS certificate store. (bsc#973042) - Newly added CAs: * CA WoSign ECC Root * Certification Authority of WoSign * Certification Authority of WoSign G2 * Certinomis - Root CA * Certum Trusted Network CA 2 * CFCA EV ROOT * COMODO RSA Certification Authority * DigiCert Assured ID Root G2 * DigiCert Assured ID Root G3 * DigiCert Global Root G2 * DigiCert Global Root G3 * DigiCert Trusted Root G4 * Entrust Root Certification Authority - EC1 * Entrust Root Certification Authority - G2 * GlobalSign * GlobalSign * IdenTrust Commercial Root CA 1 * IdenTrust Public Sector Root CA 1 * OISTE WISeKey Global Root GB CA * QuoVadis Root CA 1 G3 * QuoVadis Root CA 2 G3 * QuoVadis Root CA 3 G3 * Staat der Nederlanden EV Root CA * Staat der Nederlanden Root CA - G3 * S-TRUST Universal Root CA * SZAFIR ROOT CA2 * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5 * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6 * USERTrust ECC Certification Authority * USERTrust RSA Certification Authority * 沃通根证书 - Removed CAs: * AOL CA * A Trust nQual 03 * Buypass Class 3 CA 1 * CA Disig * Digital Signature Trust Co Global CA 1 * Digital Signature Trust Co Global CA 3 * E Guven Kok Elektronik Sertifika Hizmet Saglayicisi * NetLock Expressz (Class C) Tanusitvanykiado * NetLock Kozjegyzoi (Class A) Tanusitvanykiado * NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado * NetLock Uzleti (Class B) Tanusitvanykiado * SG TRUST SERVICES RACINE * Staat der Nederlanden Root CA * TC TrustCenter Class 2 CA II * TC TrustCenter Universal CA I * TDC Internet Root CA * UTN DATACorp SGC Root CA * Verisign Class 1 Public Primary Certification Authority - G2 * Verisign Class 3 Public Primary Certification Authority * Verisign Class 3 Public Primary Certification Authority - G2 - Removed server trust from: * AC Raíz Certicámara S.A. * ComSign Secured CA * NetLock Uzleti (Class B) Tanusitvanykiado * NetLock Business (Class B) Root * NetLock Expressz (Class C) Tanusitvanykiado * TC TrustCenter Class 3 CA II * TURKTRUST Certificate Services Provider Root 1 * TURKTRUST Certificate Services Provider Root 2 * Equifax Secure Global eBusiness CA-1 * Verisign Class 4 Public Primary Certification Authority G3 - Enable server trust for: * Actalis Authentication Root CA ----------------------------------------- Patch: SUSE-2016-633 Released: Fri Apr 15 17:21:46 2016 Summary: Security update for openssl Severity: important References: 952871,963415,967787,968046,968047,968048,968051,968053,968374,CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0705,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Description: This update for openssl fixes various security issues and bugs: Security issues fixed: - CVE-2016-0800 aka the 'DROWN' attack (bsc#968046): OpenSSL was vulnerable to a cross-protocol attack that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. This update changes the openssl library to: * Disable SSLv2 protocol support by default. This can be overridden by setting the environment variable 'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the SSL_OP_NO_SSLv2 flag. Note that various services and clients had already disabled SSL protocol 2 by default previously. * Disable all weak EXPORT ciphers by default. These can be reenabled if required by old legacy software using the environment variable 'OPENSSL_ALLOW_EXPORT'. - CVE-2016-0705 (bnc#968047): A double free() bug in the DSA ASN1 parser code was fixed that could be abused to facilitate a denial-of-service attack. - CVE-2016-0797 (bnc#968048): The BN_hex2bn() and BN_dec2bn() functions had a bug that could result in an attempt to de-reference a NULL pointer leading to crashes. This could have security consequences if these functions were ever called by user applications with large untrusted hex/decimal data. Also, internal usage of these functions in OpenSSL uses data from config files or application command line arguments. If user developed applications generated config file data based on untrusted data, then this could have had security consequences as well. - CVE-2016-0799 (bnc#968374) On many 64 bit systems, the internal fmtstr() and doapr_outch() functions could miscalculate the length of a string and attempt to access out-of-bounds memory locations. These problems could have enabled attacks where large amounts of untrusted data is passed to the BIO_*printf functions. If applications use these functions in this way then they could have been vulnerable. OpenSSL itself uses these functions when printing out human-readable dumps of ASN.1 data. Therefore applications that print this data could have been vulnerable if the data is from untrusted sources. OpenSSL command line applications could also have been vulnerable when they print out ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is not considered directly vulnerable. - CVE-2015-3197 (bsc#963415): The SSLv2 protocol did not block disabled ciphers. Note that the March 1st 2016 release also references following CVEs that were fixed by us with CVE-2015-0293 in 2015: - CVE-2016-0703 (bsc#968051): This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. It would have made the above 'DROWN' attack much easier. - CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2' This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. It would have made the above 'DROWN' attack much easier. Also fixes the following bug: - Avoid running OPENSSL_config twice. This avoids breaking engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787) ----------------------------------------- Patch: SUSE-2016-635 Released: Mon Apr 18 09:17:07 2016 Summary: Security update for krb5 Severity: moderate References: 971942,CVE-2016-3119 Description: This update for krb5 fixes the following security issue: - CVE-2016-3119: An authenticated attacker with permission to modify a principal entry could have caused kadmind to dereference a null pointer by supplying an empty DB argument to the modify_principal command, if kadmind is configured to use the LDAP KDB module. (bsc#971942) ----------------------------------------- Patch: SUSE-2016-638 Released: Mon Apr 18 12:31:29 2016 Summary: Security update for icu Severity: moderate References: 952260,CVE-2014-9654 Description: This update for icu fixes the following issue: The previous patch for CVE-2014-9654 was incorrect and lead to non-working regular expressions. This update fixes this problem (bsc#952260) ----------------------------------------- Patch: SUSE-2016-642 Released: Tue Apr 19 09:22:02 2016 Summary: Recommended update for bzip2 Severity: low References: 970260 Description: This update for bzip2 fixes the following issues: - Fix bzgrep wrapper that always returns 0 as exit code when working on multiple archives, even when the pattern is not found. ----------------------------------------- Patch: SUSE-2016-656 Released: Thu Apr 21 07:28:22 2016 Summary: Recommended update for aaa_base Severity: low References: 957794,967377,971567 Description: This update for aaa_base fixes the following issues: - Add /var/log/btmp to package to prevent errors from pam_lastlog. (bsc#967377, bsc#957794) - Fix chkconfig(8) to return 1 when attempting to show status of service that doesn't exist. (bsc#971567) ----------------------------------------- Patch: SUSE-2016-662 Released: Fri Apr 22 15:32:15 2016 Summary: Recommended update for timezone Severity: low References: 975875 Description: This update provides the latest timezone information (2016d) for your system, including the following changes: - Venezuela (America/Caracas) switches from -0430 to -04 on 2016-05-01 at 02:30. - Asia/Magadan switches from +10 to +11 on 2016-04-24 at 02:00. - New zone Asia/Tomsk, split off from Asia/Novosibirsk. It covers Tomsk Oblast, Russia, which switches from +06 to +07 on 2016-05-29 at 02:00. This release also includes changes affecting past time stamps. For a comprehensive list, please refer to the release announcement from ICANN: http://mm.icann.org/pipermail/tz/2016-April/023563.html ----------------------------------------- Patch: SUSE-2016-674 Released: Mon Apr 25 17:38:08 2016 Summary: Security update for freetype2 Severity: moderate References: 945849,947966,CVE-2014-9745,CVE-2014-9747 Description: This update of the freetype2 library fixes two security issues: - An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849) - Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966) ----------------------------------------- Patch: SUSE-2016-676 Released: Mon Apr 25 18:00:25 2016 Summary: Recommended update for postfix Severity: low References: 947519,947707,972346 Description: This update for postfix fixes the following issues: - Incorrect path to smtp_tls_session_cache_database in SuSEconfig.postfix script. (bsc#972346) - Mail generated by Amavis prevented from being re-addressed by /etc/postfix/virtual. (bsc#947707) - SuSEconfig.postfix should enforce umask 022. (bsc#947519) ----------------------------------------- Patch: SUSE-2016-692 Released: Thu Apr 28 13:42:26 2016 Summary: Recommended update for supportutils Severity: moderate References: 965692,973803 Description: This update for supportutils fixes the following issues: - Fixed service request number length (bsc#973803) - Changed rpm to check for novell_ncp_info (bsc#965692) ----------------------------------------- Patch: SUSE-2016-695 Released: Thu Apr 28 15:45:50 2016 Summary: Security update for ntp Severity: important References: 782060,784760,916617,951559,951629,956773,962318,962784,962802,962960,962966,962970,962988,962994,962995,962997,963000,963002,975496,975981,CVE-2015-5300,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8139,CVE-2015-8140,CVE-2015-8158 Description: ntp was updated to version 4.2.8p6 to fix 12 security issues. These security issues were fixed: - CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966). - CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002). - CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784). - CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000). - CVE-2015-7977: reslist NULL pointer dereference (bsc#962970). - CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802). - CVE-2015-7975: nextvar() missing length check (bsc#962988). - CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960). - CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995). - CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994). - CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997). - CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629). These non-security issues were fixed: - fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd). This replaces the w32 patches in 4.2.4 that added the authreg directive. - bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd. When run as cron job, /usr/sbin/ is not in the path, which caused the synchronization to fail. - bsc#782060: Speedup ntpq. - bsc#916617: Add /var/db/ntp-kod. - bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems. - bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST. - Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted. - bsc#784760: Remove local clock from default configuration ----------------------------------------- Patch: SUSE-2016-700 Released: Thu Apr 28 16:05:25 2016 Summary: Recommended update for hwinfo Severity: low References: 974737 Description: This update for hwinfo adjusts the DMI parser to read memory size according to the latest SMBIOS spec. (bsc#974737) ----------------------------------------- Patch: SUSE-2016-710 Released: Tue May 3 16:21:54 2016 Summary: Security update for libxml2 Severity: moderate References: 972335,975947,CVE-2016-3627 Description: This update for libxml2 fixes two security issues: - libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947) - When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335) ----------------------------------------- Patch: SUSE-2016-750 Released: Wed May 11 14:25:29 2016 Summary: Recommended update for avahi Severity: low References: 941761,947140 Description: This update for avahi fixes the following issues: - Do not log errors for every invalid packet received. ----------------------------------------- Patch: SUSE-2016-751 Released: Wed May 11 14:37:31 2016 Summary: Security update for ntp Severity: important References: 957226,977446,977450,977451,977452,977455,977457,977458,977459,977461,977464,CVE-2015-7704,CVE-2015-7705,CVE-2015-7974,CVE-2016-1547,CVE-2016-1548,CVE-2016-1549,CVE-2016-1550,CVE-2016-1551,CVE-2016-2516,CVE-2016-2517,CVE-2016-2518,CVE-2016-2519 Description: This update for ntp to 4.2.8p7 fixes the following issues: * CVE-2016-1547, bsc#977459: Validate crypto-NAKs, AKA: CRYPTO-NAK DoS. * CVE-2016-1548, bsc#977461: Interleave-pivot * CVE-2016-1549, bsc#977451: Sybil vulnerability: ephemeral association attack. * CVE-2016-1550, bsc#977464: Improve NTP security against buffer comparison timing attacks. * CVE-2016-1551, bsc#977450: Refclock impersonation vulnerability * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig directives will cause an assertion botch in ntpd. * CVE-2016-2517, bsc#977455: remote configuration trustedkey/ requestkey/controlkey values are not properly validated. * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC. * CVE-2016-2519, bsc#977458: ctl_getitem() return value not always checked. * This update also improves the fixes for: CVE-2015-7704, CVE-2015-7705, CVE-2015-7974 Bugs fixed: - Restrict the parser in the startup script to the first occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226). ----------------------------------------- Patch: SUSE-2016-754 Released: Wed May 11 15:18:26 2016 Summary: Recommended update for cyrus-sasl-openssl1 Severity: low References: 961377 Description: This update supplies the cyrus-sasl openssl1 based libraries for Teradata. ----------------------------------------- Patch: SUSE-2016-763 Released: Thu May 12 16:56:45 2016 Summary: Security update for openssl Severity: important References: 889013,968050,976942,976943,977614,977615,977617,CVE-2016-0702,CVE-2016-2105,CVE-2016-2106,CVE-2016-2108,CVE-2016-2109 Description: This update for openssl fixes the following issues: Security issues fixed: - CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617) - CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614) - CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615) - CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942) - CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050) Bugs fixed: - fate#320304: build 32bit devel package - bsc#976943: Fix buffer overrun in ASN1_parse - bsc#973223: allow weak DH groups, vulnerable to the logjam attack, when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set - bsc#889013: Rename README.SuSE to the new spelling ----------------------------------------- Patch: SUSE-2016-804 Released: Thu May 19 22:39:11 2016 Summary: Recommended update for nfs-utils Severity: low References: 931308,945937,947852,948346 Description: This update for nfs-utils fixes the following issues: - Improve gss correctness when client/server clocks are scewed (bsc#931308) - Fix NFS server problems when large numbers of netgroups are used (bsc#948346) - mount.nfs should fail if statd is being slow to start due to DNS issues (bsc#945937) - nfs.init: pass $RPC_PIPEFS_DIR to idmap when 'try-restart' or 'condrestart' called (bsc#947852) ----------------------------------------- Patch: SUSE-2016-809 Released: Fri May 20 23:06:43 2016 Summary: Security update for java-1_6_0-ibm Severity: important References: 977646,977648,977650,979252,CVE-2016-0264,CVE-2016-0363,CVE-2016-0376,CVE-2016-0686,CVE-2016-0687,CVE-2016-3422,CVE-2016-3426,CVE-2016-3427,CVE-2016-3443,CVE-2016-3449 Description: This IBM Java 1.6.0 SR16 FP25 release fixes the following issues: Security issues fixed: - CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648) - CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650) - CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646) - The following CVEs got also fixed during this update. (bsc#979252) CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426 ----------------------------------------- Patch: SUSE-2016-846 Released: Fri May 27 11:57:52 2016 Summary: Recommended update for glib2 Severity: moderate References: 846912,929542,931445,956599,970694 Description: This update for glib2 provides the following fixes: - Fix file descriptor leak when GSocketClient fails to connect asynchronously. (bsc#956599) - Add -lrt and PCRE libraries to link flags in glib-2.0.pc.in. (bsc#929542) - Add glibconfig.h to the -devel-32bit packages and ship them for x86_64 and s390x. (bsc#970694) - Relax g_thread_init() requirements so it can be called multiple times. (bsc#931445, bsc#846912) ----------------------------------------- Patch: SUSE-2016-851 Released: Fri May 27 18:39:02 2016 Summary: Recommended update for wget Severity: moderate References: 935935,977425 Description: This update for wget fixes the following issues: For wget-openssl1: - Allow enforcing tls 1.1 and 1.2 via commandline options. (bsc#977425) --secure-protocol=tlsv1_1 or --secure-protocol=tlsv1_2 - Make the wget-openssl1 a higher prioritized alternative than the wget-openssl0 build. This will enabled the TLS 1.2 wget as soon as the wget-openssl1 package is installed. (bsc#977425) For both wget and wget-openssl1: - Support the TLS SNI (Server Name Indication) extension (bsc#935935) ----------------------------------------- Patch: SUSE-2016-852 Released: Fri May 27 18:41:46 2016 Summary: Recommended update for curl, curl-openssl1 Severity: moderate References: 977409 Description: This update for curl fixes the following issues: - Report the correct TLS version in use when using verbose mode (-v). (bsc#977409) For the TLS 1.2 enabled version to be found in curl-openssl1 (in the SECURITY Module): - Allow enforcing TLS 1.1 or 1.2 on the curl commandline, using --tlsv1.1 or --tlsv1.2. (bsc#977409) ----------------------------------------- Patch: SUSE-2016-873 Released: Wed Jun 1 17:37:36 2016 Summary: Recommended update for multipath-tools Severity: important References: 980933 Description: This update for multipath-tools fixes a regression introduced with the previous update. After a single path loss, multipath could loose the complete map. ----------------------------------------- Patch: SUSE-2016-874 Released: Wed Jun 1 19:49:57 2016 Summary: Recommended update for java-1_6_0-ibm Severity: important References: 981087 Description: This update for java-1_6_0-ibm fixes the following issues: - Update to sr16 fp26 to fix a regression in TLS handling. ----------------------------------------- Patch: SUSE-2016-899 Released: Tue Jun 7 10:57:29 2016 Summary: Security update for libksba Severity: moderate References: 979261,979906,CVE-2016-4574,CVE-2016-4579 Description: This update for libksba fixes the following issues: - CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl() - CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261) Also adding reliability fixes from v1.3.4. ----------------------------------------- Patch: SUSE-2016-902 Released: Tue Jun 7 13:42:12 2016 Summary: Security update for expat Severity: important References: 979441,980391,CVE-2015-1283,CVE-2016-0718 Description: This update for expat fixes the following issues: Security issue fixed: - CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441) - CVE-2015-1283: Fix multiple integer overflows. (bnc#980391) ----------------------------------------- Patch: SUSE-2016-904 Released: Tue Jun 7 15:17:41 2016 Summary: Security update for supportutils Severity: moderate References: 980670,CVE-2016-1602 Description: supportutils was updated to fix one security issue. This security issue was fixed: - CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670). ----------------------------------------- Patch: SUSE-2016-906 Released: Wed Jun 8 12:46:04 2016 Summary: Security update for openssh Severity: moderate References: 729190,932483,948902,960414,961368,961494,962313,965576,970632,975865,CVE-2015-8325,CVE-2016-1908,CVE-2016-3115 Description: openssh was updated to fix three security issues. These security issues were fixed: - CVE-2016-3115: Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH allowed remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions (bsc#970632). - CVE-2016-1908: Possible fallback from untrusted to trusted X11 forwarding (bsc#962313). - CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes (bsc#975865). These non-security issues were fixed: - Correctly parse GSSAPI KEX algorithms (bsc#961368) - More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414) - Fix PRNG re-seeding (bsc#960414, bsc#729190) - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902) - Allow empty Match blocks (bsc#961494) ----------------------------------------- Patch: SUSE-2016-908 Released: Wed Jun 8 13:48:02 2016 Summary: Recommended update for irqbalance Severity: moderate References: 949276 Description: This update for irqbalance fixes the following issues: - Add parameter IRQBALANCE_ARGS to sysconfig file, allowing users to pass arbitrary parameters to the daemon. (bsc#949276) - Balance correctly IRQs reappearing. (bsc#949276) - Classify PCI Sub-Class for better performance. (bsc#949276) - Continuously balance single socket systems. (bsc#949276) - Fix CPU hotplug segmentation fault. (bsc#949276) - NUMA is not available fix. (bsc#949276) - Follow latest PCI class code spec. (bsc#949276) - Make irqbalance work with Xen PV guest. (bsc#949276) - Re-calibrate some IRQ classes and levels. (bsc#949276) ----------------------------------------- Patch: SUSE-2016-910 Released: Wed Jun 8 13:57:30 2016 Summary: Recommended update for glib2, pango Severity: low References: 978972,981957 Description: This update for glib2 and pango provides the following fixes: - Ignore postun/postin errors in 32bit case too. (bsc#978972) - Add missing pcre-devel dependency to glib2-devel. (bsc#981957) ----------------------------------------- Patch: SUSE-2016-913 Released: Thu Jun 9 12:44:49 2016 Summary: Recommended update for xorg-x11-driver-input Severity: low References: 967836,979895 Description: This update for xorg-x11-driver-input provides the following enhancements: - Add Kiosk mode: Implement a filter for the evdev driver which provides click-on-touch and click-on-release. (fate#319647, bsc#967836) ----------------------------------------- Patch: SUSE-2016-919 Released: Fri Jun 10 11:34:12 2016 Summary: Security update for bind Severity: important References: 970072,970073,CVE-2016-1285,CVE-2016-1286 Description: This update for bind fixes two assertion failures that could lead to a remote denial of service attack: - CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072) - CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073) ----------------------------------------- Patch: SUSE-2016-939 Released: Wed Jun 15 10:36:07 2016 Summary: Security update for ntp Severity: important References: 979302,981422,982056,982064,982065,982066,982067,982068,CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Description: ntp was updated to version 4.2.8p8 to fix five security issues. These security issues were fixed: - CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065). - CVE-2016-4954: Processing spoofed server packets (bsc#982066). - CVE-2016-4955: Autokey association reset (bsc#982067). - CVE-2016-4956: Broadcast interleave (bsc#982068). - CVE-2016-4957: CRYPTO_NAK crash (bsc#982064). These non-security issues were fixed: - Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns. - bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice. - bsc#981422: Don't ignore SIGCHILD because it breaks wait(). - Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by 'rcntp addserver'. ----------------------------------------- Patch: SUSE-2016-948 Released: Thu Jun 16 15:32:20 2016 Summary: Security update for libtasn1 Severity: moderate References: 929414,961491,982779,CVE-2015-3622,CVE-2016-4008 Description: This update for libtasn1 fixes the following issues: - Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491) - CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414) - CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779) ----------------------------------------- Patch: SUSE-2016-952 Released: Fri Jun 17 11:20:41 2016 Summary: Security update for libxml2 Severity: important References: 963963,965283,978395,981040,981041,981108,981109,981111,981112,981114,981115,981548,981549,981550,CVE-2015-8806,CVE-2016-1762,CVE-2016-1833,CVE-2016-1834,CVE-2016-1835,CVE-2016-1837,CVE-2016-1838,CVE-2016-1839,CVE-2016-1840,CVE-2016-2073,CVE-2016-3705,CVE-2016-4447,CVE-2016-4448,CVE-2016-4449,CVE-2016-4483 Description: This update for libxml2 fixes the following security issues: - CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread was fixed in libxml2/dict.c [bsc#963963, bsc#965283, bsc#981114]. - CVE-2016-4483: Code was added to avoid an out of bound access when serializing malformed strings [bsc#978395]. - CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040]. - CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041]. - CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108]. - CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109]. - CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral [bsc#981111]. - CVE-2016-1838: Fixed a heap-based buffer overread in xmlParserPrintFileContextInternal [bsc#981112]. - CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115]. - CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548]. - CVE-2016-4448: Fixed some format string warnings with possible format string vulnerability [bsc#981549], - CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550]. - CVE-2016-3705: Fixed missing increment of recursion counter. ----------------------------------------- Patch: SUSE-2016-978 Released: Tue Jun 21 12:32:11 2016 Summary: Security update for pam Severity: moderate References: 854480,934920,962220,CVE-2013-7041,CVE-2015-3238 Description: This update for pam fixes two security issues. These security issues were fixed: - CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920). - CVE-2013-7041: Compare password hashes case-sensitively (bsc#854480). This non-security issue was fixed: - bsc#962220: Don't fail when /var/log/btmp is corrupted ----------------------------------------- Patch: SUSE-2016-995 Released: Fri Jun 24 14:35:13 2016 Summary: Recommended update for xfsprogs Severity: moderate References: 966084 Description: This update for xfsprogs provides the following fixes: - Adjust superblock buffers to be sector sized. This fixes a potential crash in xfs_repair. (bsc#966084) ----------------------------------------- Patch: SUSE-2016-1050 Released: Wed Jul 13 15:16:10 2016 Summary: Recommended update for timezone Severity: moderate References: 982833,987720 Description: This update provides the latest timezone information (2016f) for your system, including the following changes: - Egypt (Africa/Cairo) DST change 2016-07-07 cancelled (bsc#982833, bsc#987720) - Asia/Novosibirsk switches from +06 to +07 on 2016-07-24 02:00 - Asia/Novokuznetsk and Asia/Novosibirsk now use numeric time zone abbreviations instead of invented ones - Europe/Minsk's 1992-03-29 spring-forward transition was at 02:00 not 00:00 Changes from timezone update 2016e are also included: - Changes affecting past timestamps in arctic and antarctic locations while uninhabited - Adjust Asia/Baku's 1992 DST transition - zic now outputs a dummy transition at time 2**31 - 1 in zones whose POSIX-style TZ strings contain a '<', working around Qt bug 53071 ----------------------------------------- Patch: SUSE-2016-1053 Released: Thu Jul 14 11:22:31 2016 Summary: Recommended update for pango Severity: low References: 978972 Description: This update for glib2 and pango provides the following fixes: - Ignore postun/postin errors in 32bit case too. (bsc#978972) ----------------------------------------- Patch: SUSE-2016-1069 Released: Mon Jul 18 16:35:57 2016 Summary: Recommended update for e2fsprogs Severity: moderate References: 982717 Description: This update for e2fsprogs fixes the following issues: - Fix overflow when computing number of reserved groups (bsc#982717) ----------------------------------------- Patch: SUSE-2016-1077 Released: Wed Jul 20 14:16:04 2016 Summary: Recommended update for libzypp, zypper Severity: moderate References: 933760,964932,971637,980263,984494,986694 Description: This update for libzypp and zypper provides the following fixes: libzypp: - Fix bug in removeRepository which may keep an empty .repo file rather than deleting it. (bsc#984494) - Fix credential file parser losing entries with known URL but different user name. (bsc#933760) - RepoManager: Allow extraction of multiple baseurls for service repositories. (bsc#964932) - Use PluginExecutor for commit- and system-hooks. (bsc#971637) zypper: - Ignore unknown package names in non interactive remove-command. (bsc#980263) - Fix Brazilian Portuguese translation of options' prompt. (bsc#986694) ----------------------------------------- Patch: SUSE-2016-1079 Released: Wed Jul 20 15:05:46 2016 Summary: Recommended update for libtirpc Severity: low References: 981429 Description: This update for libtirpc fixes the following issues: - Close all file descriptors when the connection closes. (bsc#981429) ----------------------------------------- Patch: SUSE-2016-1081 Released: Wed Jul 20 18:27:00 2016 Summary: Recommended update for device-mapper Severity: low References: 960344 Description: This update for device-mapper fixes the following issues: - Do not output error message inside retry loops to avoid noisy error message being output inside retry loops in case of remove failure because device busy. (bsc#960344) ----------------------------------------- Patch: SUSE-2016-1093 Released: Mon Jul 25 11:14:24 2016 Summary: Security update for rsync Severity: moderate References: 915410,CVE-2014-9512 Description: rsync was updated to fix one security issue. - CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410). ----------------------------------------- Patch: SUSE-2016-1135 Released: Tue Aug 2 13:40:40 2016 Summary: Security update for bsdtar Severity: important References: 920870,984990,985609,985669,985675,985682,985698,CVE-2015-2304,CVE-2015-8918,CVE-2015-8920,CVE-2015-8921,CVE-2015-8924,CVE-2015-8929,CVE-2016-4809 Description: bsdtar was updated to fix seven security issues. These security issues were fixed: - CVE-2015-8929: Memory leak in tar parser (bsc#985669). - CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990). - CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675). - CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682). - CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609). - CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698). - CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870). ----------------------------------------- Patch: SUSE-2016-1136 Released: Tue Aug 2 15:28:44 2016 Summary: Recommended update for pmtools Severity: low References: 955705,974862 Description: This update for pmtools fixes the following issues: - Skip the SMBIOS version comparison in quiet mode. (bsc#974862) - Add support for DDR4 memory type. (bsc#955705) ----------------------------------------- Patch: SUSE-2016-1144 Released: Wed Aug 3 16:52:05 2016 Summary: Recommended update for freetype2 and libqt4 Severity: low References: 865241,967455 Description: This update for freetype2 and libqt4 fixes the following issues: - Fix memory leaks as well as font handling issues (bsc#967455). - Fix issue of showing the user badly defined fonts by removing xlfd fonts support since that set of fonts is old and unmaintained (bsc#967455). ----------------------------------------- Patch: SUSE-2016-1196 Released: Wed Aug 10 09:03:22 2016 Summary: Security update for sqlite3 Severity: moderate References: 987394,CVE-2016-6153 Description: This update for sqlite3 fixes the following issues: The following security issue was fixed: - CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394) ----------------------------------------- Patch: SUSE-2016-1198 Released: Wed Aug 10 13:38:17 2016 Summary: Security update for dhcp Severity: moderate References: 969820,CVE-2016-2774 Description: This update for dhcp fixes the following issues: - CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used by network adjacent attackers to make the DHCP server non-functional (bsc#969820). ----------------------------------------- Patch: SUSE-2016-1262 Released: Wed Aug 24 13:54:58 2016 Summary: Security update for dosfstools Severity: moderate References: 980364,980377,CVE-2015-8872,CVE-2016-4804 Description: dosfstools was updated to fix two security issues. These security issues were fixed: - CVE-2015-8872: The set_fat function in fat.c in dosfstools might have allowed attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an 'off-by-two error (bsc#980364). - CVE-2016-4804: The read_boot function in boot.c in dosfstools allowed attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function (bsc#980377). ----------------------------------------- Patch: SUSE-2016-1268 Released: Wed Aug 24 16:39:36 2016 Summary: Recommended update for timezone Severity: low References: 988184 Description: This update for timezone adds a positive leap second at the end of 2016-12-31. ----------------------------------------- Patch: SUSE-2016-1272 Released: Thu Aug 25 15:03:55 2016 Summary: Security update for glibc Severity: moderate References: 931399,965699,969727,973010,973164,973179,980483,980854,986302,CVE-2016-1234,CVE-2016-3075,CVE-2016-3706,CVE-2016-4429 Description: This update for glibc fixes the following issues: - Drop old fix that could break services that start before IPv6 is up. (bsc#931399) - Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727) - Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010) - Relocate DSOs in dependency order, fixing a potential crash during symbol relocation phase. (bsc#986302) - Fix nscd assertion failure in gc. (bsc#965699) - Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164) - Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483) - Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854) ----------------------------------------- Patch: SUSE-2016-1275 Released: Thu Aug 25 23:58:27 2016 Summary: Recommended update for krb5 Severity: moderate References: 954470 Description: This update for krb5 fixes a few memory leaks: - If the system runs out of memory, gssint_convert_name_to_union_name() did not set the output error status and potentially caused callers to misbehave. - Function gss_accept_sec_context() calculated the display name from return value of gssint_convert_name_to_union_name(), however it did not always release the name. ----------------------------------------- Patch: SUSE-2016-1280 Released: Fri Aug 26 16:27:43 2016 Summary: