----------------------------------------- Version 1.0.5-SAP-BYOS-Build1.7 2020-06-16T17:34:37 ----------------------------------------- Patch: SUSE-2014-85 Released: Tue Nov 4 16:29:29 2014 Summary: Recommended update for dirmngr Severity: moderate References: 901845 Description: This update for dirmngr fixes a segmentation fault at start up. (bnc#901845) ----------------------------------------- Patch: SUSE-2014-71 Released: Tue Nov 4 16:58:36 2014 Summary: Recommended update for aws-cli Severity: moderate References: 902598,902648 Description: This collective update for the SUSE Linux Enterprise 12 Public Cloud module provides the following enhancements: - Amazon Web Services Command Line Interface (aws-cli) has been updated to version 1.5.3. - Amazon Web Services Library (python-boto) has been updated to version 2.34.0. - Python interface for AWS (python-botocore) has been updated to version 0.67.0. - Python's jmespath module has been updated to version 0.4.1. - The latest Amazon Cloud region (eu-central-1) is now supported through the command line interface. For a comprehensive list of fixes and enhancements, refer to the package's change log. ----------------------------------------- Patch: SUSE-2014-76 Released: Wed Nov 5 16:41:10 2014 Summary: Security update for wget Severity: moderate References: 902709,CVE-2014-4877 Description: wget was updated to fix one security issue. This security issue was fixed: - FTP symlink arbitrary filesystem access (CVE-2014-4877). ----------------------------------------- Patch: SUSE-2014-66 Released: Thu Nov 6 06:23:15 2014 Summary: Recommended update for gcc48 Severity: moderate References: 899871 Description: This update for gcc48 fixes a performance degradation issue caused by generation of unneeded code whe using option -pg. ----------------------------------------- Patch: SUSE-2014-95 Released: Mon Nov 24 13:25:49 2014 Summary: Security update for java-1_7_1-ibm Severity: important References: 901223,901239,904889,CVE-2014-3065,CVE-2014-3566,CVE-2014-4288,CVE-2014-6456,CVE-2014-6457,CVE-2014-6458,CVE-2014-6466,CVE-2014-6476,CVE-2014-6492,CVE-2014-6493,CVE-2014-6502,CVE-2014-6503,CVE-2014-6506,CVE-2014-6511,CVE-2014-6512,CVE-2014-6513,CVE-2014-6515,CVE-2014-6527,CVE-2014-6531,CVE-2014-6532,CVE-2014-6558 Description: java-1_7_1-ibm was updated to version 1.7.1_sr1.2 to fix 21 security issues. These security issues were fixed: - Unspecified vulnerability in Oracle Java (CVE-2014-3065). - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT (CVE-2014-6513). - Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors (CVE-2014-6456). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532 (CVE-2014-6503). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503 (CVE-2014-6532). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532 (CVE-2014-4288). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532 (CVE-2014-6493). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (CVE-2014-6492). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (CVE-2014-6458). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Internet Explorer, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (CVE-2014-6466). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (CVE-2014-6506). - Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6527 (CVE-2014-6476). - Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment (CVE-2014-6515). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D (CVE-2014-6511). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries (CVE-2014-6531). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries (CVE-2014-6512). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE (CVE-2014-6457). - Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6476 (CVE-2014-6527). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries (CVE-2014-6502). - Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security (CVE-2014-6558). ----------------------------------------- Patch: SUSE-2014-97 Released: Fri Nov 28 10:20:32 2014 Summary: Security update for file Severity: moderate References: 888308,902367,CVE-2014-3710 Description: file was updated to fix one security issue. This security issue was fixed: - Out-of-bounds read in elf note headers (CVE-2014-3710). This non-security issues was fixed: - Correctly identify GDBM files created by libgdbm4 (bnc#888308). ----------------------------------------- Patch: SUSE-2014-123 Released: Mon Dec 1 18:03:36 2014 Summary: Recommended update for libXi Severity: moderate References: 883553 Description: This update for libXi fixes a double unlock issue when connecting to an X server with XInputExtension version lower than 2.0. This could result, for example, in a segmentation fault when starting YaST over an ssh connection from SUSE Linux Enterprise 11. ----------------------------------------- Patch: SUSE-2014-83 Released: Mon Dec 1 19:46:53 2014 Summary: Security update for compat-openssl098 Severity: moderate References: 901223,901277,CVE-2014-3566,CVE-2014-3567,CVE-2014-3568 Description: compat-openssl098 was updated to fix three security issues. NOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability. OpenSSL only adds downgrade detection support for client applications. See https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations. These security issues were fixed: - Session ticket memory leak (CVE-2014-3567). - Fixed build option no-ssl3 (CVE-2014-3568). - Added support for TLS_FALLBACK_SCSV (CVE-2014-3566). ----------------------------------------- Patch: SUSE-2014-113 Released: Tue Dec 2 18:17:57 2014 Summary: Security update for cpio Severity: moderate References: 658010,907456,CVE-2014-9112 Description: This cpio security update fixes the following buffer overflow issue and two non security issues: - fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112) - prevent cpio from extracting over a symlink (bnc#658010) - fix a truncation check in mt ----------------------------------------- Patch: SUSE-2015-4 Released: Wed Dec 3 15:57:25 2014 Summary: Security update for libyaml Severity: moderate References: 907809,CVE-2014-9130 Description: This libyaml update fixes the following security issue: - bnc#907809: assert failure when processing wrapped strings (CVE-2014-9130) ----------------------------------------- Patch: SUSE-2015-15 Released: Thu Dec 4 15:24:10 2014 Summary: Security update for libjpeg-turbo, libjpeg62-turbo Severity: moderate References: 906761,CVE-2014-9092 Description: libjpeg-turbo, libjpeg62-turbo