Container summary for sles12/openldap


SUSE-CU-2019:496-1

Container Advisory IDSUSE-CU-2019:496-1
Container Tagssles12/openldap:10.0
Container Release4.10.180
The following patches have been included in this update:
Advisory IDSUSE-RU-2019:2101-1
ReleasedFri Aug 9 10:38:55 2019
SummaryRecommended update for suse-module-tools
Typerecommended
Severitymoderate
References1100989,1105495,1111300,1123697,1123704,1127155,1127891,1131635
Description:

This update for suse-module-tools to version 12.6 fixes the following issues:


SUSE-CU-2019:495-1

Container Advisory IDSUSE-CU-2019:495-1
Container Tagssles12/openldap:10.0
Container Release4.10.173
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:1896-1
ReleasedThu Jul 18 16:26:45 2019
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1010675,1110146,1126613,CVE-2016-9318
Description:

This update for libxml2 fixes the following issues:
Issue fixed:


Advisory IDSUSE-SU-2019:1955-1
ReleasedTue Jul 23 11:42:41 2019
SummarySecurity update for bzip2
Typesecurity
Severityimportant
References1139083,985657,CVE-2016-3189,CVE-2019-12900
Description:

This update for bzip2 fixes the following issues:
Security issue fixed:


Advisory IDSUSE-SU-2019:1958-1
ReleasedTue Jul 23 13:18:12 2019
SummarySecurity update for glibc
Typesecurity
Severitymoderate
References1127223,1127308,1128574,CVE-2009-5155,CVE-2019-9169
Description:

This update for glibc fixes the following issues:
Security issues fixed:


Non-security issues fixed:


Advisory IDSUSE-SU-2019:1972-1
ReleasedThu Jul 25 15:00:03 2019
SummarySecurity update for libsolv, libzypp, zypper
Typesecurity
Severitymoderate
References1109893,1110542,1111319,1112911,1113296,1120629,1120630,1120631,1127155,1131823,1134226,1137977,CVE-2018-20532,CVE-2018-20533,CVE-2018-20534
Description:

This update for libsolv, libzypp and zypper fixes the following issues:
libsolv was updated to version 0.6.36 fixes the following issues:
Security issues fixed:


Non-security issues fixed:

libzypp received following fixes:

zypper received following fixes:


Advisory IDSUSE-SU-2019:2013-1
ReleasedMon Jul 29 15:42:41 2019
SummarySecurity update for bzip2
Typesecurity
Severityimportant
References1139083,CVE-2019-12900
Description:

This update for bzip2 fixes the following issues:


Advisory IDSUSE-RU-2020:1577-1
ReleasedTue Jun 9 14:19:21 2020
SummaryRecommended update for openslp
Typerecommended
Severitymoderate
References1117969,1136136
Description:

This update for openslp fixes the following issues:


SUSE-CU-2019:494-1

Container Advisory IDSUSE-CU-2019:494-1
Container Tagssles12/openldap:10.0
Container Release4.10.160
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:1834-1
ReleasedFri Jul 12 17:55:14 2019
SummarySecurity update for expat
Typesecurity
Severitymoderate
References1139937,CVE-2018-20843
Description:

This update for expat fixes the following issues:
Security issue fixed:


Advisory IDSUSE-RU-2019:1844-1
ReleasedMon Jul 15 07:13:09 2019
SummaryRecommended update for pam
Typerecommended
Severitylow
References1116544
Description:

This update for pam fixes the following issues:


SUSE-CU-2019:493-1

Container Advisory IDSUSE-CU-2019:493-1
Container Tagssles12/openldap:10.0
Container Release4.10.154
The following patches have been included in this update:
Advisory IDSUSE-RU-2019:1431-1
ReleasedWed Jun 5 16:50:13 2019
SummaryRecommended update for xz
Typerecommended
Severitymoderate
References1135709
Description:

This update for xz does only update the license:


Advisory IDSUSE-RU-2019:1474-1
ReleasedWed Jun 12 14:46:20 2019
SummaryRecommended update for permissions
Typerecommended
Severitymoderate
References1110797
Description:

This update for permissions fixes the following issues:


Advisory IDSUSE-RU-2019:1481-1
ReleasedThu Jun 13 07:46:01 2019
SummaryRecommended update for sg3_utils
Typerecommended
Severitymoderate
References1005063,1119296,1133418,954600
Description:

This update for sg3_utils provides the following fixes:


Advisory IDSUSE-RU-2019:1493-1
ReleasedThu Jun 13 16:40:31 2019
SummaryRecommended update for binutils
Typerecommended
Severitymoderate
References1137271,SLE-6206
Description:

This update for binutils fixes the following issues:


Advisory IDSUSE-SU-2019:1733-1
ReleasedWed Jul 3 13:54:39 2019
SummarySecurity update for elfutils
Typesecurity
Severitylow
References1030472,1030476,1033084,1033085,1033087,1033088,1033089,1033090,1106390,1107067,1111973,1112723,1112726,1123685,1125007,CVE-2016-10254,CVE-2016-10255,CVE-2017-7607,CVE-2017-7608,CVE-2017-7610,CVE-2017-7611,CVE-2017-7612,CVE-2017-7613,CVE-2018-16062,CVE-2018-16403,CVE-2018-18310,CVE-2018-18520,CVE-2018-18521,CVE-2019-7150,CVE-2019-7665
Description:

This update for elfutils fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2019:1761-1
ReleasedFri Jul 5 14:10:34 2019
SummaryRecommended update for e2fsprogs
Typerecommended
Severitymoderate
References1128383,1135261
Description:

This update for e2fsprogs fixes the following issues:




Advisory IDSUSE-SU-2019:1606-1
ReleasedWed Aug 21 13:36:49 2019
SummarySecurity update for libssh2_org
Typesecurity
Severitymoderate
References1128481,1136570,CVE-2019-3860
Description:

This update for libssh2_org fixes the following issues:


SUSE-CU-2019:492-1

Container Advisory IDSUSE-CU-2019:492-1
Container Tagssles12/openldap:10.0
Container Release4.10.133
The following patches have been included in this update:

SUSE-CU-2019:491-1

Container Advisory IDSUSE-CU-2019:491-1
Container Tagssles12/openldap:10.0
Container Release4.10.133
The following patches have been included in this update:

SUSE-CU-2019:490-1

Container Advisory IDSUSE-CU-2019:490-1
Container Tagssles12/openldap:10.0
Container Release4.10.133
The following patches have been included in this update:

SUSE-CU-2019:489-1

Container Advisory IDSUSE-CU-2019:489-1
Container Tagssles12/openldap:10.0
Container Release4.10.133
The following patches have been included in this update:
Advisory IDSUSE-RU-2019:1259-1
ReleasedWed May 15 14:06:20 2019
SummaryRecommended update for sysvinit
Typerecommended
Severitymoderate
References1131982
Description:

This update for sysvinit fixes the following issues:


Advisory IDSUSE-SU-2019:1265-1
ReleasedThu May 16 09:52:22 2019
SummarySecurity update for systemd
Typesecurity
Severityimportant
References1080919,1121563,1125352,1126056,1127557,1128657,1130230,1132348,1132400,1132721,955942,CVE-2018-6954,CVE-2019-3842,CVE-2019-6454,SLE-5933
Description:

This update for systemd fixes the following issues:
Security issues fixed:


Non-security issues fixed:


Advisory IDSUSE-SU-2019:1363-1
ReleasedTue May 28 10:50:53 2019
SummarySecurity update for curl
Typesecurity
Severityimportant
References1135170,CVE-2019-5436
Description:

This update for curl fixes the following issues:
Security issue fixed:


Advisory IDSUSE-SU-2019:1379-1
ReleasedWed May 29 15:07:04 2019
SummarySecurity update for libtasn1
Typesecurity
Severitymoderate
References1040621,1105435,CVE-2017-6891,CVE-2018-1000654
Description:

This update for libtasn1 fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2019:1402-1
ReleasedMon Jun 3 09:12:38 2019
SummaryRecommended update for kmod
Typerecommended
Severitymoderate
References1097869,1118629
Description:

This update for kmod fixes the following issues:


SUSE-CU-2019:488-1

Container Advisory IDSUSE-CU-2019:488-1
Container Tagssles12/openldap:10.0
Container Release4.10.114
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:1136-1
ReleasedFri May 3 10:27:57 2019
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1131291
Description:

This update for openssl fixes the following issues:


This helps openssl using services that do not do this verification on their own.


Advisory IDSUSE-SU-2019:1166-1
ReleasedTue May 7 11:01:39 2019
SummarySecurity update for audit
Typesecurity
Severitymoderate
References1042781,1085003,1125535,941922,CVE-2015-5186
Description:


This update for audit fixes the following issues:
Audit on SUSE Linux Enterprise 12 SP3 was updated to 2.8.1 to bring new features and bugfixes. (bsc#1125535 FATE#326346)


The full changelog can be found here: http://people.redhat.com/sgrubb/audit/ChangeLog


Minor security issue fixed:


SUSE-CU-2019:487-1

Container Advisory IDSUSE-CU-2019:487-1
Container Tagssles12/openldap:10.0
Container Release4.10.109
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:1060-1
ReleasedSat Apr 27 09:45:38 2019
SummarySecurity update for libssh2_org
Typesecurity
Severityimportant
References1130103,1133528,CVE-2019-3859
Description:

This update for libssh2_org fixes the following issues:
- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]


Advisory IDSUSE-RU-2019:1125-1
ReleasedTue Apr 30 18:50:59 2019
SummaryRecommended update for glibc
Typerecommended
Severityimportant
References1100396,1103244
Description:

This update for glibc fixes the following issues:


Advisory IDSUSE-RU-2019:1131-1
ReleasedThu May 2 15:39:59 2019
SummaryRecommended update for libidn
Typerecommended
Severitymoderate
References1092034
Description:

This update for libidn fixes the following issues:


SUSE-CU-2019:486-1

Container Advisory IDSUSE-CU-2019:486-1
Container Tagssles12/openldap:10.0
Container Release4.10.105
The following patches have been included in this update:
Advisory IDSUSE-RU-2019:979-1
ReleasedThu Apr 18 08:23:19 2019
SummaryRecommended update for sg3_utils
Typerecommended
Severitymoderate
References1069384
Description:

This update for sg3_utils fixes the following issues:


Advisory IDSUSE-SU-2019:996-1
ReleasedTue Apr 23 18:42:35 2019
SummarySecurity update for curl
Typesecurity
Severityimportant
References1112758,1131886,CVE-2018-16839
Description:

This update for curl fixes the following issues:
Security issue fixed:


SUSE-CU-2019:485-1

Container Advisory IDSUSE-CU-2019:485-1
Container Tagssles12/openldap:10.0
Container Release4.10.98
The following patches have been included in this update:

SUSE-CU-2019:484-1

Container Advisory IDSUSE-CU-2019:484-1
Container Tagssles12/openldap:10.0
Container Release4.10.97
The following patches have been included in this update:

SUSE-CU-2019:483-1

Container Advisory IDSUSE-CU-2019:483-1
Container Tagssles12/openldap:10.0
Container Release4.10.95
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:655-1
ReleasedWed Mar 20 10:30:49 2019
SummarySecurity update for libssh2_org
Typesecurity
Severitymoderate
References1091236,1128471,1128472,1128474,1128476,1128480,1128481,1128490,1128492,1128493,CVE-2019-3855,CVE-2019-3856,CVE-2019-3857,CVE-2019-3858,CVE-2019-3859,CVE-2019-3860,CVE-2019-3861,CVE-2019-3862,CVE-2019-3863
Description:

This update for libssh2_org fixes the following issues:
Security issues fixed:


Other issue addressed:


Advisory IDSUSE-RU-2019:794-1
ReleasedThu Mar 28 12:09:29 2019
SummaryRecommended update for krb5
Typerecommended
Severitymoderate
References1087481
Description:

This update for krb5 fixes the following issues:


Advisory IDSUSE-SU-2019:803-1
ReleasedFri Mar 29 13:14:21 2019
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1100078,1113975,1117951,1127080,CVE-2019-1559
Description:

This update for openssl fixes the following issues:
Security issues fixed:


Other issues addressed:


Advisory IDSUSE-SU-2019:838-1
ReleasedTue Apr 2 09:52:06 2019
SummarySecurity update for bash
Typesecurity
Severityimportant
References1130324,CVE-2019-9924
Description:

This update for bash fixes the following issues: Security issue fixed:


Advisory IDSUSE-SU-2019:839-1
ReleasedTue Apr 2 13:13:21 2019
SummarySecurity update for file
Typesecurity
Severitymoderate
References1096974,1096984,1126117,1126118,1126119,CVE-2018-10360,CVE-2019-8905,CVE-2019-8906,CVE-2019-8907
Description:

This update for file fixes the following issues:
The following security vulnerabilities were addressed:


SUSE-CU-2019:482-1

Container Advisory IDSUSE-CU-2019:482-1
Container Tagssles12/openldap:10.0
Container Release4.10.81
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:428-1
ReleasedTue Feb 19 10:59:59 2019
SummarySecurity update for systemd
Typesecurity
Severityimportant
References1111498,1117025,1117382,1120658,1122000,1122344,1123333,1123892,1125352,CVE-2019-6454
Description:

This update for systemd fixes the following issues:
Security vulnerability fixed:


Other bug fixes and changes:


Advisory IDSUSE-RU-2019:434-1
ReleasedTue Feb 19 12:19:02 2019
SummaryRecommended update for libsemanage
Typerecommended
Severitymoderate
References1115500
Description:

This update for libsemanage provides the following fix:


Advisory IDSUSE-SU-2019:450-1
ReleasedWed Feb 20 16:42:38 2019
SummarySecurity update for procps
Typesecurity
Severityimportant
References1092100,1121753,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126
Description:


This update for procps fixes the following security issues:


(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)
Also the following non-security issue was fixed:


Advisory IDSUSE-RU-2019:514-1
ReleasedThu Feb 28 15:39:05 2019
SummaryRecommended update for apparmor
Typerecommended
Severitymoderate
References1112300
Description:

This update for apparmor fixes the following issues:


SUSE-CU-2019:481-1

Container Advisory IDSUSE-CU-2019:481-1
Container Tagssles12/openldap:10.0
Container Release4.10.60
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:249-1
ReleasedWed Feb 6 08:36:16 2019
SummarySecurity update for curl
Typesecurity
Severityimportant
References1123371,1123377,1123378,CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Description:

This update for curl fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2019:261-1
ReleasedWed Feb 6 11:26:21 2019
SummaryRecommended update for pam-config
Typerecommended
Severitymoderate
References1114835
Description:

This update for pam-config fixes the following issues:


SUSE-CU-2019:480-1

Container Advisory IDSUSE-CU-2019:480-1
Container Tagssles12/openldap:10.0
Container Release4.10.53
The following patches have been included in this update:
Advisory IDSUSE-RU-2014:85-1
ReleasedTue Nov 4 16:29:29 2014
SummaryRecommended update for dirmngr
Typerecommended
Severitymoderate
References901845
Description:

This update for dirmngr fixes a segmentation fault at start up. (bnc#901845)


Advisory IDSUSE-RU-2014:66-1
ReleasedThu Nov 6 06:23:15 2014
SummaryRecommended update for gcc48
Typerecommended
Severitymoderate
References899871
Description:

This update for gcc48 fixes a performance degradation issue caused by generation of unneeded code whe using option -pg.