Recommended update for autofs Severity: moderate References: 955477,968791,968918 Description: This update for AutoFS provides the following fixes and enhancements: - Add a new configuration option ($USE_HOSTNAME_FOR_MOUNTS) to enable the use of fully qualified domain names in mounts. (bsc#968791) - Link the LDAP lookup module against the reentrant version of the LDAP library (libldap_r), fixing some rare race conditions that could lead to segmentation faults. (bsc#955477) - Fix spurious ELOOP errors caused by incorrect error handling in the NSS lookup module. (bsc#968918) ----------------------------------------- Patch: SUSE-2016-1291 Released: Tue Aug 30 09:30:54 2016 Summary: Security update for fontconfig Severity: low References: 992534,CVE-2016-5384 Description: This update for fontconfig fixes the following issues: - security update: * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534] ----------------------------------------- Patch: SUSE-2016-1307 Released: Fri Sep 2 09:01:19 2016 Summary: Security update for cracklib Severity: moderate References: 928923,992966,CVE-2016-6318 Description: This update for cracklib fixes a security issue and a bug: Security issue fixed: - Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318) The following non security issue was fixed: - Call textdomain in cracklib-check main function so that program output is translated accordingly. (bsc#928923) ----------------------------------------- Patch: SUSE-2016-1317 Released: Tue Sep 6 11:26:33 2016 Summary: Security update for perl Severity: moderate References: 929027,967082,987887,988311,CVE-2015-8853,CVE-2016-1238,CVE-2016-2381,CVE-2016-6185 Description: This update for perl fixes the following issues: - CVE-2016-6185: xsloader looking at a '(eval)' directory [bsc#988311] - CVE-2016-1238: searching current directory for optional modules [bsc#987887] - CVE-2015-8853: regex engine hanging on bad utf8 [bnc976584] - CVE-2016-2381: environment dup handling bug [bsc#967082] - perl panic with utf8_mg_pos_cache_update [bsc#929027] ----------------------------------------- Patch: SUSE-2016-1329 Released: Fri Sep 9 08:12:28 2016 Summary: Security update for python Severity: moderate References: 984751,985348,989523,CVE-2016-0772,CVE-2016-1000110,CVE-2016-5699 Description: This update for python fixes the following issues: - CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751) - CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348) - CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY when REQUEST_METHOD is also set (bsc#989523) ----------------------------------------- Patch: SUSE-2016-1333 Released: Fri Sep 9 15:41:01 2016 Summary: Security update for openssh Severity: moderate References: 948902,981654,989363,992533,CVE-2016-6210,CVE-2016-6515 Description: This update for openssh fixes the following issues: - CVE-2016-6210: Prevent user enumeration through the timing of password processing (bsc#989363) [-prevent_timing_user_enumeration] - Allow lowering the DH groups parameter limit in server as well as when GSSAPI key exchange is used (bsc#948902) - CVE-2016-6515: Limiting the accepted password length to prevent possible DoS (bsc#992533) Bug fixes: - avoid complaining about unset DISPLAY variable (bsc#981654) ----------------------------------------- Patch: SUSE-2016-1340 Released: Mon Sep 12 12:02:51 2016 Summary: Security update for libidn Severity: moderate References: 923241,990189,990190,990191,CVE-2015-2059,CVE-2015-8948,CVE-2016-6261,CVE-2016-6262,CVE-2016-6263 Description: This update for libidn fixes the following issues: - CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189) - CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) - CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191) - CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) ----------------------------------------- Patch: SUSE-2016-1343 Released: Tue Sep 13 10:59:33 2016 Summary: Recommended update for yast2-ntp-client Severity: low References: 960455 Description: This update for yast2-ntp-client fixes the following issues: - Sntp uses '-K /dev/null' if the kod file doesn't exist. (bsc#960455) ----------------------------------------- Patch: SUSE-2016-1345 Released: Tue Sep 13 19:59:45 2016 Summary: Recommended update for samba Severity: moderate References: 975131,978898 Description: This update for samba provides the following fixes: - Honor smb.conf socket options in winbind. (bsc#975131) - Fix crash with net rpc join. (bsc#978898) - Fix a regression verifying the security trailer. (bsc#978898) - Fix updating netlogon credentials. (bsc#978898) ----------------------------------------- Patch: SUSE-2016-1354 Released: Thu Sep 15 14:50:53 2016 Summary: Recommended update for pciutils Severity: low References: 990050 Description: This update for pciutils fixes the following issues: - lspci(8) used to replace long names with 'pci_lookup_name: buffer too small'. Instead of that, it will now truncate the name and append '...' at the end. ----------------------------------------- Patch: SUSE-2016-1371 Released: Wed Sep 21 13:52:33 2016 Summary: Security update for libgcrypt Severity: moderate References: 994157,CVE-2016-6313 Description: This update for libgcrypt fixes the following issues: - RNG prediction vulnerability (bsc#994157, CVE-2016-6313) ----------------------------------------- Patch: SUSE-2016-1373 Released: Wed Sep 21 16:18:49 2016 Summary: Security update for java-1_6_0-ibm Severity: important References: 992537,CVE-2016-3485 Description: IBM Java 6 was updated to version 6.0-16.30. Following security issue was fixed: CVE-2016-3485 Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information. ----------------------------------------- Patch: SUSE-2016-1376 Released: Thu Sep 22 22:40:24 2016 Summary: Recommended update for aaa_base Severity: moderate References: 996442 Description: This update for aaa_base fixes the following issues: - Fix regression from previous change: wrong return code of chkconfig (bsc#996442) ----------------------------------------- Patch: SUSE-2016-1377 Released: Fri Sep 23 11:48:29 2016 Summary: Security update for yast2-storage Severity: moderate References: 937942,984245,986971,996208,CVE-2016-5746 Description: This update for yast2-storage provides the following fixes: Security issues fixed: - Use standard IPC, and not temporary files, to pass passwords between processes. (bsc#986971, CVE-2016-5746) Non security bugs fixed: - Fix usage of complete multipath disk as LVM physical volume. (bsc#984245) - Load the correct multipath module (dm-multipath). (bsc#937942) - Improve message for creating volumes with a filesystem but without a mount point. (bsc#996208) ----------------------------------------- Patch: SUSE-2016-1380 Released: Fri Sep 23 14:54:48 2016 Summary: Security update for wget Severity: moderate References: 958342,984060,995964,CVE-2016-4971,CVE-2016-7098 Description: This update for wget fixes the following issues: - CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed. (bsc#984060). - CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext and making them accessible to the current user only. (bsc#995964) Bug fixed: - Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor (bsc#958342) ----------------------------------------- Patch: SUSE-2016-1389 Released: Tue Sep 27 13:25:10 2016 Summary: Optional update for several packages Severity: low References: 995609 Description: The following packages have been rebuilt in order to increase their release numbers to the same level as the corresponding updates released for SLES 11-SP1-LTSS. These updates contain no code changes. - Mesa - e2fsprogs - multipath-tools - mysql - quagga - quota - udev - xorg-x11-libX11 - xorg-x11-libXext - xorg-x11-libXfixes - xorg-x11-libXp - xorg-x11-libXrender - xorg-x11-libXt - xorg-x11-libXv - xorg-x11-libxcb - xorg-x11-proto-devel ----------------------------------------- Patch: SUSE-2016-1392 Released: Tue Sep 27 15:19:45 2016 Summary: Recommended update for lsof Severity: moderate References: 995061 Description: This update for lsof provides the following fixes: - Prevent 'lsof -b' from hanging when NFS server is unavailable. (bsc#995061) ----------------------------------------- Patch: SUSE-2016-1401 Released: Tue Sep 27 18:17:40 2016 Summary: Security update for bind Severity: critical References: 1000362,CVE-2016-2776 Description: The nameserver bind was updated to fix a remote denial of service vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362) ----------------------------------------- Patch: SUSE-2016-1408 Released: Thu Sep 29 13:12:52 2016 Summary: Recommended update for libxml2 Severity: moderate References: 996079,CVE-2014-0191 Description: This update for libxml2 fixes an issue when processing external entities introduced with the fix for CVE-2014-0191. ----------------------------------------- Patch: SUSE-2016-1414 Released: Thu Sep 29 17:17:02 2016 Summary: Recommended update for irqbalance Severity: moderate References: 1000291,996056 Description: This update for irqbalance fixes the following issues: - A potential segmentation fault due to incorrect error handling. (bsc#996056) - A memory leak on systems without PCI devices like AWS EC2 PV VMs. (bsc#1000291) ----------------------------------------- Patch: SUSE-2016-1426 Released: Tue Oct 4 13:45:12 2016 Summary: Security update for curl Severity: moderate References: 991389,991390,997420,CVE-2016-5419,CVE-2016-5420,CVE-2016-7141 Description: This update for curl fixes the following issues: - CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389) - CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390) - CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420). ----------------------------------------- Patch: SUSE-2016-1432 Released: Wed Oct 5 14:15:36 2016 Summary: Security update for openssl Severity: important References: 979475,982575,983249,993819,994749,994844,995075,995324,995359,995377,998190,999665,999666,999668,CVE-2016-2177,CVE-2016-2178,CVE-2016-2179,CVE-2016-2181,CVE-2016-2182,CVE-2016-2183,CVE-2016-6302,CVE-2016-6303,CVE-2016-6304,CVE-2016-6306 Description: This update for openssl fixes the following issues: OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) More information can be found on: https://www.openssl.org/news/secadv/20160922.txt Bugs fixed: * Update expired S/MIME certs (bsc#979475) * Fix crash in print_notice (bsc#998190) * Resume reading from /dev/urandom when interrupted by a signal (bsc#995075) ----------------------------------------- Patch: SUSE-2016-1455 Released: Mon Oct 10 16:33:55 2016 Summary: Recommended update for timezone Severity: low References: 997830 Description: This update provides the latest timezone information for your system, including the following changes: - Turkey will remain on UTC+03 after 2016-10-30. (bsc#997830) ----------------------------------------- Patch: SUSE-2016-1472 Released: Thu Oct 13 13:58:44 2016 Summary: Security update for tiff Severity: moderate References: 973340,974449,974614,974618,975069,984808,984831,984837,984842,987351,CVE-2016-3186,CVE-2016-3622,CVE-2016-3623,CVE-2016-3945,CVE-2016-3990,CVE-2016-5314,CVE-2016-5316,CVE-2016-5317,CVE-2016-5320,CVE-2016-5875 Description: This update for tiff fixes the following issues: - CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449) - Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098) - CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831) - CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837) - CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842) - CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808) - CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351) - CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618) - CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614) - CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069) - CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340) ----------------------------------------- Patch: SUSE-2016-1477 Released: Thu Oct 13 17:56:04 2016 Summary: Security update for gtk2 Severity: moderate References: 966682,988745,991450,CVE-2013-7447,CVE-2016-6352 Description: This update for gtk2 fixes the following security issues: - CVE-2016-6352: Some crashes were fixed, including a out of bounds write in the OneLine32() function that could be used by attackers to crash GTK/GDK programs. - CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682). ----------------------------------------- Patch: SUSE-2016-1498 Released: Wed Oct 19 11:12:00 2016 Summary: Recommended update for ksh Severity: moderate References: 964966,982423,988213 Description: This update for ksh provides the following fixes: - Fix locking error in spawn implementation. (bsc#988213) - Fix editor prediction code garbling input. (bsc#964966) - Fix leak in optimize processing. (bsc#982423) ----------------------------------------- Patch: SUSE-2016-1507 Released: Wed Oct 19 21:03:19 2016 Summary: Recommended update for crash Severity: low References: 1001596 Description: This update for crash provides the following fixes: - Fix backtrace command output on ppc64. On big-endian machines the output was just a one-line error. (bsc#1001596) ----------------------------------------- Patch: SUSE-2016-1556 Released: Wed Oct 26 14:39:59 2016 Summary: Security update for libxml2 Severity: moderate References: 1005544,CVE-2016-4658 Description: This update for libxml2 fixes the following issues: - CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544). ----------------------------------------- Patch: SUSE-2016-1583 Released: Mon Oct 31 16:49:30 2016 Summary: Optional update for glibc Severity: low References: 1007553 Description: This update for glibc contains no source changes. The package has been rebuilt to include glibc.nosrc.rpm, which was not included in previous updates. ----------------------------------------- Patch: SUSE-2016-1585 Released: Tue Nov 1 10:31:13 2016 Summary: Recommended update for wget Severity: low References: 1005091 Description: This update for wget provides the following fixes: - Don't call xfree() on string returned by usr_error(). Fixes a segmentation fault. (bsc#1005091) ----------------------------------------- Patch: SUSE-2016-1597 Released: Wed Nov 2 17:38:13 2016 Summary: Security update for bind Severity: important References: 1007829,965748,CVE-2016-8864 Description: This update for bind fixes the following issues: - A defect in BIND's handling of responses containing a DNAME answer had the potential to trigger assertion errors in the server remotely, thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829). - Fix BIND to return a valid hostname in response to ldapdump queries. (bsc#965748) ----------------------------------------- Patch: SUSE-2016-1600 Released: Thu Nov 3 11:57:27 2016 Summary: Security update for curl Severity: important References: 1005633,1005634,1005635,1005637,1005638,1005642,1005645,1005646,998760,CVE-2016-7167,CVE-2016-8615,CVE-2016-8616,CVE-2016-8617,CVE-2016-8618,CVE-2016-8619,CVE-2016-8620,CVE-2016-8621,CVE-2016-8622,CVE-2016-8623,CVE-2016-8624 Description: This update for curl fixes the following security issues: - CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646) - CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645) - CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642) - CVE-2016-8619: double-free in krb5 code (bsc#1005638) - CVE-2016-8618: double-free in curl_maprintf (bsc#1005637) - CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635) - CVE-2016-8616: case insensitive password comparison (bsc#1005634) - CVE-2016-8615: cookie injection for other servers (bsc#1005633) - CVE-2016-7167: escape and unescape integer overflows (bsc#998760) ----------------------------------------- Patch: SUSE-2016-1604 Released: Thu Nov 3 20:24:36 2016 Summary: Recommended update for parted Severity: moderate References: 1001967,964012,968302 Description: This update for parted provides the following fixes: - Don't warn if the HDIO_GET_IDENTITY ioctl isn't supported. (bsc#964012, bsc#1001967) - Avoid the HDIO_GETGEO ioctl when possible. (bsc#968302) ----------------------------------------- Patch: SUSE-2016-1637 Released: Thu Nov 10 17:26:51 2016 Summary: Recommended update for timezone Severity: low References: 1007725,1007726 Description: This update provides the latest timezone information (2016i) for your system, including the following changes: - Pacific/Tongatapu begins DST on 2016-11-06 at 02:00, ending on 2017-01-15 at 03:00. (bsc#1007725) - Northern Cyprus is now +03 year round, causing a split in Cyprus time zones starting 2016-10-30 at 04:00. This creates a zone Asia/Famagusta. (bsc#1007726) - Antarctica/Casey switched from +08 to +11 on 2016-10-22. - Asia/Gaza and Asia/Hebron end DST on 2016-10-29 at 01:00, not 2016-10-21 at 00:00. - Asia/Colombo now uses numeric time zone abbreviations. ----------------------------------------- Patch: SUSE-2016-1664 Released: Thu Nov 17 12:55:55 2016 Summary: Recommended update for yast2-core Severity: moderate References: 429326 Description: This update for yast2-core provides the following fixes: - Do not fail to parse when an Optional syntax meets EOF. In some circumstances (e.g. fstab without a trailing newline), YaST could write the file incorrectly, loosing lines. (bsc#429326) ----------------------------------------- Patch: SUSE-2016-1687 Released: Wed Nov 23 15:34:20 2016 Summary: Security update for sudo Severity: moderate References: 1007501,1007766,1008043,948973,966755,CVE-2016-7032,CVE-2016-7076 Description: This update for sudo fixes the following issues: - Fix two security vulnerabilities that allowed users to bypass sudo's NOEXEC functionality: * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766] * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501] - The SSSD plugin would occasionally crash sudo with an 'internal error'. This issue has been fixed. [bsc#948973] - The SSSD plugin would occasionally apply @netgroups rules from LDAP to all users rather than the @netgroup. This issue is now fixed. [bsc#966755] - When the SSSD plugin was used and a local user ran sudo, an e-mail used to be sent to administrator because SSSD did not support sudo rules for local users. This message did not signify an error, however, it was only noise. [bsc#1008043] ----------------------------------------- Patch: SUSE-2016-1706 Released: Fri Nov 25 16:00:18 2016 Summary: Recommended update for sg3_utils Severity: low References: 958369,981452 Description: This update for sg3_utils fixes the following issues: - In some circumstances, the rescan-scsi-bus.sh script failed to identify new LUNs that have been added to the server. (bsc#958369) - The rescan-scsi-bus.sh script used to print all existing LUNs and scan all new LUNs instead of only those specified with the --luns command line option. (bsc#981452) ----------------------------------------- Patch: SUSE-2016-1720 Released: Tue Nov 29 13:11:33 2016 Summary: Security update for vim Severity: important References: 1010685,CVE-2016-1248 Description: This update for vim fixes the following security issues: - Fixed CVE-2016-1248, an arbitrary command execution vulnerability (bsc#1010685) ----------------------------------------- Patch: SUSE-2016-1730 Released: Wed Nov 30 14:58:51 2016 Summary: Recommended update for timezone Severity: low References: 1011797 Description: This update provides the latest timezone information (2016j) for your system, including the following changes: - Saratov, Russia switches from +03 to +04 on 2016-12-04 at 02:00. This change introduces a new zone Europe/Saratov split from Europe/Volgograd. This release also includes changes affecting past time stamps. For a comprehensive list, please refer to the release announcement from ICANN: http://mm.icann.org/pipermail/tz-announce/2016-November/000044.html ----------------------------------------- Patch: SUSE-2016-1739 Released: Fri Dec 2 11:23:40 2016 Summary: Recommended update for aaa_base Severity: low References: 1011548,996442 Description: This update for aaa_base fixes the following issues: - Use full path to lsinitrd(1), as /sbin might not be in the default $PATH. (bsc#1011548) - Do not list xinetd based services twice. (bsc#996442) ----------------------------------------- Patch: SUSE-2016-1763 Released: Wed Dec 7 14:22:48 2016 Summary: Security update for java-1_6_0-ibm Severity: important References: 1009280,CVE-2016-5542,CVE-2016-5554,CVE-2016-5556,CVE-2016-5568,CVE-2016-5573,CVE-2016-5597 Description: This update for java-1_6_0-ibm fixes the following issues: - Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's: CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554, CVE-2016-5542 ----------------------------------------- Patch: SUSE-2016-1769 Released: Wed Dec 7 16:44:42 2016 Summary: Security update for w3m Severity: moderate References: 1011269,1011270,1011271,1011272,1011283,1011284,1011285,1011286,1011287,1011288,1011289,1011290,1011291,1011292,1011293,1012020,1012021,1012022,1012023,1012024,1012025,1012026,1012027,1012028,1012029,1012030,1012031,1012032,CVE-2010-2074,CVE-2016-9422,CVE-2016-9423,CVE-2016-9424,CVE-2016-9425,CVE-2016-9434,CVE-2016-9435,CVE-2016-9436,CVE-2016-9437,CVE-2016-9438,CVE-2016-9439,CVE-2016-9440,CVE-2016-9441,CVE-2016-9442,CVE-2016-9443,CVE-2016-9621,CVE-2016-9622,CVE-2016-9623,CVE-2016-9624,CVE-2016-9625,CVE-2016-9626,CVE-2016-9627,CVE-2016-9628,CVE-2016-9629,CVE-2016-9630,CVE-2016-9631,CVE-2016-9632,CVE-2016-9633 Description: This update for w3m fixes the following issues: - update to debian git version (bsc#1011293) addressed security issues: CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020) CVE-2016-9622: w3m: null deref (bsc#1012021) CVE-2016-9623: w3m: null deref (bsc#1012022) CVE-2016-9624: w3m: near-null deref (bsc#1012023) CVE-2016-9625: w3m: stack overflow (bsc#1012024) CVE-2016-9626: w3m: stack overflow (bsc#1012025) CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026) CVE-2016-9628: w3m: null deref (bsc#1012027) CVE-2016-9629: w3m: null deref (bsc#1012028) CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029) CVE-2016-9631: w3m: null deref (bsc#1012030) CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031) CVE-2016-9633: w3m: OOM (bsc#1012032) CVE-2016-9434: w3m: null deref (bsc#1011283) CVE-2016-9435: w3m: use uninit value (bsc#1011284) CVE-2016-9436: w3m: use uninit value (bsc#1011285) CVE-2016-9437: w3m: write to rodata (bsc#1011286) CVE-2016-9438: w3m: null deref (bsc#1011287) CVE-2016-9439: w3m: stack overflow (bsc#1011288) CVE-2016-9440: w3m: near-null deref (bsc#1011289) CVE-2016-9441: w3m: near-null deref (bsc#1011290) CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291) CVE-2016-9443: w3m: null deref (bsc#1011292) ----------------------------------------- Patch: SUSE-2016-1776 Released: Thu Dec 8 11:07:03 2016 Summary: Security update for xorg-x11-libX11 Severity: moderate References: 1002991,CVE-2016-7942 Description: This update for xorg-x11-libX11 fixes the following issues: - plug a memory leak (bsc#1002991, CVE-2016-7942) - insufficient validation of data from the X server can cause out of boundary memory read (XGetImage()) or write (XListFonts()) (bsc#1002991, CVE-2016-7942) ----------------------------------------- Patch: SUSE-2016-1789 Released: Fri Dec 9 21:26:33 2016 Summary: Recommended update for dbus-1 Severity: moderate References: 1010769 Description: This update for dbus-1 fixes a rare race condition that could lead to dbus-launch(1) killing unrelated processes. ----------------------------------------- Patch: SUSE-2016-1810 Released: Tue Dec 13 12:52:06 2016 Summary: Security update for xorg-x11-libXv Severity: moderate References: 1003017,CVE-2016-5407 Description: This update for xorg-x11-libXv fixes the following issues: - insufficient validation of data from the X server can cause memory corruption (bsc#1003017, CVE-2016-5407) ----------------------------------------- Patch: SUSE-2016-1811 Released: Tue Dec 13 12:54:03 2016 Summary: Security update for xorg-x11-libXrender Severity: moderate References: 1003002,CVE-2016-7949,CVE-2016-7950 Description: This update for xorg-x11-libXrender fixes the following issues: - insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950) ----------------------------------------- Patch: SUSE-2016-1826 Released: Wed Dec 14 16:35:03 2016 Summary: Recommended update for xorg-x11-libXrender Severity: important References: 1015442 Description: This update for xorg-x11-libXrender fixes a regression caused by the previous security update (bsc#1003002), which prevented YaST2 GUI from starting (bsc#1015442) ----------------------------------------- Patch: SUSE-2016-1838 Released: Fri Dec 16 11:01:37 2016 Summary: Security update for xorg-x11-libXfixes Severity: moderate References: 1002995,CVE-2016-7944 Description: This update for xorg-x11-libXfixes fixes the following issues: - insufficient validation of data from the X server can cause an integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944) ----------------------------------------- Patch: SUSE-2016-1847 Released: Fri Dec 16 18:05:25 2016 Summary: Security update for xorg-x11-libs Severity: moderate References: 1002998,1003000,1003012,1003023,CVE-2016-7945,CVE-2016-7946,CVE-2016-7947,CVE-2016-7948,CVE-2016-7951,CVE-2016-7952,CVE-2016-7953 Description: This update for xorg-x11-libs fixes the following issues: - insufficient validation of data from the X server can cause a one byte buffer read underrun (bsc#1003023, CVE-2016-7953) - insufficient validation of data from the X server can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1003012, CVE-2016-7951, CVE-2016-7952) - insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948) - insufficient validation of data from the X server can cause out of boundary memory access or endless loops (Denial of Service). (bsc#1002998, CVE-2016-7945, CVE-2016-7946) ----------------------------------------- Patch: SUSE-2016-1851 Released: Mon Dec 19 17:07:17 2016 Summary: Security update for ntp Severity: moderate References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606,CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Description: This update for ntp fixes the following issues: - Simplify ntpd's search for its own executable to prevent AppArmor warnings (bsc#956365). Security issues fixed (update to 4.2.8p9): - CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6 unauthenticated trap information disclosure and DDoS vector. - CVE-2016-7427, bsc#1011390: Broadcast Mode Replay Prevention DoS. - CVE-2016-7428, bsc#1011417: Broadcast Mode Poll Interval Enforcement DoS. - CVE-2016-7431, bsc#1011395: Regression: 010-origin: Zero Origin Timestamp Bypass. - CVE-2016-7434, bsc#1011398: Null pointer dereference in _IO_str_init_static_internal(). - CVE-2016-7429, bsc#1011404: Interface selection attack. - CVE-2016-7426, bsc#1011406: Client rate limiting and server responses. - CVE-2016-7433, bsc#1011411: Reboot sync calculation problem. - CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216). - CVE-2015-8140: ntpq vulnerable to replay attacks. - CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin. - CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216). Non-security issues fixed: - Fix a spurious error message. - Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog. - Fix a regression in 'trap' (bsc#981252). - Reduce the number of netlink groups to listen on for changes to the local network setup (bsc#992606). - Fix segfault in 'sntp -a' (bsc#1009434). - Silence an OpenSSL version warning (bsc#992038). - Make the resolver task change user and group IDs to the same values as the main task. (bsc#988028) ----------------------------------------- Patch: SUSE-2016-1869 Released: Wed Dec 21 16:24:43 2016 Summary: Security update for zlib Severity: moderate References: 1003577,1003579,1003580,1013882,CVE-2016-9840,CVE-2016-9841,CVE-2016-9842,CVE-2016-9843 Description: This update for zlib fixes the following issues: * Incompatible declarations for external linkage function deflate (bnc#1003577) * CVE-2016-9842: Undefined Left Shift of Negative Number (bnc#1003580) * CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bnc#1003579) * CVE-2016-9843: Big-endian out-of-bounds pointer ----------------------------------------- Patch: SUSE-2016-1874 Released: Wed Dec 21 17:38:52 2016 Summary: Optional update for mailx, mailx-openssl1 Severity: low References: 1012814 Description: This update delivers an additional mailx version built against openssl1 to enable TLS 1.2 support for SMTP, IMAP and POP3 connections. The main mailx package is also updated to use update-alternatives, easing the switch between the version built against openssl 0.9.8j and the one using openssl 1.0.1. The original mailx package includes /usr/bin/mailx.openssl0 and /usr/bin/mailx links to this binary by default. A new package mailx-openssl1 is supplied via the SECURITY module, including the /usr/bin/mailx.openssl1 binary. To switch /usr/bin/mailx to use openssl 1.0.1 and so support TLS 1.2 in encrypted connections use: update-alternatives --set mailx /usr/bin/mailx.openssl1 to switch back, use: update-alternatives --set mailx /usr/bin/mailx.openssl0 to display the current state use: update-alternatives --display mailx ----------------------------------------- Patch: SUSE-2016-1909 Released: Fri Dec 23 15:34:26 2016 Summary: Optional update for libesmtp5-openssl1 Severity: low References: 1005909,1012814 Description: This update for libesmtp provides a libesmtp library that offers TLS 1.2 support. The additional library lives in the new libesmtp5-openssl1 package and is in /opt/suse/lib64/. ----------------------------------------- Patch: SUSE-2016-1926 Released: Thu Dec 29 11:30:31 2016 Summary: Recommended update for release-notes-sles Severity: low References: 975899,979501 Description: The Release Notes of SUSE Linux Enterprise Server 11 SP4 have been updated to document: - Btrfs supported features (bsc#979501). - Basic support for the Zeppelin platform (fate#321400). - Change in the deadlock behavior of loop-back mounted NFS (fate#320631). - Support for absolute Placement Mode for Touchscreens in the evdev-driver. (fate#319647). ----------------------------------------- Patch: SUSE-2016-1929 Released: Thu Dec 29 13:50:06 2016 Summary: Recommended update for hwinfo Severity: low References: 1010276 Description: This update for hwinfo fixes the following issues: - Look for SMBIOS entry point also in EFI settings. (bsc#1010276) - Look for DMI table also in sysfs. (bsc#1010276) ----------------------------------------- Patch: SUSE-2016-1934 Released: Thu Dec 29 20:45:08 2016 Summary: Security update for samba Severity: moderate References: 1003731,1009711,1014441,1014442,993692,997833,CVE-2016-2125,CVE-2016-2126 Description: This update for samba provides the following fixes: Security issues fixed: - CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441) - CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd parent process. (bsc#1014442) Non security issues fixed: - Allow SESSION KEY setup without signing. (bsc#1009711) - Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731) - Don't fail when using default domain with user@domain.com format. (bsc#997833) - Prevent core, make sure response->extra_data.data is always cleared out. (bsc#993692) ----------------------------------------- Patch: SUSE-2017-4 Released: Mon Jan 2 14:33:08 2017 Summary: Recommended update for libzypp, zypper Severity: low References: 1010096,899510,945169,964932 Description: This update for libzypp and zypper fixes the following issues: libzypp: - Suppress MediaChangeReport while testing multiple baseurls. (bsc#899510) - Support parsing multiple baseurls from a repo file. (bsc#899510) - Fix parsing of multi-line url entries. (bsc#964932) zypper: - Add new option 'psCheckAccessDeleted' to zypper.conf that can be used to prevent 'lsof' calls after commit (bsc#945169, bsc#1010096, fate#322060) - Suppress MediaChangeReport while testing multiple baseurls. (bsc#899510) ----------------------------------------- Patch: SUSE-2017-17 Released: Thu Jan 5 11:31:00 2017 Summary: Recommended update for irqbalance Severity: low References: 998399 Description: This update for irqbalance increases the maximum number of files that can be opened simultaneously to 4096. ----------------------------------------- Patch: SUSE-2017-34 Released: Mon Jan 9 14:11:16 2017 Summary: Recommended update for lvm2 Severity: low References: 960344,971150,985892 Description: This update for lvm2 provides the following fixes: - Redirect non-critical warnings when generating boot ramdisk to /dev/null. (bsc#971150) - Do not print error message inside retry loops to avoid multiple error messages when attempting to remove a busy device. (bsc#960344) - When stopping the lvm service, boot.udev must still be running. (bsc#985892) ----------------------------------------- Patch: SUSE-2017-55 Released: Wed Jan 11 22:58:40 2017 Summary: Security update for bind Severity: important References: 1018699,1018700,1018701,1018702,CVE-2016-9131,CVE-2016-9147,CVE-2016-9444 Description: This update for bind fixes the following issues: - Fix a potential assertion failure that could have been triggered by a malformed response to an ANY query, thereby facilitating a denial-of-service attack. [CVE-2016-9131, bsc#1018700, bsc#1018699] - Fix a potential assertion failure that could have been triggered by responding to a query with inconsistent DNSSEC information, thereby facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701, bsc#1018699] - Fix potential assertion failure that could have been triggered by DNS responses that contain unusually-formed DS resource records, facilitating a denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699] ----------------------------------------- Patch: SUSE-2017-75 Released: Mon Jan 16 16:23:33 2017 Summary: Security update for libxml2 Severity: moderate References: 1010675,1014873,CVE-2016-9318 Description: This update for libxml2 fixes the following issues: * CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675). * Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873) ----------------------------------------- Patch: SUSE-2017-106 Released: Fri Jan 20 12:54:07 2017 Summary: Recommended update for suse-build-key Severity: low References: 1014151 Description: This update for suse-build-key fixes the following issues: - Updated gpg signing key for the SLE12 build@suse.de key (bsc#1014151) - Added the current security@suse.de key to the keyring - Changed SuSE to SUSE in texts ----------------------------------------- Patch: SUSE-2017-137 Released: Mon Jan 23 12:28:48 2017 Summary: Security update for icu Severity: moderate References: 1012224,CVE-2014-9911 Description: This update for icu fixes the following security issues: - Passing a locale string longer than 