were updated to fix one security issue. This security issue was fixed: - Passing special crafted jpeg file smashes stack (CVE-2014-9092). ----------------------------------------- Patch: SUSE-2015-3 Released: Fri Dec 5 15:49:30 2014 Summary: Security update for mutt Severity: important References: 899712,907453,CVE-2014-9116 Description: mutt was updated to fix one security issue. This security issue was fixed: - Heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116). This non-security issue was fixed: - Handle text/html by default (bnc#899712) ----------------------------------------- Patch: SUSE-2014-116 Released: Sat Dec 6 16:21:37 2014 Summary: Recommended update for SUSE Manager Client Tools Severity: moderate References: 855389,896254,898428,900498,901058,901958,908152 Description: This collective update for SUSE Manager Client Tools provides the following fixes and enhancements: cobbler: - Fix port guessing in koan. (bsc#855389) - Add 'copy-default' option to grubby-compat. (bsc#855389) - Handle elilo in SUSE. (bsc#855389) - Fix wrong option 'text' in SUSE environment. (bsc#901058) osad: - Removed PyXML dependency for RHEL systems. - Fix osad through unauthenticated proxy case. - Enable and install osad during first installation. (bsc#901958) rhncfg: - Fix compare configuration files by checking permissions on the correct file. (bsc#900498) - Fix error in rhncfg if SELinux is disabled. - Validate the content of configuration files before deploying. spacewalk-backend-libs: - Fix traceback when pushing rpms with archive size greater than 4GB. - Adding handling for new rpm header information. spacewalk-client-tools: - Disable sgmlop import in rhn_check. spacewalk-koan: - Make spacewalk-koan work with newer cobbler/koan version. (bsc#908152) spacewalk-oscap: - Avoid creating profile with empty id. spacewalk-remote-utils: - Add channel definitions for RHEL 6.6. - Compose format has slightly changed for RHEL 6.6. - Add channel definitions for RHEL 5.11. suseRegisterInfo: - Re-add legacy suse_register_info to successfully perform the update. (bsc#898428) zypp-plugin-spacewalk: - Check for retrieveOnly option in up2date configuration and set download_only. (bsc#896254) ----------------------------------------- Patch: SUSE-2014-81 Released: Sat Dec 6 17:14:40 2014 Summary: Security update for MozillaFirefox and mozilla-nss Severity: important References: 897890,900941,908009,CVE-2014-1568,CVE-2014-1574,CVE-2014-1575,CVE-2014-1576,CVE-2014-1577,CVE-2014-1578,CVE-2014-1581,CVE-2014-1583,CVE-2014-1585,CVE-2014-1586,CVE-2014-1587,CVE-2014-1588,CVE-2014-1590,CVE-2014-1592,CVE-2014-1593,CVE-2014-1594,CVE-2014-1595 Description: Mozilla Firefox was updated to 31.3.0 ESR (bnc#900941) (bnc#908009). Security issues fixed: MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from Rapid7 reported that passing a JavaScript object to XMLHttpRequest that mimics an input stream will a crash. This crash is not exploitable and can only be used for denial of service attacks. MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever reported a use-after-free created by triggering the creation of a second root element while parsing HTML written to a document created with document.open(). This leads to a potentially exploitable crash. MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover a buffer overflow during the parsing of media content. This leads to a potentially exploitable crash. MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee, Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security Center (GTISC) reported a bad casting from the BasicThebesLayer to BasicContainerLayer, resulting in undefined behavior. This behavior is potentially exploitable with some compilers but no clear mechanism to trigger it through web content was identified. MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard reported an Apple issue present in OS X 10.10 (Yosemite) where log files are created by the CoreGraphics framework of OS X in the /tmp local directory. These log files contain a record of all inputs into Mozilla programs during their operation. In versions of OS X from versions 10.6 through 10.9, the CoreGraphics had this logging ability but it was turned off by default. In OS X 10.10, this logging was turned on by default for some applications that use a custom memory allocator, such as jemalloc, because of an initialization bug in the framework. This issue has been addressed in Mozilla products by explicitly turning off the framework's logging of input events. On vulnerable systems, this issue can result in private data such as usernames, passwords, and other inputed data being saved to a log file on the local system. MFSA 2014-74 / CVE-2014-1574 / CVE-2014-1575: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Bobby Holley, Christian Holler, David Bolter, Byron Campen, and Jon Coppeard reported memory safety problems and crashes that affect Firefox ESR 31.1 and Firefox 32. Carsten Book, Christian Holler, Martijn Wargers, Shih-Chiang Chien, Terrence Cole, Eric Rahm , and Jeff Walden reported memory safety problems and crashes that affect Firefox 32. MFSA 2014-75 / CVE-2014-1576: Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered a buffer overflow when making capitalization style changes during CSS parsing. This can cause a crash that is potentially exploitable. MFSA 2014-76 / CVE-2014-1577: Security researcher Holger Fuhrmannek used the used the Address Sanitizer tool to discover an out-of-bounds read issue with Web Audio when interacting with custom waveforms with invalid values. This results in a crash and could allow for the reading of random memory which may contain sensitive data, or of memory addresses that could be used in combination with another bug. MFSA 2014-77 / CVE-2014-1578: Using the Address Sanitizer tool, security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team found an out-of-bounds write when buffering WebM format video containing frames with invalid tile sizes. This can lead to a potentially exploitable crash during WebM video playback. MFSA 2014-79 / CVE-2014-1581: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free during text layout when interacting with text direction. This results in a crash which can lead to arbitrary code execution. MFSA 2014-81 / CVE-2014-1585 / CVE-2014-1586: Mozilla developers Eric Shepherd and Jan-Ivar Bruaroey reported issues with privacy and video sharing using WebRTC. Once video sharing has started within a WebRTC session running within an