Advisory IDSUSE-SU-2014:97-1
ReleasedFri Nov 28 10:20:32 2014
SummarySecurity update for file
Typesecurity
Severitymoderate
References888308,902367,CVE-2014-3710
Description:

file was updated to fix one security issue.
This security issue was fixed:


This non-security issues was fixed:


Advisory IDSUSE-SU-2014:113-1
ReleasedTue Dec 2 18:17:57 2014
SummarySecurity update for cpio
Typesecurity
Severitymoderate
References658010,907456,CVE-2014-9112
Description:


This cpio security update fixes the following buffer overflow issue and two non security issues:


Advisory IDSUSE-SU-2015:16-1
ReleasedThu Dec 11 09:25:27 2014
SummarySecurity update for libksba
Typesecurity
Severitymoderate
References907074,CVE-2014-9087
Description:

This libksba update fixes the following security issue:


Advisory IDSUSE-SU-2014:126-1
ReleasedFri Dec 19 20:16:00 2014
SummarySecurity update for file
Typesecurity
Severitymoderate
References910252,910253,CVE-2014-8116,CVE-2014-8117
Description:

This file update fixes the following security issues:


Advisory IDSUSE-SU-2015:29-1
ReleasedMon Jan 12 11:37:43 2015
SummarySecurity update for curl
Typesecurity
Severitymoderate
References901924,911363,CVE-2014-3707,CVE-2014-8150
Description:


This update fixes the following security issues - CVE-2014-8150: URL request injection vulnerability (bnc#911363) - CVE-2014-3707: duphandle read out of bounds (bnc#901924)


Advisory IDSUSE-SU-2015:40-1
ReleasedThu Jan 15 18:35:11 2015
SummarySecurity update for rpm
Typesecurity
Severityimportant
References892431,906803,908128,911228,CVE-2013-6435,CVE-2014-8118
Description:

This rpm update fixes the following security and non-security issues:


Advisory IDSUSE-RU-2015:64-1
ReleasedThu Jan 15 23:21:45 2015
SummaryRecommended update for e2fsprogs
Typerecommended
Severitymoderate
References912229
Description:

This update for e2fsprogs fixes a 'use after free' issue in fsck(8).


Advisory IDSUSE-SU-2015:44-1
ReleasedTue Jan 20 00:18:26 2015
SummarySecurity update for binutils
Typesecurity
Severitymoderate
References902676,902677,903655,905735,905736,CVE-2014-8484,CVE-2014-8485,CVE-2014-8501,CVE-2014-8502,CVE-2014-8503,CVE-2014-8504,CVE-2014-8737,CVE-2014-8738
Description:

This binutils update fixes the following security issues:


Advisory IDSUSE-SU-2015:76-1
ReleasedFri Jan 30 15:01:03 2015
SummarySecurity update for elfutils
Typesecurity
Severitymoderate
References911662,CVE-2014-9447
Description:

elfutils was updated to fix one security issue.
This security issue was fixed:


Advisory IDSUSE-RU-2015:55-1
ReleasedTue Feb 3 14:51:17 2015
SummaryRecommended update for curl
Typerecommended
Severitymoderate
References913209
Description:


curl was updated to fix problems when operating in FIPS mode.
This patch reenables following methods:


Advisory IDSUSE-RU-2015:121-1
ReleasedTue Feb 3 16:30:16 2015
SummaryRecommended update for pam
Typerecommended
Severitylow
References912922
Description:

This update for pam fixes updating of NIS passwords.


Advisory IDSUSE-RU-2015:274-1
ReleasedMon Feb 23 22:21:35 2015
SummaryRecommended update for openslp
Typerecommended
Severitymoderate
References909195
Description:

This update for openslp provides the following fixes:


Advisory IDSUSE-SU-2015:157-1
ReleasedTue Mar 10 09:01:41 2015
SummarySecurity update for libssh2_org
Typesecurity
Severitymoderate
References921070,CVE-2015-1782
Description:


The ssh client library libssh2_org was updated to fix a security issue.
CVE-2015-1782: A malicious server could send a crafted SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a crash of the libssh2_org using application.


Advisory IDSUSE-RU-2015:275-1
ReleasedWed Mar 18 18:21:44 2015
SummaryRecommended update for procps
Typerecommended
Severitylow
References901202,908516
Description:

This update for procps provides the following fixes:


Advisory IDSUSE-SU-2015:235-1
ReleasedWed Apr 29 19:05:01 2015
SummarySecurity update for curl
Typesecurity
Severitymoderate
References927556,927607,927608,927746,928533,CVE-2015-3143,CVE-2015-3144,CVE-2015-3145,CVE-2015-3148,CVE-2015-3153
Description:

curl was updated to fix five security issues.
The following vulnerabilities were fixed:


Advisory IDSUSE-SU-2015:296-1
ReleasedThu Jun 11 15:46:59 2015
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References896202,896435,898003,899524,900275,900276,905483,920057,928740,929919,CVE-2014-3591
Description:


This update of libgcrypt fixes one security issue and brings various FIPS 140-2 related improvements.
libgcrypt now uses ciphertext blinding for Elgamal decryption (CVE-2014-3591)
FIPS 140-2 related changes:









Advisory IDSUSE-SU-2015:366-1
ReleasedMon Jun 29 10:13:43 2015
SummarySecurity update for e2fsprogs
Typesecurity
Severitylow
References915402,918346,CVE-2015-0247,CVE-2015-1572
Description:


Two security issues were fixed in e2fsprogs:
Security issues fixed:


Advisory IDSUSE-RU-2015:361-1
ReleasedWed Jul 15 08:26:27 2015
SummaryRecommended update for gcc48, libffi48, libgcj48
Typerecommended
Severitymoderate
References889990,917169,919274,922534,924525,924687,927993,930176,934689
Description:


The system compiler gcc48 was updated to the GCC 4.8.5 release, fixing a lot of bugs and bringing some improvements.
It includes various bug fixes found by our customers:


Advisory IDSUSE-OU-2015:422-1
ReleasedTue Jul 28 06:25:51 2015
SummaryThe Toolchain module containing GCC 5.2
Typeoptional
Severitylow
References926412,936050,937823
Description:


This update contains the release of the new SUSE Linux Enterprise Toolchain module.
Its major feature is the GNU Compiler Collection 5.2, please see https://gcc.gnu.org/gcc-5/changes.html for important changes.
This update also includes a version update of binutils to 2.25 release branch to provide features and bugfixes.
Following features have been added to binutils:



The GNU Debugger gdb was updated to version 7.9.1 bringing various features and lots of bugfixes. Also IBM zSeries z13 hardware support has been added to gdb. (fate#318039)


Advisory IDSUSE-SU-2015:500-1
ReleasedMon Aug 17 11:36:33 2015
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References920057,938343,CVE-2015-0837
Description:


This update fixes the following issues:
Security:


Bugfixes:


Advisory IDSUSE-RU-2015:530-1
ReleasedWed Aug 26 03:07:07 2015
SummaryRecommended update for sed
Typerecommended
Severitylow
References933029
Description:


This update for sed fixes the behavior of --follow-symlinks when reading from the standard input (stdin).
The behavior of 'sed --follow-symlinks -' is now identical to 'sed -'. In both cases, sed will read from the standard input and no longer from a file named '-'.


Advisory IDSUSE-RU-2015:568-1
ReleasedWed Sep 16 13:30:12 2015
SummaryRecommended update for grep
Typerecommended
Severitylow
References920386
Description:

This update for grep fixes undefined behaviour with -P and non-utf-8 data.


Advisory IDSUSE-OU-2015:663-1
ReleasedWed Oct 7 16:01:20 2015
SummaryOptional update for binutils
Typeoptional
Severitylow
References949066
Description:


ARM64 (aarch64) binaries produced by binutils 2.25 gold linker had incorrect (4k) section alignment. As a result, those binaries could not be mapped when being executed on a SLE 12 kernel.
This update adjusts the section alignment to 64k, as required by the ABI.


Advisory IDSUSE-SU-2015:922-1
ReleasedTue Dec 22 08:44:25 2015
SummarySecurity update for gpg2
Typesecurity
Severitymoderate
References918089,918090,952347,955753,CVE-2015-1606,CVE-2015-1607
Description:

The gpg2 package was updated to fix the following security and non security issues:



Advisory IDSUSE-SU-2015:869-1
ReleasedWed Dec 23 10:01:16 2015
SummaryRecommended update for libksba
Typesecurity
Severitymoderate
References926826
Description:

The libksba package was updated to fix the following security issues:


Advisory IDSUSE-RU-2015:862-1
ReleasedWed Dec 23 17:40:51 2015
SummaryRecommended update for acl
Typerecommended
Severitymoderate
References945899
Description:

This update for acl provides the following fixes:


Advisory IDSUSE-RU-2016:46-1
ReleasedFri Jan 8 12:37:34 2016
SummaryRecommended update for gcr, gnome-keyring, libgcrypt, libsecret
Typerecommended
Severitymoderate
References932232
Description:


This update for gcr, gnome-keyring, libgcrypt, libsecret fixes issues when the system operates in FIPS mode.
The various GNOME libraries and tool have been changed to use the default libgcrypt allocators.
GNOME keyring was changed not to use MD5 anymore.
libgcrypt was adjusted to free the DRBG on exit to avoid crashes.


Advisory IDSUSE-SU-2016:201-1
ReleasedThu Feb 4 15:51:22 2016
SummarySecurity update for curl
Typesecurity
Severitymoderate
References934333,936676,962983,962996,CVE-2016-0755
Description:


This update for curl fixes the following issues:


The following non-security bugs were fixed:

The following tracked bugs only affect the test suite:


Advisory IDSUSE-RU-2016:291-1
ReleasedFri Feb 19 19:31:54 2016
SummaryRecommended update for openslp
Typerecommended
Severitylow
References950777
Description:


This update for OpenSLP adjusts slpd's initialization to use SystemD's forking mechanism, avoiding stale PID files after the daemon is stopped.


Advisory IDSUSE-RU-2016:371-1
ReleasedThu Mar 3 15:58:18 2016
SummaryRecommended update for insserv-compat
Typerecommended
Severitylow
References960820
Description:


This update for insserv-compat fixes the name of the ntpd service.


Advisory IDSUSE-SU-2016:413-1
ReleasedFri Mar 11 10:17:57 2016
SummarySecurity update for libssh2_org
Typesecurity
Severitymoderate
References933336,961964,967026,CVE-2016-0787
Description:


This update for libssh2_org fixes the following issues:
Security issue fixed:


A feature was added:
Bug fixed:


Advisory IDSUSE-RU-2016:462-1
ReleasedWed Mar 16 18:17:59 2016
SummaryRecommended update for libcap
Typerecommended
Severitylow
References967838
Description:


This update for libcap adds two new capabilities (CAP_WAKE_ALARM and CAP_BLOCK_SUSPEND) which are available in Linux Kernel 3.12.


Advisory IDSUSE-RU-2016:543-1
ReleasedFri Apr 1 18:44:16 2016
SummaryRecommended update for libgcrypt
Typerecommended
Severitymoderate
References970882
Description:


This update for libgcrypt fixes a crash in GPG key generation when operating in FIPS mode. (bsc#970882)


Advisory IDSUSE-SU-2016:565-1
ReleasedWed Apr 6 16:26:42 2016
SummarySecurity update for gcc5
Typesecurity
Severitymoderate
References939460,945842,952151,953831,954002,955382,962765,964468,966220,968771,CVE-2015-5276
Description:


The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes and enhancements.
The following security issue has been fixed:


The following non-security issues have been fixed:


Advisory IDSUSE-SU-2016:636-1
ReleasedMon Apr 18 09:18:19 2016
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References965902,CVE-2015-7511
Description:

libgcrypt was updated to fix one security issue.
This security issue was fixed:


Advisory IDSUSE-RU-2016:643-1
ReleasedTue Apr 19 09:23:39 2016
SummaryRecommended update for bzip2
Typerecommended
Severitylow
References970260
Description:


This update for bzip2 fixes the following issues:


Advisory IDSUSE-RU-2016:697-1
ReleasedThu Apr 28 16:03:24 2016
SummaryRecommended update for libssh2_org
Typerecommended
Severityimportant
References974691
Description:


This update for libssh2_org fixes a regression introduced by a previous update which could result in a segmentation fault in EVP_DigestInit_Ex().


Advisory IDSUSE-RU-2016:801-1
ReleasedThu May 19 22:38:01 2016
SummaryRecommended update for curl
Typerecommended
Severitymoderate
References915846
Description:


This update for curl fixes the following issue:


Advisory IDSUSE-RU-2016:835-1
ReleasedWed May 25 18:27:30 2016
SummaryRecommended update for libgcrypt
Typerecommended
Severitymoderate
References979629
Description:


This update for libgcrypt fixes the following issue:


Advisory IDSUSE-SU-2016:898-1
ReleasedTue Jun 7 09:48:12 2016
SummarySecurity update for expat
Typesecurity
Severityimportant
References979441,980391,CVE-2015-1283,CVE-2016-0718
Description:


This update for expat fixes the following issues:
Security issue fixed:


Advisory IDSUSE-SU-2016:900-1
ReleasedTue Jun 7 10:58:37 2016
SummarySecurity update for libksba
Typesecurity
Severitymoderate
References979261,979906,CVE-2016-4574,CVE-2016-4579
Description:


This update for libksba fixes the following issues:


Also adding reliability fixes from v1.3.4.


Advisory IDSUSE-RU-2016:987-1
ReleasedWed Jun 22 14:32:18 2016
SummaryRecommended update for procps
Typerecommended
Severitylow
References981616
Description:


This update for procps fixes the following issues:


Advisory IDSUSE-RU-2016:1028-1
ReleasedThu Jul 7 11:50:47 2016
SummaryRecommended update for findutils
Typerecommended
Severitymoderate
References986935
Description:


This update for findutils fixes the following issues:


Advisory IDSUSE-RU-2016:1126-1
ReleasedSat Jul 30 00:39:03 2016
SummaryRecommended update for kmod
Typerecommended
Severitylow
References983754,989788
Description:


This update for kmod fixes libkmod to handle very long lines in /proc/modules.


Advisory IDSUSE-RU-2016:1152-1
ReleasedThu Aug 4 15:02:18 2016
SummaryRecommended update for binutils
Typerecommended
Severitylow
References970239,985642
Description:


GNU Binutils was updated to version 2.26.1, which brings several fixes and enhancements:


Advisory IDSUSE-RU-2016:1205-1
ReleasedThu Aug 11 15:02:18 2016
SummaryRecommended update for rpm
Typerecommended
Severitylow
References829717,894610,940315,953532,965322,967728
Description:


This update for rpm provides the following fixes:


Advisory IDSUSE-SU-2016:1228-1
ReleasedTue Aug 16 09:29:01 2016
SummarySecurity update for libidn
Typesecurity
Severitymoderate
References923241,990189,990190,990191,CVE-2015-2059,CVE-2015-8948,CVE-2016-6261,CVE-2016-6262,CVE-2016-6263
Description:


This update for libidn fixes the following issues:





Advisory IDSUSE-SU-2016:1247-1
ReleasedFri Aug 19 12:58:39 2016
SummarySecurity update for cracklib
Typesecurity
Severitymoderate
References992966,CVE-2016-6318
Description:


This update for cracklib fixes the following issues:


Advisory IDSUSE-SU-2016:1326-1
ReleasedThu Sep 8 11:37:44 2016
SummarySecurity update for perl
Typesecurity
Severitymoderate
References928292,932894,967082,984906,987887,988311,CVE-2015-8853,CVE-2016-1238,CVE-2016-2381,CVE-2016-6185
Description:


This update for Perl fixes the following issues:


Advisory IDSUSE-OU-2016:1358-1
ReleasedThu Sep 15 20:54:21 2016
SummaryOptional update for gcc6
Typeoptional
Severitylow
References983206
Description:


This update ships the GNU Compiler Collection (GCC) in version 6.2.
This update is shipped in two parts:


The runtime libraries libgcc_s1, libstdc++6, libatomic1, libgomp1, libitm1 and some others can now be used by GCC 6 built binaries.