255 characters to uloc_getDisplayName() could have caused a buffer overflow resulting in denial of service or possible code execution (bsc#1012224, CVE-2014-9911). ----------------------------------------- Patch: SUSE-2017-158 Released: Fri Jan 27 18:23:11 2017 Summary: Security update for gnutls Severity: important References: 1005879,1018832,961491,CVE-2016-8610,CVE-2017-5335,CVE-2017-5336,CVE-2017-5337 Description: This update for gnutls fixes the following issues: - Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491). - CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879). - CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832). - CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832). - CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832). ----------------------------------------- Patch: SUSE-2017-160 Released: Fri Jan 27 18:26:03 2017 Summary: Security update for bash Severity: moderate References: 1000396,1001299,959755,971410,CVE-2016-0634,CVE-2016-7543 Description: This update for bash fixes the following issues: - CVE-2016-7543: Local attackers could have executed arbitrary commands via specially crafted SHELLOPTS+PS4 variables. (bsc#1001299) - CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when $HOSTNAME was expanded in the prompt. (bsc#1000396) The following bugs were fixed: - bsc#971410: Scripts could terminate unexpectedly due to mishandled recursive traps. - bsc#959755: Clarify that the files /etc/profile as well as /etc/bash.bashrc may source other files as well even if the bash does not. ----------------------------------------- Patch: SUSE-2017-169 Released: Mon Jan 30 18:39:04 2017 Summary: Recommended update for kexec-tools Severity: low References: 1009970,981339 Description: This update for kexec-tools fixes a segmentation fault that could happen on IBM Power 64 systems with more than 32TB of memory installed. ----------------------------------------- Patch: SUSE-2017-206 Released: Tue Feb 7 13:17:28 2017 Summary: Security update for expat Severity: moderate References: 1022037,983215,983216,CVE-2012-6702,CVE-2016-5300 Description: This update for expat fixes the following security issues: - CVE-2012-6702: Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, made it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function. (bsc#983215) - CVE-2016-5300: The XML parser in Expat did not use sufficient entropy for hash initialization, which allowed context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. (bsc#983216) ----------------------------------------- Patch: SUSE-2017-239 Released: Tue Feb 14 20:09:47 2017 Summary: Recommended update for libusb-1_0 Severity: moderate References: 1023977,978501 Description: This update for the libusb 1.0 library libusb-1_0 fixes the following issues and brings new features: - Fix race condition causing delayed completion of sync transfers. (bsc#978501) - Numerous bug fixes and improvements - Add libusb_get_device_speed() - Add libusb_has_capability() - Add libusb_error_name() - Add libusb_get_version() ----------------------------------------- Patch: SUSE-2017-242 Released: Wed Feb 15 12:02:29 2017 Summary: Security update for icu Severity: moderate References: 1023033,CVE-2014-9911 Description: This update for icu fixes the following issues: - CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). ----------------------------------------- Patch: SUSE-2017-243 Released: Wed Feb 15 12:12:08 2017 Summary: Security update for xorg-x11-libXpm Severity: moderate References: 1021315,CVE-2016-10164 Description: This update for xorg-x11-libXpm fixes the following security issue: - A heap overflow in XPM handling could be used by attackers supplying XPM files to crash or potentially execute code. (bsc#1021315) ----------------------------------------- Patch: SUSE-2017-307 Released: Wed Mar 1 16:52:12 2017 Summary: Security update for openssl Severity: moderate References: 1000677,1001912,1004499,1005878,1019334,1021641,984663,CVE-2016-2108,CVE-2016-7056,CVE-2016-8610 Description: This update for openssl fixes the following issues contained in the OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641) Security issues fixed: - CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334) - CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878) - degrade 3DES to MEDIUM in SSL2 (bsc#1001912) - CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499) Bugs fixed: - fix crash in openssl speed (bsc#1000677) - don't attempt session resumption if no ticket is present and session ID length is zero (bsc#984663) ----------------------------------------- Patch: SUSE-2017-311 Released: Thu Mar 2 15:26:49 2017 Summary: Security update for bind Severity: moderate References: 1024130,CVE-2017-3135 Description: This update for bind fixes the following issues: - Fixed a possible denial of service vulnerability (affected only configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130) ----------------------------------------- Patch: SUSE-2017-318 Released: Fri Mar 3 17:46:19 2017 Summary: Security update for openssh Severity: moderate References: 1005480,1005893,1006221,1016366,1016369,CVE-2016-10009,CVE-2016-10011,CVE-2016-8858 Description: This update for openssh fixes the following issues: Security issues fixed: - CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480) - CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366) - CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369) Non security issues fixed: - Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893) - fix suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221) ----------------------------------------- Patch: SUSE-2017-325 Released: Mon Mar 6 11:24:53 2017 Summary: Security update for unzip Severity: moderate References: 1013992,1013993,950110,950111,CVE-2014-9913,CVE-2015-7696,CVE-2015-7697,CVE-2016-9844 Description: This update for unzip fixes the following issues: - CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993) - CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110) - CVE-2015-7697: Specially crafted zip files could trigger an endless loop and lead to denial of service (bsc#950111) - CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992) ----------------------------------------- Patch: SUSE-2017-352 Released: Thu Mar 9 10:30:23 2017 Summary: Security update for xorg-x11-libX11 Severity: moderate References: 1019642,CVE-2013-1997 Description: This update for xorg-x11-libX11 fixes the following issues: - a regression introduced by the security fix for CVE-2013-1997 (bnc#824294). Keyboard mappings for special characters on Non-English keyboards might have been broken. (bnc#1019642) ----------------------------------------- Patch: SUSE-2017-355 Released: Thu Mar 9 11:37:37 2017 Summary: Recommended update for timezone Severity: low References: 1024676,1024677 Description: This update provides the latest timezone information (2017a) for your system, including the following changes: - Mongolia no longer observes DST. (bsc#1024676) - Chile's Region of Magallanes moves from -04/-03 to -03 year-round starting 2017-05-13 23:00. Split from America/Santiago creating a new zone America/Punta_Arenas. Also affects Antarctica/Palmer. (bsc#1024677) - Fixes to historical time stamps: Spain, Ecuador, Atyrau, Oral. - Switch to numeric, or commonly used time zone abbreviations. - zic(8) no longer mishandles some transitions in January 2038. - date and strftime now cause %z to generate '-0000' instead of '+0000' when the UT offset is zero and the time zone abbreviation begins with '-'. ----------------------------------------- Patch: SUSE-2017-363 Released: Fri Mar 10 14:36:15 2017 Summary: Security update for tcpdump Severity: moderate References: 1020940,CVE-2016-7922,CVE-2016-7923,CVE-2016-7925,CVE-2016-7926,CVE-2016-7927,CVE-2016-7928,CVE-2016-7931,CVE-2016-7934,CVE-2016-7935,CVE-2016-7936,CVE-2016-7937,CVE-2016-7939,CVE-2016-7940,CVE-2016-7973,CVE-2016-7974,CVE-2016-7975,CVE-2016-7983,CVE-2016-7984,CVE-2016-7992,CVE-2016-7993,CVE-2016-8574,CVE-2017-5202,CVE-2017-5203,CVE-2017-5204,CVE-2017-5483,CVE-2017-5484,CVE-2017-5485,CVE-2017-5486 Description: This update for tcpdump fixes the following issues: Security issues fixed (bsc#1020940): - CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print(). - CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print(). - CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print(). - CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print(). - CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print(). - CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print(). - CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print(). - CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print(). - CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). - CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions). - CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions). - CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c. - CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions). - CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print(). - CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print(). - CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c. - CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.). - CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print(). - CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print(). - CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print(). - CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print(). - CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse(). - CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print(). - CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap(). - CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print(). ----------------------------------------- Patch: SUSE-2017-405 Released: Fri Mar 17 14:09:27 2017 Summary: Recommended update for release-notes-sles Severity: low References: 1016450,1017579,1028458 Description: The Release Notes of SUSE Linux Enterprise Server 11 SP4 have been updated to document: - Maximum RAM certified of '1.5TB' for POWER. (bsc#1028458) - Samba support to operate as an Active Directory style domain controller. (bsc#1017579, fate#322422) ----------------------------------------- Patch: SUSE-2017-453 Released: Wed Mar 22 15:59:10 2017 Summary: Security update for wget Severity: moderate References: 1028301,CVE-2017-6508 Description: This update for wget fixes the following issues: Security issue fixed: - CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301). ----------------------------------------- Patch: SUSE-2017-467 Released: Tue Mar 28 16:33:30 2017 Summary: Security update for samba Severity: important References: 1027147,CVE-2017-2619 Description: This update for samba fixes the following issues: Security issue fixed: - CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147). ----------------------------------------- Patch: SUSE-2017-469 Released: Tue Mar 28 17:15:27 2017 Summary: Recommended update for timezone Severity: low References: 1030417 Description: This update provides the latest timezone information (2017b) for your system, including following changes: - Haiti resumed observance of DST in 2017. - Liberia changed from -004430 to +00 on 1972-01-07, not 1972-05-01. - Use 'MMT' to abbreviate Liberia's time zone before 1972. ----------------------------------------- Patch: SUSE-2017-515 Released: Fri Mar 31 11:47:27 2017 Summary: Security update for libpng12-0 Severity: moderate References: 1017646,958791,CVE-2015-8540,CVE-2016-10087 Description: This update for libpng12-0 fixes the following issues: Security issues fixed: - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) ----------------------------------------- Patch: SUSE-2017-539 Released: Tue Apr 4 18:03:17 2017 Summary: Recommended update for libzypp, zypper Severity: moderate References: 1004096,1030012,1030827,1030919,683914,932393,985390 Description: This update for libzypp and zypper fixes the following issues: libzypp: - Add support for repository authentication using SSL client certificates. (bsc#683914) - Fix SSL client certificate authentication via URL option ssl_clientcert/ssl_clientkey. (bsc#932393, bsc#1030012) - Fix X-libcurl-Empty-Header-Workaround. (bsc#1030919, bsc#1030827) - Let 'dup --from' leave updateTestcase logs in /var/log. (bsc#1004096) zypper: - Add parseable XML output to 'zypper locks'. (bsc#985390) - Add --matches and --solvables options to 'zypper locks'. ----------------------------------------- Patch: SUSE-2017-550 Released: Thu Apr 6 11:38:56 2017 Summary: Security update for ruby Severity: moderate References: 926974,959495,986630,CVE-2015-1855,CVE-2015-7551 Description: This update for ruby fixes the following issues: Secuirty issues fixed: - CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974) - CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495) Bugfixes: - fix small mistake in the backport for (bsc#986630) ----------------------------------------- Patch: SUSE-2017-558 Released: Fri Apr 7 12:26:27 2017 Summary: Security update for java-1_6_0-ibm Severity: moderate References: 1027038,CVE-2016-2183 Description: This update for java-1_6_0-ibm to 8.0-4.1 fixes the following issues: Security issue fixed: - CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a 'Sweet32' attack. (bsc#1027038) ----------------------------------------- Patch: SUSE-2017-565 Released: Mon Apr 10 12:52:48 2017 Summary: Recommended update for libssh2_org Severity: low References: 1027264,933336,967787,974691 Description: This update provides libssh2_org 1.4.3, which brings several fixes and enhancements: - Add support for zlib@openssh.com compression. - Return error if a too large package arrives. - Do not leak memory when handling OpenSSL errors. - Improved handling of disabled MD5 algorithm in OpenSSL. - Fail when parsing unknown keys in known_hosts file. - Return LIBSSH2_ERROR_SOCKET_DISCONNECT on EOF when reading banner. - Always do 'forced' window updates to avoid corner case stalls. - Finish in-progress key exchange before sending data. - Verify the packet before accepting it. - Use safer snprintf rather then sprintf in several places. - Advance offset correctly for buffered copies. For a comprehensive list of changes please refer to the package's change log. ----------------------------------------- Patch: SUSE-2017-575 Released: Wed Apr 12 09:02:07 2017 Summary: Recommended update for openslp Severity: low References: 1012814 Description: This update for openslp fixes the following issues: Provide a variant of libslp1 built against openssl1 for building sblim-sfcb or other libslp.so.1 users against openssl1 (bsc#1012814) ----------------------------------------- Patch: SUSE-2017-583 Released: Thu Apr 13 02:36:37 2017 Summary: Security update for bind Severity: important References: 1033466,1033467,1033468,987866,989528,CVE-2016-2775,CVE-2016-6170,CVE-2017-3136,CVE-2017-3137,CVE-2017-3138 Description: This update for bind fixes the following security issues: CVE-2017-3137 (bsc#1033467): Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could have been exploited to cause a denial of service of a bind server performing recursion. CVE-2017-3136 (bsc#1033466): An attacker could have constructed a query that would cause a denial of service of servers configured to use DNS64. CVE-2017-3138 (bsc#1033468): An attacker with access to the BIND control channel could have caused the server to stop by triggering an assertion failure. CVE-2016-6170 (bsc#987866): Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response. IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response. Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message. CVE-2016-2775 (bsc#989528): When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. ----------------------------------------- Patch: SUSE-2017-590 Released: Thu Apr 13 13:13:58 2017 Summary: Recommended update for libtool Severity: moderate References: 1010802 Description: This update for libtool prevents a segmentation fault caused by insufficient error handling on out-of-memory situations. ----------------------------------------- Patch: SUSE-2017-601 Released: Tue Apr 18 02:54:04 2017 Summary: Security update for bind Severity: important References: 1034162,CVE-2017-3137 Description: This update for bind fixes the following issues: - A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162) ----------------------------------------- Patch: SUSE-2017-608 Released: Tue Apr 18 11:26:47 2017 Summary: Security update for curl Severity: moderate References: 1015332,1032309,CVE-2016-9586,CVE-2017-7407 Description: This update for curl fixes the following issues: These security issues were fixed: - CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332) - CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309). ----------------------------------------- Patch: SUSE-2017-613 Released: Tue Apr 18 16:06:41 2017 Summary: Security update for ntp Severity: moderate References: 1014172,1030050,1031085,CVE-2016-9042,CVE-2017-6451,CVE-2017-6458,CVE-2017-6460,CVE-2017-6462,CVE-2017-6463,CVE-2017-6464 Description: This ntp update to version 4.2.8p10 fixes the following issues: Security issues fixed (bsc#1030050): - CVE-2017-6464: Denial of Service via Malformed Config - CVE-2017-6462: Buffer Overflow in DPTS Clock - CVE-2017-6463: Authenticated DoS via Malicious Config Option - CVE-2017-6458: Potential Overflows in ctl_put() functions - CVE-2017-6451: Improper use of snprintf() in mx4200_send() - CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist - CVE-2016-9042: 0rigin (zero origin) DoS. - ntpq_stripquotes() returns incorrect Value - ereallocarray()/eallocarray() underused - Copious amounts of Unused Code - Off-by-one in Oncore GPS Receiver - Makefile does not enforce Security Flags Bugfixes: - Remove spurious log messages (bsc#1014172). - Fixing ppc and ppc64 linker issue (bsc#1031085). - clang scan-build findings - Support for openssl-1.1.0 without compatibility modes - Bugfix 3072 breaks multicastclient - forking async worker: interrupted pipe I/O - (...) time_pps_create: Exec format error - Incorrect Logic for Peer Event Limiting - Change the process name of forked DNS worker - Trap Configuration Fail - Nothing happens if minsane < maxclock < minclock - allow -4/-6 on restrict line with mask - out-of-bound pointers in ctl_putsys and decode_bitflags - Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for transactional updates. ----------------------------------------- Patch: SUSE-2017-628 Released: Thu Apr 20 19:07:56 2017 Summary: Recommended update for mkinitrd Severity: low References: 1006705,1027452,926440,958722,968863,995634 Description: This update for mkinitrd fixes the following issues: - Prevent false error messages from setup-network.sh when optional configuration files don't exist in the system. (bsc#1027452) - Explicitly load usb modules in single user mode. (bsc#1006705) - Only copy /etc/group to the initrd and do not call getent. (bsc#995634) - Clear the GREP_OPTIONS variable. (bsc#968863) - Do not run fsck if fastboot is given on the kernel command line. (bsc#958722) - Include only required SCSI modules. (bsc#926440) ----------------------------------------- Patch: SUSE-2017-648 Released: Fri Apr 28 08:58:53 2017 Summary: Recommended update for crash Severity: low References: 1022962 Description: This update for crash provides the following fixes: - Fix analyzing fadump (and qemu) dumps on PPC64 systems with 32TB of memory. (bsc#1022962) ----------------------------------------- Patch: SUSE-2017-688 Released: Wed May 3 18:36:21 2017 Summary: Recommended update for release-notes-sles Severity: low References: 1027264,1028467 Description: The Release Notes of SUSE Linux Enterprise Server 11 SP4 have been updated to document: - Availability of libssh2_org version update. (bsc#1027264, fate#320942) ----------------------------------------- Patch: SUSE-2017-689 Released: Wed May 3 18:37:09 2017 Summary: Recommended update for boost Severity: low References: 1035216 Description: This update for boost fixes the following issues: - Backport upstream fix for a change in how Python interpreter handles __doc__ section in compiled modules. (bsc#1035216) ----------------------------------------- Patch: SUSE-2017-696 Released: Thu May 4 22:14:19 2017 Summary: Recommended update for xorg-x11-driver-video Severity: low References: 1019348,995542 Description: This update for xorg-x11-driver-video provides the following fixes: - Add freqless profile that removes HorizSync and Vertrefrsh lines from xorg.conf for G200 SE rev. 4 cards; used by all G200 SE cards by now. (bsc#995542) - Add support for G200e rev 4 chipset. (bsc#995542) - Add support for the new deviceID for G200eW3. (bsc#1019348) ----------------------------------------- Patch: SUSE-2017-718 Released: Mon May 8 17:30:00 2017 Summary: Security update for samba Severity: important References: 1027147,1036283,CVE-2017-2619 Description: This update for samba fixes the following issues: Security issue fixed: - CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147). For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression in the fix has been addressed (bsc#1036283, bso#12721). ----------------------------------------- Patch: SUSE-2017-736 Released: Wed May 10 18:34:53 2017 Summary: Recommended update for openldap2 Severity: low References: 1012894,1033210 Description: This update for openldap2 provides the following feature and bug fix: A new openldap2-openssl1 package is added for the SECURITY Module, which contains a TLS 1.2 enabled slapd. The openldap2-openssl1 package can be additionally installed and starting the 'ldap' sysvinit service will then use this. (FATE#320397 bsc#1033210) Bug fixed: - Fix a deadlock in connection handling (bsc#1012894) ----------------------------------------- Patch: SUSE-2017-755 Released: Fri May 12 12:55:51 2017 Summary: Recommended update for autofs Severity: low References: 1031533,998078 Description: This update for autofs fixes the following issues: - Do not add wildcard key to negative cache. (bsc#1031533) - Fix typo in DEFAULT_AUTH_CONFIG_FILE definition. (bsc#998078) ----------------------------------------- Patch: SUSE-2017-759 Released: Mon May 15 16:44:03 2017 Summary: Security update for libxslt Severity: moderate References: 1005591,1035905,934119,952474,CVE-2015-7995,CVE-2015-9019,CVE-2016-4738,CVE-2017-5029 Description: This update for libxslt fixes the following issues: - CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page (bsc#1035905). - CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator could cause a heap overread. This can be exploited to leak a couple of bytes after the buffer that holds the pattern string (bsc#1005591). - CVE-2015-9019: Properly initialize random generator (bsc#934119). - CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a type confusion leading to DoS. (bsc#952474) ----------------------------------------- Patch: SUSE-2017-802 Released: Thu May 18 12:24:08 2017 Summary: Security update for bash Severity: low References: 1010845,1031729,976776,CVE-2016-9401 Description: This update for bash fixed several issues This security issue was fixed: - CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845). This non-security issue was fixed: - Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729) ----------------------------------------- Patch: SUSE-2017-832 Released: Fri May 19 14:48:29 2017 Summary: Recommended update for xorg-x11-libX11 Severity: moderate References: 1031337 Description: This update for xorg-x11-libX11 fixes a memory leak that's visible when using gnome-panel. ----------------------------------------- Patch: SUSE-2017-851 Released: Tue May 23 16:13:39 2017 Summary: Recommended update for multipath-tools Severity: moderate References: 1005255,1007202,1019798,1025602,984957,991432,995633 Description: This update for multipath-tools provides the following fixes: - Fix check for new path states. (bsc#1019798) - Set DI_SERIAL in 'multipath -ll' output. (bsc#1007202) - Remove calls to dm_udev_complete. (bsc#1025602) - Add support for read-only bindings. (bsc#995633) - Fix issues with user_friendly_names initramfs bindings. (bsc#1005255) - Add HP MSA 2040 to hardware table. (bsc#984957) - Add 'wwn' and 'serial' keyword to weightedpath prioritizer. (bsc#991432) ----------------------------------------- Patch: SUSE-2017-855 Released: Wed May 24 10:23:44 2017 Summary: Security update for samba Severity: important References: 1038231,CVE-2017-7494 Description: This update for samba fixes the following issue: - An unprivileged user with access to the samba server could cause smbd to load a specially crafted shared library, which then had the ability to execute arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231] ----------------------------------------- Patch: SUSE-2017-880 Released: Tue May 30 13:19:02 2017 Summary: Security update for java-1_6_0-ibm Severity: important References: 1027038,1038505,CVE-2016-2183,CVE-2016-9840,CVE-2016-9841,CVE-2016-9842,CVE-2016-9843,CVE-2017-1289,CVE-2017-3509,CVE-2017-3514,CVE-2017-3533,CVE-2017-3539,CVE-2017-3544 Description: This update for java-1_6_0-ibm fixes the following issues: - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c - CVE-2016-9842: zlib: Undefined left shift of negative number - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification - CVE-2017-3533: OpenJDK: newline injection in the FTP client - CVE-2017-3544: OpenJDK: newline injection in the SMTP client - Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183 ----------------------------------------- Patch: SUSE-2017-899 Released: Wed May 31 16:44:50 2017 Summary: Security update for libtirpc, rpcbind Severity: important References: 1037559,CVE-2017-8779 Description: This update for libtirpc and rpcbind fixes the following issues: - CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559) ----------------------------------------- Patch: SUSE-2017-921 Released: Wed Jun 7 15:15:53 2017 Summary: Recommended update for tcpd Severity: low References: 1019574,899185,914527 Description: This update for tcpd provides the following fixes: - Fixes for breakage of IPv6 address handling (bsc#914527, bsc#899185, bsc#1019574) - Use O_CLOEXEC whenever necessary, otherwise fd leaks will follow. ----------------------------------------- Patch: SUSE-2017-954 Released: Tue Jun 13 15:19:02 2017 Summary: Security update for libxml2 Severity: moderate References: 1010675,1013930,1039063,1039064,1039066,1039069,1039661,CVE-2016-9318,CVE-2017-9047,CVE-2017-9048,CVE-2017-9049,CVE-2017-9050 Description: This update for libxml2 fixes the following issues: Security issues fixed: - CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661] - CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066] - CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063] - CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064] A clarification for the previously released update: For CVE-2016-9318 we decided not to ship a fix since it can break existing setups. Please take appropriate actions if you parse untrusted XML files and use the new -noxxe flag if possible (bnc#1010675, bnc#1013930). ----------------------------------------- Patch: SUSE-2017-960 Released: Wed Jun 14 14:40:22 2017 Summary: Recommended update for gcc5 Severity: low References: 1043580 Description: This update for gcc5 fixes the version of libffi in its pkg-config configuration file. ----------------------------------------- Patch: SUSE-2017-997 Released: Mon Jun 19 21:21:07 2017 Summary: Security update for glibc Severity: important References: 1039357,CVE-2017-1000366 Description: This update for glibc fixes the following issues: - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] ----------------------------------------- Patch: SUSE-2017-1006 Released: Wed Jun 21 09:00:23 2017 Summary: Recommended update for openldap2 Severity: moderate References: 1043101 Description: This update for openldap2 fixes the following issues: A seperate openldap2-client-openssl1 package is being split out, which contains the ldap commandline client tools in TLS 1.2 enabled variants. These previously lived directly in the library package, which lead to confusion. (bsc#1043101) These binaries can be found in /opt/suse/bin/ldap* ----------------------------------------- Patch: SUSE-2017-1070 Released: Thu Jun 29 16:04:31 2017 Summary: Security update for net-snmp Severity: low References: 1011601,1019450 Description: This update for net-snmp ships an additional library package built against openssl1 to allow linking libsnmp against other binaries that link against openssl1. (bsc#1011601 fate#322032) The Net-SNMP server and commandline clients themselves do not use TLS, so are not duplicated with openssl1 builds. ----------------------------------------- Patch: SUSE-2017-1081 Released: Thu Jun 29 22:21:47 2017 Summary: Security update for bind Severity: important References: 1046554,1046555,CVE-2017-3142,CVE-2017-3143 Description: This update for bind fixes the following issues: - An attacker with the ability to send and receive messages to an authoritative DNS server was able to circumvent TSIG authentication of AXFR requests. A server that relied solely on TSIG keys for protection could be manipulated into (1) providing an AXFR of a zone to an unauthorized recipient and (2) accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142] - An attacker who with the ability to send and receive messages to an authoritative DNS server and who had knowledge of a valid TSIG key name for the zone and service being targeted was able to manipulate BIND into accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143] ----------------------------------------- Patch: SUSE-2017-1088 Released: Fri Jun 30 15:37:36 2017 Summary: Security update for xorg-x11-server Severity: moderate References: 1019649,1025029,1025035,1025084,981044,CVE-2017-2624 Description: This update for xorg-x11-server fixes the following issues: Security issues: - CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624) Non security issues: - Use arc4random to generate cookies. (bsc#1025084) - XDrawArc performance improvement (bsc#1019649) - Fix byte swapping for gradeint stops (bsc#981044). - Remove unused function with use-after-free issue. (bsc#1025035) ----------------------------------------- Patch: SUSE-2017-1098 Released: Mon Jul 3 17:17:09 2017 Summary: Security update for unrar Severity: important References: 1045315,CVE-2012-6706 Description: This update for unrar fixes the following issues: - CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315). ----------------------------------------- Patch: SUSE-2017-1103 Released: Tue Jul 4 16:12:55 2017 Summary: Security update for vim Severity: moderate References: 1024724,CVE-2017-5953 Description: This update for vim fixes the following issues: - CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724) ----------------------------------------- Patch: SUSE-2017-1114 Released: Thu Jul 6 11:32:55 2017 Summary: Recommended update for ncurses Severity: important References: 1046853,1046858,CVE-2017-10684,CVE-2017-10685 Description: This update for ncurses fixes the following issues: Security issues fixed: - CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858) - CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853) ----------------------------------------- Patch: SUSE-2017-1115 Released: Thu Jul 6 11:35:12 2017 Summary: Security update for libgcrypt Severity: moderate References: 1046607,CVE-2017-7526 Description: This update for libgcrypt fixes the following issues: - CVE-2017-7526: Hardening a against local side-channel attack in RSA key handling has been added (bsc#1046607) ----------------------------------------- Patch: SUSE-2017-1120 Released: Fri Jul 7 11:24:46 2017 Summary: Security update for libxml2 Severity: moderate References: 1024989,1044337,1044887,1044894,CVE-2017-0663,CVE-2017-5969,CVE-2017-7375,CVE-2017-7376 Description: This update for libxml2 fixes the following issues: Security issues fixed: * CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337) * CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989) * CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894) * CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887) ----------------------------------------- Patch: SUSE-2017-1123 Released: Fri Jul 7 15:56:25 2017 Summary: Recommended update for yast2-ldap-client Severity: low References: 1043915 Description: This update for yast2-ldap-client provides the following fix: - AutoYaST: Reading default values from /etc/nsswitch.conf before writing settings to system (bsc#1043915) ----------------------------------------- Patch: SUSE-2017-1128 Released: Mon Jul 10 16:26:42 2017 Summary: Recommended update for release-notes-sles Severity: low References: 1035915 Description: The Release Notes of SUSE Linux Enterprise Server 11 SP4 have been updated to document that lxc-attach(1) is not supported. ----------------------------------------- Patch: SUSE-2017-1139 Released: Wed Jul 12 13:30:39 2017 Summary: Recommended update for pango Severity: low References: 978972 Description: This update for glib2 and pango provides the following fixes: - Ignore postun/postin errors. (bsc#978972) ----------------------------------------- Patch: SUSE-2017-1144 Released: Wed Jul 12 16:38:28 2017 Summary: Security update for xorg-x11-server Severity: important References: 1035283,CVE-2017-10971,CVE-2017-10972 Description: This update for xorg-x11-server fixes the following issues: - CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283) - Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the allowed range. - CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage. ----------------------------------------- Patch: SUSE-2017-1145 Released: Wed Jul 12 16:40:00 2017 Summary: Security update for xorg-x11-libICE Severity: moderate References: 1025068,CVE-2017-2626 Description: This update for xorg-x11-libICE fixes the following issues: - CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies predictable. A more random generation method has been implemented. (boo#1025068) ----------------------------------------- Patch: SUSE-2017-1155 Released: Fri Jul 14 17:15:36 2017 Summary: Security update for xorg-x11-libXdmcp Severity: moderate References: 1025046,CVE-2017-2625 Description: This update for xorg-x11-libXdmcp fixes the following issues: - CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making the session keys predictable (bsc#1025046) ----------------------------------------- Patch: SUSE-2017-1156 Released: Fri Jul 14 17:16:21 2017 Summary: Recommended update for autoyast2 Severity: low References: 1038797,935066,937942,986124,996839 Description: This update for autoyast2 fixes the following