----------------------------------------- Version 0.0.4-Build1.837 2020-08-22T07:55:56 ----------------------------------------- Patch: SUSE-2014-70 Released: Tue Oct 28 19:16:10 2014 Summary: update for rsyslog Severity: moderate References: 890228,899756,CVE-2014-3634,CVE-2014-3683 Description: This update for rsyslog provides the following fixes: - Fixed remote PRI DoS vulnerability patch (CVE-2014-3683, bnc#899756) - Removed broken, unsupported and dropped by upstream zpipe utility from rsyslog-diag-tools package (bnc#890228) ----------------------------------------- Patch: SUSE-2014-75 Released: Tue Nov 4 16:25:40 2014 Summary: Recommended update for wicked Severity: important References: 887910,893665,900112,900401 Description: This update for wicked fixes the following issues: - ethernet: Do not fail when ETHTOOL_GSET/SSET fails. (bsc#900401, bsc#900112) - dbus: Omit ethernet speed, duplex, autoneg properties if not supported by the driver. - ethtool: Independent ioctl requests are handled separately: if one fails it should not stop the following ones. - wireless: Request association even if link was up; linkup indicates association, rather than explicit linkAssociate event. (bsc#893665) - bonding: Ignore redundant slaves in configs with a warning. - fsm: Generate default config for children in existing relation. - compat: Prefer /etc/hostname over /etc/HOSTNAME and warn about missed global configs. (bsc#887910) ----------------------------------------- Patch: SUSE-2014-79 Released: Tue Nov 4 16:28:02 2014 Summary: Recommended update for yast2-proxy Severity: moderate References: 853725,871945 Description: This update for yast2-proxy fixes an issue that made 'Test Proxy Settings' always report failure. (bnc#853725, bnc#871945) ----------------------------------------- Patch: SUSE-2014-85 Released: Tue Nov 4 16:29:29 2014 Summary: Recommended update for dirmngr Severity: moderate References: 901845 Description: This update for dirmngr fixes a segmentation fault at start up. (bnc#901845) ----------------------------------------- Patch: SUSE-2014-86 Released: Tue Nov 4 16:42:58 2014 Summary: Recommended update for release-notes-sles Severity: low References: 888469,900083,900771,902380 Description: This update provides the latest revision of the release notes for SUSE Linux Enterprise Server 12: - Fix URLs to documentation (bsc#902868) - Add life cycle of SUSE Linux Enterprise modules. - Fixed typo in section 5.3.6.7 suseRegister replaced by SUSEConnect (bsc#900771, fate#316585) - Cosmetic changes in section 3.2.1 (bsc#888469, fate#317042) - Added a new entry about Support for Intel PSM API (fate#315889) ----------------------------------------- Patch: SUSE-2014-74 Released: Tue Nov 4 16:49:16 2014 Summary: Recommended update for yast2-users Severity: low References: 901419 Description: This update for yast2-users fixes a crash when trying to start the authentication client module and yast2-auth-client is not installed on the system. (bnc#901419) ----------------------------------------- Patch: SUSE-2014-71 Released: Tue Nov 4 16:58:36 2014 Summary: Recommended update for aws-cli Severity: moderate References: 902598,902648 Description: This collective update for the SUSE Linux Enterprise 12 Public Cloud module provides the following enhancements: - Amazon Web Services Command Line Interface (aws-cli) has been updated to version 1.5.3. - Amazon Web Services Library (python-boto) has been updated to version 2.34.0. - Python interface for AWS (python-botocore) has been updated to version 0.67.0. - Python's jmespath module has been updated to version 0.4.1. - The latest Amazon Cloud region (eu-central-1) is now supported through the command line interface. For a comprehensive list of fixes and enhancements, refer to the package's change log. ----------------------------------------- Patch: SUSE-2014-76 Released: Wed Nov 5 16:41:10 2014 Summary: Security update for wget Severity: moderate References: 902709,CVE-2014-4877 Description: wget was updated to fix one security issue. This security issue was fixed: - FTP symlink arbitrary filesystem access (CVE-2014-4877). ----------------------------------------- Patch: SUSE-2014-66 Released: Thu Nov 6 06:23:15 2014 Summary: Recommended update for gcc48 Severity: moderate References: 899871 Description: This update for gcc48 fixes a performance degradation issue caused by generation of unneeded code whe using option -pg. ----------------------------------------- Patch: SUSE-2014-109 Released: Thu Nov 13 17:10:48 2014 Summary: Security update for gnutls Severity: moderate References: 904603,CVE-2014-8564 Description: gnutls was updated to fix one security issue. - Fixed parsing problem in elliptic curve blobs over TLS that could lead to remote crashes (CVE-2014-8564). ----------------------------------------- Patch: SUSE-2014-87 Released: Fri Nov 14 18:57:12 2014 Summary: Recommended update for rpcbind Severity: low References: 