The Toolchain module received the GCC 6 compiler suite with this update.
Changes:

Generic Optimization improvements:

C language specific improvements:

C improvements:

C++ improvements:

libstdc++ improvements:

Fortran improvements:

Architecture improvements:

IA-32/x86-64 improvements:

PowerPC / PowerPC64 / RS6000 improvements:

S/390, System z, IBM z Systems improvements:

An even more detailed list of features can be found at: https://gcc.gnu.org/gcc-6/changes.html


Advisory IDSUSE-SU-2016:1364-1
ReleasedFri Sep 16 17:13:43 2016
SummarySecurity update for curl
Typesecurity
Severitymoderate
References991389,991390,991391,991746,997420,CVE-2016-5419,CVE-2016-5420,CVE-2016-5421,CVE-2016-7141
Description:


This update for curl fixes the following issues:
Security issues fixed:


Also the following bug was fixed:


Advisory IDSUSE-SU-2016:1370-1
ReleasedWed Sep 21 12:58:14 2016
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References994157,CVE-2016-6313
Description:


This update for libgcrypt fixes the following issues:
- RNG prediction vulnerability (bsc#994157, CVE-2016-6313)


Advisory IDSUSE-SU-2016:1390-1
ReleasedTue Sep 27 15:11:15 2016
SummarySecurity update for flex, at, bogofilter, cyrus-imapd, kdelibs4, libQtWebKit4, libbonobo, mdbtools, netpbm, openslp, sgmltool, virtuoso, libqt5-qtwebkit
Typesecurity
Severitymoderate
References954210,990856,CVE-2015-8079,CVE-2016-6354
Description:


Various packages included vulnerable parsers generated by 'flex'.
This update provides a fixed 'flex' package and also rebuilds of packages that might have security issues caused by the auto generated code.
Flex itself was updated to fix a buffer overflow in the generated scanner (bsc#990856, CVE-2016-6354)
Packages that were rebuilt with the fixed flex:


Also libqt5-qtwebkit received an additional security fix:


Advisory IDSUSE-SU-2016:1565-1
ReleasedThu Oct 27 13:06:35 2016
SummarySecurity update for openslp
Typesecurity
Severitymoderate
References1001600,974655,980722,994989,CVE-2016-4912,CVE-2016-7567
Description:

This update for openslp fixes two security issues and two bugs.
The following vulnerabilities were fixed:


The following bugfix changes are included:


Advisory IDSUSE-SU-2016:1591-1
ReleasedWed Nov 2 12:07:51 2016
SummarySecurity update for curl
Typesecurity
Severityimportant
References1005633,1005634,1005635,1005637,1005638,1005640,1005642,1005643,1005645,1005646,998760,CVE-2016-7167,CVE-2016-8615,CVE-2016-8616,CVE-2016-8617,CVE-2016-8618,CVE-2016-8619,CVE-2016-8620,CVE-2016-8621,CVE-2016-8622,CVE-2016-8623,CVE-2016-8624
Description:

This update for curl fixes the following security issues:


Advisory IDSUSE-RU-2016:1614-1
ReleasedMon Nov 7 20:01:31 2016
SummaryRecommended update for shadow
Typerecommended
Severitylow
References1002975
Description:


This update for shadow fixes the following issues:


Advisory IDSUSE-RU-2016:1641-1
ReleasedThu Nov 10 20:02:04 2016
SummaryRecommended update for sg3_utils
Typerecommended
Severitymoderate
References1006469,958369,979436
Description:


This update for sg3_utils provides the following fixes:


Advisory IDSUSE-SU-2016:1744-1
ReleasedFri Dec 2 11:42:41 2016
SummarySecurity update for pcre
Typesecurity
Severitymoderate
References906574,924960,933288,933878,936227,942865,957566,957567,957598,957600,960837,971741,972127,CVE-2014-8964,CVE-2015-2325,CVE-2015-2327,CVE-2015-2328,CVE-2015-3210,CVE-2015-3217,CVE-2015-5073,CVE-2015-8380,CVE-2015-8381,CVE-2015-8382,CVE-2015-8383,CVE-2015-8384,CVE-2015-8385,CVE-2015-8386,CVE-2015-8387,CVE-2015-8388,CVE-2015-8389,CVE-2015-8390,CVE-2015-8391,CVE-2015-8392,CVE-2015-8393,CVE-2015-8394,CVE-2015-8395,CVE-2016-1283,CVE-2016-3191
Description:


This update for pcre to version 8.39 (bsc#972127) fixes several issues.
If you use pcre extensively please be aware that this is an update to a new version. Please make sure that your software works with the updated version.
This version fixes a number of vulnerabilities that affect pcre and applications using the libary when accepting untrusted input as regular expressions or as part thereof. Remote attackers could have caused the application to crash, disclose information or potentially execute arbitrary code. These security issues were fixed:


These non-security issues were fixed:


Advisory IDSUSE-RU-2016:1782-1
ReleasedFri Dec 9 13:35:02 2016
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1001790,1004289,1005404,1006372,1006690,989831,991443
Description:


This update for systemd provides the following fixes:


Advisory IDSUSE-SU-2016:1827-1
ReleasedThu Dec 15 12:41:10 2016
SummarySecurity update for pcre
Typesecurity
Severitymoderate
References906574,924960,933288,933878,936227,942865,957566,957567,957598,957600,960837,971741,972127,CVE-2014-8964,CVE-2015-2325,CVE-2015-2327,CVE-2015-2328,CVE-2015-3210,CVE-2015-3217,CVE-2015-5073,CVE-2015-8380,CVE-2015-8381,CVE-2015-8382,CVE-2015-8383,CVE-2015-8384,CVE-2015-8385,CVE-2015-8386,CVE-2015-8387,CVE-2015-8388,CVE-2015-8389,CVE-2015-8390,CVE-2015-8391,CVE-2015-8392,CVE-2015-8393,CVE-2015-8394,CVE-2015-8395,CVE-2016-1283,CVE-2016-3191
Description:


This update for pcre to version 8.39 (bsc#972127) fixes several issues.
If you use pcre extensively please be aware that this is an update to a new version. Please make sure that your software works with the updated version.
This version fixes a number of vulnerabilities that affect pcre and applications using the libary when accepting untrusted input as regular expressions or as part thereof. Remote attackers could have caused the application to crash, disclose information or potentially execute arbitrary code. These security issues were fixed:


These non-security issues were fixed:


Advisory IDSUSE-RU-2016:1863-1
ReleasedWed Dec 21 10:41:35 2016
SummaryRecommended updated for pth
Typerecommended
Severitylow
References1013286
Description:


This update adds the 32bit version of libpth20 to SUSE Linux Enterprise 12 SP1 and 12 SP2.


Advisory IDSUSE-SU-2017:2-1
ReleasedMon Jan 2 08:35:08 2017
SummarySecurity update for zlib
Typesecurity
Severitymoderate
References1003577,1003579,1003580,1013882,CVE-2016-9840,CVE-2016-9841,CVE-2016-9842,CVE-2016-9843
Description:


This update for zlib fixes the following issues:
CVE-2016-9843: Big-endian out-of-bounds pointer
CVE-2016-9842: Undefined Left Shift of Negative Number (bsc#1003580)
CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)
Incompatible declarations for external linkage function deflate (bsc#1003577)


Advisory IDSUSE-RU-2017:6-1
ReleasedTue Jan 3 15:01:58 2017
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1012390,1012591,1012818,1013989,1015515,909418,912715,945340,953807,963290,990538
Description:


This update for systemd fixes the following issues:


Advisory IDSUSE-RU-2017:32-1
ReleasedMon Jan 9 11:50:42 2017
SummaryRecommended update for dirmngr
Typerecommended
Severitylow
References994794
Description:


This update for dirmngr enables support for daemon mode.


Advisory IDSUSE-RU-2017:47-1
ReleasedWed Jan 11 11:42:43 2017
SummaryRecommended update for systemd
Typerecommended
Severityimportant
References1018214,1018399
Description:


This update for systemd fixes the following two issues:


Advisory IDSUSE-RU-2017:98-1
ReleasedThu Jan 19 10:17:55 2017
SummaryRecommended update for kmod
Typerecommended
Severitylow
References998906
Description:


This update for kmod fixes a rare race condition while loading modules.


Advisory IDSUSE-SU-2017:149-1
ReleasedWed Jan 25 09:17:08 2017
SummarySecurity update for systemd
Typesecurity
Severityimportant
References1012266,1014560,1014566,1020601,997682,CVE-2016-10156
Description:


This update for systemd fixes the following issues:
This security issue was fixed:


These non-security issues were fixed:


Advisory IDSUSE-SU-2017:185-1
ReleasedThu Feb 2 18:22:37 2017
SummarySecurity update for cpio
Typesecurity
Severitymoderate
References1020108,963448,CVE-2016-2037
Description:


This update for cpio fixes two issues.
This security issue was fixed:


This non-security issue was fixed:


Advisory IDSUSE-SU-2017:192-1
ReleasedFri Feb 3 18:46:05 2017
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1005544,1010675,1013930,1014873,1017497,CVE-2016-4658,CVE-2016-9318,CVE-2016-9597
Description:


This update for libxml2 fixes the following issues:


For CVE-2016-9318 we decided not to ship a fix since it can break existing setups. Please take appropriate actions if you parse untrusted XML files and use the new -noxxe flag if possible (bnc#1010675, bnc#1013930).


Advisory IDSUSE-RU-2017:209-1
ReleasedTue Feb 7 17:00:47 2017
SummaryRecommended update for libseccomp
Typerecommended
Severitylow
References1019900
Description:


This update provides libseccomp version 2.3.1 which fixes the following issues:


Advisory IDSUSE-SU-2017:212-1
ReleasedWed Feb 8 13:07:24 2017
SummarySecurity update for expat
Typesecurity
Severitymoderate
References983215,983216,CVE-2012-6702,CVE-2016-5300
Description:


This update for expat fixes the following security issues:


Advisory IDSUSE-SU-2017:228-1
ReleasedFri Feb 10 15:39:32 2017
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1000677,1001912,1009528,1019637,1021641,1022085,1022086,1022271,CVE-2016-7055,CVE-2017-3731,CVE-2017-3732
Description:


This update for openssl fixes the following issues contained in the OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:


Non-security issues fixed:


Advisory IDSUSE-RU-2017:261-1
ReleasedMon Feb 20 11:00:28 2017
SummaryRecommended update for dirmngr
Typerecommended
Severitylow
References1019276
Description:


This update for dirmngr fixes the following issues:


Advisory IDSUSE-RU-2017:365-1
ReleasedFri Mar 10 15:16:59 2017
SummaryRecommended update for sg3_utils
Typerecommended
Severitylow
References1006175
Description:


This update for sg3_utils fixes the following issue:


Advisory IDSUSE-RU-2017:389-1
ReleasedThu Mar 16 14:16:43 2017
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1004094,1006687,1019470,1022014,1022047,1025598,995936
Description:


This update for systemd provides the following fixes:


Advisory IDSUSE-RU-2017:439-1
ReleasedTue Mar 21 10:48:47 2017
SummaryRecommended update for netcfg
Typerecommended
Severitylow
References1028305,959693
Description:


This update for netcfg provides the following fixes:


Advisory IDSUSE-RU-2017:462-1
ReleasedFri Mar 24 21:58:07 2017
SummaryRecommended update for lvm2
Typerecommended
Severitymoderate
References1012973,1015943,1017034,1023283,1025560,1025630
Description:


This update for lvm2 fixes the following issues:


Advisory IDSUSE-RU-2017:464-1
ReleasedMon Mar 27 15:50:51 2017
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1007851,1029725,1029900
Description:


This update for glibc fixes a potential segmentation fault in libpthread:


Advisory IDSUSE-RU-2017:580-1
ReleasedWed Apr 12 23:58:47 2017
SummaryRecommended update for cpio
Typerecommended
Severityimportant
References1028410
Description:


This update for cpio fixes the following issues:


Advisory IDSUSE-RU-2017:589-1
ReleasedThu Apr 13 13:12:45 2017
SummaryRecommended update for libtool
Typerecommended
Severitymoderate
References1010802
Description:


This update for libtool prevents a segmentation fault caused by insufficient error handling on out-of-memory situations.


Advisory IDSUSE-SU-2017:609-1
ReleasedTue Apr 18 11:28:14 2017
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1015332,1027712,1032309,CVE-2016-9586,CVE-2017-7407
Description:


This update for curl fixes the following issues:
Security issue fixed:


With this release new default ciphers are active (SUSE_DEFAULT, bsc#1027712).


Advisory IDSUSE-RU-2017:732-1
ReleasedWed May 10 14:03:43 2017
SummaryRecommended update for procps
Typerecommended
Severitylow
References1030621
Description:


This update for procps fixes the following issues:


Advisory IDSUSE-RU-2017:735-1
ReleasedWed May 10 15:43:46 2017
SummaryRecommended update for gpg2
Typerecommended
Severitylow
References1036736,986783
Description:


This update for gpg2 provides the following fixes:


Advisory IDSUSE-RU-2017:751-1
ReleasedThu May 11 17:14:30 2017
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1010220,1025398,1025886,1028263,1028610,1029183,1029691,1030290,1031355,1032538,1032660,1033855,1034565,955770
Description:


This update for systemd provides the following fixes:


Advisory IDSUSE-SU-2017:794-1
ReleasedTue May 16 15:41:09 2017
SummarySecurity update for bash
Typesecurity
Severitymoderate
References1010845,1035371,CVE-2016-9401
Description:


This update for bash fixes an issue that could lead to syntax errors when parsing scripts that use expr(1) inside loops.
Additionally, the popd build-in now ensures that the normalized stack offset is within bounds before trying to free that stack entry. This fixes a segmentation fault.


Advisory IDSUSE-RU-2017:799-1
ReleasedWed May 17 00:21:13 2017
SummaryRecommended update for glibc
Typerecommended
Severitylow
References1026224,1035445
Description:


This update for glibc introduces basic support for IBM POWER9 systems. Additionally, an improper assert in dlclose() has been removed.


Advisory IDSUSE-SU-2017:865-1
ReleasedWed May 24 16:23:20 2017
SummarySecurity update for pam
Typesecurity
Severitymoderate
References1015565,1037824,934920,CVE-2015-3238
Description:


This update for pam fixes the following issues:



Advisory IDSUSE-RU-2017:873-1
ReleasedFri May 26 16:19:47 2017
SummaryRecommended update for e2fsprogs
Typerecommended
Severitylow
References1009532,960273
Description:


This update for e2fsprogs provides the following fixes:


Advisory IDSUSE-RU-2017:877-1
ReleasedMon May 29 15:11:48 2017
SummaryRecommended update for cryptsetup
Typerecommended
Severitylow
References1031998
Description:


This update for cryptsetup provides the following fix:


Advisory IDSUSE-SU-2017:891-1
ReleasedTue May 30 22:28:21 2017
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1039063,1039064,1039066,1039069,1039661,981114,CVE-2016-1839,CVE-2017-9047,CVE-2017-9048,CVE-2017-9049,CVE-2017-9050
Description:


This update for libxml2 fixes the following issues:


Advisory IDSUSE-RU-2017:907-1
ReleasedThu Jun 1 14:23:36 2017
SummaryRecommended update for shadow
Typerecommended
Severitylow
References1003978,1031643
Description:


This update for shadow fixes the following issues:


Advisory IDSUSE-RU-2017:918-1
ReleasedTue Jun 6 12:35:44 2017
SummaryRecommended update for libsemanage, selinux-policy
Typerecommended
Severitymoderate
References1020143,1032445,1035818,1038189
Description:


This update for libsemanage, selinux-policy fixes the following issues:


Advisory IDSUSE-SU-2017:939-1
ReleasedMon Jun 12 10:56:22 2017
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1039063,1039064,1039066,1039069,1039661,CVE-2017-9047,CVE-2017-9048,CVE-2017-9049,CVE-2017-9050
Description:

This update for libxml2 fixes the following security issues:


Advisory IDSUSE-RU-2017:959-1
ReleasedWed Jun 14 14:38:11 2017
SummaryRecommended update for gcc5
Typerecommended
Severitylow
References1043580
Description:


This update for gcc5 fixes the version of libffi in its pkg-config configuration file.