issues: - Add correct yast2-storage requirement (bsc#1038797) - Exporting '/dev/nfs' containers for nfs volumes correctly (bsc#986124) - Software raid using dm-devices fails (bsc#996839) - Bring up multipath during installation (bsc#937942) - Syncing hardware time before starting installation via ntp (bsc#935066) ----------------------------------------- Patch: SUSE-2017-1159 Released: Fri Jul 14 17:18:49 2017 Summary: Recommended update for yast2-samba-client Severity: moderate References: 1035099 Description: This update fixes yast2-samba-client to allow client ipc signing parameter specified in smb.conf to be used by YaST when performing 'net ads join' to join the domain. ----------------------------------------- Patch: SUSE-2017-1161 Released: Sat Jul 15 09:50:23 2017 Summary: Security update for gnutls Severity: moderate References: 1034173,1038337,1040621,CVE-2017-6891,CVE-2017-7869 Description: This update for gnutls fixes the following issues: - GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173) - CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621) - An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337) ----------------------------------------- Patch: SUSE-2017-1176 Released: Wed Jul 19 23:10:02 2017 Summary: Recommended update for release-notes-sles Severity: low References: 1031375,1048537 Description: The Release Notes of SUSE Linux Enterprise Server 11 SP4 have been updated to document the support status of xl/libxl and libvirt/libxl tool stacks on Xen systems. ----------------------------------------- Patch: SUSE-2017-1278 Released: Mon Aug 7 14:46:12 2017 Summary: Security update for ncurses Severity: moderate References: 1046853,1046858,1047964,1047965,1049344,CVE-2017-10684,CVE-2017-10685,CVE-2017-11112,CVE-2017-11113 Description: This update for ncurses fixes the following issues: Security issues fixed: - CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964) - CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965) - CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken termcap format (bsc#1046853, bsc#1046858, bsc#1049344) ----------------------------------------- Patch: SUSE-2017-1314 Released: Wed Aug 9 16:31:29 2017 Summary: Security update for libxml2 Severity: moderate References: 1038444,CVE-2017-8872 Description: This update for libxml2 fixes the following issues: - CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444) ----------------------------------------- Patch: SUSE-2017-1321 Released: Fri Aug 11 16:21:45 2017 Summary: Recommended update for xfsprogs Severity: moderate References: 1045597 Description: This update for xfsprogs provides the following fixes: - Clear bad flags observed on PowerPC64 systems after a file system corruption. (bsc#1045597) ----------------------------------------- Patch: SUSE-2017-1339 Released: Wed Aug 16 12:55:10 2017 Summary: Recommended update for sed Severity: low References: 954661 Description: This update for sed provides the following fixes: - Don't terminate with a segmentation fault if close of last file descriptor fails. (bsc#954661) ----------------------------------------- Patch: SUSE-2017-1353 Released: Fri Aug 18 18:41:42 2017 Summary: Recommended update for bash Severity: moderate References: 1025645 Description: This update for bash provides fixes for better handling of signal functions. ----------------------------------------- Patch: SUSE-2017-1422 Released: Wed Aug 30 19:44:51 2017 Summary: Recommended update for xorg-x11-driver-video Severity: low References: 1044216,995542 Description: This update for xorg-x11-driver-video provides the following fixes: - Add support for Matrox G200 eH3 GPUs. (bsc#1044216, fate#323551) - Changed the HiPri value for G200e4 to be always 0. - Added bandwidth limitation to block resolution above 1920x1200x60Hz. (bnc#995542) ----------------------------------------- Patch: SUSE-2017-1423 Released: Thu Aug 31 14:56:31 2017 Summary: Security update for curl Severity: moderate References: 1015332,1032309,1051644,CVE-2016-9586,CVE-2017-1000100,CVE-2017-7407 Description: This update for curl fixes the following issues: - CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644) - CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309) - CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332) ----------------------------------------- Patch: SUSE-2017-1465 Released: Wed Sep 6 09:37:29 2017 Summary: Security update for expat Severity: moderate References: 1047236,1047240,CVE-2016-9063,CVE-2017-9233 Description: This update for expat fixes the following issues: - CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240) - CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236) ----------------------------------------- Patch: SUSE-2017-1484 Released: Mon Sep 11 12:31:51 2017 Summary: Recommended update for yast2-support Severity: low References: 1040706 Description: This update for yast2-support provides the following fix: - Allow support request numbers longer than 11 digits. (bsc#1040706) ----------------------------------------- Patch: SUSE-2017-1594 Released: Wed Sep 27 08:48:04 2017 Summary: Recommended update for open-iscsi Severity: low References: 960439 Description: This update for open-iscsi provides fixes and enhancements for iscsiuio: - iscsiuio: Correct the handling of Multi Function mode. - iscsiuio: Get the library to use based on uio sysfs name. - iscsiuio: Wait for interface to be ready before issuing the ping. - iscsiadm: Let ping be tried after interface configuration is initialized. - iscsiuio: Add ping support through iscsiuio. - iscsid: Add socket communication hooks for uip. - iscsid: Changes to support ping through iscsiuio. ----------------------------------------- Patch: SUSE-2017-1596 Released: Wed Sep 27 15:24:03 2017 Summary: Recommended update for autofs Severity: low References: 1046493 Description: This update for autofs improves timeout handling to use a monotonic time source. This prevents negative adjustments of the system clock from affecting expiration of automounted volumes. ----------------------------------------- Patch: SUSE-2017-1661 Released: Tue Oct 10 11:45:02 2017 Summary: Security update for tcpdump Severity: moderate References: 1047873,1057247,CVE-2017-11108,CVE-2017-11541,CVE-2017-11542,CVE-2017-11543,CVE-2017-13011 Description: This update for tcpdump fixes the following issues: Security issues fixed: - CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873) - CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247). - CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247). - CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247). - CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247). ----------------------------------------- Patch: SUSE-2017-1666 Released: Tue Oct 10 13:13:44 2017 Summary: Recommended update for xinetd Severity: low References: 1034687,1054532,870904,943484,947475,972691 Description: This update for xinetd provides the following fixes: - Specifying multiple log targets in the configuration caused a crash in xinetd, so make sure this is not allowed and in case of misconfiguration handle it correctly. (bsc#1054532) - Fix a race condition that was causing xinetd not to be running after receiving a SIGHUP and a call to bind() failing with error EADDRINUSE. The fix exposes a sysconfig variable named XINETD_BIND_DELAY that can be used to delay calls to bind(). (bsc#972691) - Increase the maximum amount of file descriptors that can be used simultaneously by using poll() instead of select() for socket handling. (bsc#1034687) - Fix an error that was causing a failure in xinetd when trying to fallback from IPv6 to IPv4. (bsc#947475) - Update the documentation about the maximum allowed size of server parameters. (bsc#943484) - Fix a problem that was causing an error message to be displayed in the logs when reloading the service via SIGHUP even when no errors happened. (bsc#870904) ----------------------------------------- Patch: SUSE-2017-1677 Released: Wed Oct 11 15:50:20 2017 Summary: Recommended update for supportutils Severity: important References: 1061282,965682,995387 Description: This update for supportutils fixes the following issues: * A core_pattern containing pipe could have lead to a filesystem corruption (bsc#1061282) * Supportconfig was no longer running the LVM commands vgs and lvs (bsc#995387) * The NCP configuration was being skipped when run on OES2015 (bsc#965682) ----------------------------------------- Patch: SUSE-2017-1680 Released: Thu Oct 12 14:44:29 2017 Summary: Security update for samba Severity: moderate References: 1042419,1058622,1058624,CVE-2017-12150,CVE-2017-12163 Description: This update for samba fixes several issues. These security issues were fixed: - CVE-2017-12163: Prevent client short SMB1 write from writing server memory to file, leaking information from the server to the client (bsc#1058624) - CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622) This non-security issue was fixed: - Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419). ----------------------------------------- Patch: SUSE-2017-1688 Released: Fri Oct 13 16:09:47 2017 Summary: Recommended update for mdadm Severity: moderate References: 1003568,1009954,1020405,1031452,1032802,1047183,953595,966773 Description: This update for mdadm fixes the following issues: - Fix superblock's max_dev when adding a new disk in linear array. (bsc#1032802) - Avoid error message if component devices contain hyphen in name. (bsc#1031452) - Fix misleading error code returned by mdadm --detail on inactive arrays. (bsc#966773, bsc#1020405) - Fix 'Insufficient head-space for reshape' error. (bsc#953595) - Do not assign numbers to missing raid disks when printing information to avoid duplication and confusion. (bsc#1047183) - Only issue change events for kernels older than 2.6.28, preventing a race condition that could lead to broken symbolic links against /dev/mdX devices. (bsc#1003568) - Fix handling of MD arrays with devices that have been assigned very large minor numbers. This affects systems with more than 128 MD arrays. (bsc#1009954) ----------------------------------------- Patch: SUSE-2017-1690 Released: Mon Oct 16 11:51:57 2017 Summary: Recommended update for iproute2 Severity: low References: 1034855,949040,949063,990635 Description: This update for iproute2 provides the following fixes: - Fix command line parser in routel command preventing it from entering in an infinite loop. (bsc#1034855) - Fix the exit code returned by the ip command on failures. (bsc#949040) - Clarify the meaning of 'priority' in ip-rule(8) and ip-route(8) manual pages. (bsc#990635) ----------------------------------------- Patch: SUSE-2017-1767 Released: Tue Oct 24 20:07:06 2017 Summary: Recommended update for logrotate Severity: low References: 1057801,982315 Description: This update for logrotate provides the following fix: - Make sure log files continue to rotate properly when a stale status file is found. (bsc#1057801) - Fix a problem that was causing recent log files to be deleted instead of the oldest ones when using date format. (bsc#982315) ----------------------------------------- Patch: SUSE-2017-1825 Released: Wed Nov 8 08:45:45 2017 Summary: Security update for perl Severity: low References: 1047178,CVE-2017-6512 Description: This update for perl fixes the following issues: Security issue fixed: - CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic. (bnc#1047178) Bug fixes: - reformat baselibs.conf as source validator workaround ----------------------------------------- Patch: SUSE-2017-1870 Released: Thu Nov 16 12:56:38 2017 Summary: Security update for xorg-x11-server Severity: moderate References: 1025084,1051150,1063034,1063035,1063037,1063038,1063039,1063040,1063041,CVE-2017-12176,CVE-2017-12177,CVE-2017-12178,CVE-2017-12179,CVE-2017-12180,CVE-2017-12181,CVE-2017-12182,CVE-2017-12183,CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187,CVE-2017-13723 Description: This update for xorg-x11-server provides several fixes. These security issues were fixed: - CVE-2017-13723: Prevent local DoS via unusual characters in XkbAtomText and XkbStringText (bsc#1051150). - Improve the entropy when generating random data used in X.org server authorization cookies generation by using getentropy() and getrandom() when available (bsc#1025084) - CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed unvalidated lengths in multiple extensions (bsc#1063034) - CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES extension. (bsc#1063035) - CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions (bsc#1063037) - CVE-2017-12179: Fixed an integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038) - CVE-2017-12178: Fixed a wrong extra length check in ProcXIChangeHierarchy in Xi (bsc#1063039) - CVE-2017-12177: Fixed an unvalidated variable-length request in ProcDbeGetVisualInfo (bsc#1063040) - CVE-2017-12176: Fixed an unvalidated extra length in ProcEstablishConnection (bsc#1063041) ----------------------------------------- Patch: SUSE-2017-1883 Released: Wed Nov 22 17:00:14 2017 Summary: Recommended update for timezone Severity: low References: 1064571 Description: This update provides the latest timezone information (2017c) for your system, including following changes: - Northern Cyprus switches from +03 to +02/+03 on 2017-10-29 - Fiji ends DST 2018-01-14, not 2018-01-21 - Namibia switches from +01/+02 to +02 on 2018-04-01 - Sudan switches from +03 to +02 on 2017-11-01 - Tonga likely switches from +13/+14 to +13 on 2017-11-05 - Turks and Caicos switches from -04 to -05/-04 on 2018-11-04 - Corrections to past DST transitions - Move oversized Canada/East-Saskatchewan to 'backward' file - zic(8) and the reference runtime now reject multiple leap seconds within 28 days of each other, or leap seconds before the Epoch. ----------------------------------------- Patch: SUSE-2017-1973 Released: Fri Dec 1 10:09:41 2017 Summary: Recommended update for zip Severity: low References: 1068346 Description: This update for zip provides the following fix: - Fix memory leaks when appending files (bsc#1068346) ----------------------------------------- Patch: SUSE-2017-1984 Released: Fri Dec 1 15:02:36 2017 Summary: Security update for curl Severity: moderate References: 1061876,CVE-2017-1000254 Description: This update for curl fixes the following security issues: - CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876) ----------------------------------------- Patch: SUSE-2017-1988 Released: Fri Dec 1 15:05:54 2017 Summary: Security update for ncurses Severity: important References: 1056127,1056128,1056129,1056131,1056132,1056136,1069530,CVE-2017-13728,CVE-2017-13729,CVE-2017-13730,CVE-2017-13731,CVE-2017-13732,CVE-2017-13733,CVE-2017-16879 Description: This update for ncurses fixes the following issues: Security issues fixed: - CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136). - CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132). - CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131). - CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129). - CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128). - CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127). - CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530). ----------------------------------------- Patch: SUSE-2017-1997 Released: Mon Dec 4 20:43:55 2017 Summary: Recommended update for mcelog Severity: low References: 1061637 Description: This update for mcelog provides the following enhancement: - Added support for 'skylake server' aka SKYLAKE_XEON. (bsc#1061637) ----------------------------------------- Patch: SUSE-2017-2010 Released: Thu Dec 7 15:27:09 2017 Summary: Security update for procmail Severity: moderate References: 1068648,CVE-2017-16844 Description: This update for procmail fixes the following issues: Security issue fixed: - CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648) ----------------------------------------- Patch: SUSE-2017-2023 Released: Fri Dec 8 12:27:54 2017 Summary: Recommended update for openssl Severity: moderate References: 1032261,1034941,1065363 Description: This update for openssl fixes the following issues: Bugs fixed: - Backported alternative certificate chain lookup patches (bsc#1032261) - Fixed a crash in DES_fcrypt (bsc#1065363) - Backport the DEFAULT_SUSE cipher list we use in SUSE Linux Enterprise 12 (bsc#1034941) ----------------------------------------- Patch: SUSE-2017-2029 Released: Mon Dec 11 10:39:40 2017 Summary: Recommended update for libmspack Severity: low References: 1063072 Description: This update for libmspack fixes the following issues: - Add a pkgconfig file for use with libmspack-devel (bsc#1063072) ----------------------------------------- Patch: SUSE-2017-2101 Released: Tue Dec 19 08:37:09 2017 Summary: Security update for java-1_6_0-ibm Severity: important References: 1070162,CVE-2016-9841,CVE-2017-10281,CVE-2017-10285,CVE-2017-10293,CVE-2017-10295,CVE-2017-10345,CVE-2017-10346,CVE-2017-10347,CVE-2017-10348,CVE-2017-10349,CVE-2017-10350,CVE-2017-10355,CVE-2017-10356,CVE-2017-10357,CVE-2017-10388 Description: This update for java-1_6_0-ibm fixes the following issues: Security issues fixed: - Security update to version 6.0.16.50 (bsc#1070162) * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356 CVE-2017-10293 CVE-2016-9841 CVE-2017-10355 CVE-2017-10357 CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350 CVE-2017-10281 CVE-2017-10295 CVE-2017-10345 ----------------------------------------- Patch: SUSE-2018-20 Released: Thu Jan 4 14:40:45 2018 Summary: Security update for samba Severity: moderate References: 1016531,1063008,CVE-2017-15275 Description: This update for samba fixes the following issues: - CVE-2017-15275: s3: smbd: Chain code can return uninitialized memory when talloc buffer is grown; (bsc#1063008); (bso#13077); - s3/libads: fix seal/signed ldap connections so they are reused; (bsc#1016531). ----------------------------------------- Patch: SUSE-2018-23 Released: Fri Jan 5 13:57:36 2018 Summary: Recommended update for icu Severity: moderate References: 1037416,CVE-2014-9911 Description: This update for icu fixes the following issue: - Fix international date/time format output (a regression caused by the fix for CVE-2014-9911) (bsc#1037416). ----------------------------------------- Patch: SUSE-2018-57 Released: Fri Jan 12 09:47:38 2018 Summary: Security update for glibc Severity: important References: 1074293,CVE-2018-1000001 Description: This update for glibc fixes the following issues: - A privilege escalation bug in the realpath() function has been fixed. [CVE-2018-1000001, bsc#1074293] ----------------------------------------- Patch: SUSE-2018-71 Released: Mon Jan 15 13:32:22 2018 Summary: Recommended update for xfsprogs Severity: low References: 1066353 Description: This update for xfsprogs provides the following fix: - Improved xfs_repair performance on large filesystems. (bsc#1066353) ----------------------------------------- Patch: SUSE-2018-85 Released: Wed Jan 17 08:32:35 2018 Summary: Security update for rsync Severity: moderate References: 1066644,1071459,1071460,CVE-2017-16548,CVE-2017-17433,CVE-2017-17434 Description: This update for rsync fixes the following issues: Security issues fixed: - CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also did not apply the sanitize_paths protection mechanism to pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function in rsync.c), which allowed remote attackers to bypass intended access restrictions' (bsc#1071460). - CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync, proceeded with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allowed remote attackers to bypass intended access restrictions (bsc#1071459). - CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check for a trailing '\\0' character in an xattr name, which allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon (bsc#1066644). ----------------------------------------- Patch: SUSE-2018-114 Released: Mon Jan 22 11:36:25 2018 Summary: Security update for perl-XML-LibXML Severity: important References: 1046848,CVE-2017-10672 Description: This update for perl-XML-LibXML fixes the following issues: - CVE-2017-10672: A use-after-free allowed remote attackers to potentially execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848) ----------------------------------------- Patch: SUSE-2018-117 Released: Mon Jan 22 12:54:10 2018 Summary: Security update for rsync Severity: moderate References: 1076503,CVE-2018-5764 Description: This update for rsync fixes one issues. This security issue was fixed: - CVE-2018-5764: The parse_arguments function in options.c did not prevent multiple --protect-args uses, which allowed remote attackers to bypass an argument-sanitization protection mechanism (bsc#1076503) ----------------------------------------- Patch: SUSE-2018-123 Released: Tue Jan 23 10:38:29 2018 Summary: Security update for ncurses Severity: moderate References: 1056127,CVE-2017-13733 Description: This update for ncurses fixes the following issues: Security issue fixed: - CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127). ----------------------------------------- Patch: SUSE-2018-135 Released: Wed Jan 24 12:11:19 2018 Summary: Security update for libexif Severity: moderate References: 1059893,CVE-2017-7544 Description: This update for libexif fixes the following security issue: - CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure (bsc#1059893) ----------------------------------------- Patch: SUSE-2018-147 Released: Thu Jan 25 11:47:39 2018 Summary: Recommended update for openldap2 Severity: low References: 1064213 Description: This update for openldap2 provides the following fix: - Read system wide certificate directory by default (bsc#1064213) - Avoid hiding the error if specified CA location cannot be read (bsc#1064213) ----------------------------------------- Patch: SUSE-2018-153 Released: Fri Jan 26 08:47:15 2018 Summary: Security update for curl Severity: moderate References: 1027712,1077001,CVE-2016-7141,CVE-2018-1000007 Description: This update for curl several issues. This security issue was fixed: - CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001) This non-security issue was fixed: - Set DEFAULT_SUSE as the default cipher list (bsc#1027712] ----------------------------------------- Patch: SUSE-2018-171 Released: Fri Jan 26 17:40:46 2018 Summary: Security update for xorg-x11-libs Severity: moderate References: 1049692,1050459,1054285,1065386,CVE-2017-13720,CVE-2017-13722,CVE-2017-16612 Description: This update for xorg-x11-libs fixes several issues. These security issues were fixed: - CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386). - CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285) - CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692) - Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459) ----------------------------------------- Patch: SUSE-2018-183 Released: Mon Jan 29 14:36:14 2018 Summary: Security update for libevent Severity: moderate References: 1022917,1022918,1022919,CVE-2016-10195,CVE-2016-10196,CVE-2016-10197 Description: This update for libevent fixes the following issues: - CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) - CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21) - CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) ----------------------------------------- Patch: SUSE-2018-212 Released: Tue Jan 30 13:04:50 2018 Summary: Security update for gcc43 Severity: moderate References: 1039513,1044016,1045091,1059075,1074621,938159,977654,999596,CVE-2017-1000376 Description: This update for gcc43 fixes the following issues: Security issue fixed: - CVE-2017-1000376: Don't request excutable stack from libffi. [bnc#1045091] New features: - Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621] - Add support for zero-sized VLAs and allocas with -fstack-clash-protection. [bnc#1059075] - Add support for -fstack-clash-protection to mitigate the Stack Clash attack. [bnc#1039513] Non security bugs fixed: - Fixed build of 32bit libgcov.a with LFS support. [bsc#1044016] - Fixed issue with libstdc++ functional when an exception is thrown during construction. [bsc#999596] - Fixed issue with using gcov and #pragma pack. [bsc#977654] - Fixed ICE compiling AFS modules for the s390x kernel. [bsc#938159] - Backport large file support from GCC 4.6. ----------------------------------------- Patch: SUSE-2018-254 Released: Mon Feb 5 08:32:39 2018 Summary: Security update for bind Severity: important References: 1040039,1047184,1076118,CVE-2017-3145 Description: This update for bind fixes several issues. This security issue was fixed: - CVE-2017-3145: Improper sequencing during cleanup could have lead to a use-after-free error that triggered an assertion failure and crash in named (bsc#1076118). These non-security issues were fixed: - Updated named.root file (bsc#1040039) - Update bind.keys for DNSSEC root KSK rollover (bsc#1047184) ----------------------------------------- Patch: SUSE-2018-267 Released: Tue Feb 6 17:46:06 2018 Summary: Recommended update for openssl-certs Severity: moderate References: 1010996,1071152,1071390 Description: This update for openssl-certs fixes the following issues: The system SSL root certificate store was updated to Mozilla certificate version 2.22 from January 2018. (bsc#1071152 bsc#1071390 bsc#1010996) The old 1024 bit legacy CAs that were temporary left in to allow in-chain root certificates were removed as openssl is now able to handle them. Further changes coming from Mozilla: - New Root CAs added: * Amazon Root CA 1: (email protection, server auth) * Amazon Root CA 2: (email protection, server auth) * Amazon Root CA 3: (email protection, server auth) * Amazon Root CA 4: (email protection, server auth) * Certplus Root CA G1: (email protection, server auth) * Certplus Root CA G2: (email protection, server auth) * D-TRUST Root CA 3 2013: (email protection) * GDCA TrustAUTH R5 ROOT: (server auth) * Hellenic Academic and Research Institutions ECC RootCA 2015: (email protection, server auth) * Hellenic Academic and Research Institutions RootCA 2015: (email protection, server auth) * ISRG Root X1: (server auth) * LuxTrust Global Root 2: (server auth) * OpenTrust Root CA G1: (email protection, server auth) * OpenTrust Root CA G2: (email protection, server auth) * OpenTrust Root CA G3: (email protection, server auth) * SSL.com EV Root Certification Authority ECC: (server auth) * SSL.com EV Root Certification Authority RSA R2: (server auth) * SSL.com Root Certification Authority ECC: (email protection, server auth) * SSL.com Root Certification Authority RSA: (email protection, server auth) * Symantec Class 1 Public Primary Certification Authority - G4: (email protection) * Symantec Class 1 Public Primary Certification Authority - G6: (email protection) * Symantec Class 2 Public Primary Certification Authority - G4: (email protection) * Symantec Class 2 Public Primary Certification Authority - G6: (email protection) * TrustCor ECA-1: (email protection, server auth) * TrustCor RootCert CA-1: (email protection, server auth) * TrustCor RootCert CA-2: (email protection, server auth) * TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1: (server auth) - Removed root CAs: * AddTrust Public Services Root * AddTrust Public CA Root * AddTrust Qualified CA Root * ApplicationCA - Japanese Government * Buypass Class 2 CA 1 * CA Disig Root R1 * CA WoSign ECC Root * Certification Authority of WoSign G2 * Certinomis - Autorité Racine * Certum Root CA * China Internet Network Information Center EV Certificates Root * CNNIC ROOT * Comodo Secure Services root * Comodo Trusted Services root * ComSign Secured CA * EBG Elektronik Sertifika Hizmet Sağlayıcısı * Equifax Secure CA * Equifax Secure eBusiness CA 1 * Equifax Secure Global eBusiness CA * GeoTrust Global CA 2 * IGC/A * Juur-SK * Microsec e-Szigno Root CA * PSCProcert * Root CA Generalitat Valenciana * RSA Security 2048 v3 * Security Communication EV RootCA1 * Sonera Class 1 Root CA * StartCom Certification Authority * StartCom Certification Authority G2 * S-TRUST Authentication and Encryption Root CA 2005 PN * Swisscom Root CA 1 * Swisscom Root EV CA 2 * TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3 * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı * TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6 * UTN USERFirst Hardware Root CA * UTN USERFirst Object Root CA * VeriSign Class 3 Secure Server CA - G2 * Verisign Class 1 Public Primary Certification Authority * Verisign Class 2 Public Primary Certification Authority - G2 * Verisign Class 3 Public Primary Certification Authority * WellsSecure Public Root Certificate Authority * Certification Authority of WoSign * WoSign China - Removed Code Signing rights from a lot of CAs (not listed here). - Removed Server Auth rights from: * AddTrust Low-Value Services Root * Camerfirma Chambers of Commerce Root * Camerfirma Global Chambersign Root * Swisscom Root CA 2 ----------------------------------------- Patch: SUSE-2018-275 Released: Thu Feb 8 08:54:25 2018 Summary: Security update for libxml2 Severity: moderate References: 1069689,1077993,1078806,1078813,CVE-2016-5131,CVE-2017-15412,CVE-2017-16932,CVE-2017-5130 Description: This update for libxml2 fixes several issues. Theses security issues were fixed: - CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689). - CVE-2017-15412: Prevent use after free when calling XPath extension functions that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993) - CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. (bsc#1078813) - CVE-2017-5130: Fixed a potential remote buffer overflow in function xmlMemoryStrdup() (bsc#1078806) ----------------------------------------- Patch: SUSE-2018-278 Released: Fri Feb 9 12:59:19 2018 Summary: Security update for libdb-4_5 Severity: moderate References: 1043886 Description: This update for libdb-4_5 fixes the following issues: - A DB_CONFIG file in the current working directory allowed local users to obtain sensitive information via a symlink attack involving a setgid or setuid application using libdb-4_8. (bsc#1043886) ----------------------------------------- Patch: SUSE-2018-306 Released: Wed Feb 14 16:03:07 2018 Summary: Security update for dhcp Severity: moderate References: 1023415,1076119,CVE-2017-3144 Description: This update for dhcp fixes several issues. This security issue was fixed: - CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message is received allowing DoS (bsc#1076119) This non-security issue was fixed: - Enhance dhclient-script to handle static route updates. (bsc#1023415) ----------------------------------------- Patch: SUSE-2018-311 Released: Thu Feb 15 13:44:47 2018 Summary: Recommended update for gcc43 Severity: moderate References: 1074621 Description: This update for gcc43 fixes the following issues: - Fixed a bug in the indirect retpoline thunk generations. (bsc#1074621) ----------------------------------------- Patch: SUSE-2018-318 Released: Fri Feb 16 11:34:25 2018 Summary: Security update for freetype2 Severity: moderate References: 1028103,1035807,1036457,CVE-2016-10244,CVE-2017-8105,CVE-2017-8287 Description: This update for freetype2 fixes the following issues: Security issue fixed: - CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not ensure that a font contains a glyph name, which allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file (bsc#1028103). - CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.ca (bsc#1035807) - CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c (bsc#1036457) ----------------------------------------- Patch: SUSE-2018-322 Released: Fri Feb 16 15:59:41 2018 Summary: Security update for gtk2 Severity: moderate References: 1053417 Description: This update for gtk2 fixes the following issues: This security issue was fixed: - Add checks for multiplications at several locations to avoid mishandling memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417). ----------------------------------------- Patch: SUSE-2018-323 Released: Fri Feb 16 16:00:22 2018 Summary: Security update for unzip Severity: moderate References: 1080074,CVE-2018-1000035 Description: This update for unzip fixes the following issues: - CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074) ----------------------------------------- Patch: SUSE-2018-340 Released: Wed Feb 21 16:23:45 2018 Summary: Recommended update for timezone, timezone-java Severity: low References: 1073275 Description: This update provides the latest timezone information (2018c) for your system, including following changes: - Sao Tome and Principe switched from +00 to +01 on 2018-01-01. - Southern Brazil's DST will now start on November's first Sunday. (bsc#1073275) - New zic option -t to specify the time zone file if TZ is unset. ----------------------------------------- Patch: SUSE-2018-376 Released: Wed Feb 28 17:32:18 2018 Summary: Security update for glibc Severity: important References: 1037930,1051791,1074293,1079036,978209,CVE-2017-12132,CVE-2017-8804,CVE-2018-1000001,CVE-2018-6485,CVE-2018-6551 Description: This update for glibc fixes the following issues: Security issues: - CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930) - CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791) - CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036) - CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293) Also a non security issue was fixed: - Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209) ----------------------------------------- Patch: SUSE-2018-411 Released: Mon Mar 5 10:43:24 2018 Summary: Security update for puppet Severity: moderate References: 1040151,1077767,CVE-2017-2295 Description: This update for puppet fixes the following issues: - CVE-2017-2295: Fixed a security vulnerability where an attacker could force YAML deserialization in an unsafe manner, which would lead to remote code execution. In default, this update would break a backwards compatibility with Puppet agents older than 3.2.2 as the SLE11 master doesn't support other fact formats than pson in default anymore. In order to allow users to continue using their SLE11 agents a patch was added that enables sending PSON from agents. For non-SUSE clients older that 3.2.2 a new puppet master boolean option 'dangerous_fact_formats' was added. When it's set to true it enables using dangerous fact formats (e.g. YAML). When it's set to false, only PSON fact format is accepted. (bsc#1040151), (bsc#1077767) ----------------------------------------- Patch: SUSE-2018-441 Released: Fri Mar 9 14:06:51 2018 Summary: Security update for augeas Severity: moderate References: 1054171,925225,CVE-2014-8119,CVE-2017-7555 Description: This update for augeas fixes the following issues: Security issues fixed: - CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171). - CVE-2014-8119: Fix improper handling of escaped strings leading to memory corruption (bsc#925225). ----------------------------------------- Patch: SUSE-2018-454 Released: Wed Mar 14 07:55:39 2018 Summary: Recommended update for openssl Severity: moderate References: 1081056,1083463 Description: This update for openssl fixes the following issues: - Provide a DEFAULT_SUSE cipher list capability which packages can require (bsc#1081056, bsc#1083463) ----------------------------------------- Patch: SUSE-2018-521 Released: Thu Mar 22 08:19:28 2018 Summary: Security update for python Severity: moderate References: 1068664,CVE-2017-1000158 Description: This update for python fixes the following issues: - CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664). ----------------------------------------- Patch: SUSE-2018-523 Released: Thu Mar 22 11:37:14 2018 Summary: Security update for samba Severity: moderate References: 1081741,CVE-2018-1050 Description: This update for samba fixes the following issues: - CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741) ----------------------------------------- Patch: SUSE-2018-539 Released: Fri Mar 23 17:21:01 2018 Summary: Recommended update for release-notes-sles Severity: low References: 1078361,1079501 Description: This update for release-notes-sles fixes the following issues: - Change supported RAM for ppc64 to 32 TiB (bsc#1079501, bsc#1078361). ----------------------------------------- Patch: SUSE-2018-547 Released: Mon Mar 26 11:49:54 2018 Summary: Security update for ntp Severity: moderate References: 1077445,1082210,1083417,1083420,1083422,1083424,1083426,CVE-2016-1549,CVE-2018-7170,CVE-2018-7182,CVE-2018-7183,CVE-2018-7184,CVE-2018-7185 Description: This update for ntp fixes the following issues: Security issues fixed: - CVE-2016-1549: Significant additional protections against CVE-2016-1549 that was fixed in ntp-4.2.8p7 (bsc#1082210). - CVE-2018-7170: Ephemeral association time spoofing additional protection (bsc#1083424). - CVE-2018-7182: Buffer read overrun leads information leak in ctl_getitem() (bsc#1083426). - CVE-2018-7183: decodearr() can write beyond its buffer limit (bsc#1083417). - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state (bsc#1083422). - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association (bsc#1083420). Bug fixes: - bsc#1077445: Don't use libevent's cached time stamps in sntp. - Disable CMAC in ntp when building against a version of OpenSSL that doesn't support it. ----------------------------------------- Patch: SUSE-2018-559 Released: Wed Mar 28 16:38:26 2018 Summary: Recommended update for suse-build-key Severity: moderate References: 1082022,1085512 Description: This update for suse-build-key contains the following changes: - Extended GPG signings keys (bsc#1085512): - SUSE Linux Enterprise Server 10: pub dsa1024/0xA84EDAE89C800ACA 2000-10-19 [SC] [expires: 2022-03-14] uid SuSE Package Signing Key sub elg2048/0x197448E88495160C 2000-10-19 [E] [expires: 2022-03-14] - SUSE Linux Enterprise Server 11: pub rsa1024/0xE3A5C360307E3D54 2006-03-21 [SC] [expires: 2022-03-14] uid SuSE Package Signing Key - PTF key: pub dsa1024/0x6C74CE73B37B98A9 2005-05-11 [SC] [expires: 2022-03-14] uid SUSE PTF Signing Key sub elg1024/0x74FB5EEF6647760C 2005-05-11 [E] [expires: 2022-03-14] - Added a new security@suse.de E-Mail contact key. (bsc#1082022) pub rsa4096/0x21FE92322BA9E067 2018-03-15 [SC] [expires: 2020-03-14] Fingerprint = EC7C 5EAB 2C34 09A6 4F3B BE6E 21FE 9232 2BA9 E067 uid SUSE Security Team uid SUSE Security Team sub rsa4096/0xFF97314EC1E11A0E 2018-03-15 [E] [expires: 2020-03-14] ----------------------------------------- Patch: SUSE-2018-561 Released: Thu Mar 29 08:27:11 2018 Summary: Security update for freetype2 Severity: moderate References: 1034191,CVE-2016-10328 Description: This update for freetype2 fixes the following issues: Security issue fixed: - CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191). ----------------------------------------- Patch: SUSE-2018-571 Released: Tue Apr 3 09:47:40 2018 Summary: Security update for krb5 Severity: moderate References: 1056995,1083926,1083927,970696,CVE-2017-11462,CVE-2018-5729,CVE-2018-5730 Description: This update for krb5 fixes several issues. This security issue was fixed: - CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995). - CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926). - CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927). This non-security issue was fixed: - Avoid indefinite polling in KDC communication. (bsc#970696) ----------------------------------------- Patch: SUSE-2018-577 Released: Tue Apr 3 17:16:40 2018 Summary: Security update for unrar Severity: moderate References: 1046882,1054038,513804,693890,CVE-2012-6706,CVE-2017-12938,CVE-2017-12940,CVE-2017-12941,CVE-2017-12942 Description: This update for unrar to version 5.6.1 fixes several issues. These security issues were fixed: - CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file (bsc#1054038). - CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call within the Archive::ReadHeader15 function (bsc#1054038). - CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20 function (bsc#1054038). - CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function (bsc#1054038). These non-security issues were fixed: - Added extraction support for .LZ archives created by Lzip compressor - Enable unpacking of files in ZIP archives compressed with XZ algorithm and encrypted with AES - Added support for PAX extended headers inside of TAR archive - If RAR recovery volumes (.rev files) are present in the same folder as usual RAR volumes, archive test command verifies .rev contents after completing testing .rar files - By default unrar skips symbolic links with absolute paths in link target when extracting unless -ola command line switch is specified - Added support for AES-NI CPU instructions - Support for a new RAR 5.0 archiving format - Wildcard exclusion mask for folders - Added libunrar* and libunrar*-devel subpackages (bsc#513804) - Prevent conditional jumps depending on uninitialised values (bsc#1046882) ----------------------------------------- Patch: SUSE-2018-581 Released: Tue Apr 3 18:42:20 2018 Summary: Security update for coreutils Severity: important References: 1023041,CVE-2017-2616 Description: This update for coreutils fixes one issue. This security issue was fixed: - CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041) ----------------------------------------- Patch: SUSE-2018-591 Released: Thu Apr 5 10:38:12 2018 Summary: Security update for glibc Severity: moderate References: 1076871,1081556,CVE-2017-12133 Description: This update for glibc fixes the following issues: Security issues fixed: - CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556) Non security issue fixed: - Fix incorrect getaddrinfo assertion trigger (bsc#1076871) ----------------------------------------- Patch: SUSE-2018-603 Released: Sun Apr 8 21:40:19 2018 Summary: Security update for libidn Severity: moderate References: 1056450,CVE-2017-14062 Description: This update for libidn fixes one issues. This security issue was fixed: - CVE-2017-14062: Prevent integer overflow in the decode_digit function that allowed remote attackers to cause a denial of service or possibly have unspecified other impact (bsc#1056450). ----------------------------------------- Patch: SUSE-2018-650 Released: Mon Apr 16 19:20:10 2018 Summary: Recommended update for timezone, timezone-java Severity: low References: 1086729 Description: This update provides the latest timezone information (2018d) for your system, including following changes: - In 2018, Palestine starts DST on March 24, not March 31. - Casey Station in Antarctica changed from +11 to +08 on 2018-03-11 at 04:00 (bsc#1086729). - corrections for historical transitions. ----------------------------------------- Patch: SUSE-2018-653 Released: Wed Apr 18 08:29:46 2018 Summary: Security update for perl Severity: moderate References: 1082216,1082233,CVE-2018-6798,CVE-2018-6913 Description: This update for perl fixes the following issues: Security issue fixed: - CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216). - CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233). ----------------------------------------- Patch: SUSE-2018-654 Released: Wed Apr 18 08:30:45 2018 Summary: Security update for openssl Severity: important References: 1087102,CVE-2018-0739 Description: This update for openssl fixes the following issues: - CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed the stack. This could result in a Denial Of Service attack. (bsc#1087102) ----------------------------------------- Patch: SUSE-2018-713 Released: Fri Apr 20 15:21:55 2018 Summary: Security update for zsh Severity: moderate References: 1089030,CVE-2018-1100 Description: This update for zsh fixes the following issues: - CVE-2018-1100: Fixed a buffer overflow in utils.c:checkmailpath() that could lead to local arbitrary code execution ( bsc#1089030) ----------------------------------------- Patch: SUSE-2018-717 Released: Mon Apr 23 13:56:38 2018 Summary: Recommended update for xorg-x11-libxcb, xorg-x11-libX11 Severity: moderate References: 1070498 Description: This update for xorg-x11-libxcb, xorg-x11-libX11 provides the following fix: - Backport a new XCB hand off mechanism to fix crashes in some clients. (bsc#1070498) ----------------------------------------- Patch: SUSE-2018-741 Released: Thu Apr 26 13:24:00 2018 Summary: Recommended update for bind Severity: moderate References: 908850 Description: This update for bind provides the following fix: - Change /var/lib/named owner to named:named so that it is writable by bind.(bsc#908850) ----------------------------------------- Patch: SUSE-2018-780 Released: Wed May 2 22:21:22 2018 Summary: Recommended update for nfs-utils Severity: low References: 1036504,1076271 Description: This update for nfs-utils provides the following fixes: - Improve interoperability with AD kerberos (bsc#1036504) - Correctly handle 'port=0' option in mount. If '0' is passed, rpcbind should be queried to discover the actual non-zero port number to use. (bsc#1076271) ----------------------------------------- Patch: SUSE-2018-804 Released: Mon May 7 17:15:33 2018 Summary: Security update for patch Severity: important References: 1059698,1080918,1088420,662957,914891,CVE-2010-4651,CVE-2014-9637,CVE-2016-10713,CVE-2018-1000156 Description: This update for patch fixes several issues. These security issues were fixed: - CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420). - CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and segmentation fault) via a crafted diff file (bsc#914891). - CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that could have lead to DoS via a crafted input file (bsc#1080918). - CVE-2010-4651: Fixed a directory traversal bug (bsc#662957): ----------------------------------------- Patch: SUSE-2018-821 Released: Wed May 9 14:00:43 2018 Summary: Security update for tiff Severity: moderate References: 1007280,1011107,1011845,1017688,1017690,1017691,1017692,1031255,1046077,1048937,1074318,960341,983436,CVE-2015-7554,CVE-2016-10095,CVE-2016-10268,CVE-2016-3945,CVE-2016-5318,CVE-2016-5652,CVE-2016-9453,CVE-2016-9536,CVE-2017-11335,CVE-2017-17973,CVE-2017-9935 Description: This update for tiff fixes the following issues: - CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107). - CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280). - CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937). - CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.' (bsc#1011845) - CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077). - CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318) - CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341). - CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436). - CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,). - CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255) - An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691). - Fixed an invalid memory read which could lead to a crash (bsc#1017692). - Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688). ----------------------------------------- Patch: SUSE-2018-917 Released: Tue May 15 16:08:05 2018 Summary: Recommended update for timezone, timezone-java Severity: low References: 1073299 Description: This update provides the latest timezone information (2018e) for your system, including following changes: - North Korea switches back from +0830 to +09 on 2018-05-05. - Ireland's standard time is in the summer, with negative DST offset to standard time used in Winter (bsc#1073299) ----------------------------------------- Patch: SUSE-2018-938 Released: Wed May 16 21:51:40 2018 Summary: Security update for curl Severity: moderate References: 1081056,1083463,1084137,1084521,1084524,1084532,1085124,1086825,1087922,1090194,CVE-2018-1000120,CVE-2018-1000121,CVE-2018-1000122 Description: This update for curl fixes the following issues: curl was updated to version 7.37.0 (fate#325339 bsc#1084137) This update syncs the curl version to the one in SUSE Linux Enterprise 12 and is full binary compatible to the previous version. This update is done to allow other third party software like 'R' to be able to be used on the SUSE Linux Enterprise 11 codebase. Following security issues were fixed: - CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521). - CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524). - CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532). The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list (bsc#1081056, bsc#1083463,bsc#1086825) ----------------------------------------- Patch: SUSE-2018-940 Released: Thu May 17 21:01:08 2018 Summary: Recommended update for mdadm Severity: moderate References: 1032802,1068175,1081910,808647,881530,882634,887773,923920,926517,926767,953595,966773 Description: This update for mdadm provides the backporting of some critical fixes from upstream, and replace some existing patches with their upstream counterpart (bsc#1081910). The following fixes are included: - Grow: Followup fix for a problem that reshape fails to continue after restart on RAID array. (bsc#881530) - IMSM: Add warning message when assemble spanned container. (bsc#882634) - mdmon: Allow prepare_update to report failures. (bsc#1081910) - DDF, IMSM: Validate metadata_update size before using it. (bsc#1081910) - Grow: Do not try to restart if reshape is running. (bsc#887773) - IMSM: Move 'validate_container_imsm' to be included in mdassemble. (bsc#1081910) - Grow: Fix a problem that was preventing the resize of an array to 32bit size. (bsc#1081910) - Assemble: Only fail auto-assemble in case of mdadm.conf conflicts. (bsc#1081910) - super: Make sure to ignore disk state flags that we don't understand. (bsc#1081910) - mdmon: Don't include super0 and super1 in mdmon. (bsc#1081910) - config: Add a new option to suppress adding bad block lists. (bsc#1081910) - Manage: Fix the removal of non-existent devices. (bsc#1081910) - Monitor: Stop monitoring devices that have disappeared. (bsc#1081910) - super1: Don't allow adding a bitmap if there is no space. (bsc#1081910) - super1: Make sure 'room' includes 'bbl_size' when creating array. (bsc#1081910) - update: Add 'bbl' and 'no-bbl' to the list of known updates. (bsc#1081910) - Grow: Report when grow needs metadata update. (bsc#1081910) - Grow: Fix the resize of array component size to > 32bits. (bsc#1081910) - mdcheck: Do not trigger an error if no /dev/md?* devices exists. (bsc#1081910) - Rebuildmap: Strip local host name from device name. (bsc#1081910) - Detail: Fix handling of 'disks' array. (bsc#1081910) - Incremental: Do not be distracted by partition table when calling try_spare. (bsc#1081910) - imsm: Add support for OROMs shared by multiple HBAs. (fate#317456) - imsm: Add support for second and combined AHCI controllers in UEFI mode. (fate#317456) - imsm: Add support for NVMe devices. (fate#317456) - imsm: Use efivarfs interface for reading UEFI variables. (fate#317456) - Monitor: Do not open md array that doesn't exist. (bsc#1081910) - mdcheck: Be careful when sourcing the output of 'mdadm --detail --export'. (bsc#1081910) - Monitor: Fix for regression with container devices. (bsc#1081910) - Grow.c: Fix classic readlink() buffer overflow. (bsc#1081910) - imsm: Simplified multiple OROMs support. (bsc#1081910) - IncRemove: Set 'auto-read' only after successful excl open. (bsc#1081910) - Assemble: Fix 'no uptodate device' message. (bsc#1081910) - Assemble: Revert the support for assembling of a RAID0 being reshaped. (bsc#1081910) - Assemble: Allow a RAID4 to assemble easily when parity devices is missing. (bsc#926767) - Assemble/force: Make it possible to 'force' a new device in a reshape. (bsc#1081910) - IMSM: Count arrays per orom. (bsc#926517) - Add 'Name' defines to some ancillary programs. (bsc#1081910) - Assemble: Don't check for pre-existing array when updating uuid. (bsc#1081910) - Manage: When re-adding, do check avail size if ->sb cannot be found. (bsc#1081910) - Grow: Only warn about incompatible metadata when no fallback available. (bsc#1081910) - Grow: Be more careful if array is stopped during critical section. (bsc#1081910) - Grow: Retry when writing 'reshape' to 'sync_action' is EBUSY. (bsc#1081910) - Grow: Be even more careful about handing a '0' completed value. (bsc#1081910) - Grow: Another attempt to fix stop-during-reshape race. (bsc#1081910) - Grow: Fix problem with --grow --continue. (bsc#1081910) - Create n bitmaps for clustered mode. (bsc#1081910) - Add nodes option while creating md. (bsc#1081910) - Set home-cluster while creating an array. (bsc#1081910) - Show all bitmaps while examining bitmap. (bsc#1081910) - Add a new clustered disk. (bsc#1081910) - Convert a bitmap=none device to clustered. (bsc#1081910) - Skip clustered devices in incremental. (bsc#1081910) - mdadm: Add the ability to change cluster name. (bsc#1081910) - Assemble: Ensure stripe_cache is big enough to handle new chunk size. (bsc#1081910) - mdstat: Discard 'dev' field, just use 'devnm'. (bsc#1081910) - sysfs: Reject reads that use the whole buffer. (bsc#1081910) - Monitor: Don't wait forever on a 'frozen' array. (bsc#1081910) - Manage/stop: Guard against 'completed' being too large. (bsc#1081910) - Manage/stop: Don't stop during initial critical section. (bsc#1081910) - raid6check: Report role of suspect device. (bsc#1081910) - raid6check: Get device ordering correct for syndrome calculation. (bsc#1081910) - restripe: Fix data block order in raid6_2_data_recov. (bsc#1081910) - Assemble: Extend --homehost='' to allow --name= to ignore homehost. (bsc#1081910) - mdassemble: Add 'Name' definition. (bsc#1081910) - mdassemble: Include mapfile support. (bsc#1081910) - super1: Do not create bad block log for clustered devices. (bsc#1081910) - Fix --incremental handling on cluster array. (bsc#1081910) - mdadm: Make cluster raid also support re-add. (bsc#1081910) - re-add: Make re-add try to write sysfs node first. (bsc#1081910) - imsm: Don't call abort_reshape() in imsm_manage_reshape(). (bsc#1081910) - Show device as journal in --detail --examine. (bsc#1081910) - Enable create array with write journal (--write-journal DEVICE). (bsc#1081910) - Assemble array with write journal. (bsc#1081910) - Check write journal in incremental. (bsc#1081910) - Safeguard against writing to an active device of another node. (bsc#1081910) - Make cmap_* also have same policy as dlm_*. (bsc#1081910) - Add crc32c and use it for r5l checksum. (bsc#1081910) - Avoid confusion with parameter 'devname' with same name, ensure buffer is large enough for two ints plus extras. (bsc#1081910) - Make sure 'path' buffer is large enough to fit 200 characters plus null terminator. (bsc#1081910) - mdadm: Change timestamps to unsigned data type. (bsc#1081910) - Add sysfs_array_state to struct mdinfo. (bsc#1081910) - mdadm: Allow cluster raid to also add disk within incremental mode. (bsc#1081910) - mdadm: Don't show cluster name once the bitmap is cleared. (bsc#1081910) - mdadm: Do not display bitmap info if it is cleared. (bsc#1081910) - mdadm: Do not try to hold dlm lock in free_super1. (bsc#1081910) - mdadm: Improve the safeguard for change cluster raid's sb. (bsc#1081910) - Detail: Report correct raid-disk for removed drives. (bsc#1081910) - Move journal to end of --detail list. (bsc#1081910) - Check and remove bitmap first when reshape to raid0. (bsc#1081910) - Detail: Fix wrong condition in recent change. (bsc#1081910) - Grow: Close file descriptor earlier to avoid problems. (bsc#1081910) - Add casts for the addr argument of connect and bind. (bsc#1081910) - util: Fix wrong return value of cluster_get_dlmlock. (bsc#1081910) - super1: Fix calculation of space_before. (bsc#1081910) - systemd/mdadm-last-resort: Add Conflicts to .service file. (bsc#1081910) - super0: Fix reporting of devices between 2GB and 4GB. (bsc#1081910) - super1: Allow reshape that hasn't really started to be reverted. (bsc#1081910) - super1: Fix bblog_size accesses on big-ending machines. (bsc#953595) - Manage.c: Only issue change events for kernels older than 2.6.28. (bsc#1081910) - super-intel: Ensure suspended region is removed when reshape completes. (bsc#1081910) - Fix wrong bitmap output for cluster raid. (bsc#1081910) - load_sys(): Add a buffer size argument. (bsc#1081910) - Fix regression during add devices. (bsc#1081910) - Change the option from NoUpdate to NodeNumUpdate. (bsc#1081910) - mdadm:Add '--nodes' option in GROW mode. (bsc#1081910) - Grow: Handle failure to load superblock in Grow_addbitmap(). (bsc#1081910) - Remove: Container should wait for an array to release a drive. (bsc#1081910) - Fix RAID metadata check. (bsc#1081910) - super1: Make write_bitmap1 compatible with previous mdadm versions. (bsc#1081910) - Allow level migration only for single-array container. (bsc#1081910) - Fix bus error when accessing MBR partition records. (bsc#1081910) - Add function for getting member drive sector size. (bsc#1081910) - Add failfast support. (fate#311379) - Use disk sector size value to set offset for reading GPT. (bsc#1081910) - reshape: Support raid5 grow on certain older kernels. (bsc#923920) - super1: Fix sb->max_dev when adding a new disk in linear array. (bsc#1032802) - Fix a problem that was causing DASD not to be re-added automatically to the MD Array after channel path is online. (bsc#808647) - Ignore empty inactive arrays. (bsc#966773) - Update md_monitor from 5.2 to 5.4 to make sure `md_monitor -cMirrorStatus` detects md mirror status properly. (bsc#1068175) ----------------------------------------- Patch: SUSE-2018-965 Released: Tue May 22 20:00:55 2018 Summary: Security update for wget Severity: moderate References: 1092061,CVE-2018-0494 Description: This update for wget fixes the following issues: - CVE-2018-0494: Fixed Cookie injection vulnerability by checking for and joining continuation lines. (bsc#1092061) ----------------------------------------- Patch: SUSE-2018-994 Released: Mon May 28 16:46:02 2018 Summary: Security update for cairo Severity: moderate References: 1007255,1036789,1049092,CVE-2016-9082,CVE-2017-7475,CVE-2017-9814 Description: This update for cairo fixes the following issues: - CVE-2016-9082: Fixed a segfault when using >4GB images since int values were used for pointer operations (bsc#1007255). - CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before allocating to prevent DoS (bsc#1049092). - CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789). ----------------------------------------- Patch: SUSE-2018-1003 Released: Wed May 30 02:30:02 2018 Summary: Recommended update for nfs-utils Severity: moderate References: 1087074 Description: This update for nfs-utils provides the following fix: - mountd: Honor the no_root_squash flag on pseudo roots. (bsc#1087074) ----------------------------------------- Patch: SUSE-2018-1007 Released: Wed May 30 09:08:37 2018 Summary: Security update for tiff Severity: moderate References: 1017694,1031250,1031254,1033109,1033111,1033112,1033113,1033120,1033126,1033127,1033129,1074317,984808,984809,984831,987351,CVE-2016-10267,CVE-2016-10269,CVE-2016-10270,CVE-2016-5314,CVE-2016-5315,CVE-2017-18013,CVE-2017-7593,CVE-2017-7595,CVE-2017-7596,CVE-2017-7597,CVE-2017-7599,CVE-2017-7600,CVE-2017-7601,CVE-2017-7602 Description: This update for tiff fixes the following issues: Security issues fixed: - CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image. (bsc#984809) - CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8. (bsc#1017694) - CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2. (bsc#1031254) - CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22. (bsc#1031250) - CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash. (bsc#1074317) - CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image. (bsc#1033129) - CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. (bsc#1033127) - CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033126) - CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033120) - CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033113) - CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033112) - CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033111) - CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033109) - Multiple divide by zero issues - CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr. (bsc#987351 bsc#984808 bsc#984831) ----------------------------------------- Patch: SUSE-2018-1009 Released: Wed May 30 15:18:43 2018 Summary: Security update for curl Severity: moderate References: 1092098,CVE-2018-1000301 Description: This update for curl fixes the following issues: - CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098) ----------------------------------------- Patch: SUSE-2018-1026 Released: Tue Jun 5 09:00:55 2018 Summary: Security update for gcc43 Severity: moderate References: 1086069,1092807,CVE-2017-5715 Description: This update for gcc43 fixes the following issues: This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069) The option flags are the same as for the x86 retpolines. A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807) ----------------------------------------- Patch: SUSE-2018-1032 Released: Tue Jun 5 15:17:50 2018 Summary: Recommended update for sysvinit Severity: moderate References: 1087176 Description: This update for sysvinit provides the following fixes: - Update showconsole to 1.16 to fix sysvinit service shutdown messages missing from /var/log/boot.omsg. (bsc#1087176) - Change showconsole to use newest /proc/tty/consoles API. - Use /proc/tty/consoles if ioctl TIOCGDEV does not exist. - Make pseudo terminal raw as it does not show anything. - Handle more than two console devices. - Speed up used pts/tty pair by enabling raw mode. - Implement termios locking scheme but disable it as it may interfere with sulogin and others using the old console. - Enable full raw mode for pty/tty pairs of startpar. ----------------------------------------- Patch: SUSE-2018-1083 Released: Thu Jun 7 13:01:02 2018 Summary: Recommended update for patch Severity: important References: 1092500,1093615 Description: This update for patch provides the following fixes: - Ignore dangerous filenames instead of failing immediately. (bsc#1093615) - Fix a temporary file leak when applying ed-style patches. The leaked temporary file could cause certain ed-style patches to fail to apply. (bsc#1092500) ----------------------------------------- Patch: SUSE-2018-1096 Released: Fri Jun 8 11:38:46 2018 Summary: Security update for icu Severity: important References: 1034674,1034678,1067203,1072193,1077999,990636,CVE-2016-6293,CVE-2017-14952,CVE-2017-15422,CVE-2017-17484,CVE-2017-7867,CVE-2017-7868 Description: This update for icu fixes the following issues: - CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636) - CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674) - CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678) - CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203) - CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193) - CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999) ----------------------------------------- Patch: SUSE-2018-1140 Released: Fri Jun 15 08:22:42 2018 Summary: Security update for gpg2 Severity: important References: 1096745,CVE-2018-12020 Description: This update for gpg2 fixes the following issues: - CVE-2018-12020: GnuPG mishandled the original filename during decryption and verification actions, which allowed remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2' option (bsc#1096745) ----------------------------------------- Patch: SUSE-2018-1182 Released: Wed Jun 20 11:42:25 2018 Summary: Security update for pam-modules Severity: moderate References: 707645,CVE-2011-3172 Description: This update for pam-modules fixes the following security issue: - CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage of locked accounts (bsc#707645). ----------------------------------------- Patch: SUSE-2018-1204 Released: Fri Jun 22 08:09:54 2018 Summary: Recommended update for xorg-x11-libX11 Severity: important References: 1094636 Description: This update for xorg-x11-libX11 provides the following fix: - Fix a regression that could cause a deadlock in pthread_cond_broadcast in multi-threaded clients. (bsc#1094636) ----------------------------------------- Patch: SUSE-2018-1208 Released: Fri Jun 22 14:41:27 2018 Summary: Security update for python Severity: moderate References: 1083507,CVE-2017-18207 Description: This update for python fixes the following issues: The following security vulnerabilities were addressed: - Add a check to Lib/wave.py that verifies that at least one channel is provided. Prior to this, attackers could cause a denial of service via a crafted wav format audio file. [bsc#1083507, CVE-2017-18207] ----------------------------------------- Patch: SUSE-2018-1227 Released: Tue Jun 26 21:25:55 2018 Summary: Recommended update for kdump Severity: low References: 1057760 Description: This update for kdump fixes the following issues: - Do not free fadump memory when rebooting to make it faster. (bsc#1057760) ----------------------------------------- Patch: SUSE-2018-1234 Released: Wed Jun 27 13:36:10 2018 Summary: Security update for jpeg Severity: moderate References: 1062937,1096209,1098155,CVE-2017-15232,CVE-2018-1152,CVE-2018-11813 Description: This update for jpeg fixes the following issues: * CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could lead to denial of service (crash) when processing images [bsc#1062937] * CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c, which allowed remote attackers to cause a denial-of-service via crafted JPG files due to a large loop [bsc#1096209] * CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused by a divide by zero when processing a crafted BMP image [bsc#1098155] ----------------------------------------- Patch: SUSE-2018-1239 Released: Wed Jun 27 16:16:43 2018 Summary: Recommended update for yast2-ftp-server Severity: moderate References: 921303 Description: This update for yast2-ftp-server provides the following fix: - Drop SSLv2 and SSLv3 options as they are no longer supported by vsftpd. (bsc#921303) ----------------------------------------- Patch: SUSE-2018-1241 Released: Thu Jun 28 11:41:31 2018 Summary: Security update for tiff Severity: moderate References: 1007276,1011839,1011846,1017689,1017690,1019611,1031263,1082332,1082825,1086408,974621,CVE-2014-8128,CVE-2015-7554,CVE-2016-10095,CVE-2016-10266,CVE-2016-3632,CVE-2016-5318,CVE-2016-8331,CVE-2016-9535,CVE-2016-9540,CVE-2017-11613,CVE-2017-5225,CVE-2018-7456,CVE-2018-8905 Description: This update for tiff fixes the following security issues: - CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could have caused DoS or code execution via a crafted BitsPerSample value (bsc#1019611) - CVE-2018-7456: Prevent a NULL Pointer dereference in the function TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013 (bsc#1082825) - CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If the value of td_imagelength is set close to the amount of system memory, it will hang the system or trigger the OOM killer (bsc#1082332) - CVE-2016-10266: Prevent remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22 (bsc#1031263) - CVE-2018-8905: Prevent heap-based buffer overflow in the function LZWDecodeCompat via a crafted TIFF file (bsc#1086408) - CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile width versus image width (bsc#1011839). - CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846). - CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846). - Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689). - CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField function that allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690). - CVE-2016-8331: Prevent remote code execution because of incorrect handling of TIFF images. A crafted TIFF document could have lead to a type confusion vulnerability resulting in remote code execution. This vulnerability could have been be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality (bsc#1007276). - CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image (bsc#974621). ----------------------------------------- Patch: SUSE-2018-1275 Released: Wed Jul 4 18:06:53 2018 Summary: Recommended update for fontconfig Severity: moderate References: 1031344,1079127 Description: This update for fontconfig provides the following fix: - Fix a memory leak that showed up on gnome panel. (bsc#1031344) - Prevent crashes by checking for the NULL pointer value in FcCharSetHasChar(). (bsc#1079127) ----------------------------------------- Patch: SUSE-2018-1293 Released: Mon Jul 9 11:59:30 2018 Summary: Security update for openslp Severity: important References: 1090638,CVE-2017-17833 Description: This update for openslp fixes the following issues: - CVE-2017-17833: Prevent heap-related memory corruption issue which may have manifested itself as a denial-of-service or a remote code-execution vulnerability (bsc#1090638). ----------------------------------------- Patch: SUSE-2018-1350 Released: Thu Jul 19 09:39:28 2018 Summary: Security update for perl Severity: moderate References: 1096718,CVE-2018-12015 Description: This update for perl fixes the following issues: - CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a directory-traversal protection mechanism and overwrite arbitrary files (bsc#1096718). ----------------------------------------- Patch: SUSE-2018-1360 Released: Thu Jul 19 12:42:24 2018 Summary: Recommended update for dbus-1 Severity: moderate References: 1090267 Description: This update for dbus-1 fixes the following issues: - Fix file descriptor leak. (bsc#1090267) ----------------------------------------- Patch: SUSE-2018-1377 Released: Mon Jul 23 