905042 Description: This update for rpcbind disables debug code which could fill up the system log files. ----------------------------------------- Patch: SUSE-2014-97 Released: Fri Nov 28 10:20:32 2014 Summary: Security update for file Severity: moderate References: 888308,902367,CVE-2014-3710 Description: file was updated to fix one security issue. This security issue was fixed: - Out-of-bounds read in elf note headers (CVE-2014-3710). This non-security issues was fixed: - Correctly identify GDBM files created by libgdbm4 (bnc#888308). ----------------------------------------- Patch: SUSE-2014-123 Released: Mon Dec 1 18:03:36 2014 Summary: Recommended update for libXi Severity: moderate References: 883553 Description: This update for libXi fixes a double unlock issue when connecting to an X server with XInputExtension version lower than 2.0. This could result, for example, in a segmentation fault when starting YaST over an ssh connection from SUSE Linux Enterprise 11. ----------------------------------------- Patch: SUSE-2014-115 Released: Mon Dec 1 18:06:24 2014 Summary: Security update for flac Severity: moderate References: 906831,907016,CVE-2014-8962,CVE-2014-9028 Description: flac was updated to fix two security issues. These security issues were fixed: - Stack overflow may result in arbitrary code execution (CVE-2014-8962). - Heap overflow via specially crafted .flac files (CVE-2014-9028). ----------------------------------------- Patch: SUSE-2014-104 Released: Mon Dec 1 18:10:56 2014 Summary: Recommended update for apparmor Severity: moderate References: 898438 Description: The AppArmor profiles were adjusted to allow running ntpd. ----------------------------------------- Patch: SUSE-2014-84 Released: Mon Dec 1 19:54:01 2014 Summary: Security update for openssl Severity: moderate References: 901223,901277,CVE-2014-3513,CVE-2014-3566,CVE-2014-3567,CVE-2014-3568 Description: openssl was updated to fix four security issues. These security issues were fixed: - SRTP Memory Leak (CVE-2014-3513). - Session Ticket Memory Leak (CVE-2014-3567). - Fixed incomplete no-ssl3 build option (CVE-2014-3568). - Add support for TLS_FALLBACK_SCSV (CVE-2014-3566). NOTE: This update alone DOESN'T FIX the POODLE SSL protocol vulnerability. OpenSSL only adds downgrade detection support for client applications. See https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations. ----------------------------------------- Patch: SUSE-2014-82 Released: Tue Dec 2 11:12:56 2014 Summary: Security update for python, python-base, python-doc Severity: moderate References: 898572,CVE-2014-7185 Description: python, python-base, python-doc was updated to fix one security issue. This security issue was fixed: - Fixed potential buffer overflow in buffer() (CVE-2014-7185). ----------------------------------------- Patch: SUSE-2015-35 Released: Tue Dec 2 15:56:40 2014 Summary: Recommended update for samba Severity: moderate References: 896536,899558 Description: This update for Samba provides the following fixes: - Backport upstream master fixes for samba-regedit. (bsc#896536) - Fix small memory-leak in the background print process. (bsc#899558) ----------------------------------------- Patch: SUSE-2014-113 Released: Tue Dec 2 18:17:57 2014 Summary: Security update for cpio Severity: moderate References: 658010,907456,CVE-2014-9112 Description: This cpio security update fixes the following buffer overflow issue and two non security issues: - fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112) - prevent cpio from extracting over a symlink (bnc#658010) - fix a truncation check in mt ----------------------------------------- Patch: SUSE-2015-4 Released: Wed Dec 3 15:57:25 2014 Summary: Security update for libyaml Severity: moderate References: 907809,CVE-2014-9130 Description: This libyaml update fixes the following security issue: - bnc#907809: assert failure when processing wrapped strings (CVE-2014-9130) ----------------------------------------- Patch: SUSE-2015-11 Released: Thu Dec 4 14:49:04 2014 Summary: Recommended update for SUSEConnect Severity: moderate References: 900689 Description: This update fixes SUSEConnect to always write the configuration file when --url parameter used. ----------------------------------------- Patch: SUSE-2015-15 Released: Thu Dec 4 15:24:10 2014 Summary: Security update for libjpeg-turbo, libjpeg62-turbo Severity: moderate References: 906761,CVE-2014-9092 Description: libjpeg-turbo, libjpeg62-turbo were updated to fix one security issue. This security issue was fixed: - Passing special crafted jpeg file smashes stack (CVE-2014-9092). ----------------------------------------- Patch: SUSE-2014-117 Released: Thu Dec 4 17:12:48 2014 Summary: Recommended update for ntp Severity: moderate References: 898596 Description: This update for ntp re-enables usage of the legacy MD5 algorithm in FIPS mode. ----------------------------------------- Patch: SUSE-2015-3 Released: Fri Dec 5 15:49:30 2014 Summary: Security update for mutt Severity: important References: 899712,907453,CVE-2014-9116 Description: mutt was updated to fix one security issue. This security issue was fixed: - Heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116). This non-security issue was fixed: - Handle text/html by default (bnc#899712) ----------------------------------------- Patch: SUSE-2014-103 Released: Sat Dec 6 16:30:45 2014 Summary: Recommended update for bind Severity: moderate References: 906079 Description: This update provides fixes for BIND for systems running with FIPS mode enabled: - Do not consider a failure to load the GOST OpenSSL engine a fatal error. ----------------------------------------- Patch: SUSE-2014-81 Released: Sat Dec 6 17:14:40 2014 Summary: Security update for MozillaFirefox and mozilla-nss Severity: important References: 897890,900941,908009,CVE-2014-1568,CVE-2014-1574,CVE-2014-1575,CVE-2014-1576,CVE-2014-1577,CVE-2014-1578,CVE-2014-1581,CVE-2014-1583,CVE-2014-1585,CVE-2014-1586,CVE-2014-1587,CVE-2014-1588,CVE-2014-1590,CVE-2014-1592,CVE-2014-1593,CVE-2014-1594,CVE-2014-1595 Description: Mozilla Firefox was updated to 31.3.0 ESR (bnc#900941) (bnc#908009). Security issues fixed: MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from Rapid7 reported that passing a JavaScript object to XMLHttpRequest that mimics an input stream will a crash. This crash is not exploitable and can only be used for denial of service attacks. MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever reported a use-after-free created by triggering the creation of a second root element while parsing HTML written to a document created with document.open(). This leads to a potentially exploitable crash. MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover a buffer overflow during the parsing of media content. This leads to a potentially exploitable crash. MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee, Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security Center (GTISC) reported a bad casting from the BasicThebesLayer to BasicContainerLayer, resulting in undefined behavior. This behavior is potentially exploitable with some compilers but no clear mechanism to trigger it through web content was identified. MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard reported an Apple issue present in OS X 10.10 (Yosemite) where log files are created by the CoreGraphics framework of OS X in the /tmp local directory. These log files contain a record of all inputs into Mozilla programs during their operation. In versions of OS X from versions 10.6 through 10.9, the CoreGraphics had this logging ability but it was turned off by default. In OS X 10.10, this logging was turned on by default for some applications that use a custom memory allocator, such as jemalloc, because of an initialization bug in the framework. This issue has been addressed in Mozilla products by explicitly turning off the framework's logging of input events. On vulnerable systems, this issue can result in private data such as usernames, passwords, and other inputed data being saved to a log file on the local system. MFSA 2014-74 / CVE-2014-1574 / CVE-2014-1575: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Bobby Holley, Christian Holler, David Bolter, Byron Campen, and Jon Coppeard reported memory safety problems and crashes that affect Firefox ESR 31.1 and Firefox 32. Carsten Book, Christian Holler, Martijn Wargers, Shih-Chiang Chien, Terrence Cole, Eric Rahm , and Jeff Walden reported memory safety problems and crashes that affect Firefox 32. MFSA 2014-75 / CVE-2014-1576: Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered a buffer overflow when making capitalization style changes during CSS parsing. This can cause a crash that is potentially exploitable. MFSA 2014-76 / CVE-2014-1577: Security researcher Holger Fuhrmannek used the used the Address Sanitizer tool to discover an out-of-bounds read issue with Web Audio when interacting with custom waveforms with invalid values. This results in a crash and could allow for the reading of random memory which may contain sensitive data, or of memory addresses that could be used in combination with another bug. MFSA 2014-77 / CVE-2014-1578: Using the Address Sanitizer tool, security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team found an out-of-bounds write when buffering WebM format video containing frames with invalid tile sizes. This can lead to a potentially exploitable crash during WebM video playback. MFSA 2014-79 / CVE-2014-1581: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with text direction. This results in a crash which can lead to arbitrary code execution. MFSA 2014-81 / CVE-2014-1585 / CVE-2014-1586: Mozilla developers Eric Shepherd and Jan-Ivar Bruaroey reported issues with privacy and video sharing using WebRTC. Once video sharing has started within a WebRTC session running within an