Advisory IDSUSE-SU-2017:962-1
ReleasedWed Jun 14 16:33:07 2017
SummarySecurity update for openldap2
Typesecurity
Severitymoderate
References1009470,1037396,1041764,972331,CVE-2017-9287
Description:


This update for openldap2 fixes the following issues:
Security issues fixed:


Non security bugs fixed:


Advisory IDSUSE-SU-2017:985-1
ReleasedMon Jun 19 14:57:41 2017
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References1042326,931932,CVE-2017-9526
Description:

This update for libgcrypt fixes the following issues:



Advisory IDSUSE-SU-2017:990-1
ReleasedMon Jun 19 17:19:44 2017
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1039357,1040043,CVE-2017-1000366
Description:

This update for glibc fixes the following issues:



Advisory IDSUSE-RU-2017:1033-1
ReleasedFri Jun 23 16:38:55 2017
SummaryRecommended update for e2fsprogs
Typerecommended
Severitylow
References1038194
Description:


This update for e2fsprogs provides the following fixes:


Advisory IDSUSE-SU-2017:1036-1
ReleasedMon Jun 26 08:12:24 2017
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1024989,1044337,CVE-2017-0663,CVE-2017-5969
Description:

This update for libxml2 fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2017:1040-1
ReleasedMon Jun 26 13:22:26 2017
SummaryRecommended update for libsemanage, policycoreutils
Typerecommended
Severitylow
References1043237
Description:

This update for libsemanage, policycoreutils fixes the following issue:


Advisory IDSUSE-RU-2017:1082-1
ReleasedFri Jun 30 10:54:06 2017
SummaryRecommended update for dirmngr
Typerecommended
Severitylow
References1045943
Description:

This update for dirmngr provides the following fix:


Advisory IDSUSE-SU-2017:1086-1
ReleasedFri Jun 30 15:36:17 2017
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1044887,1044894,CVE-2017-7375,CVE-2017-7376
Description:

This update for libxml2 fixes the following issues:
Security issues fixed:


Advisory IDSUSE-SU-2017:1104-1
ReleasedTue Jul 4 16:13:55 2017
SummarySecurity update for systemd
Typesecurity
Severitymoderate
References1004995,1029102,1029516,1036873,1038865,1040258,1040614,1040942,1043758,982303,CVE-2017-9217
Description:

This update for systemd fixes the following issues:
Security issue fixed:


The update also fixed several non-security bugs:


Advisory IDSUSE-SU-2017:1116-1
ReleasedThu Jul 6 11:37:18 2017
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References1046607,CVE-2017-7526
Description:

This update for libgcrypt fixes the following issues:


Advisory IDSUSE-SU-2017:1119-1
ReleasedFri Jul 7 11:23:20 2017
SummaryRecommended update for ncurses
Typesecurity
Severityimportant
References1000662,1046853,1046858,CVE-2017-10684,CVE-2017-10685
Description:

This update for ncurses fixes the following issues:
Security issues fixed:


Bugfixes:


Advisory IDSUSE-RU-2017:1124-1
ReleasedFri Jul 7 19:32:38 2017
SummaryRecommended update for binutils
Typerecommended
Severitymoderate
References1031508
Description:


This update for binutils fixes an issue that prevented ld(1) from correctly linking the 32 bit version of libclntshcore.so.12.1 from the Oracle 12 Client.


Advisory IDSUSE-RU-2017:1160-1
ReleasedFri Jul 14 17:20:26 2017
SummaryRecommended update for openldap2
Typerecommended
Severitylow
References1031702
Description:

This update for openldap2 provides the following fix:


Advisory IDSUSE-SU-2017:1174-1
ReleasedWed Jul 19 11:12:51 2017
SummarySecurity update for systemd, dracut
Typesecurity
Severityimportant
References1032029,1033238,1037120,1040153,1040968,1043900,1045290,1046750,986216,CVE-2017-9445
Description:

This update for systemd and dracut fixes the following issues:
Security issues fixed:


Non-security issues fixed in systemd:

Non-security issues fixed in dracut:


Advisory IDSUSE-RU-2017:1222-1
ReleasedWed Jul 26 17:15:18 2017
SummaryRecommended update for procps
Typerecommended
Severitylow
References1034563,1039941
Description:


This update for procps provides the following fixes:


Advisory IDSUSE-SU-2017:1245-1
ReleasedThu Aug 3 10:43:15 2017
SummarySecurity update for systemd
Typesecurity
Severitymoderate
References1004995,1029102,1029516,1032029,1033238,1036873,1037120,1038865,1040153,1040258,1040614,1040942,1040968,1043758,1043900,1045290,1046750,982303,986216,CVE-2017-9217,CVE-2017-9445
Description:

This update for systemd provides several fixes and enhancements.
Security issues fixed:


The update also fixed several non-security bugs:


Advisory IDSUSE-RU-2017:1250-1
ReleasedThu Aug 3 13:49:24 2017
SummaryRecommended update for binutils
Typerecommended
Severitymoderate
References1031508
Description:


This update for binutils fixes an issue that prevented ld(1) from correctly linking the 32 bit version of libclntshcore.so.12.1 from the Oracle 12 Client.


Advisory IDSUSE-RU-2017:1268-1
ReleasedMon Aug 7 10:09:19 2017
SummaryRecommended update for openssl
Typerecommended
Severitymoderate
References1019637,1027079,1027688,1027908,1028281,1028723,1029523,1042392,1044095,1044107,1044175,902364
Description:

This update for openssl fixes the following issues including fixes for our ongoing FIPS 140-2 evaluation:


Advisory IDSUSE-SU-2017:1279-1
ReleasedMon Aug 7 14:46:40 2017
SummarySecurity update for ncurses
Typesecurity
Severitymoderate
References1046853,1046858,1047964,1047965,1049344,CVE-2017-10684,CVE-2017-10685,CVE-2017-11112,CVE-2017-11113
Description:

This update for ncurses fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2017:1316-1
ReleasedThu Aug 10 13:54:27 2017
SummaryRecommended update for cyrus-sasl
Typerecommended
Severitymoderate
References1014471,1026825,1044840,938657
Description:


This update for cyrus-sasl provides the following fixes:


Advisory IDSUSE-SU-2017:1326-1
ReleasedFri Aug 11 16:59:04 2017
SummarySecurity update for libxml2
Typesecurity
Severitylow
References1038444,CVE-2017-8872
Description:

This update for libxml2 fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2017:1330-1
ReleasedMon Aug 14 18:41:29 2017
SummaryRecommended update for sed
Typerecommended
Severitylow
References954661
Description:

This update for sed provides the following fixes:


Advisory IDSUSE-OU-2017:1333-1
ReleasedTue Aug 15 17:59:30 2017
SummaryOptional update for libverto
Typeoptional
Severitylow
References1029561
Description:

This update adds the libverto library to OpenStack Cloud Magnum Orchestration channels.


Advisory IDSUSE-RU-2017:1334-1
ReleasedTue Aug 15 20:09:03 2017
SummaryRecommended update for systemd
Typerecommended
Severityimportant
References1048679,874665
Description:

This update for systemd fixes the following issues:


Advisory IDSUSE-SU-2017:1335-1
ReleasedWed Aug 16 11:24:21 2017
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1051643,1051644,CVE-2017-1000100,CVE-2017-1000101
Description:

This update for curl fixes the following issues:


Advisory IDSUSE-RU-2017:1347-1
ReleasedFri Aug 18 11:03:57 2017
SummaryRecommended update for procps
Typerecommended
Severityimportant
References1053409
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2017:1349-1
ReleasedFri Aug 18 12:31:07 2017
SummaryRecommended update for lua51
Typerecommended
Severitylow
References1051626
Description:

This update for lua51 provides the following fixes:


Advisory IDSUSE-SU-2017:1390-1
ReleasedFri Aug 25 15:14:27 2017
SummarySecurity update for libzypp
Typesecurity
Severityimportant
References1009745,1036659,1038984,1043218,1045735,1046417,1047785,1048315,CVE-2017-7435,CVE-2017-7436,CVE-2017-9269
Description:

The Software Update Stack was updated to receive fixes and enhancements.

libzypp:


yast2-pkg-bindings:


Advisory IDSUSE-SU-2017:1419-1
ReleasedWed Aug 30 15:38:22 2017
SummarySecurity update for expat
Typesecurity
Severitymoderate
References1047236,1047240,CVE-2016-9063,CVE-2017-9233
Description:

This update for expat fixes the following issues:


Advisory IDSUSE-RU-2017:1439-1
ReleasedFri Sep 1 15:31:05 2017
SummaryRecommended update for systemd
Typerecommended
Severityimportant
References1045384,1045987,1046268,1047379,1048605
Description:

This update for systemd fixes the following issues:



Advisory IDSUSE-SU-2017:1447-1
ReleasedMon Sep 4 15:38:20 2017
SummarySecurity update for libzypp, zypper
Typesecurity
Severityimportant
References1008325,1038984,1045735,1047785,1054088,1054671,1055920,CVE-2017-7436
Description:

The Software Update Stack was updated to receive fixes and enhancements.
libzypp:


zypper:


Advisory IDSUSE-RU-2017:1450-1
ReleasedMon Sep 4 16:36:07 2017
SummaryRecommended update for insserv-compat
Typerecommended
Severitylow
References1035062,944903
Description:


This update for insserv-compat fixes the following issues:


Advisory IDSUSE-RU-2017:1453-1
ReleasedMon Sep 4 21:23:50 2017
SummaryRecommended update for libgcrypt
Typerecommended
Severitymoderate
References1043333,1046659,1047008
Description:

This update for libgcrypt fixes the following issues:


Advisory IDSUSE-RU-2017:1548-1
ReleasedFri Sep 15 18:19:12 2017
SummaryRecommended update for sg3_utils
Typerecommended
Severitymoderate
References1005063,1009269,1012523,1025176,1050767,1050943
Description:

This update for sg3_utils provides the following fixes:


Advisory IDSUSE-RU-2017:1592-1
ReleasedTue Sep 26 17:38:03 2017
SummaryRecommended update for lvm2
Typerecommended
Severitymoderate
References1028485,1045628,978055,998893,999878
Description:


This update for lvm2 provides the following fixes:


Advisory IDSUSE-SU-2017:1644-1
ReleasedMon Oct 9 07:52:24 2017
SummarySecurity update for krb5
Typesecurity
Severitymoderate
References1032680,1054028,1056995,903543,CVE-2017-11462
Description:

This update for krb5 fixes several issues.
This security issue was fixed:


These non-security issues were fixed:


Advisory IDSUSE-RU-2017:1663-1
ReleasedTue Oct 10 12:05:09 2017
SummaryRecommended update for dbus-1
Typerecommended
Severitymoderate
References1043615,1046173
Description:

This update for dbus-1 provides the following fixes:


Advisory IDSUSE-RU-2017:1703-1
ReleasedTue Oct 17 13:20:12 2017
SummaryRecommended update for audit
Typerecommended
Severitylow
References1042781
Description:

This update for audit provides the following fix:


Advisory IDSUSE-SU-2017:1758-1
ReleasedMon Oct 23 08:47:47 2017
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1060653,1061876,1063824,CVE-2017-1000254,CVE-2017-1000257
Description:

This update for curl fixes the following issues:
Security issues fixed:


Bugs fixed:


Advisory IDSUSE-RU-2017:1796-1
ReleasedFri Oct 27 21:25:06 2017
SummaryRecommended update for pcre
Typerecommended
Severitymoderate
References1058722
Description:



This update for pcre fixes the following issues:


Advisory IDSUSE-RU-2017:1797-1
ReleasedSat Oct 28 12:06:19 2017
SummaryRecommended update for permissions
Typerecommended
Severitymoderate
References1028304,1048645,1060738
Description:

This update for permissions fixes the following issues:


Advisory IDSUSE-SU-2017:1826-1
ReleasedWed Nov 8 08:47:17 2017
SummarySecurity update for krb5
Typesecurity
Severityimportant
References1065274,CVE-2017-15088
Description:

This update for krb5 fixes the following issues:
Security issues fixed:


Advisory IDSUSE-SU-2017:1829-1
ReleasedWed Nov 8 08:50:00 2017
SummarySecurity update for shadow
Typesecurity
Severitymoderate
References1023895,1052261,980486,CVE-2017-12424
Description:

This update for shadow fixes several issues.
This security issue was fixed:


These non-security issues were fixed:


Advisory IDSUSE-SU-2017:1881-1
ReleasedWed Nov 22 16:29:58 2017
SummarySecurity update for file
Typesecurity
Severitymoderate
References1009966,1063269,910252,910253,913650,913651,917152,996511,CVE-2014-8116,CVE-2014-8117,CVE-2014-9620,CVE-2014-9621,CVE-2014-9653
Description:



The GNU file utility was updated to version 5.22.
Security issues fixed:


Version update to file version 5.22

Version update to file version 5.21

Update to file version 5.20

Additional non-security bug fixes:


Advisory IDSUSE-SU-2017:1903-1
ReleasedFri Nov 24 16:19:37 2017
SummarySecurity update for perl
Typesecurity
Severitymoderate
References1047178,1057721,1057724,999735,CVE-2017-12837,CVE-2017-12883,CVE-2017-6512
Description:

This update for perl fixes the following issues:
Security issues fixed:


Bug fixes:


Advisory IDSUSE-RU-2017:1916-1
ReleasedFri Nov 24 20:15:01 2017
SummaryRecommended update for libgcrypt
Typerecommended
Severityimportant
References1043333,1059723
Description:

This update for libgcrypt provides the following fix:


Advisory IDSUSE-RU-2017:1917-1
ReleasedMon Nov 27 13:32:07 2017
SummaryOptional update for gcc7
Typerecommended
Severitylow
References1056437,1062591,1062592
Description:


The GNU Compiler GCC 7 is being added to the Toolchain Module by this update.
New features:


The update also supplies gcc7 compatible libstdc++, libgcc_s1 and other gcc derived libraries for the base products of SUSE Linux Enterprise 12.
Various optimizers have been improved in GCC 7, several of bugs fixed, quite some new warnings added and the error pin-pointing and fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 7 contains a summary of all the changes that have happened:
https://gcc.gnu.org/gcc-7/changes.html


Advisory IDSUSE-RU-2017:1965-1
ReleasedThu Nov 30 12:48:45 2017
SummaryRecommended update for libsolv, libzypp, zypper
Typerecommended
Severitymoderate
References1047233,1053671,1057188,1057634,1058695,1058783,1059065,1061384,1062561,1064999,661410
Description:

The Software Update Stack was updated to receive fixes and enhancements.
libsolv:


libzypp:

zypper:


Advisory IDSUSE-RU-2017:1966-1
ReleasedThu Nov 30 13:45:24 2017
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1004995,1035386,1039099,1040800,1045472,1048605,1050152,1053137,1053595,1055641,1063249
Description:

This update for systemd fixes the following issues:


Advisory IDSUSE-RU-2017:1968-1
ReleasedThu Nov 30 19:49:33 2017
SummaryRecommended update for coreutils
Typerecommended
Severitylow
References1026567,1043059,965780
Description:

This update for coreutils provides the following fixes:


Advisory IDSUSE-RU-2017:1969-1
ReleasedThu Nov 30 19:50:53 2017
SummaryRecommended update for libtool
Typerecommended
Severitylow
References1056381
Description:

This update for libtool provides the following fix:


Advisory IDSUSE-SU-2017:1970-1
ReleasedThu Nov 30 22:55:41 2017
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1055825,1056058,1065363,1066242,CVE-2017-3735,CVE-2017-3736
Description:

This update for openssl fixes the following issues:
Security issues fixed:


Advisory IDSUSE-SU-2017:1971-1
ReleasedThu Nov 30 22:58:14 2017
SummarySecurity update for binutils
Typesecurity
Severitymoderate
References1003846,1025282,1029907,1029908,1029909,1029995,1030296,1030297,1030298,1030583,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1033122,1037052,1037057,1037061,1037062,1037066,1037070,1037072,1037273,1038874,1038875,1038876,1038877,1038878,1038880,1038881,1044891,1044897,1044901,1044909,1044925,1044927,1046094,1052061,1052496,1052503,1052507,1052509,1052511,1052514,1052518,1053347,1056312,1056437,1057139,1057144,1057149,1058480,1059050,1060599,1060621,1061241,437293,445037,546106,561142,578249,590820,691290,698346,713504,776968,863764,938658,970239,CVE-2014-9939,CVE-2017-12448,CVE-2017-12450,CVE-2017-12452,CVE-2017-12453,CVE-2017-12454,CVE-2017-12456,CVE-2017-12799,CVE-2017-13757,CVE-2017-14128,CVE-2017-14129,CVE-2017-14130,CVE-2017-14333,CVE-2017-14529,CVE-2017-14729,CVE-2017-14745,CVE-2017-14974,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7227,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-7614,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8395,CVE-2017-8396,CVE-2017-8397,CVE-2017-8398,CVE-2017-8421,CVE-2017-9038,CVE-2017-9039,CVE-2017-9040,CVE-2017-9041,CVE-2017-9042,CVE-2017-9043,CVE-2017-9044,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2017-9954,CVE-2017-9955
Description:



GNU binutil was updated to the 2.29.1 release, bringing various new features, fixing a lot of bugs and security issues.
Following security issues are being addressed by this release:
* 18750 bsc#1030296 CVE-2014-9939 * 20891 bsc#1030585 CVE-2017-7225 * 20892 bsc#1030588 CVE-2017-7224 * 20898 bsc#1030589 CVE-2017-7223 * 20905 bsc#1030584 CVE-2017-7226 * 20908 bsc#1031644 CVE-2017-7299 * 20909 bsc#1031656 CVE-2017-7300 * 20921 bsc#1031595 CVE-2017-7302 * 20922 bsc#1031593 CVE-2017-7303 * 20924 bsc#1031638 CVE-2017-7301 * 20931 bsc#1031590 CVE-2017-7304 * 21135 bsc#1030298 CVE-2017-7209 * 21137 bsc#1029909 CVE-2017-6965 * 21139 bsc#1029908 CVE-2017-6966 * 21156 bsc#1029907 CVE-2017-6969 * 21157 bsc#1030297 CVE-2017-7210 * 21409 bsc#1037052 CVE-2017-8392 * 21412 bsc#1037057 CVE-2017-8393 * 21414 bsc#1037061 CVE-2017-8394 * 21432 bsc#1037066 CVE-2017-8396 * 21440 bsc#1037273 CVE-2017-8421 * 21580 bsc#1044891 CVE-2017-9746 * 21581 bsc#1044897 CVE-2017-9747 * 21582 bsc#1044901 CVE-2017-9748 * 21587 bsc#1044909 CVE-2017-9750 * 21594 bsc#1044925 CVE-2017-9755 * 21595 bsc#1044927 CVE-2017-9756 * 21787 bsc#1052518 CVE-2017-12448 * 21813 bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450, bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450 * 21933 bsc#1053347 CVE-2017-12799 * 21990 bsc#1058480 CVE-2017-14333 * 22018 bsc#1056312 CVE-2017-13757 * 22047 bsc#1057144 CVE-2017-14129 * 22058 bsc#1057149 CVE-2017-14130 * 22059 bsc#1057139 CVE-2017-14128 * 22113 bsc#1059050 CVE-2017-14529 * 22148 bsc#1060599 CVE-2017-14745 * 22163 bsc#1061241 CVE-2017-14974 * 22170 bsc#1060621 CVE-2017-14729
Update to binutils 2.29. [fate#321454, fate#321494, fate#323293]:
* The MIPS port now supports microMIPS eXtended Physical Addressing (XPA) instructions for assembly and disassembly. * The MIPS port now supports the microMIPS Release 5 ISA for assembly and disassembly. * The MIPS port now supports the Imagination interAptiv MR2 processor, which implements the MIPS32r3 ISA, the MIPS16e2 ASE as well as a couple of implementation-specific regular MIPS and MIPS16e2 ASE instructions. * The SPARC port now supports the SPARC M8 processor, which implements the Oracle SPARC Architecture 2017. * The MIPS port now supports the MIPS16e2 ASE for assembly and disassembly. * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX. * Add support for the wasm32 ELF conversion of the WebAssembly file format. * Add --inlines option to objdump, which extends the --line-numbers option so that inlined functions will display their nesting information. * Add --merge-notes options to objcopy to reduce the size of notes in a binary file by merging and deleting redundant notes. * Add support for locating separate debug info files using the build-id method, where the separate file has a name based upon the build-id of the original file.


* Add support for ELF SHF_GNU_MBIND. * Add support for the WebAssembly file format and wasm32 ELF conversion. * PowerPC gas now checks that the correct register class is used in instructions. For instance, 'addi %f4,%cr3,%r31' warns three times that the registers are invalid. * Add support for the Texas Instruments PRU processor. * Support for the ARMv8-R architecture and Cortex-R52 processor has been added to the ARM port.

* Support for -z shstk in the x86 ELF linker to generate GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program properties. * Add support for GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program properties in the x86 ELF linker. * Add support for GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program properties in the x86 ELF linker. * Support for -z ibtplt in the x86 ELF linker to generate IBT-enabled PLT. * Support for -z ibt in the x86 ELF linker to generate IBT-enabled PLT as well as GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program properties. * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX. * Add support for ELF GNU program properties. * Add support for the Texas Instruments PRU processor. * When configuring for arc*-*-linux* targets the default linker emulation will change if --with-cpu=nps400 is used at configure time. * Improve assignment of LMAs to orphan sections in some edge cases where a mixture of both AT>LMA_REGION and AT(LMA) are used. * Orphan sections placed after an empty section that has an AT(LMA) will now take an load memory address starting from LMA. * Section groups can now be resolved (the group deleted and the group members placed like normal sections) at partial link time either using the new linker option --force-group-allocation or by placing FORCE_GROUP_ALLOCATION into the linker script.


Minor security bugs fixed: PR 21147, PR 21148, PR 21149, PR 21150, PR 21151, PR 21155, PR 21158, PR 21159

* Add support for locating separate debug info files using the build-id method, where the separate file has a name based upon the build-id of the original file. * This version of binutils fixes a problem with PowerPC VLE 16A and 16D relocations which were functionally swapped, for example, R_PPC_VLE_HA16A performed like R_PPC_VLE_HA16D while R_PPC_VLE_HA16D performed like R_PPC_VLE_HA16A. This could have been fixed by renumbering relocations, which would keep object files created by an older version of gas compatible with a newer ld. However, that would require an ABI update, affecting other assemblers and linkers that create and process the relocations correctly. It is recommended that all VLE object files be recompiled, but ld can modify the relocations if --vle-reloc-fixup is passed to ld. If the new ld command line option is not used, ld will ld warn on finding relocations inconsistent with the instructions being relocated. * The nm program has a new command line option (--with-version-strings) which will display a symbol's version information, if any, after the symbol's name. * The ARC port of objdump now accepts a -M option to specify the extra instruction class(es) that should be disassembled. * The --remove-section option for objcopy and strip now accepts section patterns starting with an exclamation point to indicate a non-matching section. A non-matching section is removed from the set of sections matched by an earlier --remove-section pattern. * The --only-section option for objcopy now accepts section patterns starting with an exclamation point to indicate a non-matching section. A non-matching section is removed from the set of sections matched by an earlier --only-section pattern. * New --remove-relocations=SECTIONPATTERN option for objcopy and strip. This option can be used to remove sections containing relocations. The SECTIONPATTERN is the section to which the relocations apply, not the relocation section itself.

* Add support for the RISC-V architecture. * Add support for the ARM Cortex-M23 and Cortex-M33 processors.

* The EXCLUDE_FILE linker script construct can now be applied outside of the section list in order for the exclusions to apply over all input sections in the list. * Add support for the RISC-V architecture. * The command line option --no-eh-frame-hdr can now be used in ELF based linkers to disable the automatic generation of .eh_frame_hdr sections. * Add --in-implib= to the ARM linker to enable specifying a set of Secure Gateway veneers that must exist in the output import library specified by --out-implib= and the address they must have. As such, --in-implib is only supported in combination with --cmse-implib. * Extended the --out-implib= option, previously restricted to x86 PE targets, to any ELF based target. This allows the generation of an import library for an ELF executable, which can then be used by another application to link against the executable.
  • GOLD specific:

* Add -z bndplt option (x86-64 only) to support Intel MPX. * Add --orphan-handling option. * Add --stub-group-multi option (PowerPC only). * Add --target1-rel, --target1-abs, --target2 options (Arm only). * Add -z stack-size option. * Add --be8 option (Arm only). * Add HIDDEN support in linker scripts. * Add SORT_BY_INIT_PRIORITY support in linker scripts.
  • Other fixes:

* Fix section alignment on .gnu_debuglink. [bso#21193] * Add s390x to gold_archs. * Fix alignment frags for aarch64 (bsc#1003846) * Call ldconfig for libbfd * Fix an assembler problem with clang on ARM. * Restore monotonically increasing section offsets.

  • Update to binutils 2.27.

* Add a configure option, --enable-64-bit-archive, to force use of a 64-bit format when creating an archive symbol index. * Add --elf-stt-common= option to objcopy for ELF targets to control whether to convert common symbols to the STT_COMMON type.
  • GAS specific:

* Default to --enable-compressed-debug-sections=gas for Linux/x86 targets. * Add --no-pad-sections to stop the assembler from padding the end of output sections up to their alignment boundary. * Support for the ARMv8-M architecture has been added to the ARM port. Support for the ARMv8-M Security and DSP Extensions has also been added to the ARM port. * ARC backend accepts .extInstruction, .extCondCode, .extAuxRegister, and .extCoreRegister pseudo-ops that allow an user to define custom instructions, conditional codes, auxiliary and core registers. * Add a configure option --enable-elf-stt-common to decide whether ELF assembler should generate common symbols with the STT_COMMON type by default. Default to no. * New command line option --elf-stt-common= for ELF targets to control whether to generate common symbols with the STT_COMMON type. * Add ability to set section flags and types via numeric values for ELF based targets. * Add a configure option --enable-x86-relax-relocations to decide whether x86 assembler should generate relax relocations by default. Default to yes, except for x86 Solaris targets older than Solaris 12. * New command line option -mrelax-relocations= for x86 target to control whether to generate relax relocations. * New command line option -mfence-as-lock-add=yes for x86 target to encode lfence, mfence and sfence as 'lock addl $0x0, (%[re]sp)'. * Add assembly-time relaxation option for ARC cpus. * Add --with-cpu=TYPE configure option for ARC gas. This allows the default cpu type to be adjusted at configure time.
  • GOLD specific:

* Add a configure option --enable-relro to decide whether -z relro should be enabled by default. Default to yes. * Add support for s390, MIPS, AArch64, and TILE-Gx architectures. * Add support for STT_GNU_IFUNC symbols. * Add support for incremental linking (--incremental).
  • GNU ld specific:

* Add a configure option --enable-relro to decide whether -z relro should be enabled in ELF linker by default. Default to yes for all Linux targets except FRV, HPPA, IA64 and MIPS. * Support for -z noreloc-overflow in the x86-64 ELF linker to disable relocation overflow check. * Add -z common/-z nocommon options for ELF targets to control whether to convert common symbols to the STT_COMMON type during a relocatable link. * Support for -z nodynamic-undefined-weak in the x86 ELF linker, which avoids dynamic relocations against undefined weak symbols in executable. * The NOCROSSREFSTO command was added to the linker script language. * Add --no-apply-dynamic-relocs to the AArch64 linker to do not apply link-time values for dynamic relocations.


Advisory IDSUSE-RU-2017:2021-1
ReleasedFri Dec 8 10:11:04 2017
SummaryRecommended update for file
Typerecommended
Severitymoderate
References1070878,1070958
Description:

This update for file fixes detection of JPEG files.