10:58:26 2018 Summary: Security update for procps Severity: moderate References: 1092100,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126 Description: This update for procps fixes the following security issues: - CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top with HOME unset in an attacker-controlled directory, the attacker could have achieved privilege escalation by exploiting one of several vulnerabilities in the config_file() function (bsc#1092100). - CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maped a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service) (bsc#1092100). - CVE-2018-1124: Prevent multiple integer overflows leading to a heap corruption in file2strvec function. This allowed a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users (bsc#1092100). - CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was mitigated by FORTIFY limiting the impact to a crash (bsc#1092100). - CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent truncation/integer overflow issues (bsc#1092100). ----------------------------------------- Patch: SUSE-2018-1449 Released: Mon Jul 30 10:09:52 2018 Summary: Recommended update for grub Severity: low References: 1020714,1045024 Description: This update for grub provides the following fixes: - Add support to SHA2 crypt grub passwords. (bsc#1020714, fate#322419) - Add workarounds for some problematic Dell BIOSes. (bsc#1045024) ----------------------------------------- Patch: SUSE-2018-1498 Released: Mon Aug 6 09:58:15 2018 Summary: Security update for openssl Severity: moderate References: 1097158,1097624,1098592,CVE-2018-0732 Description: This update for openssl fixes the following issues: - CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158). - Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592) ----------------------------------------- Patch: SUSE-2018-1511 Released: Tue Aug 7 12:47:34 2018 Summary: Security update for cups Severity: moderate References: 1096405,1096406,1096407,1096408,CVE-2018-4180,CVE-2018-4181,CVE-2018-4182,CVE-2018-4183 Description: This update for cups fixes the following issues: Security issues fixed: - CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405). - CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406). - CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407). - CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408). ----------------------------------------- Patch: SUSE-2018-1531 Released: Thu Aug 9 15:56:27 2018 Summary: Security update for openssh Severity: moderate References: 1016370,1017099,1023275,1053972,1065000,1069509,1076957,CVE-2008-1483,CVE-2016-10012,CVE-2016-10708,CVE-2017-15906 Description: This update for openssh fixes the following issues: Security issues fixed: - CVE-2016-10012: Fix pre-auth compression checks that could be optimized away (bsc#1016370). - CVE-2016-10708: Fix remote denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYSmessage (bsc#1076957). - CVE-2017-15906: Fix r/o sftp-server zero byte file creation (bsc#1065000). - CVE-2008-1483: Fix accidental re-introduction of CVE-2008-1483 (bsc#1069509). Bug fixes: - bsc#1017099: Match conditions with uppercase hostnames fail (bsc#1017099) - bsc#1053972: supportedKeyExchanges diffie-hellman-group1-sha1 is duplicated (bsc#1053972) - bsc#1023275: Messages suppressed after upgrade from SLES 11 SP3 to SP4 (bsc#1023275) ----------------------------------------- Patch: SUSE-2018-1543 Released: Fri Aug 10 15:23:08 2018 Summary: Security update for glibc Severity: important References: 1077763,1079625,1086690,1094161,CVE-2018-11236 Description: This update for glibc fixes the following issues: Security issue fixed: - CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161). Bug fixes: - bsc#1086690: Fix crash in resolver on memory allocation failure. - bsc#1077763: Fix allocation in in6ailist_add. - bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group. ----------------------------------------- Patch: SUSE-2018-1568 Released: Tue Aug 14 19:59:58 2018 Summary: Security update for samba Severity: important References: 1079449,1103411,CVE-2018-10858 Description: This update for samba fixes the following issues: The following security issues were fixed: - CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411). The following other bugs were fixed: - s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449) ----------------------------------------- Patch: SUSE-2018-1655 Released: Fri Aug 17 08:54:20 2018 Summary: Security update for mutt Severity: important References: 1101567,1101570,1101571,1101573,1101576,1101577,1101578,1101581,1101582,1101588,1101589,936807,CVE-2018-14349,CVE-2018-14350,CVE-2018-14352,CVE-2018-14353,CVE-2018-14354,CVE-2018-14355,CVE-2018-14356,CVE-2018-14357,CVE-2018-14358,CVE-2018-14359,CVE-2018-14362 Description: This update for mutt fixes the following issues: Security issues fixed: - CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582). - CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581). - CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567). - CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578). - CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576). - CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577). - CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589). - CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588). - CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573). - CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570). - CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571). Bug fixes: - bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters. ----------------------------------------- Patch: SUSE-2018-1657 Released: Fri Aug 17 10:41:10 2018 Summary: Security update for python Severity: important References: 1086001,1088004,1088009,985177,CVE-2016-5636,CVE-2018-1060,CVE-2018-1061 Description: This update for python-base fixes the following issues: Security issues fixed: - CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004). - CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009). - CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177) Bug fixes: - bsc#1086001: python tarfile uses random order. ----------------------------------------- Patch: SUSE-2018-1733 Released: Tue Aug 21 14:55:45 2018 Summary: Security update for gtk2 Severity: moderate References: 1027024,1027025,1027026,1039465,1048289,1048544,CVE-2017-2862,CVE-2017-2870,CVE-2017-6312,CVE-2017-6313,CVE-2017-6314 Description: This update for gtk2 provides the following fixes: These security issues were fixed: - CVE-2017-6312: Prevent integer overflow that allowed context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file (bsc#1027026). - CVE-2017-6314: The make_available_at_least function allowed context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file (bsc#1027025). - CVE-2017-6313: Prevent integer underflow in the load_resources function that allowed context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file (bsc#1027024). - CVE-2017-2862: Prevent heap overflow in the gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file could have caused a heap overflow resulting in remote code execution (bsc#1048289) - CVE-2017-2870: Prevent integer overflow in the tiff_image_parse functionality. A specially crafted tiff file could have caused a heap-overflow resulting in remote code execution (bsc#1048544). This non-security issue was fixed: - Prevent an infinite loop when a window is destroyed while traversed (bsc#1039465). ----------------------------------------- Patch: SUSE-2018-1749 Released: Thu Aug 23 16:21:17 2018 Summary: Security update for openssl Severity: moderate References: 1089039,CVE-2018-0737 Description: This update for openssl fixes the following security issue: - CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039) ----------------------------------------- Patch: SUSE-2018-1794 Released: Thu Aug 30 09:34:23 2018 Summary: Security update for libtirpc Severity: moderate References: 968175 Description: This update for libtirpc fixes the following issues: - Prevent remote crash of RPC services (bsc#968175) ----------------------------------------- Patch: SUSE-2018-1840 Released: Wed Sep 5 14:08:40 2018 Summary: Recommended update for openssl-certs Severity: moderate References: 1100415,1104780 Description: This update for openssl-certs fixes the following issues: Updated to 2.26 state of the Mozilla NSS Certificate store. (bsc#1104780) - Removed server auth rights from: - Certplus Root CA G1 - Certplus Root CA G2 - OpenTrust Root CA G1 - OpenTrust Root CA G2 - OpenTrust Root CA G3 - removed CA - ComSign CA - Added new CA - GlobalSign Updated to 2.24 state of the Mozilla NSS Certificate store. (bsc#1100415) Removed CAs: - S-TRUST_Universal_Root_CA:2.16.96.86.197.75.35.64.91.100.212.237.37.218.217.214.30.30.crt - TC_TrustCenter_Class_3_CA_II:2.14.74.71.0.1.0.2.229.160.93.214.63.0.81.191.crt - TUeRKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_H5:2.7.0.142.23.254.36.32.129.crt ----------------------------------------- Patch: SUSE-2018-1864 Released: Mon Sep 10 15:05:01 2018 Summary: Security update for tiff Severity: moderate References: 1074186,1092480,960589,983440,CVE-2015-8668,CVE-2016-5319,CVE-2017-17942,CVE-2018-10779 Description: This update for tiff fixes the following issues: The following security vulnerabilities were addressed: - CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff, which allowed remote attackers to execute arbitrary code or cause a denial of service via a large width field in a specially crafted BMP image. (bsc#960589) - CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in tif_write.c (bsc#1092480) - CVE-2017-17942: Fixed a heap-based buffer overflow in the function PackBitsEncode in tif_packbits.c. (bsc#1074186) - CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440) ----------------------------------------- Patch: SUSE-2018-1889 Released: Wed Sep 12 13:46:54 2018 Summary: Recommended update for xorg-x11-libxcb Severity: moderate References: 1070498 Description: This update for xorg-x11-libxcb provides the following fix: - Backport a new XCB hand off mechanism to fix crashes in some clients. (bsc#1070498) ----------------------------------------- Patch: SUSE-2018-1902 Released: Fri Sep 14 12:45:45 2018 Summary: Security update for curl Severity: moderate References: 1106019,CVE-2018-14618 Description: This update for curl fixes the following issues: - CVE-2018-14618: Prevent integer overflow in the NTLM authentication code (bsc#1106019). ----------------------------------------- Patch: SUSE-2018-1912 Released: Mon Sep 17 16:38:57 2018 Summary: Recommended update for python Severity: important References: 1108253 Description: This update for python fixes the following issues: A recent maintenance update moved the pyconfig.h header file from python-base to python-devel package which caused breakage of some applications. This update restores the previous state. (bsc#1108253) ----------------------------------------- Patch: SUSE-2018-1964 Released: Fri Sep 21 14:55:19 2018 Summary: Security update for xorg-x11-libs Severity: moderate References: 1103511,CVE-2015-9262 Description: This update for xorg-x11-libs fixes the following security issue: - CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow (bsc#1103511) ----------------------------------------- Patch: SUSE-2018-2041 Released: Wed Sep 26 14:20:10 2018 Summary: Security update for glibc Severity: important References: 1058774,1064580,1064583,941234,CVE-2015-5180,CVE-2017-15670,CVE-2017-15804 Description: This update for glibc fixes the following security issues: - CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer overflow in the glob function, related to the processing of home directories using the ~ operator followed by a long string (bsc#1064583) - CVE-2017-15804: The glob function contained a buffer overflow during unescaping of user names with the ~ operator (bsc#1064580) - CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a denial of service (NULL pointer dereference and process crash) (bsc#941234). This non-security issue was fixed: - Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774) ----------------------------------------- Patch: SUSE-2018-2071 Released: Fri Sep 28 10:56:01 2018 Summary: Security update for xorg-x11-libX11 Severity: moderate References: 1102062,1102068,1102073,CVE-2018-14598,CVE-2018-14599,CVE-2018-14600 Description: This update for xorg-x11-libX11 fixes the following issues: - CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact (bsc#1102062) - CVE-2018-14600: The function XListExtensions interpreted a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution (bsc#1102068) - CVE-2018-14598: A malicious server could have sent a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault) (bsc#1102073) ----------------------------------------- Patch: SUSE-2018-2184 Released: Tue Oct 9 13:03:09 2018 Summary: Recommended update for tcpdump Severity: moderate References: 1094241,CVE-2016-7975 Description: This update for tcpdump provides the following fix: - The original fix for CVE-2016-7975 was using a variable before declaring it. Fix this by moving the declaration before any usage. (bsc#1094241, CVE-2016-7975) ----------------------------------------- Patch: SUSE-2018-2224 Released: Mon Oct 15 09:13:40 2018 Summary: Security update for libtirpc Severity: moderate References: 1106517,1106519,968175,CVE-2018-14621,CVE-2018-14622 Description: This update for libtirpc fixes the following issues: Security issues fixed: - CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519) - CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517) ----------------------------------------- Patch: SUSE-2018-2240 Released: Tue Oct 16 11:06:06 2018 Summary: Security update for python Severity: moderate References: 1109847,CVE-2018-14647 Description: This update for python fixes the following issue: - CVE-2018-14647: Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM (bsc#1109847) ----------------------------------------- Patch: SUSE-2018-544 Released: Tue Oct 23 13:50:45 2018 Summary: Security update for dhcp Severity: moderate References: 1083302,1083303,CVE-2018-5732,CVE-2018-5733 Description: This update for dhcp fixes the following issues: Security issues fixed: - CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303). - CVE-2018-5732: buffer overflow in dhclient (bsc#1083302). ----------------------------------------- Patch: SUSE-2018-2420 Released: Tue Oct 23 17:51:39 2018 Summary: Security update for ntp Severity: moderate References: 1083424,1098531,1111853,CVE-2018-12327,CVE-2018-7170 Description: NTP was updated to 4.2.8p12 (bsc#1111853): - CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531) - CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424) Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information. ----------------------------------------- Patch: SUSE-2018-2436 Released: Wed Oct 24 15:03:16 2018 Summary: Security update for tiff Severity: moderate References: 1106853,1108627,1108637,1110358,CVE-2017-11613,CVE-2017-9935,CVE-2018-16335,CVE-2018-17100,CVE-2018-17101,CVE-2018-17795 Description: This update for tiff fixes the following issues: - CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637) - CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627) - CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358) - CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853) ----------------------------------------- Patch: SUSE-2018-2446 Released: Wed Oct 24 16:42:15 2018 Summary: Recommended update for supportutils Severity: moderate References: 1104332,1105849 Description: This update for supportutils provides the following fixes: - Exclude sched_domain to improve the performance of loading the config of large systems. (bsc#1104332) - Added vulnerabilities check. (bsc#1105849) ----------------------------------------- Patch: SUSE-2018-2447 Released: Wed Oct 24 16:43:00 2018 Summary: Recommended update for tcsh Severity: moderate References: 1028864,1103692 Description: This update for tcsh fixes the following issues: - Avoid closing sockets that were not opened by tcsh itself (bsc#1028864, bsc#1103692) ----------------------------------------- Patch: SUSE-2018-2448 Released: Thu Oct 25 09:42:19 2018 Summary: Recommended update for yast2-core Severity: moderate References: 1103076 Description: This update for yast2-core fixes the following issues: - Reduced risk of race condition between while logging (bsc#1103076) ----------------------------------------- Patch: SUSE-2018-2453 Released: Thu Oct 25 11:19:07 2018 Summary: Recommended update for rsync Severity: low References: 1083017 Description: This update for rsync provides the following fix: - Do not send useless keepalive messages to sender if the file list is still being sent. This may cause a crash in older versions of rsync. (bsc#1083017) ----------------------------------------- Patch: SUSE-2018-2458 Released: Thu Oct 25 13:48:21 2018 Summary: Recommended update for smartmontools Severity: moderate References: 1038271,1047198,977294 Description: This update for smartmontools provides the following fixes: - Auto detect HPSA devices with the new kernel driver. (bsc#977294) - Make possible to disable broken SAT support by -d scsi+cciss,N. (bsc#1038271) - Fix some SCSI temperature errors. (bsc#1047198) ----------------------------------------- Patch: SUSE-2018-2469 Released: Thu Oct 25 16:41:56 2018 Summary: Security update for xorg-x11-server Severity: important References: 1078383,1111697,CVE-2018-14665 Description: This update for xorg-x11-server provides the following fix: Security issue fixed: - CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697) Non security issues fixed: - Do not write past the allocated buffer. (bsc#1078383) ----------------------------------------- Patch: SUSE-2018-2538 Released: Tue Oct 30 16:16:50 2018 Summary: Recommended update for yast2-bootloader Severity: moderate References: 962620,976228 Description: This update for yast2-bootloader fixes the following issues: - Add nounzip element to AutoYaST schema (bsc#962620) - fix device name by-path handling (bsc#976228) ----------------------------------------- Patch: SUSE-2018-2545 Released: Wed Oct 31 13:18:33 2018 Summary: Recommended update for open-iscsi Severity: low References: 1072312 Description: This update for open-iscsi Provides the following fix: - Fix some vulnerabilities in iscsiuio reported by Qualys. (bsc#1072312) ----------------------------------------- Patch: SUSE-2018-2583 Released: Mon Nov 5 17:59:16 2018 Summary: Security update for opensc Severity: moderate References: 1104812,1106998,1106999,1107033,1107037,1107038,1107039,1107107,1108318,CVE-2018-16391,CVE-2018-16392,CVE-2018-16393,CVE-2018-16418,CVE-2018-16419,CVE-2018-16422,CVE-2018-16423,CVE-2018-16427 Description: This update for opensc fixes the following issues: - CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998) - CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999) - CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318) - CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039) - CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107) - CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038) - CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037) - CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033) ----------------------------------------- Patch: SUSE-2018-2612 Released: Thu Nov 8 11:36:08 2018 Summary: Recommended update for bridge-utils Severity: low References: 1071964 Description: This update for bridge-utils provides the following fix: - Check for errors when opening files in fetch_id() to avoid crashing. (bsc#1071964) ----------------------------------------- Patch: SUSE-2018-2618 Released: Thu Nov 8 17:55:35 2018 Summary: Security update for curl Severity: moderate References: 1112758,1113660,CVE-2018-16840,CVE-2018-16842 Description: This update for curl fixes the following issues: - CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758) - CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660) ----------------------------------------- Patch: SUSE-2018-2636 Released: Mon Nov 12 20:37:08 2018 Summary: Recommended update for timezone, timezone-java Severity: moderate References: 1104700,1113554 Description: This update provides the latest time zone definitions (2018g), including the following changes: - Morocco switched from +00/+01 to permanent +01 effective 2018-10-28 (bsc#1113554) - Volgograd moves from +03 to +04 on 2018-10-28. - Fiji ends DST 2019-01-13, not 2019-01-20. - Most of Chile changes DST dates, effective 2019-04-06 (bsc#1104700) - Corrections to past timestamps of DST transitions - Use 'PST' and 'PDT' for Philippine time - minor code changes to zic handling of the TZif format - documentation updates ----------------------------------------- Patch: SUSE-2018-2699 Released: Fri Nov 16 16:03:04 2018 Summary: Security update for openssh Severity: moderate References: 1091396,1105010,1106163,964336,982273,CVE-2018-15473,CVE-2018-15919 Description: This update for openssh fixes the following issues: Following security issues have been fixed: - CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163) - CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010) Also the following security related hardening change was done: - Removed arcfour,blowfish,cast from list of default ciphers as they are long discontinued and should no longer be used. (bsc#982273) And the following non-security issues were fixed: - Stop leaking File descriptors (bsc#964336) - sftp-client.c returns wrong error code upon failure (bsc#1091396) ----------------------------------------- Patch: SUSE-2018-2723 Released: Tue Nov 20 19:35:17 2018 Summary: Recommended update for openssh Severity: important References: 1115654,1116577,CVE-2018-15919 Description: This update for openssh fixes the following issues: - Revert fix for CVE-2018-15919 which could have caused login problems with GSSAPI authentication (bsc#1115654, bsc#1116577) ----------------------------------------- Patch: SUSE-2018-2733 Released: Thu Nov 22 13:26:47 2018 Summary: Recommended update for autofs Severity: moderate References: 1038198,1062482,1066720,1068166 Description: This update for autofs provides the following fixes: - Fix issue where comparing CLOCK_MONOTONIC times with stat.st_mtime caused repeated re-reads of the map and stale ghost entries for failed mounts (bsc#1068166) - Fix ordering of seteuid/setegid in do_spawn (bsc#1062482) - Fix possible map instance memory leak (bsc#1038198) - Check map instances for staleness on map update (bsc#1038198) - Fix handling of replicated NFS server so that selection between servers still works sensibly when use_hostname_for_mounts is in effect. (bsc#1066720) - Fix a bug that causes nanoseconds to be ignored and effectively disables sorting of hosts based on response time and/or weight. (bsc#1066720) ----------------------------------------- Patch: SUSE-2018-2765 Released: Fri Nov 23 17:06:05 2018 Summary: Security update for tiff Severity: moderate References: 1010163,1014461,1040080,1040322,1074186,1099257,1113672,974446,974447,974448,983440,CVE-2015-8870,CVE-2016-3619,CVE-2016-3620,CVE-2016-3621,CVE-2016-5319,CVE-2016-9273,CVE-2017-17942,CVE-2017-9117,CVE-2017-9147,CVE-2018-12900,CVE-2018-18661 Description: This update for tiff fixes the following issues: Security issues fixed: - CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672). - CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257). - CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). - CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080). - CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186). - CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163). - CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440). - CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448). - CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447) - CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446) - CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461). Non-security issues fixed: - asan_build: build ASAN included - debug_build: build more suitable for debugging ----------------------------------------- Patch: SUSE-2018-2785 Released: Tue Nov 27 00:23:04 2018 Summary: Recommended update for yast2-network Severity: moderate References: 1103712,1108852,1113896,978463 Description: This update for yast2-network provides the following fixes: - Apply udev rules on running system. (bsc#978463) - Add 'bridge' settings to networking.rnc file. (bsc#1113896) - The following fixes to the networking autoyast schema (bsc#1103712, bsc#1108852): * Allow the usage of 'listentry' element in list entries. * Add missed s390 device 'layer2' boolean element. ----------------------------------------- Patch: SUSE-2018-2827 Released: Mon Dec 3 15:36:51 2018 Summary: Security update for glib2 Severity: moderate References: 1107116,1111499,CVE-2018-16429 Description: This update for glib2 fixes the following issues: Security issues fixed: - CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116). - Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499). ----------------------------------------- Patch: SUSE-2018-2845 Released: Wed Dec 5 10:04:12 2018 Summary: Recommended update for mkinitrd Severity: moderate References: 1072711,1104090,1111603,726313,742884,950426 Description: This update for mkinitrd fixes the following issues: - check_for_device: Match only udev symlinks by major number. (bsc#726313) - purge-kernels: Add kernel-syms to packages to be removed by purge-kernels. (bsc#1104090) - purge-kernels: If a kernel cannot be removed due to dependencies, continue removing other kernels. (bsc#1104090) - Workaround for HPE 57810 adapter in offload mode with static IP. (bsc#950426) - Make mkinitrd content private. (bsc#742884, bsc#1072711, bsc#1111603) ----------------------------------------- Patch: SUSE-2018-2891 Released: Mon Dec 10 18:12:34 2018 Summary: Recommended update for glibc Severity: moderate References: 1064569,1110170,1110174,CVE-2017-15671 Description: This update for glibc fixes the following issues: Security issue fixed: - CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325). Non-security issue fixed: - Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618). - Remove improper assert in dlclose (bsc#1110174, BZ #11941). ----------------------------------------- Patch: SUSE-2018-2902 Released: Tue Dec 11 21:46:51 2018 Summary: Recommended update for pciutils-ids Severity: moderate References: 1116085 Description: This update for pciutils-ids fixes the following issues: The pci.ids database was updated to 2018.02.08 (bsc#1116085) ----------------------------------------- Patch: SUSE-2018-2928 Released: Fri Dec 14 10:56:59 2018 Summary: Security update for tiff Severity: moderate References: 1017693,CVE-2016-10092,CVE-2016-10093,CVE-2016-10094 Description: This update for tiff fixes the following issues: Security issues fixed: - CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693). - CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693). - CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693). ----------------------------------------- Patch: SUSE-2018-2985 Released: Wed Dec 19 11:33:03 2018 Summary: Security update for crash Severity: low References: 1032471,1075785 Description: This update for crash provides the following fix: - Update crash to support -bigmem kernel dumps for PPC64, including the ones that have extended process virtual address space support to 128TB (bsc#1075785, bsc#1032471). ----------------------------------------- Patch: SUSE-2018-3030 Released: Fri Dec 21 17:34:32 2018 Summary: Recommended update for ntp Severity: important References: 1113663 Description: This update for ntp provides the following fix: - Leave SSL enabled when compiling against an OpenSSL version that does not support CMAC. (bsc#1113663) ----------------------------------------- Patch: SUSE-2018-3033 Released: Fri Dec 21 17:35:21 2018 Summary: Recommended update for multipath-tools Severity: moderate References: 1005255,1047180,1069037,1110671 Description: This update for multipath-tools provides the following fixes: - kpartx.rules: Do not bump link prio if DM_UDEV_LOW_PRIORITY_FLAG is set. (bsc#1047180) - tur checker: Fix 'TUR checker done' case. (bsc#1110671) - libmultipath: Fix unit to seconds in log message for checker timeout. (bsc#1069037) - libmultipath: Fix return code of sysfs_get_timeout. (bsc#1069037) - libmultipath: Use existing alias from bindings file. (bsc#1005255) ----------------------------------------- Patch: SUSE-2018-3048 Released: Thu Dec 27 09:06:24 2018 Summary: Security update for openssl Severity: moderate References: 1104789,1110018,1113534,1113652,CVE-2016-8610,CVE-2018-0734,CVE-2018-5407 Description: This update for openssl fixes the following issues: Security issues fixed: - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). - CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). - Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). ----------------------------------------- Patch: SUSE-2019-84 Released: Fri Jan 11 17:17:30 2019 Summary: Recommended update for timezone Severity: moderate References: 1120402 Description: This update for timezone fixes the following issues: - Update 2018i: São Tomé and Príncipe switches from +01 to +00 on 2019-01-01. (bsc#1120402) - Update 2018h: Qyzylorda, Kazakhstan moved from +06 to +05 on 2018-12-21 New zone Asia/Qostanay because Qostanay, Kazakhstan didn't move Metlakatla, Alaska observes PST this winter only Guess Morocco will continue to adjust clocks around Ramadan Add predictions for Iran from 2038 through 2090 ----------------------------------------- Patch: SUSE-2019-85 Released: Fri Jan 11 17:18:13 2019 Summary: Recommended update for xorg-x11-libX11, xorg-x11-libxcb Severity: moderate References: 1115729 Description: This update for xorg-x11-libX11, xorg-x11-libxcb provides the following fix: - Add proper dependencies for handoff mechanism in 32bit version of the packages. (bsc#1115729) ----------------------------------------- Patch: SUSE-2019-129 Released: Fri Jan 18 16:30:31 2019 Summary: Security update for openssh Severity: important References: 1121571,1121816,1121818,1121821,CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Description: This update for openssh fixes the following issues: Security issue fixed: - CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571) - CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816) - CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818) - CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821) ----------------------------------------- Patch: SUSE-2019-185 Released: Mon Jan 28 14:13:38 2019 Summary: Recommended update for wodim Severity: moderate References: 1100466 Description: This update for wodim fixes the following issues: - Fixing a crash when option '-T' is used in conjunction with files larger than 4GB. (bsc#1100466) ----------------------------------------- Patch: SUSE-2019-187 Released: Mon Jan 28 14:14:07 2019 Summary: Recommended update for mkinitrd Severity: moderate References: 1118723 Description: This update for mkinitrd provides the following fix: - Dereference symlinks when copying binaries. (bsc#1118723) ----------------------------------------- Patch: SUSE-2019-214 Released: Thu Jan 31 13:08:18 2019 Summary: Recommended update for openssh Severity: important References: 1123028 Description: This update for openssh fixes the following issues: - A previously applied security patch unintendedly changed the behavior of OpenSSH's 'scp' utility such that server-side brace expansion would no longer be supported. Attempts to copy a set files from a remote machine to the local one by running 'scp 'remote:{file-a,file-b}' /tmp' would fail. This change in behavior broke Corosync and, potentially, many user scripts that relied on brace expansion. [bsc#1123028] ----------------------------------------- Patch: SUSE-2019-220 Released: Fri Feb 1 11:22:17 2019 Summary: Recommended update for openssl-certs Severity: moderate References: 1121446 Description: This update for openssl-certs fixes the following issues: The package was updated to 2.30 version of the Mozilla NSS Certificate store. (bsc#1121446) Removed Root CAs: - AC Raiz Certicamara S.A. - Certplus Root CA G1 - Certplus Root CA G2 - OpenTrust Root CA G1 - OpenTrust Root CA G2 - OpenTrust Root CA G3 - Visa eCommerce Root Added Root CAs: - Certigna Root CA (email and server auth) - GTS Root R1 (server auth) - GTS Root R2 (server auth) - GTS Root R3 (server auth) - GTS Root R4 (server auth) - OISTE WISeKey Global Root GC CA (email and server auth) - UCA Extended Validation Root (server auth) - UCA Global G2 Root (email and server auth) ----------------------------------------- Patch: SUSE-2019-309 Released: Fri Feb 8 14:47:03 2019 Summary: Security update for avahi Severity: moderate References: 1120281,CVE-2018-1000845 Description: This update for avahi fixes the following issues: Security issue fixed: - CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281) ----------------------------------------- Patch: SUSE-2019-310 Released: Fri Feb 8 14:47:38 2019 Summary: Security update for fuse Severity: moderate References: 1101797,CVE-2018-10906 Description: This update for fuse fixes the following issues: Security issue fixed: - CVE-2018-10906: Fix a bypass of the user_allow_other restriction (bsc#1101797) ----------------------------------------- Patch: SUSE-2019-523 Released: Fri Mar 1 07:05:14 2019 Summary: Recommended update for krb5 Severity: moderate References: 1056995,1081725,1114897 Description: This update for krb5 fixes the following issues: - Fix GSS failures in legacy applications; (bsc#1081725); (bsc#1114897); - Fix a context leak in gss_accept_sec_context introduced by (bsc#1056995) ----------------------------------------- Patch: SUSE-2019-559 Released: Wed Mar 6 14:12:06 2019 Summary: Recommended update for multipath-tools Severity: moderate References: 1111270,1114771 Description: This update for multipath-tools fixes the following issues: - multipathd: Add delayed path reintegration (fate#326836, bsc#1114771, bsc#1111270) ----------------------------------------- Patch: SUSE-2019-601 Released: Tue Mar 12 18:40:52 2019 Summary: Security update for supportutils Severity: moderate References: 1117751,1118460,1118462,1118463,CVE-2018-19636,CVE-2018-19638,CVE-2018-19639,CVE-2018-19640 Description: This update for supportutils fixes the following issues: Security vulnerabilities fixed: - CVE-2018-19636: Local root exploit via inclusion of attacker controlled shell script (bsc#1117751) - CVE-2018-19640: Users can kill arbitrary processes (bsc#1118463) - CVE-2018-19638: User can overwrite