Advisory IDSUSE-RU-2017:2031-1
ReleasedMon Dec 11 12:55:57 2017
SummaryRecommended update for gzip
Typerecommended
Severitylow
References1067891
Description:


This update for gzip provides the following fix:

  • Fix mishandling of leading zeros in the end-of-block code (bsc#1067891)


Advisory IDSUSE-RU-2017:2036-1
ReleasedWed Dec 13 16:34:21 2017
SummaryRecommended update for util-linux
Typerecommended
Severitylow
References1039276,1040968,1055446,1066500
Description:

This update for util-linux provides the following fixes:

  • Allow unmounting of filesystems without calling stat() on the mount point, when '-c' is used. (bsc#1040968)
  • Fix an infinite loop, a crash and report the correct minimum and maximum frequencies in lscpu for some processors. (bsc#1055446)
  • Fix a lscpu failure on Sydney Amazon EC2 region. (bsc#1066500)
  • If multiple subvolumes are mounted, report the default subvolume. (bsc#1039276)


Advisory IDSUSE-SU-2017:2097-1
ReleasedSat Dec 16 01:59:00 2017
SummarySecurity update for openssl
Typesecurity
Severityimportant
References1071905,1071906,CVE-2017-3737,CVE-2017-3738
Description:

This update for openssl fixes the following issues:

  • OpenSSL Security Advisory [07 Dec 2017] * CVE-2017-3737: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \'error state\' mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (bsc#1071905) * CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. (bsc#1071906)


Advisory IDSUSE-RU-2017:2137-1
ReleasedThu Dec 21 17:49:12 2017
SummaryRecommended update for dbus-1
Typerecommended
Severitymoderate
References1046173,1071698
Description:


This update for dbus-1 provides the following fixes:

  • The previously released fix for systemd-logind dbus disconnections was missing in some parts of the package, so properly apply it. (bsc#1071698)
  • Remove call to initscripts related macros from the spec file as dbus-1 does not ship any initscript anymore. (bsc#1046173)


Advisory IDSUSE-RU-2018:4-1
ReleasedTue Jan 2 15:58:20 2018
SummaryRecommended update for libzypp, zypper
Typerecommended
Severitymoderate
References1057640,1067605,1068708,1071466,969569
Description:

The Software Update Stack was updated to receive fixes and enhancements.
libzypp:

  • Don't store duplicated locks. (bsc#969569)
  • Fix default for solver.allowNameChange. (bsc#1071466)
  • Don't filter procs with a different mnt namespace. (bsc#1068708)
  • Support repo variables in an URIs host:port component. (bsc#1057640, bsc#1067605)

zypper:
  • Update manpage regarding custom repository variable fixes. (bsc#1057640, bsc#1067605)


Advisory IDSUSE-RU-2018:38-1
ReleasedTue Jan 9 14:56:43 2018
SummaryRecommended update for kmod
Typerecommended
Severitylow
References1070209
Description:


This update for kmod provides the following fix:

  • Fix resolving .TOC. in modules on 4.4 and older kernel (bsc#1070209)
  • Fix kernel master build for ppc64le (bsc#1070209)


Advisory IDSUSE-SU-2018:55-1
ReleasedFri Jan 12 09:45:49 2018
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1051042,1053188,1063675,1064569,1064580,1064583,1070905,1071319,1073231,1074293,CVE-2017-1000408,CVE-2017-1000409,CVE-2017-15670,CVE-2017-15671,CVE-2017-15804,CVE-2017-16997,CVE-2018-1000001
Description:

This update for glibc fixes the following issues:

  • A privilege escalation bug in the realpath() function has been fixed. [CVE-2018-1000001, bsc#1074293]

  • A memory leak and a buffer overflow in the dynamic ELF loader has been fixed. [CVE-2017-1000408, CVE-2017-1000409, bsc#1071319]

  • An issue in the code handling RPATHs was fixed that could have been exploited by an attacker to execute code loaded from arbitrary libraries. [CVE-2017-16997, bsc#1073231]

  • A potential crash caused by a use-after-free bug in pthread_create() has been fixed. [bsc#1053188]

  • A bug that prevented users to build shared objects which use the optimized libmvec.so API has been fixed. [bsc#1070905]

  • A memory leak in the glob() function has been fixed. [CVE-2017-15670, CVE-2017-15671, CVE-2017-15804, bsc#1064569, bsc#1064580, bsc#1064583]

  • A bug that would lose the syscall error code value in case of crashes has been fixed. [bsc#1063675]


Advisory IDSUSE-SU-2018:68-1
ReleasedMon Jan 15 11:30:39 2018
SummarySecurity update for openslp
Typesecurity
Severitymoderate
References1001600,974655,980722,994989,CVE-2016-4912,CVE-2016-7567
Description:

This update for openslp fixes two security issues and two bugs.
The following vulnerabilities were fixed:

  • CVE-2016-4912: A remote attacker could have crashed the server with a large number of packages (bsc#980722)
  • CVE-2016-7567: A remote attacker could cause a memory corruption having unspecified impact (bsc#1001600)

The following bugfix changes are included:
  • bsc#994989: Removed convenience code as changes bytes in the message buffer breaking the verification code
  • bsc#974655: Removed no longer needed slpd init file


Advisory IDSUSE-SU-2018:86-1
ReleasedWed Jan 17 09:38:17 2018
SummarySecurity update for ncurses
Typesecurity
Severitymoderate
References1056127,1056128,1056129,1056131,1056132,1056136,CVE-2017-13728,CVE-2017-13729,CVE-2017-13730,CVE-2017-13731,CVE-2017-13732,CVE-2017-13733
Description:

This update for ncurses fixes the following issues:
Security issues fixed:

  • CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
  • CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
  • CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
  • CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
  • CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
  • CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).


Advisory IDSUSE-SU-2018:88-1
ReleasedWed Jan 17 14:41:17 2018
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1069222,1069226,CVE-2017-8816,CVE-2017-8817
Description:

This update for curl fixes the following issues:
Security issues fixed:

  • CVE-2017-8816: Buffer overrun flaw in the NTLM authentication code (bsc#1069226).
  • CVE-2017-8817: Read out of bounds flaw in the FTP wildcard function (bsc#1069222).


Advisory IDSUSE-RU-2018:90-1
ReleasedWed Jan 17 14:44:33 2018
SummaryRecommended update for lvm2
Typerecommended
Severitylow
References1063051,1067312
Description:


This update for lvm2 provides the following fix:

  • Backport various upstream fixes for clvmd. (bsc#1063051)
  • Don't print error messages on testing the connection to the daemon. (bsc#1063051)
  • Fix handling of udev CHANGE events with systemd. (bsc#1067312)


Advisory IDSUSE-RU-2018:146-1
ReleasedThu Jan 25 11:44:23 2018
SummaryRecommended update for openldap2
Typerecommended
Severitymoderate
References1064397,1065083
Description:

This update for openldap2 provides the following fixes:

  • Fix a leak of sockets in case of unsuccessful connection attempts. (bsc#1065083)
  • Fix a crash that would happen under heavy load when using back-relay. (bsc#1064397)


Advisory IDSUSE-SU-2018:149-1
ReleasedThu Jan 25 13:38:37 2018
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1077001,CVE-2018-1000007
Description:

This update for curl fixes one issues.
This security issue was fixed:

  • CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)


Advisory IDSUSE-SU-2018:209-1
ReleasedTue Jan 30 10:53:43 2018
SummarySecurity update for ncurses
Typesecurity
Severitymoderate
References1056126,1056127,1056128,1056129,1056131,1056132,1056136,CVE-2017-13728,CVE-2017-13729,CVE-2017-13730,CVE-2017-13731,CVE-2017-13732,CVE-2017-13733,CVE-2017-13734
Description:

This update for ncurses fixes several issues.
These security issues were fixed:

  • CVE-2017-13734: Prevent illegal address access in the _nc_safe_strcat function in strings.c that might have lead to a remote denial of service attack (bsc#1056126).
  • CVE-2017-13733: Prevent illegal address access in the fmt_entry function in progs/dump_entry.c that might have lead to a remote denial of service attack (bsc#1056127).
  • CVE-2017-13732: Prevent illegal address access in the function dump_uses() in progs/dump_entry.c that might have lead to a remote denial of service attack (bsc#1056128).
  • CVE-2017-13731: Prevent illegal address access in the function postprocess_termcap() in parse_entry.c that might have lead to a remote denial of service attack (bsc#1056129).
  • CVE-2017-13730: Prevent illegal address access in the function _nc_read_entry_source() in progs/tic.c that might have lead to a remote denial of service attack (bsc#1056131).
  • CVE-2017-13729: Prevent illegal address access in the _nc_save_str function in alloc_entry.c that might have lead to a remote denial of service attack (bsc#1056132).
  • CVE-2017-13728: Prevent infinite loop in the next_char function in comp_scan.c that might have lead to a remote denial of service attack (bsc#1056136).


Advisory IDSUSE-SU-2018:213-1
ReleasedTue Jan 30 14:36:40 2018
SummarySecurity update for systemd
Typesecurity
Severitymoderate
References1048510,1065276,1066156,1068251,1070428,1071558,1074254,1075724,1076308,897422,CVE-2017-15908,CVE-2018-1049
Description:

This update for systemd fixes several issues.
This security issue was fixed:

  • CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).

These non-security issues were fixed:
  • core: don't choke if a unit another unit triggers vanishes during reload
  • delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX
  • delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428)
  • delta: check if a prefix needs to be skipped only once
  • delta: skip symlink paths when split-usr is enabled (#4591)
  • sysctl: use raw file descriptor in sysctl_write (#7753)
  • sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254)
  • Fix the regexp used to detect broken by-id symlinks in /etc/crypttab It was missing the following case: '/dev/disk/by-id/cr_-xxx'.
  • sysctl: disable buffer while writing to /proc (bsc#1071558)
  • Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558)
  • sysctl: no need to check for eof twice
  • def: add new constant LONG_LINE_MAX
  • fileio: add new helper call read_line() as bounded getline() replacement
  • service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156)
  • gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280)
  • gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422)
  • fstab-util: introduce fstab_has_fstype() helper
  • fstab-generator: ignore root=/dev/nfs (#3591)
  • fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452)
  • virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510)
  • analyze: replace --no-man with --man=no in the man page (bsc#1068251)
  • udev: net_setup_link: don't error out when we couldn't apply link config (#7328)
  • Add missing /etc/systemd/network directory
  • Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510)
  • sd-bus: use -- when passing arguments to ssh (#6706)
  • systemctl: make sure we terminate the bus connection first, and then close the pager (#3550)
  • sd-bus: bump message queue size (bsc#1075724)
  • tmpfiles: downgrade warning about duplicate line


Advisory IDSUSE-SU-2018:214-1
ReleasedTue Jan 30 14:37:42 2018
SummarySecurity update for libtasn1
Typesecurity
Severitymoderate
References1076832,CVE-2018-6003
Description:

This update for libtasn1 fixes one issue.
This security issue was fixed:

  • CVE-2018-6003: Prevent a stack exhaustion in _asn1_decode_simple_ber (lib/decoding.c) when decoding BER encoded structure allowed for DoS (bsc#1076832).


Advisory IDSUSE-SU-2018:276-1
ReleasedThu Feb 8 17:47:43 2018
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1077993,1078806,1078813,CVE-2016-5131,CVE-2017-15412,CVE-2017-5130
Description:

This update for libxml2 fixes one issue.
This security issue was fixed:

  • CVE-2017-15412: Prevent use after free when calling XPath extension functions that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
  • CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. (bsc#1078813)
  • CVE-2017-5130: Fixed a potential remote buffer overflow in function xmlMemoryStrdup() (bsc#1078806)


Advisory IDSUSE-RU-2018:291-1
ReleasedMon Feb 12 11:50:39 2018
SummaryRecommended update for bash
Typerecommended
Severitylow
References1057452,1076909
Description:

This update for bash provides the following fix:

  • Allow process group assignment on all kernel versions to fix the usage of debug traps. (bsc#1057452)
  • Fix a crash when filesystem is full. (bsc#1076909)
  • Enable multi-byte characters by default.


Advisory IDSUSE-SU-2018:314-1
ReleasedThu Feb 15 14:47:35 2018
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1037930,1051791,1073990,1074293,1079036,CVE-2017-12132,CVE-2017-8804,CVE-2018-1000001,CVE-2018-6485,CVE-2018-6551
Description:


This update for glibc fixes the following issues:
Security issues fixed:

  • CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
  • CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
  • CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
  • CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)

Non security bugs fixed:
  • Release read lock after resetting timeout (bsc#1073990)


Advisory IDSUSE-SU-2018:336-1
ReleasedWed Feb 21 14:26:52 2018
SummarySecurity update for libdb-4_8
Typesecurity
Severitymoderate
References1043886
Description:

This update for libdb-4_8 fixes the following issues:

  • A DB_CONFIG file in the current working directory allowed local users to obtain sensitive information via a symlink attack involving a setgid or setuid application using libdb-4_8. (bsc#1043886)


Advisory IDSUSE-SU-2018:355-1
ReleasedMon Feb 26 16:34:46 2018
SummarySecurity update for systemd
Typesecurity
Severitymoderate
References1057974,1068588,1071224,1071311,1075801,1077925,CVE-2017-18078
Description:


This update for systemd fixes the following issues:
Security issue fixed:

  • CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are hardlinked, unless protected_hardlinks sysctl is on. This could be used by local attackers to gain privileges (bsc#1077925)

Non Security issues fixed:
  • core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
  • cryptsetup-generator: run cryptsetup service before swap unit (#5480)
  • udev-rules: all values can contain escaped double quotes now (#6890)
  • strv: fix buffer size calculation in strv_join_quoted()
  • tmpfiles: change ownership of symlinks too
  • stdio-bridge: Correctly propagate error
  • stdio-bridge: remove dead code
  • remove bus-proxyd (bsc#1057974)
  • core/timer: Prevent timer looping when unit cannot start (bsc#1068588)

  • Make systemd-timesyncd use the openSUSE NTP servers by default Previously systemd-timesyncd used the Google Public NTP servers time{1..4}.google.com

  • Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224) But we still ship a copy in /var. Users who want to use tmpfs on /tmp are supposed to add a symlink in /etc/ pointing to the copy shipped in /var. To support the update path we automatically create the symlink if tmp.mount in use is located in /usr.

  • Enable systemd-networkd on Leap distros only (bsc#1071311)


Advisory IDSUSE-RU-2018:375-1
ReleasedWed Feb 28 16:33:37 2018
SummaryRecommended update for net-tools
Typerecommended
Severitylow
References1009905,1063910
Description:


This update for net-tools provides the following fix:

  • netstat: fix handling of large socket numbers (bsc#1063910)


Advisory IDSUSE-SU-2018:439-1
ReleasedFri Mar 9 14:05:22 2018
SummarySecurity update for augeas
Typesecurity
Severitylow
References1054171,CVE-2017-7555
Description:

This update for augeas fixes the following issues:
Security issue fixed:

  • CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).


Advisory IDSUSE-SU-2018:443-1
ReleasedFri Mar 9 18:02:14 2018
SummarySecurity update for glibc
Typesecurity
Severitymoderate
References1081556,CVE-2017-12133
Description:

This update for glibc fixes the following issues:

  • CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)


Advisory IDSUSE-SU-2018:446-1
ReleasedMon Mar 12 13:13:55 2018
SummarySecurity update for shadow
Typesecurity
Severitymoderate
References1081294,CVE-2018-7169
Description:

This update for shadow fixes the following issues:

  • CVE-2018-7169: Fixed an privilege escalation in newgidmap, which allowed an unprivileged user to be placed in a user namespace where setgroups(2) is allowed. (bsc#1081294)


Advisory IDSUSE-RU-2018:465-1
ReleasedThu Mar 15 07:38:52 2018
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1075743,1078358,1081170
Description:

This update for systemd fixes the following issues:

  • Add dmi/id conditions to 80-acpi-container-hotplug.rules to restrict the rule that it can only be triggered on Huawei Kunlun 9008, 9016 and 9032 machines. (bsc#1078358, bsc#1081170, bsc#1075743)


Advisory IDSUSE-RU-2018:472-1
ReleasedThu Mar 15 10:47:40 2018
SummaryRecommended update for libsolv, libzypp, zypper
Typerecommended
Severitylow
References1074687,1075449,1076415,1079334,953130
Description:

This update for libsolv, libzypp and zypper provides the following fixes:
libsolv:

  • Fix a bug that could make fileconflict detection very slow in some cases. (bnc#953130)
  • Add new configuration options: ENABLE_RPMDB_LIBRPM and ENABLE_RPMPKG_LIBRPM.
  • Add a new function to change the whatprovides data: pool_set_whatprovides.
  • Significant improvements in the selection code.

libzypp:
  • Make sure deleted keys are also removed from rpmdb. (bsc#1075449)
  • plugin: Don't reject header values containing ':'. (bsc#1074687)
  • RpmDb::checkPackage: Fix parsing localized rpm output. (bsc#1076415)

zypper:
  • Do not recommend cron as it is not a direct dependency of zypper. (bsc#1079334)


Advisory IDSUSE-SU-2018:522-1
ReleasedThu Mar 22 08:20:46 2018
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1084521,1084524,1084532,CVE-2018-1000120,CVE-2018-1000121,CVE-2018-1000122
Description:

This update for curl fixes the following issues:
Following security issues were fixed:

  • CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
  • CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
  • CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).


Advisory IDSUSE-SU-2018:567-1
ReleasedThu Mar 29 14:02:08 2018
SummarySecurity update for krb5
Typesecurity
Severitymoderate
References1057662,1081725,1083926,1083927,CVE-2018-5729,CVE-2018-5730
Description:

This update for krb5 provides the following fixes:
Security issues fixed:

  • CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
  • CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).