arbitrary log files in support tar (bsc#1118460) - CVE-2018-19639: Code execution if run with -v (bsc#1118462) ----------------------------------------- Patch: SUSE-2019-638 Released: Tue Mar 19 11:42:26 2019 Summary: Security update for libssh2_org Severity: moderate References: 1128471,1128472,1128474,1128476,1128480,1128481,1128490,1128492,1128493,CVE-2019-3855,CVE-2019-3856,CVE-2019-3857,CVE-2019-3858,CVE-2019-3859,CVE-2019-3860,CVE-2019-3861,CVE-2019-3862,CVE-2019-3863 Description: This update for libssh2_org fixes the following issues: Security issues fixed: - CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490). - CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492). - CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481). - CVE-2019-3863: Fixed an Integer overflow in user authenicate keyboard interactive which could allow out-of-bounds writes with specially crafted keyboard responses (bsc#1128493). - CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write with specially crafted payload (bsc#1128472). - CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev (bsc#1128480). - CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially crafted payload (bsc#1128471). - CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted SFTP packet (bsc#1128476). - CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet (bsc#1128474). ----------------------------------------- Patch: SUSE-2019-663 Released: Wed Mar 20 14:53:47 2019 Summary: Recommended update for augeas Severity: moderate References: 1091696 Description: This update for augeas provides the following fix: - Fix parsing of quoted strings with spaces in spacevars lens. (bsc#1091696) ----------------------------------------- Patch: SUSE-2019-687 Released: Thu Mar 21 18:39:48 2019 Summary: Security update for unzip Severity: moderate References: 1110194,CVE-2018-18384 Description: This update for unzip fixes the following issues: - CVE-2018-18384: Fixed a buffer overflow when listing archives (bsc#1110194) ----------------------------------------- Patch: SUSE-2019-689 Released: Thu Mar 21 18:41:00 2019 Summary: Security update for libxml2 Severity: moderate References: 1010675,1102046,1110146,1126613,CVE-2016-9318,CVE-2018-14404 Description: This update for libxml2 fixes the following issues: Security issue fixed: - CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval() function when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case leading to a denial of service attack (bsc#1102046) Other Issue fixed: - Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146). ----------------------------------------- Patch: SUSE-2019-692 Released: Thu Mar 21 19:51:39 2019 Summary: Recommended update for mkinitrd Severity: moderate References: 1125327 Description: This update for mkinitrd fixes the following issues: - Bugfix: Avoid purge-kernel loop when a package depends on a KMP (bsc#1125327) ----------------------------------------- Patch: SUSE-2019-773 Released: Wed Mar 27 10:37:36 2019 Summary: Security update for ntp Severity: moderate References: 1001182,1128525,CVE-2019-8936 Description: This update for ntp fixes the following issues: Security issue fixed: - CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause segmentation fault to ntpd (bsc#1128525). Other issues addressed: - Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). - Fixed several bugs in the BANCOMM reclock driver. - Fixed ntp_loopfilter.c snprintf compilation warnings. - Fixed spurious initgroups() error message. - Fixed STA_NANO struct timex units. - Fixed GPS week rollover in libparse. - Fixed incorrect poll interval in packet. - Added a missing check for ENABLE_CMAC. ----------------------------------------- Patch: SUSE-2019-774 Released: Wed Mar 27 11:05:06 2019 Summary: Security update for libmspack Severity: moderate References: 1113038,1113039,CVE-2018-18584,CVE-2018-18585 Description: This update for libmspack fixes the following issues: Security issues fixed: - CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038) - CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039) ----------------------------------------- Patch: SUSE-2019-809 Released: Fri Mar 29 14:09:20 2019 Summary: Recommended update for timezone Severity: moderate References: 1130557 Description: This update for timezone fixes the following issues: timezone was updated to 2019a (bsc#1130557): * Palestine 'springs forward' on 2019-03-30 instead of 2019-03-23 * Metlakatla 'fell back' to rejoin Alaska Time on 2019-01-20 at 02:00 * Israel observed DST in 1980 (08-02/09-13) and 1984 (05-05/08-25) * zic now has an -r option to limit the time range of output data ----------------------------------------- Patch: SUSE-2019-814 Released: Fri Mar 29 16:32:59 2019 Summary: Security update for SDL Severity: moderate References: 1124799,1124800,1124802,1124803,1124805,1124806,1124824,1124825,1124826,1124827,1125099,CVE-2019-7572,CVE-2019-7573,CVE-2019-7574,CVE-2019-7575,CVE-2019-7576,CVE-2019-7577,CVE-2019-7578,CVE-2019-7635,CVE-2019-7636,CVE-2019-7637,CVE-2019-7638 Description: This update for SDL fixes the following issues: Security issues fixed: - CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806). - CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099). - CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799). - CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805). - CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827). - CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826). - CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824). - CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803). - CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802). - CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825). - CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800). ----------------------------------------- Patch: SUSE-2019-829 Released: Mon Apr 1 11:47:37 2019 Summary: Security update for tiff Severity: low References: 1121626,983268,CVE-2016-5102,CVE-2019-6128 Description: This update for tiff fixes the following issue: Security vulnerabilities fixed: - CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268) - CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626) ----------------------------------------- Patch: SUSE-2019-830 Released: Mon Apr 1 13:25:28 2019 Summary: Security update for sqlite3 Severity: moderate References: 1119687,CVE-2018-20346 Description: This update for sqlite3 fixes the following issue: Security issue fixed: - CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687). ----------------------------------------- Patch: SUSE-2019-835 Released: Mon Apr 1 15:38:18 2019 Summary: Recommended update for krb5 Severity: important References: 1129085 Description: This update for krb5 fixes the following issues: - A previously released update introduced a regression for Windows clients that manifested in gss_display_name() malfunctioning, complaining that 'an invalid name was supplied'. This issue is now fixed. [bsc#1129085] ----------------------------------------- Patch: SUSE-2019-951 Released: Mon Apr 15 16:36:08 2019 Summary: Security update for python Severity: important References: 1129346,1130847,CVE-2019-9636,CVE-2019-9948 Description: This update for python fixes the following issues: Security issues fixed: - CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847). - CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346). ----------------------------------------- Patch: SUSE-2019-1031 Released: Thu Apr 25 10:34:46 2019 Summary: Security update for openssh Severity: moderate References: 1090671,1115550,1119183,1121816,1121821,1131709,CVE-2019-6109,CVE-2019-6111 Description: This update for openssh fixes the following issues: Security vulnerabilities addressed: - CVE-2019-6109: Fixed an character encoding issue in the progress display of the scp client that could be used to manipulate client output, allowing for spoofing during file transfers (bsc#1121816). - CVE-2019-6111: Properly validate object names received by the scp client to prevent arbitrary file overwrites when interacting with a malicious SSH server (bsc#1121821). Other issues fixed: - Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183). - Returned proper reason for port forwarding failures (bsc#1090671). - Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550). ----------------------------------------- Patch: SUSE-2019-1058 Released: Sat Apr 27 09:31:27 2019 Summary: Security update for libssh2_org Severity: important References: 1091236,1130103,1133528,CVE-2019-3859 Description: This update for libssh2_org fixes the following issues: - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103] - Store but don't use keys of unsupported types in the known_hosts file [bsc#1091236] ----------------------------------------- Patch: SUSE-2019-1107 Released: Tue Apr 30 12:51:25 2019 Summary: Recommended update for glibc Severity: important References: 1100396,1103244 Description: This update for glibc fixes the following issues: - Add support for the new Japanese time era name that comes into effect on 2019-05-01. [bsc#1100396, bsc#1103244] ----------------------------------------- Patch: SUSE-2019-1180 Released: Tue May 7 18:09:20 2019 Summary: Security update for sqlite3 Severity: moderate References: 1085790,1132045,CVE-2017-10989,CVE-2018-8740 Description: This update for sqlite3 fixes the following issues: Security issue fixed: - CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790). - CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045). ----------------------------------------- Patch: SUSE-2019-1205 Released: Fri May 10 14:00:58 2019 Summary: Security update for samba Severity: moderate References: 1101499,1131060,CVE-2019-3880 Description: This update for samba fixes the following issues: Security issue fixed: - CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060). Non-security issue fixed: - Make init scripts create log directories before running daemons (bsc#1101499) ----------------------------------------- Patch: SUSE-2019-1233 Released: Tue May 14 18:30:50 2019 Summary: Security update for glibc Severity: moderate References: 1127223,CVE-2009-5155 Description: This update for glibc fixes the following issue: Security issue fixed: - CVE-2009-5155: Fixed a local denial of service inside the parse_reg_exp in posix/regcomp.c (bsc#1127223). ----------------------------------------- Patch: SUSE-2019-1263 Released: Thu May 16 09:49:19 2019 Summary: Security update for screen Severity: low References: 944458,CVE-2015-6806 Description: This update for screen fixes the following issues: Security issue fixed: - CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458). ----------------------------------------- Patch: SUSE-2019-1270 Released: Thu May 16 14:26:01 2019 Summary: Security update for libxslt Severity: moderate References: 1132160,CVE-2019-11068 Description: This update for libxslt fixes the following issues: Security issue fixed: - CVE-2019-11068: Fixed a protection mechanism bypass where callers of xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an error (bsc#1132160). ----------------------------------------- Patch: SUSE-2019-1305 Released: Tue May 21 16:38:40 2019 Summary: Recommended update for gcc43 , libffi43 Severity: moderate References: 1111793 Description: This update of gcc43 and libffi43 fixes the following issue: - The libffi43 library is delivered for SLES 11 SP3. ----------------------------------------- Patch: SUSE-2019-1306 Released: Tue May 21 18:14:55 2019 Summary: Security update for gnutls Severity: moderate References: 1047002,1105460,CVE-2017-10790,CVE-2018-10846 Description: This update for gnutls fixes the following issues: Security issues fixed: - CVE-2018-10846: Improve mitigations against Lucky 13 class of attacks (PRIME + PROBE) (bsc#1105460). - CVE-2017-10790: Fixed a denial of service in the _asn1_check_identifier() function (bsc#1047002). ----------------------------------------- Patch: SUSE-2019-1338 Released: Fri May 24 11:56:20 2019 Summary: Security update for curl Severity: important References: 1135170,CVE-2019-5436 Description: This update for curl fixes the following issues: Security issue fixed: - CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170). ----------------------------------------- Patch: SUSE-2019-1377 Released: Wed May 29 14:12:21 2019 Summary: Security update for libtasn1 Severity: moderate References: 1040621,1105435,CVE-2017-6891,CVE-2018-1000654 Description: This update for libtasn1 fixes the following issues: Security issues fixed: - CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435). - CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621). ----------------------------------------- Patch: SUSE-2019-1386 Released: Fri May 31 08:46:18 2019 Summary: Security update for jpeg Severity: low References: 1122299,1128712,CVE-2018-11212,CVE-2018-14498 Description: This update for jpeg fixes the following issue: Security issue fixed: - CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function which could allow to an attacker to cause denial of service (bsc#1128712). - CVE-2018-11212: Fixed divide by zero in alloc_sarray function in jmemmgr.c (bsc#1122299). - CVE-2018-14498: Fixed denial of service in get_8bit_row in rdbmp.c (bsc#1128712). ----------------------------------------- Patch: SUSE-2019-1442 Released: Thu Jun 6 18:25:33 2019 Summary: Security update for bind Severity: important References: 1104129,1126068,1126069,1133185,CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465 Description: This update for bind fixes the following issues: Security issues fixed: - CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129). - CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185) - CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068) - CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069). ----------------------------------------- Patch: SUSE-2019-1455 Released: Tue Jun 11 10:07:34 2019 Summary: Security update for vim Severity: important References: 1137443,CVE-2019-12735 Description: This update for vim fixes the following issues: Security issue fixed: - CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443). ----------------------------------------- Patch: SUSE-2019-1462 Released: Tue Jun 11 18:13:40 2019 Summary: Security update for elfutils Severity: low References: 1030472,1030476,1033084,1033085,1033087,1033088,1033089,1033090,1106390,1107067,1111973,1112723,1112726,1123685,1125007,CVE-2016-10254,CVE-2016-10255,CVE-2017-7607,CVE-2017-7608,CVE-2017-7610,CVE-2017-7611,CVE-2017-7612,CVE-2017-7613,CVE-2018-16062,CVE-2018-16403,CVE-2018-18310,CVE-2018-18520,CVE-2018-18521,CVE-2019-7150,CVE-2019-7665 Description: This update for elfutils fixes the following issues: Security issues fixed: - CVE-2018-16403: Fixed a heap-based buffer over-read in in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c which could have lead to denial of service (bsc#1107067). - CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472). - CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007). - CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476). - CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files to be read (bsc#1123685). - CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390). - CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088). - CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections and the number of segments in a crafted ELF file (bsc#1033090). - CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084). - CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085). - CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087). - CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723). - CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089). - CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973). - CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726). - CVE-2017-7613: Missing validation of the number of sections and the number of segments allowed remote attackers to cause a denial of service (memory consumption) via a crafted ELF file (bsc#1033090). - CVE-2017-7612: The check_sysv_hash function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file (bsc#1033089). ----------------------------------------- Patch: SUSE-2019-1465 Released: Wed Jun 12 08:45:51 2019 Summary: Recommended update for mdadm Severity: moderate References: 1081286,1082766,1095141,1095729,1096363,1105175 Description: This update for mdadm provides the following fixes: - Assemble: Prevent a segmentation fault with faulty 'best' devices. (bsc#1082766, bsc#1095729) - Do not use the bad_blocks and unacknowledged_bad_blocks sysfs entries which are not available in SLE11-SP4 kernel. (bsc#1105175) - Accept option '--brief' with '--export' (bsc#1095141) Call mdadm --detail --export with --brief in 64-md-raid.rules. This should prevent overflow on large deployment. - md_monitor: use pselect (bsc#1095141) - md_monitor: fix crash in display_io_status (bsc#1096363) - md_monitor: fixup crash in display_md_status (bsc#1081286), (bsc#1096363) - Delete code that require sysfs entries bad_blocks and unacknowledged_bad_blocks which are not in SLE11-SP4 kernel. (bsc#1105175) ----------------------------------------- Patch: SUSE-2019-1510 Released: Fri Jun 14 16:18:53 2019 Summary: Security update for sqlite3 Severity: important References: 1136976,CVE-2019-8457 Description: This update for sqlite3 fixes the following issue: Security issue fixed: - CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976). ----------------------------------------- Patch: SUSE-2019-1561 Released: Wed Jun 19 08:58:42 2019 Summary: Recommended update for xz Severity: low References: 1135709 Description: This update for xz doesn't address any customer relevant issues. - The license has been updated (bsc#1135709) * LGPLv2.1+ (getopt_long) * GPLv2+ (scripts to grep, diff, and view compressed files, +doc) * SUSE-Public-Domain licence (liblzma, xz, xzdec, lzmadec, documentation, translated messages, tests, debug, extra directory) ----------------------------------------- Patch: SUSE-2019-1609 Released: Fri Jun 21 10:27:27 2019 Summary: Security update for libssh2_org Severity: moderate References: 1128481,1136570,CVE-2019-3860 Description: This update for libssh2_org fixes the following issues: - Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481) (Out-of-bounds reads with specially crafted SFTP packets) ----------------------------------------- Patch: SUSE-2019-1685 Released: Mon Jun 24 11:14:21 2019 Summary: Security update for glib2 Severity: important References: 1137001,CVE-2019-12450 Description: This update for glib2 fixes the following issues: Security issue fixed: - CVE-2019-12450: Fixed an improper file permission when copy operation takes place (bsc#1137001). ----------------------------------------- Patch: SUSE-2019-1719 Released: Tue Jul 2 10:31:25 2019 Summary: Security update for dbus-1 Severity: important References: 1137832,CVE-2019-12749 Description: This update for dbus-1 fixes the following issues: Security issue fixed: - CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which could have allowed local attackers to bypass authentication (bsc#1137832). ----------------------------------------- Patch: SUSE-2019-1831 Released: Fri Jul 12 17:52:10 2019 Summary: Security update for expat Severity: moderate References: 1139937,CVE-2018-20843 Description: This update for expat fixes the following issues: Security issue fixed: - CVE-2018-20843: Fixed a denial of service triggered by high resource consumption in the XML parser when XML names contain a large amount of colons (bsc#1139937). ----------------------------------------- Patch: SUSE-2019-1848 Released: Mon Jul 15 14:39:37 2019 Summary: Security update for bzip2 Severity: important References: 1139083,985657,CVE-2016-3189,CVE-2019-12900 Description: This update for bzip2 fixes the following issues: Security issue fixed: - CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083). - CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657). ----------------------------------------- Patch: SUSE-2019-1872 Released: Wed Jul 17 17:21:55 2019 Summary: Security update for coreutils Severity: moderate References: 928749,CVE-2015-4041,CVE-2015-4042 Description: This update for coreutils fixes the following issues: Security issues fixed: - CVE-2015-4041, CVE-2015-4042: Fixed a buffer overflow related to case conversion (bsc#928749). ----------------------------------------- Patch: SUSE-2019-1905 Released: Fri Jul 19 12:48:41 2019 Summary: Recommended update for openssh Severity: important References: 1138936 Description: This update for openssh fixes the following issues: - Fix a regression in utf-8 handling that could cause crashes of scp (bsc#1138936). ----------------------------------------- Patch: SUSE-2019-2038 Released: Fri Aug 2 08:34:27 2019 Summary: Recommended update for timezone Severity: moderate References: 1140016 Description: This update for timezone fixes the following issues: - Timezone update 2019b. (bsc#1140016): - Brazil no longer observes DST. - 'zic -b slim' outputs smaller TZif files. - Palestine's 2019 spring-forward transition was on 03-29, not 03-30. - Add info about the Crimea situation. ----------------------------------------- Patch: SUSE-2019-2051 Released: Tue Aug 6 09:43:01 2019 Summary: Security update for bzip2 Severity: important References: 1139083,CVE-2019-12900 Description: This update for bzip2 fixes the following issues: - Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities with files that used many selectors (bsc#1139083). ----------------------------------------- Patch: SUSE-2019-2090 Released: Thu Aug 8 13:23:16 2019 Summary: Security update for python Severity: important References: 1138459,1141853,CVE-2018-20852,CVE-2019-10160 Description: This update for python fixes the following issues: - CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459). - CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853). ----------------------------------------- Patch: SUSE-2019-1515 Released: Tue Aug 20 17:56:54 2019 Summary: Security update for glibc Severity: important References: 1127308,CVE-2019-9169 Description: This update for glibc fixes the following issues: Security issue fixed: - CVE-2019-9169: Fixed heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308). ----------------------------------------- Patch: SUSE-2019-1552 Released: Wed Sep 11 16:45:12 2019 Summary: Security update for openssl Severity: moderate References: 1117951,1127080,1131291,CVE-2019-1559 Description: This update for openssl fixes the following issues: Security issues fixed: - CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080) - Reject invalid EC point coordinates (bsc#1131291) - Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951) ----------------------------------------- Patch: SUSE-2019-2386 Released: Tue Sep 17 15:41:57 2019 Summary: Security update for curl Severity: important References: 1149496,CVE-2019-5482 Description: This update for curl fixes the following issues: Security issue fixed: - CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496). ----------------------------------------- Patch: SUSE-2019-2408 Released: Thu Sep 19 15:26:11 2019 Summary: Security update for openssl Severity: moderate References: 1150003,1150250,CVE-2019-1547,CVE-2019-1563 Description: This update for openssl fixes the following issues: OpenSSL Security Advisory [10 September 2019] - CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003). - CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250). ----------------------------------------- Patch: SUSE-2019-2445 Released: Tue Sep 24 13:19:46 2019 Summary: Security update for expat Severity: moderate References: 1149429,CVE-2019-15903 Description: This update for expat fixes the following issues: Security issue fixed: - CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429) ----------------------------------------- Patch: SUSE-2019-2446 Released: Tue Sep 24 13:19:59 2019 Summary: Security update for libgcrypt Severity: moderate References: 1148987,CVE-2019-13627 Description: This update for libgcrypt fixes the following issues: Security issue fixed: - CVE-2019-13627: Mitigated against an ECDSA timing attack. (bsc#1148987) ----------------------------------------- Patch: SUSE-2019-2449 Released: Tue Sep 24 13:53:29 2019 Summary: Security update for libxml2 Severity: low References: 1123919 Description: This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect all CVEs that have been fixed over the past. ----------------------------------------- Patch: SUSE-2019-2479 Released: Thu Sep 26 14:51:37 2019 Summary: Security update for gpg2 Severity: moderate References: 1124847,1141093,CVE-2019-13050 Description: This update for gpg2 fixes the following issues: Security issue fixed: - CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093) Non-security issue fixed: - Allow coredumps in X11 desktop sessions (bsc#1124847). ----------------------------------------- Patch: SUSE-2019-2554 Released: Fri Oct 4 13:36:35 2019 Summary: Recommended update for tcsh Severity: moderate References: 1134508,992577 Description: This update for tcsh provides the following fix: - Make a copy of the file descriptor of the history file to be able not only to lock but also unlock the file. (bsc#992577, bsc#1134508) ----------------------------------------- Patch: SUSE-2019-2665 Released: Tue Oct 15 11:18:38 2019 Summary: Security update for tcpdump Severity: important References: 1057247,1153098,1153332,CVE-2017-12893,CVE-2017-12894,CVE-2017-12896,CVE-2017-12897,CVE-2017-12898,CVE-2017-12899,CVE-2017-12900,CVE-2017-12901,CVE-2017-12902,CVE-2017-12985,CVE-2017-12986,CVE-2017-12987,CVE-2017-12988,CVE-2017-12991,CVE-2017-12992,CVE-2017-12993,CVE-2017-12995,CVE-2017-12996,CVE-2017-12998,CVE-2017-12999,CVE-2017-13001,CVE-2017-13002,CVE-2017-13003,CVE-2017-13004,CVE-2017-13005,CVE-2017-13006,CVE-2017-13008,CVE-2017-13009,CVE-2017-13010,CVE-2017-13012,CVE-2017-13013,CVE-2017-13014,CVE-2017-13016,CVE-2017-13017,CVE-2017-13018,CVE-2017-13019,CVE-2017-13021,CVE-2017-13022,CVE-2017-13023,CVE-2017-13024,CVE-2017-13025,CVE-2017-13027,CVE-2017-13028,CVE-2017-13029,CVE-2017-13030,CVE-2017-13031,CVE-2017-13032,CVE-2017-13034,CVE-2017-13035,CVE-2017-13036,CVE-2017-13037,CVE-2017-13038,CVE-2017-13041,CVE-2017-13047,CVE-2017-13048,CVE-2017-13049,CVE-2017-13051,CVE-2017-13053,CVE-2017-13055,CVE-2017-13687,CVE-2017-13688,CVE-2017-13689,CVE-2017-13725,CVE-2018-10103,CVE-2018-10105,CVE-2018-14461,CVE-2018-14462,CVE-2018-14463,CVE-2018-14464,CVE-2018-14465,CVE-2018-14466,CVE-2018-14467,CVE-2018-14468,CVE-2018-14469,CVE-2018-14881,CVE-2018-14882,CVE-2018-16229,CVE-2018-16230,CVE-2018-16300,CVE-2018-16301,CVE-2018-16451,CVE-2018-16452,CVE-2019-15166 Description: This update for tcpdump fixes the following issues: Security issues fixed: - CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247). - CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247). - CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247). - CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247). - CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247). - CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247). - CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247). - CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247). - CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247). - CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247). - CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247). - CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247). - CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247). - CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247). - CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247). - CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247). - CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247). - CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247). - CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247). - CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247). - CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247). - CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247). - CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247). - CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247). - CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247). - CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247). - CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247). - CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247). - CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247). - CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247). - CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247). - CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247). - CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247). - CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247). - CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247). - CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247). - CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247). - CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247). - CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247). - CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247). - CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247). - CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247). - CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247). - CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098). - CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098). - CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098). - CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098). - CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098). - CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098). - CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098). - CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098). - CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098). - CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098). - CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098). - CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098). - CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098). - CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098). - CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098). - CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098). - CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098). - CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098). - CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098). - CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098). ----------------------------------------- Patch: SUSE-2019-2711 Released: Fri Oct 18 16:19:55 2019 Summary: Security update for sudo Severity: important References: 1153674,CVE-2019-14287 Description: This update for sudo fixes the following issues: - CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674). ----------------------------------------- Patch: SUSE-2019-2733 Released: Tue Oct 22 08:51:22 2019 Summary: Security update for python Severity: moderate References: 1149955,CVE-2019-16056 Description: This update for python fixes the following issues: Security issue fixed: - CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955) ----------------------------------------- Patch: SUSE-2019-2775 Released: Thu Oct 24 13:57:24 2019 Summary: Recommended update for timezone Severity: moderate References: 1150451 Description: This update for timezone fixes the following issues: - Fiji observes DST from 2019-11-10 to 2020-01-12. - Norfolk Island starts observing Australian-style DST. ----------------------------------------- Patch: SUSE-2019-2804 Released: Tue Oct 29 11:45:03 2019 Summary: Security update for samba Severity: important References: 1144902,CVE-2019-10218 Description: This update for samba fixes the following issue: - CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902). ----------------------------------------- Patch: SUSE-2019-2899 Released: Wed Nov 6 11:20:09 2019 Summary: Security update for libssh2_org Severity: moderate References: 1154862,CVE-2019-17498 Description: This update for libssh2_org fixes the following issue: - CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862). ----------------------------------------- Patch: SUSE-2019-2977 Released: Thu Nov 14 22:42:20 2019 Summary: Recommended update for crash Severity: moderate References: 1142056 Description: This update for crash fixes the following issues: - Fixes an issue when analyzing memory dumps from ppc64 machines with large amount of memory (bsc#1142056) ----------------------------------------- Patch: SUSE-2019-3023 Released: Thu Nov 21 09:36:23 2019 Summary: Security update for cpio Severity: moderate References: 1155199,963448,CVE-2016-2037,CVE-2019-14866 Description: This update for cpio fixes the following issues: - CVE-2019-14866: Fixed an improper validation of the values written in the header of a TAR file through the to_oct() function which could have led to unexpected TAR generation (bsc#1155199). - CVE-2016-2037: Fixed an out-of-bounds write in the way cpio parses certain cpio files (bsc#963448). ----------------------------------------- Patch: SUSE-2019-3051 Released: Mon Nov 25 17:27:50 2019 Summary: Security update for sqlite3 Severity: important References: 1155787,CVE-2017-2518 Description: This update for sqlite3 fixes the following issues: - CVE-2017-2518: Fixed a use-after-free vulnerability which could have led to buffer overflow via a crafted SQL statement (bsc#1155787). ----------------------------------------- Patch: SUSE-2019-3054 Released: Mon Nov 25 17:28:39 2019 Summary: Security update for cups Severity: important References: 1146358,1146359,959478,CVE-2019-8675,CVE-2019-8696 Description: This update for cups fixes the following issues: - CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). - CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359). - Fixed a double free which was triggered by Java application (bsc#959478). ----------------------------------------- Patch: SUSE-2019-3071 Released: Tue Nov 26 13:31:11 2019 Summary: Security update for ncurses Severity: moderate References: 1056126,1056127,1056128,1056129,1056131,1056132,1056136,1131830,1154037,CVE-2017-13728,CVE-2017-13729,CVE-2017-13730,CVE-2017-13731,CVE-2017-13732,CVE-2017-13733,CVE-2017-13734,CVE-2018-10754,CVE-2019-17595 Description: This update for ncurses fixes the following issues: Security issues fixed: - CVE-2017-13728: Fixed an infinite loop in the next_char function (bsc#1056136). - CVE-2017-13729: Fixed an illegal address access in the _nc_save_str (bsc#1056132). - CVE-2017-13730: Fixed an illegal address access in the