Non-security issues fixed:
  • Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with newer Kerberos. System administrators who are experiencing this kind of compatibility issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value, and make sure the environment variable is visible and effective to the application startup script. (bsc#1057662)
  • Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in gss_indicate_mech() list. (bsc#1081725)


Advisory IDSUSE-SU-2018:594-1
ReleasedThu Apr 5 17:22:37 2018
SummarySecurity update for libidn
Typesecurity
Severitymoderate
References1056450,CVE-2017-14062
Description:

This update for libidn fixes one issues.
This security issue was fixed:

  • CVE-2017-14062: Prevent integer overflow in the decode_digit function that allowed remote attackers to cause a denial of service or possibly have unspecified other impact (bsc#1056450).


Advisory IDSUSE-SU-2018:624-1
ReleasedWed Apr 11 18:02:57 2018
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1087102,CVE-2018-0739
Description:

This update for openssl fixes the following issues:
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. (bsc#1087102).


Advisory IDSUSE-SU-2018:730-1
ReleasedWed Apr 25 14:14:41 2018
SummarySecurity update for perl
Typesecurity
Severitymoderate
References1082216,1082233,1082234,CVE-2018-6797,CVE-2018-6798,CVE-2018-6913
Description:

This update for perl fixes the following issues:
Security issues fixed:

  • CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
  • CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
  • CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).


Advisory IDSUSE-RU-2018:736-1
ReleasedWed Apr 25 14:23:49 2018
SummaryRecommended update for libsolv, libzypp
Typerecommended
Severitymoderate
References1075978,1077635,1079991,1082318,1086602
Description:

This update for libsolv, libzypp provides the following fixes:
Changes in libsolv:

  • Make sure the product file comes from /etc/products.d for the fallback product search. (bsc#1086602)
  • Also make use of suggests for ordering packages. (bsc#1077635)
  • Fix bad assignment in solution refinement that led to a memory leak. (bsc#1075978)
  • Use license tag instead of doc in the spec file. (bsc#1082318)

Changes in libzypp:
  • Make sure the product file comes from /etc/products.d for the fallback product search. (bsc#1086602)
  • Fix a memory leak in Digest.cc. (bsc#1075978)
  • Add /var/lib/gdm to CheckAccessDeleted blacklist to prevent showing superfluous `zypper ps -s` messages. (bsc#1079991)


Advisory IDSUSE-RU-2018:779-1
ReleasedWed May 2 22:16:26 2018
SummaryRecommended update for rpm
Typerecommended
Severitylow
References1003714,1027925,1069934
Description:


This update for rpm provides the following fixes:

  • Fix find-lang.sh to handle special case of .qm file paths correctly. (bsc#1027925)
  • Add %sle_version macro to suse_macros. (bsc#1003714)
  • Added a %rpm_vercmp macro which accepts two versions as parameters and returns -1, 0, 1 if the first version is less than, equal or greater than the second version respectively.
  • Added a %pkg_version macro that accepts a package or capability name as argument and returns the version number of the installed package. If no package provides the argument, it returns the string '~~~'.
  • Added a %pkg_vcmp macro that accepts 3 parameters. The first parameter is a package name or provided capability name, the second argument is an operator ( < <= = >= > != ) and the third parameter is a version string to be compared to the installed version of the first argument.
  • Added a %pkg_version_cmp macro which accepts a package or capability name as first argument and a version number as second argument and returns -1, 0, 1 or '~~~'. The number values have the same meaning as in %rpm_vercmp and the '~~~' string is returned if the package or capability can't be found. (bsc#1069934)


Advisory IDSUSE-RU-2018:797-1
ReleasedMon May 7 07:07:38 2018
SummaryRecommended update for gcc7
Typerecommended
Severityimportant
References1061667,1068967,1074621,1083290,1083946,1084812,1087550,1087930
Description:


This update for gcc7 to 7.3 release fixes the following issues:

  • Update to GCC 7.3 release and further updated to gcc-7-branch head (r258812).
  • The Spectre v2 mitigation patch for s390x is now included. [bsc#1083946]
  • Adds backport of x86 retpoline support via -mindirect-branch=, -mfunction-return= and friends. [bsc#1074621]
  • Update includes a fix for chromium build failure. [bsc#1083290]
  • Various AArch64 compile fixes are included:

* Picks fix to no longer enable -mpc-relative-literal-loads by default with --enable-fix-cortex-a53-843419. * Enable --enable-fix-cortex-a53-843419 for aarch64. [bsc#1084812] [bsc#1087930] * Enable --enable-fix-cortex-a53-835769 for aarch64. * Contains fix for PR82445 which is about a RPI1 bootloader miscompile. [bsc#1061667] * Fixed bogus stack probe instruction on ARM. [bsc#1068967]
  • Revert the ios_base::failure ABI back to compatible behavior with the default ABI. [bsc#1087550]

  • Fix nvptx offload target compiler install so GCC can pick up required files. Split out the newlib part into cross-nvptx-newlib7-devel and avoid conflicts with GCC 8 variant via Provides/Conflicts of cross-nvptx-newlib-devel.


Advisory IDSUSE-RU-2018:906-1
ReleasedMon May 14 15:18:26 2018
SummaryRecommended update for binutils
Typerecommended
Severitymoderate
References1075418
Description:

This update for binutils fixes the following issues:

  • Fix pacemaker libqb problem with section start/stop symbols. (bsc#1075418)


Advisory IDSUSE-SU-2018:939-1
ReleasedThu May 17 08:41:30 2018
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1086825,1092098,CVE-2018-1000301
Description:

This update for curl fixes several issues:
Security issues fixed:

  • CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:
  • If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing. (bsc#1086825)


Advisory IDSUSE-RU-2018:974-1
ReleasedWed May 23 16:46:50 2018
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1045092,1051465,1066422,1075804,1082485,1084626,1085062,1086785,1087323
Description:

This update for systemd provides the following fixes:

  • sysusers: Do not append entries after the NIS ones. (bsc#1085062, bsc#1045092)
  • sysusers: Also add support for NIS entries in /etc/shadow.
  • sysusers: Make sure to reset errno before calling fget*ent().
  • coredump: Respect ulimit -c 0 settings. (bsc#1075804)
  • systemctl: Don't make up unit states, and don't eat up errors too eagerly. (bsc#1084626)
  • systemctl: Don't mangle unit names in check_unit_generic().
  • rules, compat-rules: Fix errors detected by the rule syntax checker.
  • python: Use raw strings for regexp patterns.
  • compat-rules: Make path_id_compat build with meson.
  • compat-rules: Get rid of scsi_id when generating compat symlinks for NVMe devices. (bsc#1051465)
  • Fix memory hotplugging.
  • systemd: Add offline environmental condition to the udev rules for acpi container to prevent them from being triggered by the 'udevadm trigger' from user space. (bsc#1082485)
  • systemd-udevd: Limit children-max by the available memory. (bsc#1086785, bsc#1066422)
  • Rename the tarball to reflect the exact version used, so that it is clear that it contains some additional patches on top of the upstream version. Use the commit hash in the name so the exact version can easily be identified. (bsc#1087323)


Advisory IDSUSE-SU-2018:977-1
ReleasedWed May 23 17:14:16 2018
SummarySecurity update for bash
Typesecurity
Severitymoderate
References1000396,1001299,1086247,CVE-2016-0634,CVE-2016-7543
Description:

This update for bash fixes the following issues:
Security issues fixed:

  • CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
  • CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:
  • Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)


Advisory IDSUSE-RU-2018:978-1
ReleasedWed May 23 17:18:39 2018
SummaryRecommended update for zlib
Typerecommended
Severitymoderate
References1071321
Description:

This update for zlib fixes the following issues:

  • Fix a segmentation fault which was raised when converting a negative value into an unsigned integer (bsc#1071321)


Advisory IDSUSE-RU-2018:1028-1
ReleasedTue Jun 5 13:20:44 2018
SummaryRecommended update for pam
Typerecommended
Severitylow
References1089884
Description:

This update for pam fixes the following issues:

  • Fix order of accessed configuration files in man page. (bsc#1089884)


Advisory IDSUSE-SU-2018:1077-1
ReleasedWed Jun 6 11:44:25 2018
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1086690,1094150,1094154,1094161,CVE-2017-18269,CVE-2018-11236,CVE-2018-11237
Description:


This update for glibc fixes the following issues:

  • CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
  • CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
  • CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:
  • Fix crash in resolver on memory allocation failure (bsc#1086690)


Advisory IDSUSE-RU-2018:1082-1
ReleasedThu Jun 7 12:58:56 2018
SummaryRecommended update for rpm
Typerecommended
Severitymoderate
References1073879,1080078,964063
Description:

This update for rpm fixes the following issues:

  • Backport support for no_recompute_build_ids macro. (bsc#964063)
  • Fix code execution when evaluating common python-related macros. (bsc#1080078)

Additionally, this update adds python3-rpm to the SUSE Linux Enterprise Server.


Advisory IDSUSE-SU-2018:1141-1
ReleasedFri Jun 15 13:41:08 2018
SummarySecurity update for gpg2
Typesecurity
Severityimportant
References1096745,CVE-2018-12020
Description:

This update for gpg2 fixes the following security issue:

  • CVE-2018-12020: GnuPG mishandled the original filename during decryption and verification actions, which allowed remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2' option (bsc#1096745)


Advisory IDSUSE-RU-2018:1145-1
ReleasedFri Jun 15 19:19:51 2018
SummaryRecommended update for openssl
Typerecommended
Severitymoderate
References1090765
Description:

This update for openssl provides the following fix:

  • Suggest libopenssl1_0_0-hmac from libopenssl1_0_0 package to avoid dependency issues during updates. (bsc#1090765)


Advisory IDSUSE-RU-2018:1156-1
ReleasedTue Jun 19 15:10:45 2018
SummaryRecommended update for openslp
Typerecommended
Severitymoderate
References1076035,1080964
Description:

This update for openslp provides the following fixes:

  • Fix slpd using the peer address as local address for TCP connections. (bsc#1076035)
  • Use TCP connections for unicast requests. (bsc#1080964)


Advisory IDSUSE-RU-2018:1193-1
ReleasedWed Jun 20 18:48:16 2018
SummaryRecommended update for openslp
Typerecommended
Severitymoderate
References1076035,1080964
Description:

This update for openslp provides the following fixes:

  • Fix slpd using the peer address as local address for TCP connections. (bsc#1076035)
  • Use TCP connections for unicast requests. (bsc#1080964)


Advisory IDSUSE-SU-2018:1242-1
ReleasedThu Jun 28 13:44:16 2018
SummarySecurity update for procps
Typesecurity
Severitymoderate
References1092100,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126
Description:

This update for procps fixes the following security issues:

  • CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top with HOME unset in an attacker-controlled directory, the attacker could have achieved privilege escalation by exploiting one of several vulnerabilities in the config_file() function (bsc#1092100).
  • CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maped a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service) (bsc#1092100).
  • CVE-2018-1124: Prevent multiple integer overflows leading to a heap corruption in file2strvec function. This allowed a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users (bsc#1092100).
  • CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
  • CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent truncation/integer overflow issues (bsc#1092100).


Advisory IDSUSE-SU-2018:1276-1
ReleasedThu Jul 5 08:36:17 2018
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1097158,1097624,1098592,CVE-2018-0732
Description:

This update for openssl fixes the following issues:

  • CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
  • Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)


Advisory IDSUSE-SU-2018:1328-1
ReleasedTue Jul 17 08:07:57 2018
SummarySecurity update for perl
Typesecurity
Severityimportant
References1068565,1082216,1082233,1082234,1096718,CVE-2018-12015,CVE-2018-6797,CVE-2018-6798,CVE-2018-6913
Description:

This update for perl fixes the following issues:
These security issue were fixed:

  • CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
  • CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
  • CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
  • CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a directory-traversal protection mechanism and overwrite arbitrary files (bsc#1096718)

This non-security issue was fixed:
  • fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]


Advisory IDSUSE-SU-2018:1351-1
ReleasedThu Jul 19 09:43:21 2018
SummarySecurity update for shadow
Typesecurity
Severityimportant
References1099310,CVE-2016-6252
Description:

This update for shadow fixes the following issues:

  • CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)


Advisory IDSUSE-SU-2018:1400-1
ReleasedThu Jul 26 16:32:29 2018
SummarySecurity update for util-linux
Typesecurity
Severitymoderate
References1072947,1078662,1080740,1084300,CVE-2018-7738
Description:

This update for util-linux fixes the following issues:
This non-security issue was fixed:

  • CVE-2018-7738: bash-completion/umount allowed local users to gain privileges by embedding shell commands in a mountpoint name, which was mishandled during a umount command by a different user (bsc#1084300).

These non-security issues were fixed:
  • Fixed crash loop in lscpu (bsc#1072947).
  • Fixed possible segfault of umount -a
  • Fixed mount -a on NFS bind mounts (bsc#1080740).
  • Fixed lsblk on NVMe (bsc#1078662).


Advisory IDSUSE-SU-2018:1413-1
ReleasedFri Jul 27 12:41:13 2018
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References1064455,1090766,1097410,CVE-2018-0495
Description:

This update for libgcrypt fixes the following issues:
The following security vulnerability was addressed:

  • CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for ECDSA signatures (bsc#1097410).

The following other issues were fixed:
  • Extended the fipsdrv dsa-sign and dsa-verify commands with the --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
  • Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)


Advisory IDSUSE-RU-2018:1450-1
ReleasedMon Jul 30 10:10:45 2018
SummaryRecommended update for pam
Typerecommended
Severitylow
References1096282
Description:

This update for pam provides the following fix:

  • Added /etc/security/limits.d to the pam package. (bsc#1096282)


Advisory IDSUSE-RU-2018:1549-1
ReleasedMon Aug 13 13:41:22 2018
SummaryRecommended update for sg3_utils
Typerecommended
Severitylow
References1065448,1070431,1077787,1092640
Description:

This update for sg3_utils provides the following fix:

  • Decode standard INQUIRY for CD-ROMs correctly. (bsc#1065448, bsc#1070431)
  • Fix page decoding. (bsc#1077787)
  • Remove initrd rebuild macros for libsgutils2 subpackage. (bsc#1092640)
  • Use %post -p for ldconfig. (bsc#1092640)


Advisory IDSUSE-SU-2018:1610-1
ReleasedThu Aug 16 14:04:25 2018
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References1064455,1090766,1097410,CVE-2018-0495
Description:

This update for libgcrypt fixes the following issues:
The following security vulnerability was addressed:

  • CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for ECDSA signatures (bsc#1097410).