function _nc_read_entry_source (bsc#1056131). - CVE-2017-13731: Fixed an illegal address access in the function postprocess_termcap (bsc#1056129). - CVE-2017-13732: Fixed an illegal address access in the function dump_uses (bsc#1056128). - CVE-2017-13733: Fixed an illegal address access in the fmt_entry function (bsc#1056127). - CVE-2017-13734: Fixed an illegal address access in the _nc_safe_strcat (bsc#1056126). - CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830). - CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037) ----------------------------------------- Patch: SUSE-2019-3082 Released: Wed Nov 27 13:20:20 2019 Summary: Security update for bsdtar Severity: moderate References: 1005070,1059139,985601,985706,CVE-2015-8915,CVE-2015-8925,CVE-2016-8687,CVE-2017-14503 Description: This update for bsdtar fixes the following issues: - CVE-2015-8915: Fixed an invalid read which could have allowed remote attackers to cause a denial of service (bsc#985601). - CVE-2015-8925: Fixed an invalid read which could have allowed remote attackers to cause a denial of service (bsc#985706). - CVE-2017-14503: Fixed an out of bounds read within lha_read_data_none() in archive_read_support_format_lha.c (bsc#1059139). - CVE-2016-8687: Fixed a buffer overflow when printing a filename (bsc#1005070). ----------------------------------------- Patch: SUSE-2019-3187 Released: Thu Dec 5 11:44:36 2019 Summary: Security update for permissions Severity: moderate References: 1150734,1157198,CVE-2019-3690 Description: This update for permissions fixes the following issues: - CVE-2019-3690: Fixed a privilege escalation through untrusted symlinks (bsc#1150734). ----------------------------------------- Patch: SUSE-2019-3265 Released: Wed Dec 11 11:17:03 2019 Summary: Security update for ncurses Severity: important References: 1115929,1121450,CVE-2018-19211 Description: This update for ncurses fixes the following issues: Security issue fixed: - CVE-2018-19211: Fixed NULL pointer dereference at function _nc_parse_entry in parse_entry.c (bsc#1115929). Bug fixes: - Modify bsc#1115929 patch to fix change in form_driver() that breaks ncurses-5.9 and the variable move_after_insert of ncurses-6.1 (bsc#1121450). ----------------------------------------- Patch: SUSE-2019-3287 Released: Thu Dec 12 15:50:58 2019 Summary: Security update for openssl Severity: important References: 1153785,CVE-2019-1563 Description: This update for openssl fixes the following issues: - Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785). ----------------------------------------- Patch: SUSE-2019-1408 Released: Mon Dec 23 16:54:38 2019 Summary: Recommended update for xfsprogs Severity: moderate References: 1115083,1134102 Description: This update for xfsprogs fixes the following issues: - xfs_db: fix crash when field list selector string has trailing slash (bsc#1115083) - xfs_fsr: file reads should be O_DIRECT (bsc#1134102) ----------------------------------------- Patch: SUSE-2019-3398 Released: Mon Dec 30 17:45:22 2019 Summary: Recommended update for mutt Severity: moderate References: 1115561 Description: This update for mutt fixes the following issues: - Enable configure option '--enable-smtp' for smtp support. (bsc#1115561) ----------------------------------------- Patch: SUSE-2020-269 Released: Thu Jan 30 15:47:36 2020 Summary: Security update for Mesa Severity: moderate References: 1156015,985650,CVE-2019-5068 Description: This update for Mesa fixes the following issues: Security issue fixed: - CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015). Bug fixes: - Initialize AMD RSxxx chipsets correctly, fixing corruption of the graphical login screen (bsc#985650). ----------------------------------------- Patch: SUSE-2020-350 Released: Thu Feb 6 14:51:38 2020 Summary: Recommended update for openssl-certs Severity: moderate References: 1144169,1160160 Description: This update for openssl-certs fixes the following issues: openssl-certs was updated to the 2.40 state of the Mozilla NSS Certificate store (bsc#1160160): Removed certificates: - Certplus Class 2 Primary CA - Deutsche Telekom Root CA 2 - CN=Swisscom Root CA 2 - UTN-USERFirst-Client Authentication and Email - Certinomis - Root CA Added certificates: - Entrust Root Certification Authority - G4 - emSign ECC Root CA - C3 (email and server auth) - emSign ECC Root CA - G3 (email and server auth) - emSign Root CA - C1 (email and server auth) - emSign Root CA - G1 (email and server auth) - Hongkong Post Root CA 3 (server auth) ----------------------------------------- Patch: SUSE-2020-504 Released: Thu Feb 27 10:36:16 2020 Summary: Security update for libexif Severity: moderate References: 1120943,1160770,CVE-2018-20030,CVE-2019-9278 Description: This update for libexif fixes the following issues: - CVE-2019-9278: Fixed an integer overflow (bsc#1160770). - CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943). ----------------------------------------- Patch: SUSE-2020-515 Released: Thu Feb 27 14:37:25 2020 Summary: Security update for openssl Severity: moderate References: 1117951,1160163 Description: This update for openssl fixes the following issues: - Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951) - Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163) ----------------------------------------- Patch: SUSE-2020-546 Released: Fri Feb 28 15:54:16 2020 Summary: Recommended update for permissions Severity: moderate References: 1160594,1160764,1163922,CVE-2020-8013 Description: This update for permissions fixes the following issues: Security issues fixed: - CVE-2020-8013: Fixed a missing symlink check. Do not follow symlinks that are the final path element (bsc#1163922). - Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594). ----------------------------------------- Patch: SUSE-2020-577 Released: Tue Mar 3 15:23:42 2020 Summary: Security update for python Severity: moderate References: 1162367,CVE-2020-8492 Description: This update for python fixes the following security issue: - CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367). ----------------------------------------- Patch: SUSE-2020-656 Released: Thu Mar 12 14:46:22 2020 Summary: Recommended update for libzypp Severity: moderate References: 1099982,1163408,556664,939392 Description: This update for libzypp fixes the following issues: - Service refresh must not attempt to modify plugin services en-/disable repos with respect to previous state and user modifications. (bsc#1163408) - Fix conversion of string and glob to regex when compiling queries. (bsc#1099982, bsc#939392, bsc#556664) ----------------------------------------- Patch: SUSE-2020-939 Released: Tue Apr 7 09:59:24 2020 Summary: Security update for libqt4 Severity: moderate References: 1118595,1118596,1118599,CVE-2018-15518,CVE-2018-19869,CVE-2018-19873 Description: This update for libqt4 fixes the following issues: - CVE-2018-15518: Fixed a double free in QXmlStreamReader (bsc#1118595) - CVE-2018-19873: Fixed a segmantation fault via a malformed BMP file (bsc#1118596). - CVE-2018-19869: Fixed an improper checking which might lead to a crach via a malformed url reference (bsc#1118599). ----------------------------------------- Patch: SUSE-2020-1044 Released: Thu Apr 23 11:31:10 2020 Summary: Security update for cups Severity: important References: 1168422,CVE-2020-3898 Description: This update for cups fixes the following issues: - CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422). ----------------------------------------- Patch: SUSE-2020-1154 Released: Wed Apr 29 22:55:38 2020 Summary: Security update for openldap2 Severity: important References: 1143194,1143273,CVE-2019-13057,CVE-2019-13565 Description: This update for openldap2 fixes the following issues: - CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194). - CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273). ----------------------------------------- Patch: SUSE-2020-1191 Released: Tue May 5 14:08:41 2020 Summary: Security update for puppet Severity: moderate References: 1167645,935899,CVE-2020-7942 Description: This update for puppet fixes the following issues: Security issue fixed: - CVE-2020-7942: Added a warning for a vulnerable configuration option, which could allow for information disclosure in certain setups. Disabling it my break some setups. (bsc#1167645) Non-security issue fixed: - Fixed deletion of puppet master file /etc/puppet/manifests/site.pp during updates (bsc#935899). ----------------------------------------- Patch: SUSE-2020-1215 Released: Thu May 7 12:09:10 2020 Summary: Security update for openldap2 Severity: important References: 1170771,CVE-2020-12243 Description: This update for openldap2 fixes the following issues: - CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771). ----------------------------------------- Patch: SUSE-2020-1256 Released: Tue May 12 17:34:48 2020 Summary: Recommended update for timezone Severity: moderate References: 1169582 Description: This update for timezone fixes the following issues: - timezone update 2020a (bsc#1169582) * Morocco springs forward on 2020-05-31, not 2020-05-24. * Canada's Yukon advanced to -07 year-round on 2020-03-08. * America/Nuuk renamed from America/Godthab. * zic now supports expiration dates for leap second lists. ----------------------------------------- Patch: SUSE-2020-1278 Released: Thu May 14 14:00:26 2020 Summary: Security update for syslog-ng Severity: moderate References: 1169385,CVE-2020-8019 Description: This update for syslog-ng fixes the following issues: - CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385). ----------------------------------------- Patch: SUSE-2020-1283 Released: Thu May 14 15:57:44 2020 Summary: Recommended update for sudo Severity: important References: 1015162,1015351 Description: This update for sudo fixes the following issues: - Check if the monitor process became an orphan when receiving SIGHUP. (bsc#1015162) Terminate the child in that case. - sudo is not able to resolve sudo for users when using LDAP. (bsc#1015351) SSSD doesn't handle netgroups, we have to ensure they are correctly filtered in sudo. The rules may contain mixed sudoUser specification so we have to check not only for netgroup membership but also for user and group matches. ----------------------------------------- Patch: SUSE-2020-1307 Released: Mon May 18 09:55:59 2020 Summary: Recommended update for pam-config Severity: moderate References: 1114835 Description: This update for pam-config fixes the following issue: - Provide the missing 'reject_username' option for PAM passwords. (bsc#1114835) This option will check whether the name of the user in straight or reversed form is contained in the new password. If it is found the new password is rejected. ----------------------------------------- Patch: SUSE-2020-1499 Released: Thu May 28 16:49:13 2020 Summary: Security update for python Severity: moderate References: 1155094,1162825,CVE-2019-18348,CVE-2019-9674 Description: This update for python fixes the following issues: Security issues fixed: - CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094). - CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825). ----------------------------------------- Patch: SUSE-2020-1500 Released: Thu May 28 16:49:25 2020 Summary: Security update for facter Severity: moderate References: 917383,CVE-2015-1426 Description: This update for facter fixes the following issues: - CVE-2015-1426: Prevent the EC2 metadata fact from collecting security credentials (bsc#917383). ----------------------------------------- Patch: SUSE-2020-1522 Released: Wed Jun 3 08:34:32 2020 Summary: Security update for w3m Severity: moderate References: 1077559,1077568,1077572,CVE-2018-6196,CVE-2018-6197,CVE-2018-6198 Description: This update for w3m fixes several issues. These security issues were fixed: - CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559) - CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568) - CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572) ----------------------------------------- Patch: SUSE-2020-1537 Released: Thu Jun 4 12:58:38 2020 Summary: Security update for vim Severity: moderate References: 1172225,CVE-2019-20807 Description: This update for vim fixes the following issues: - CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim was possible using interfaces (bsc#1172225). ----------------------------------------- Patch: SUSE-2020-1617 Released: Fri Jun 12 10:52:10 2020 Summary: Recommended update for puppet Severity: moderate References: 1171711 Description: This update for puppet fixes the following issues: - Add tags to the config files so that user defined configuration files are not overwritten during package updates. (bsc#1171711) ----------------------------------------- Patch: SUSE-2020-1697 Released: Fri Jun 19 16:11:06 2020 Summary: Security update for bind Severity: important References: 1033843,1092283,1109160,1171740,1172220,1172680,CVE-2018-5741,CVE-2020-8616,CVE-2020-8617 Description: This update for bind fixes the following issues: - CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740). - CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740). - CVE-2018-5741: Fixed the documentation (bsc#1109160). - Removed rndc.key generation from bind.spec file (bsc#1092283, bsc#1033843) bind should create the key on first boot or if it went missing. ----------------------------------------- Patch: SUSE-2020-1736 Released: Wed Jun 24 09:45:02 2020 Summary: Security update for curl Severity: important References: 1173027,CVE-2020-8177 Description: This update for curl fixes the following issues: - CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027). ----------------------------------------- Patch: SUSE-2020-1739 Released: Wed Jun 24 10:24:06 2020 Summary: Recommended update for openssl-certs Severity: moderate References: 1172808 Description: This update for openssl-certs fixes the following issues: - Removed the expired addtrust ca, also one dutch CA. This avoids issues with sites still having AddTrust in their returned CA stack to cause certificate validation troubles with openssl. (bsc#1172808) ----------------------------------------- Patch: SUSE-2020-1744 Released: Thu Jun 25 08:51:48 2020 Summary: Security update for jpeg Severity: moderate References: 1172491,1172995,CVE-2020-13790,CVE-2020-14152 Description: This update for jpeg fixes the following issues: - CVE-2020-14152: Fixed an improper implementation which vould have potentially exhausted the memory (bsc#1172995). - CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491). ----------------------------------------- Patch: SUSE-2020-1746 Released: Thu Jun 25 14:46:14 2020 Summary: Recommended update for curl Severity: low References: Description: This update for curl rebuilds curl, especially ia64 was not working. ----------------------------------------- Patch: SUSE-2020-1799 Released: Tue Jun 30 11:29:54 2020 Summary: Security update for mutt Severity: important References: 1172906,1172935,1173197,CVE-2020-14093,CVE-2020-14154,CVE-2020-14954 Description: This update for mutt fixes the following issues: - CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was affecting IMAP, SMTP, and POP3 (bsc#1173197). - CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935). - CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935). ----------------------------------------- Patch: SUSE-2020-1817 Released: Wed Jul 1 16:18:35 2020 Summary: Security update for ntp Severity: moderate References: 1169740,1171355,1172651,1173334,CVE-2018-8956,CVE-2020-11868,CVE-2020-13817,CVE-2020-15025 Description: This update for ntp fixes the following issues: ntp was updated to 4.2.8p15 - CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address frequently send to the client ntpd could have caused denial of service (bsc#1169740). - CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed mode 3 and mode 5 packets (bsc#1171355). - CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651). - CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334). ----------------------------------------- Patch: SUSE-2020-1854 Released: Mon Jul 6 17:04:22 2020 Summary: Security update for openldap2 Severity: important References: 1172698,CVE-2020-8023 Description: This update for openldap2 fixes the following issues: - CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698). ----------------------------------------- Patch: SUSE-2020-2010 Released: Wed Jul 22 17:28:09 2020 Summary: Security update for libxml2 Severity: moderate References: 1159928,1161517,1161521,CVE-2019-19956,CVE-2019-20388,CVE-2020-7595 Description: This update for libxml2 fixes the following issues: - CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521). - CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517). - CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928). ----------------------------------------- Patch: SUSE-2020-2031 Released: Thu Jul 23 14:38:59 2020 Summary: Security update for samba Severity: moderate References: 1173160,CVE-2020-10745 Description: This update for samba fixes the following issues: - CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets containing dots could potentially have consumed excessive CPU (bsc#1173160). ----------------------------------------- Patch: SUSE-2020-2129 Released: Wed Aug 5 10:39:03 2020 Summary: Security update for xorg-x11-libX11 Severity: important References: 1174628,CVE-2020-14344 Description: This update for xorg-x11-libX11 fixes the following issues: - Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628) ----------------------------------------- Patch: SUSE-2020-2195 Released: Tue Aug 11 13:29:31 2020 Summary: Security update for xorg-x11-libX11 Severity: important References: 1174628,CVE-2020-14344 Description: This update for xorg-x11-libX11 fixes the following issues: - Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628). ----------------------------------------- Version 0.0.6-Build1.389 2020-08-26T07:55:04 ----------------------------------------- Patch: SUSE-2020-2324 Released: Tue Aug 25 19:03:42 2020 Summary: Security update for xorg-x11-server Severity: important References: 1174633,1174635,CVE-2020-14345,CVE-2020-14347 Description: This update for xorg-x11-server fixes the following issues: - CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426). - CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428). ----------------------------------------- Version 0.0.6-Build1.390 2020-08-27T07:55:01 ----------------------------------------- Patch: SUSE-2020-2336 Released: Wed Aug 26 11:51:33 2020 Summary: Recommended update for kdump Severity: moderate References: 1108170,1108823,1133407 Description: This update for kdump fixes the following issues: - Add udev event support for *fadump*. (bsc#1108170, bsc#1108823) - Add required dependencies for *fadump* udev support. - Re-register *FADUMP* from userspace if the kernel cannot do it. (bsc#1108823) - Do not reload on CPU hot removal. (bsc#1133407) ----------------------------------------- Patch: SUSE-2020-2345 Released: Wed Aug 26 17:02:20 2020 Summary: Security update for avahi Severity: moderate References: 1085255 Description: This update for avahi fixes the following issues: - increase data and stack limits to fix remote denial of service (bsc#1085255). ----------------------------------------- Version 0.0.6-Build1.391 2020-08-28T07:55:17 ----------------------------------------- Patch: SUSE-2020-2356 Released: Thu Aug 27 18:26:35 2020 Summary: Security update for python Severity: moderate References: 1174091,CVE-2019-20907 Description: This update for python fixes the following issues: - CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091). ----------------------------------------- Version 0.0.6-Build1.394 2020-09-01T07:55:45 ----------------------------------------- Patch: SUSE-2020-2397 Released: Tue Sep 1 08:21:41 2020 Summary: Security update for xorg-x11-server Severity: important References: 1174910,1174913,CVE-2020-14361,CVE-2020-14362 Description: This update for xorg-x11-server fixes the following issues: - CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573). - CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574). ----------------------------------------- Version 0.0.6-Build1.395 2020-09-03T07:54:19 ----------------------------------------- Patch: SUSE-2020-2454 Released: Wed Sep 2 14:00:06 2020 Summary: Security update for curl Severity: moderate References: 1175109,CVE-2020-8231 Description: This update for curl fixes the following issues: - An application that performs multiple requests with libcurl's multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in rare circumstances experience that when subsequently using the setup connect-only transfer, libcurl will pick and use the wrong connection and instead pick another one the application has created since then. [bsc#1175109, CVE-2020-8231] ----------------------------------------- Version 0.0.6-Build1.396 2020-09-04T07:54:17 ----------------------------------------- Patch: SUSE-2020-2483 Released: Thu Sep 3 17:06:38 2020 Summary: Recommended update for openssl-certs Severity: moderate References: 1174673 Description: This update for openssl-certs fixes the following issues: - update to 2.42 state of the Mozilla NSS Certificate store (bsc#1174673) Removed CAs: - LuxTrust Global Root 2 - Staat der Nederlanden Root CA - G2 - Symantec Class 1 Public Primary Certification Authority - G4 - Symantec Class 2 Public Primary Certification Authority - G4 - VeriSign Class 3 Public Primary Certification Authority - G3 Added CAs: - certSIGN Root CA G2 - e-Szigno Root CA 2017 - Microsoft ECC Root Certificate Authority 2017 - Microsoft RSA Root Certificate Authority 2017 ----------------------------------------- Version 0.0.6-Build1.398 2020-09-08T07:53:43 ----------------------------------------- Patch: SUSE-2020-2564 Released: Tue Sep 8 10:18:26 2020 Summary: Security update for libxslt Severity: moderate References: 1140095,1140101,1154609,CVE-2019-11068,CVE-2019-13117,CVE-2019-13118,CVE-2019-18197 Description: This update for libxslt fixes the following issues: Security issues fixed: - CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101). - CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095). - CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609). ----------------------------------------- Version 0.0.6-Build1.399 2020-09-15T07:57:31 ----------------------------------------- Patch: SUSE-2020-2635 Released: Tue Sep 15 11:19:29 2020 Summary: Security update for openssl Severity: important References: 1176331,CVE-2020-1968 Description: This update for openssl fixes the following issues: - CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys and never reuse them across multiple TLS connections (bsc#1176331). ----------------------------------------- Version 0.0.6-Build1.401 2020-09-19T07:57:53 ----------------------------------------- Patch: SUSE-2020-2637 Released: Tue Sep 15 14:41:17 2020 Summary: Security update for xorg-x11-libX11 Severity: moderate References: 1175239,CVE-2020-14363 Description: This update for xorg-x11-libX11 fixes the following issues: - CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239). ----------------------------------------- Patch: SUSE-2020-2679 Released: Fri Sep 18 10:50:41 2020 Summary: Security update for libxml2 Severity: moderate References: 1176179,CVE-2020-24977 Description: This update for libxml2 fixes the following issues: - CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179). ----------------------------------------- Version 0.0.6-Build1.403 2020-09-23T08:17:55 ----------------------------------------- Patch: SUSE-2020-2688 Released: Mon Sep 21 10:55:11 2020 Summary: Security update for less Severity: moderate References: 921719,CVE-2014-9488 Description: This update for less fixes the following issues: Security issue fixed: - CVE-2014-9488: Malformed UTF-8 data could have caused an out of bounds read in the UTF-8 decoding routines, causing an invalid read access (bsc#921719). ----------------------------------------- Version 0.0.6-Build1.404 2020-09-24T07:55:19 ----------------------------------------- Patch: SUSE-2020-2725 Released: Wed Sep 23 15:59:16 2020 Summary: Security update for libcdio Severity: low References: 1082821,CVE-2017-18199 Description: This update for libcdio and libcdio-mini fixes the following issues: Security issue fixed: - CVE-2017-18199: Fixed a NULL Pointer Dereference in realloc_symlink which could allow remote attackers to cause Denial of Service (bsc#1082821). ----------------------------------------- Version 0.0.6-Build1.407 2020-09-29T07:55:30 ----------------------------------------- Patch: SUSE-2020-2752 Released: Fri Sep 25 17:30:54 2020 Summary: Security update for pixman Severity: moderate References: 968090,CVE-2014-9766 Description: This update for pixman fixes the following issues: Security issue fixed: - CVE-2014-9766: Fixed an integer overflow in create_bits() (bsc#968090). ----------------------------------------- Patch: SUSE-2020-2762 Released: Mon Sep 28 09:25:01 2020 Summary: Security update for libnl Severity: moderate References: 1020123,CVE-2017-0386 Description: This update for libnl fixes the following issues: Security issue fixed: - CVE-2017-0386: Fixed a privilege escalation vulnerability which allowed a local user to execute code within a privileged process (bsc#1020123). ----------------------------------------- Version 0.0.6-Build1.410 2020-10-15T07:59:02 ----------------------------------------- Patch: SUSE-2020-2922 Released: Wed Oct 14 14:30:51 2020 Summary: Security update for libpng12-0 Severity: moderate References: 1141493,CVE-2017-12652 Description: This update for libpng12-0 fixes the following issues: Security issue fixed: - CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493). ----------------------------------------- Patch: SUSE-2020-2925 Released: Wed Oct 14 14:31:52 2020 Summary: Security update for libsoup Severity: moderate References: 1100097,CVE-2018-12910 Description: This update for libsoup fixes the following issues: Security issue fixed: - CVE-2018-12910: Fixed a denial of service which was caused handling empty hostnames in get_cookies() (bsc#1100097). ----------------------------------------- Version 0.0.6-Build1.413 2020-10-29T07:59:05 ----------------------------------------- Patch: SUSE-2020-3044 Released: Tue Oct 27 14:34:08 2020 Summary: Security update for libmspack Severity: low References: 1141680,CVE-2019-1010305 Description: This update for libmspack fixes the following issues: Security issue fixed: - CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file which could have led to information disclosure (bsc#1141680). ----------------------------------------- Version 0.0.6-Build1.414 2020-10-31T08:00:06 ----------------------------------------- Patch: SUSE-2020-3111 Released: Fri Oct 30 13:50:55 2020 Summary: Security update for samba Severity: important References: 1173902,1173994,CVE-2020-14318,CVE-2020-14323 Description: This update for samba fixes the following issues: - CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994). - CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902). ----------------------------------------- Version 0.0.6-Build1.417 2020-11-06T08:01:01 ----------------------------------------- Patch: SUSE-2020-3124 Released: Tue Nov 3 10:13:03 2020 Summary: Security update for SDL Severity: moderate References: 1141844,CVE-2019-13616 Description: This update for SDL fixes the following issues: Secuirty issue fixed: - CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844). ----------------------------------------- Patch: SUSE-2020-3144 Released: Tue Nov 3 17:40:09 2020 Summary: Recommended update for openssl-certs Severity: moderate References: 1177864 Description: This update for openssl-certs fixes the following issues: The SSL Root CA store is updated to the 2.44 state of the Mozilla NSS Certificate store (bsc#1177864) - Removed CAs: - EE Certification Centre Root CA - Taiwan GRCA - Added CAs: - Trustwave Global Certification Authority - Trustwave Global ECC P256 Certification Authority - Trustwave Global ECC P384 Certification Authority ----------------------------------------- Patch: SUSE-2020-3154 Released: Wed Nov 4 11:07:44 2020 Summary: Security update for opensc Severity: low References: 1122756,CVE-2019-6502 Description: This update for opensc fixes the following issues: Security issue fixed: - CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756). ----------------------------------------- Version 0.0.6-Build1.419 2020-11-14T08:01:57 ----------------------------------------- Patch: SUSE-2020-3293 Released: Wed Nov 11 12:28:11 2020 Summary: Security update for openldap2 Severity: important References: 1178387,CVE-2020-25692 Description: This update for openldap2 fixes the following issues: - CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387). ----------------------------------------- Version 0.0.6-Build1.421 2020-11-18T08:00:50 ----------------------------------------- Patch: SUSE-2020-3362 Released: Tue Nov 17 14:59:08 2020 Summary: Security update for tcpdump Severity: moderate References: 1178466,CVE-2020-8037 Description: This update for tcpdump fixes the following issues: - CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466). ----------------------------------------- Version 0.0.6-Build1.423 2020-11-27T07:58:43 ----------------------------------------- Patch: SUSE-2020-3531 Released: Thu Nov 26 12:48:41 2020 Summary: Security update for python Severity: important References: 1177211,CVE-2020-26116 Description: This update for python fixes the following issues: - bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter of HTTPConnection.putrequest in httplib, stopping injection of headers. ----------------------------------------- Version 0.0.6-Build1.425 2020-12-02T07:57:54 ----------------------------------------- Patch: SUSE-2020-3567 Released: Mon Nov 30 16:57:33 2020 Summary: Security update for mutt Severity: important References: 1179035,1179113,CVE-2020-28896 Description: This update for mutt fixes the following issues: - CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035) - Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113) ----------------------------------------- Patch: SUSE-2020-3584 Released: Tue Dec 1 16:29:18 2020 Summary: Security update for xorg-x11-server Severity: important References: 1174908,1177596,CVE-2020-14360,CVE-2020-25712 Description: This update for xorg-x11-server fixes the following issues: - CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596). - CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908). ----------------------------------------- Version 0.0.6-Build1.427 2020-12-09T07:41:14 ----------------------------------------- Patch: SUSE-2020-3712 Released: Tue Dec 8 16:40:42 2020 Summary: Recommended update for wodim Severity: moderate References: 1178692 Description: This update for wodim fixes the following issues: - Initialize memory that created the partition table instead of writing random bytes to it. (bsc#1178692) ----------------------------------------- Version 0.0.6-Build1.429 2020-12-16T07:40:20 ----------------------------------------- Patch: SUSE-2020-3806 Released: Tue Dec 15 13:43:01 2020 Summary: Recommended update for bash Severity: moderate References: 1178857 Description: This update for bash fixes the following issue: - release number of bash package is now higher than the SLES 11 SP1, SP2 and SP3 bash packages. ----------------------------------------- Version 0.0.6-Build1.430 2020-12-17T07:41:10 ----------------------------------------- Patch: SUSE-2020-3848 Released: Wed Dec 16 10:43:37 2020 Summary: Security update for libqt4 Severity: moderate References: 1176315,CVE-2020-17507 Description: This update for libqt4 fixes the following issues: - CVE-2020-17507: Fixed buffer over-read in read_xbm_body (bsc#1176315) ----------------------------------------- Version 0.0.6-Build1.431 2020-12-18T07:39:52 ----------------------------------------- Patch: SUSE-2020-3871 Released: Thu Dec 17 18:22:36 2020 Summary: Security update for cyrus-sasl Severity: important References: 1159635,CVE-2019-19906 Description: This update for cyrus-sasl fixes the following issues: - CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635). ----------------------------------------- Version 0.0.6-Build1.433 2020-12-22T07:41:40 ----------------------------------------- Patch: SUSE-2020-3893 Released: Mon Dec 21 10:57:24 2020 Summary: Security update for curl Severity: moderate References: 1179398,1179399,CVE-2020-8284,CVE-2020-8285 Description: This update for curl fixes the following issues: - CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398). - CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399). ----------------------------------------- Version 0.0.6-Build1.434 2020-12-22T14:55:46 ----------------------------------------- Patch: SUSE-2020-3910 Released: Tue Dec 22 10:56:49 2020 Summary: Recommended update for mutt Severity: low References: 1179461 Description: This update for mutt fixes the following issues: - Add a further correction in plaintext for external bodies as well. (bsc#1179461) ----------------------------------------- Version 0.0.6-Build1.439 2021-01-15T11:43:25 ----------------------------------------- Patch: SUSE-2021-132 Released: Thu Jan 14 13:43:48 2021 Summary: Security update for openldap2 Severity: moderate References: 1178909,CVE-2020-25709,CVE-2020-25710 Description: This update for openldap2 fixes the following issues: - CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909). - CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909). ----------------------------------------- Version 0.0.6-Build1.440 2021-01-16T07:40:32 ----------------------------------------- Patch: SUSE-2021-150 Released: Fri Jan 15 17:00:34 2021 Summary: Recommended update for java-1_6_0-ibm Severity: low References: 1057460 Description: This update for java-1_6_0-ibm provides the following fix: - Make it possible to run Java jnlp files from Firefox. (bsc#1057460) ----------------------------------------- Version 0.0.6-Build1.442 2021-01-23T09:27:52 ----------------------------------------- Patch: SUSE-2021-193 Released: Fri Jan 22 10:37:59 2021 Summary: Security update for mutt Severity: moderate References: 1181221,CVE-2021-3181 Description: This update for mutt fixes the following issue: - CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221). ----------------------------------------- Version 0.0.6-Build1.445 2021-02-03T07:40:18 ----------------------------------------- Patch: SUSE-2021-287 Released: Tue Feb 2 13:09:38 2021 Summary: Security update for cups Severity: moderate References: 1180520,CVE-2020-10001 Description: This update for cups fixes the following issues: - CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).