The following other issues were fixed:
  • Extended the fipsdrv dsa-sign and dsa-verify commands with the --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
  • Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)


Advisory IDSUSE-SU-2018:1620-1
ReleasedThu Aug 16 14:49:45 2018
SummarySecurity update for shadow
Typesecurity
Severityimportant
References1099310,CVE-2016-6252
Description:

This update for shadow fixes the following issues:

  • CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)


Advisory IDSUSE-RU-2018:1632-1
ReleasedThu Aug 16 15:27:04 2018
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1039099,1080382,1082004,1082485,1083158,1088052,1088769,1088890,1089761,1090785,1091265,1093851,1095096
Description:

This update for systemd fixes the following issues:

  • core: In --user mode, report READY=1 as soon as basic.target is reached.
  • sd-bus: Extend D-Bus authentication timeout considerably.
  • scsi_id: Fixup prefix for pre-SPC inquiry reply. (bsc#1039099)
  • udev: Use MAC address match only for ibmveth/ibmvnic/mlx4. (bsc#1095096)
  • compat-rules: Generate more compat by-id symlinks for NVMe devices. (bsc#1095096)
  • udev: Whitelist mlx4_core locally-administered MAC addresses in the persistent rule generator. (bsc#1083158)
  • udev: Don't create by-partlabel/primary and .../logical symlinks. (bsc#1089761)
  • rules: Add /dev/disk/by-partuuid symlinks also for dos partition tables.
  • device: Make sure to always retroactively start device dependencies. (bsc#1088052)
  • device: Skip deserialization of device units when udevd is not running.
  • install: 'user' and 'global' scopes are equivalent for user presets. (bsc#1093851)
  • install: Search preset files in /run.
  • man: Updated systemd-analyze blame description for service-units with Type=simple. (bsc#1091265)
  • logind: Fix crash when shutdown is not issued from a tty. (bsc#1088890)
  • logind: Do not use an uninitialized variable. (bsc#1088890)
  • Disable user services by default. (bsc#1090785)
  • Ship 99-sysctl.conf instead of creating it during package installation/update. (bsc#1088769) Previously this symlink was created in /etc/sysctl.d during %post which made the symlink not owned and more importantly it was created only if /etc/sysctl.conf is already installed which is not always the case during the installation process it seems. So ship the symlink unconditionally and put it in /usr/lib/sysctl.d instead since it's a distro default behavior that might be overriden by sysadmin later.
  • systemd: Add offline environmental condition to 80-acpi-container-hotplug.rules. (bsc#1080382, bsc#1082485) Add the offline event environmental condition to restrict the rule that is can only be triggered when the change event is received with the 'offline' environmental data. The 27664c581 'ACPI / scan: Send change uevent with offine environmental data' kernel patch changed the corresponding code in kernel. This change prevents the udev rules for acpi container be triggered by 'udevadm trigger' from user space.
  • build-sys: Explicitly require python3. (bsc#1082004)


Advisory IDSUSE-RU-2018:1636-1
ReleasedThu Aug 16 15:30:11 2018
SummaryRecommended update for pam
Typerecommended
Severitylow
References1096282
Description:

This update for pam provides the following fix:

  • Added /etc/security/limits.d to the pam package. (bsc#1096282)


Advisory IDSUSE-RU-2018:1688-1
ReleasedMon Aug 20 09:02:23 2018
SummaryRecommended update for openslp
Typerecommended
Severitymoderate
References1076035,1080964
Description:

This update for openslp provides the following fixes:

  • Fix slpd using the peer address as local address for TCP connections. (bsc#1076035)
  • Use TCP connections for unicast requests. (bsc#1080964)


Advisory IDSUSE-RU-2018:1689-1
ReleasedMon Aug 20 09:02:24 2018
SummaryRecommended update for pam
Typerecommended
Severitylow
References1096282
Description:

This update for pam provides the following fix:

  • Added /etc/security/limits.d to the pam package. (bsc#1096282)


Advisory IDSUSE-RU-2018:1691-1
ReleasedMon Aug 20 09:04:17 2018
SummaryRecommended update for sg3_utils
Typerecommended
Severitylow
References1065448,1070431,1077787,1092640
Description:

This update for sg3_utils provides the following fix:

  • Decode standard INQUIRY for CD-ROMs correctly. (bsc#1065448, bsc#1070431)
  • Fix page decoding. (bsc#1077787)
  • Remove initrd rebuild macros for libsgutils2 subpackage. (bsc#1092640)
  • Use %post -p for ldconfig. (bsc#1092640)


Advisory IDSUSE-SU-2018:1695-1
ReleasedMon Aug 20 09:19:20 2018
SummarySecurity update for perl
Typesecurity
Severityimportant
References1068565,1082216,1082233,1082234,1096718,CVE-2018-12015,CVE-2018-6797,CVE-2018-6798,CVE-2018-6913
Description:

This update for perl fixes the following issues:
These security issue were fixed:

  • CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
  • CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
  • CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
  • CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a directory-traversal protection mechanism and overwrite arbitrary files (bsc#1096718)

This non-security issue was fixed:
  • fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]


Advisory IDSUSE-SU-2018:1698-1
ReleasedMon Aug 20 09:19:28 2018
SummarySecurity update for shadow
Typesecurity
Severityimportant
References1099310,CVE-2016-6252
Description:

This update for shadow fixes the following issues:

  • CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)


Advisory IDSUSE-RU-2018:1834-1
ReleasedWed Sep 5 10:17:42 2018
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1089761,1090944,1101040,1103910
Description:

This update for systemd fixes the following issues:

  • cryptsetup: Add support for sector-size= option. (fate#325634)
  • resolved: Apply epoch to system time from PID 1. (bsc#1103910)
  • core/service: Rework the hold-off time over message.
  • core: Don't freeze OnCalendar= timer units when the clock goes back a lot. (bsc#1090944)
  • man: SystemMaxUse= clarification in journald.conf(5). (bsc#1101040)
  • Add udev.no-partlabel-links kernel command-line option. This option can be used to disable the generation of the by-partlabel symlinks regardless of the name used. (bsc#1089761)


Advisory IDSUSE-SU-2018:1903-1
ReleasedFri Sep 14 12:46:21 2018
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1089533,1106019,CVE-2018-14618
Description:

This update for curl fixes the following issues:
This security issue was fixed:

  • CVE-2018-14618: Prevent integer overflow in the NTLM authentication code (bsc#1106019)

This non-security issue was fixed:
  • Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)


Advisory IDSUSE-SU-2018:1942-1
ReleasedFri Sep 21 07:51:02 2018
SummarySecurity update for openslp
Typesecurity
Severityimportant
References1090638,CVE-2017-17833
Description:

This update for openslp fixes the following issues:

  • CVE-2017-17833: Prevent heap-related memory corruption issue which may have manifested itself as a denial-of-service or a remote code-execution vulnerability (bsc#1090638)
  • Prevent out of bounds reads in message parsing


Advisory IDSUSE-SU-2018:1969-1
ReleasedMon Sep 24 08:06:42 2018
SummarySecurity update for libzypp, zypper
Typesecurity
Severityimportant
References1036304,1045735,1049825,1070851,1076192,1088705,1091624,1092413,1096803,1099847,1100028,1101349,1102429,CVE-2017-9269,CVE-2018-7685
Description:

This update for libzypp, zypper fixes the following issues:
Update libzypp to version 16.17.20:
Security issues fixed:

  • PackageProvider: Validate deta rpms before caching (bsc#1091624, bsc#1088705, CVE-2018-7685)
  • PackageProvider: Validate downloaded rpm package signatures before caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:
  • lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
  • Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
  • RepoManager: Explicitly request repo2solv to generate application pseudo packages.
  • libzypp-devel should not require cmake (bsc#1101349)
  • HardLocksFile: Prevent against empty commit without Target having been been loaded (bsc#1096803)
  • Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45:
Security issues fixed:
  • Improve signature check callback messages (bsc#1045735, CVE-2017-9269)
  • add/modify repo: Add options to tune the GPG check settings (bsc#1045735, CVE-2017-9269)

Other bugs fixed:
  • XML attribute `packages-to-change` added (bsc#1102429)
  • man: Strengthen that `--config FILE' affects zypper.conf, not zypp.conf (bsc#1100028)
  • Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
  • ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
  • Fix: zypper bash completion expands non-existing options (bsc#1049825)
  • Improve signature check callback messages (bsc#1045735)
  • add/modify repo: Add options to tune the GPG check settings (bsc#1045735)


Advisory IDSUSE-RU-2018:1985-1
ReleasedMon Sep 24 11:56:08 2018
SummaryRecommended update for openldap2
Typerecommended
Severitymoderate
References1089640
Description:

This update for openldap2 provides the following fix:

  • Fix slapd segfaults in mdb_env_reader_dest. (bsc#1089640)


Advisory IDSUSE-SU-2018:1994-1
ReleasedMon Sep 24 12:55:57 2018
SummarySecurity update for shadow
Typesecurity
Severitymoderate
References1106914
Description:

This update for shadow fixes the following security issue:

  • Prevent useradd from creating intermediate directories with mode 0777 (bsc#1106914)


Advisory IDSUSE-SU-2018:2069-1
ReleasedFri Sep 28 08:01:25 2018
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1089039,1101246,1101470,1104789,1106197,997043,CVE-2018-0737
Description:

This update for openssl fixes the following issues:
These security issues were fixed:

  • Prevent One&Done side-channel attack on RSA that allowed physically near attackers to use EM emanations to recover information (bsc#1104789)
  • CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)

These non-security issues were fixed:
  • Add openssl(cli) Provide so the packages that require the openssl binary can require this instead of the new openssl meta package (bsc#1101470)
  • Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246, bsc#997043)


Advisory IDSUSE-SU-2018:2132-1
ReleasedThu Oct 4 06:47:56 2018
SummarySecurity update for openslp
Typesecurity
Severityimportant
References1090638,CVE-2017-17833
Description:

This update for openslp fixes the following issues:

  • CVE-2017-17833: Prevent heap-related memory corruption issue which may have manifested itself as a denial-of-service or a remote code-execution vulnerability (bsc#1090638)
  • Prevent out of bounds reads in message parsing


Advisory IDSUSE-RU-2018:2162-1
ReleasedFri Oct 5 14:46:53 2018
SummaryRecommended update for krb5
Typerecommended
Severitymoderate
References1088921
Description:

This update for krb5 provides the following fix:

  • Resolve krb5 GSS credentials immediately if the application requests the lifetime. (bsc#1088921)


Advisory IDSUSE-SU-2018:2181-1
ReleasedTue Oct 9 11:08:20 2018
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1088279,1088601,1102046,1105166,CVE-2017-18258,CVE-2018-14404,CVE-2018-14567,CVE-2018-9251
Description:

This update for libxml2 fixes the following security issues:

  • CVE-2018-9251: The xz_decomp function allowed remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1088279).
  • CVE-2018-14567: Prevent denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1105166).
  • CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval() function when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case leading to a denial of service attack (bsc#1102046).
  • CVE-2017-18258: The xz_head function allowed remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality did not restrict memory usage to what is required for a legitimate file (bsc#1088601).


Advisory IDSUSE-RU-2018:2196-1
ReleasedThu Oct 11 07:45:16 2018
SummaryOptional update for gcc8
Typerecommended
Severitylow
References1084812,1084842,1087550,1094222,1102564
Description:


The GNU Compiler GCC 8 is being added to the Toolchain Module by this update.
The update also supplies gcc8 compatible libstdc++, libgcc_s1 and other gcc derived libraries for the base products of SUSE Linux Enterprise 12.
Various optimizers have been improved in GCC 8, several of bugs fixed, quite some new warnings added and the error pin-pointing and fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 8 contains a summary of all the changes that have happened:
https://gcc.gnu.org/gcc-8/changes.html
Also changes needed or common pitfalls when porting software are described on:
https://gcc.gnu.org/gcc-8/porting_to.html


Advisory IDSUSE-RU-2018:2217-1
ReleasedFri Oct 12 15:07:24 2018
SummaryRecommended update for bash
Typerecommended
Severitymoderate
References1094121,1107430
Description:

This update for bash provides the following fixes:

  • Fix an inconsistent behaviour regarding expansion of here strings. (bsc#1094121)
  • Fix mis-matching of null string with '*' pattern. (bsc#1107430)
  • Fix a crash when the lastpipe option is enabled.
  • Fix a typo that was preventing the `compat42' shopt option from working as intended.
  • Help the shell to process any pending traps at redirection.
  • Fix a crashe due to incorrect conversion from an indexed to associative array.
  • Avoid the expansion of escape sequences in HOSTNAME in prompt.
  • Avoid `xtrace' attack over $PS4.


Advisory IDSUSE-SU-2018:2297-1
ReleasedWed Oct 17 16:56:44 2018
SummarySecurity update for binutils
Typesecurity
Severitymoderate
References1029907,1029908,1029909,1030296,1030297,1030298,1030584,1030585,1030588,1030589,1031590,1031593,1031595,1031638,1031644,1031656,1037052,1037057,1037061,1037066,1037273,1044891,1044897,1044901,1044909,1044925,1044927,1065643,1065689,1065693,1068640,1068643,1068887,1068888,1068950,1069176,1069202,1074741,1077745,1079103,1079741,1080556,1081527,1083528,1083532,1085784,1086608,1086784,1086786,1086788,1090997,1091015,1091365,1091368,CVE-2014-9939,CVE-2017-15938,CVE-2017-15939,CVE-2017-15996,CVE-2017-16826,CVE-2017-16827,CVE-2017-16828,CVE-2017-16829,CVE-2017-16830,CVE-2017-16831,CVE-2017-16832,CVE-2017-6965,CVE-2017-6966,CVE-2017-6969,CVE-2017-7209,CVE-2017-7210,CVE-2017-7223,CVE-2017-7224,CVE-2017-7225,CVE-2017-7226,CVE-2017-7299,CVE-2017-7300,CVE-2017-7301,CVE-2017-7302,CVE-2017-7303,CVE-2017-7304,CVE-2017-8392,CVE-2017-8393,CVE-2017-8394,CVE-2017-8396,CVE-2017-8421,CVE-2017-9746,CVE-2017-9747,CVE-2017-9748,CVE-2017-9750,CVE-2017-9755,CVE-2017-9756,CVE-2018-10372,CVE-2018-10373,CVE-2018-10534,CVE-2018-10535,CVE-2018-6323,CVE-2018-6543,CVE-2018-6759,CVE-2018-6872,CVE-2018-7208,CVE-2018-7568,CVE-2018-7569,CVE-2018-7570,CVE-2018-7642,CVE-2018-7643,CVE-2018-8945
Description:

This update for binutils to 2.31 fixes the following issues:
These security issues were fixed:

  • CVE-2017-15996: readelf allowed remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggered a buffer overflow on fuzzed archive header (bsc#1065643).
  • CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled NULL files in a .debug_line file table, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename (bsc#1065689).
  • CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd) miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object file, which allowed remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash) (bsc#1065693).
  • CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file (bsc#1068640).
  • CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File Descriptor (BFD) library (aka libbfd) did not validate size and offset values in the data dictionary, which allowed remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file (bsc#1068643).
  • CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not validate the symbol count, which allowed remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file (bsc#1068887).
  • CVE-2017-16830: The print_gnu_property_note function did not have integer-overflow protection on 32-bit platforms, which allowed remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
  • CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file (bsc#1068950).
  • CVE-2017-16828: The display_debug_frames function allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file (bsc#1069176).
  • CVE-2017-16827: The aout_get_external_symbols function in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file (bsc#1069202).
  • CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD) library (aka libbfd) had an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (bsc#1077745).
  • CVE-2018-6543: Prevent integer overflow in the function load_specific_debug_section() which resulted in `malloc()` with 0 size. A crafted ELF file allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (bsc#1079103).
  • CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation. Remote attackers could have leveraged this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file (bsc#1079741).
  • CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment (bsc#1080556).
  • CVE-2018-7208: In the coff_pointerize_aux function in the Binary File Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object (bsc#1081527).
  • CVE-2018-7570: The assign_file_positions_for_non_load_sections function in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy (bsc#1083528).
  • CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm (bsc#1083532).
  • CVE-2018-8945: The bfd_section_from_shdr function in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (segmentation fault) via a large attribute section (bsc#1086608).
  • CVE-2018-7643: The display_debug_ranges function allowed remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump (bsc#1086784).
  • CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
  • CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm (bsc#1086788).
  • CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new (bsc#1090997).
  • CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf (bsc#1091015).
  • CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor (BFD) library (aka libbfd) did not validate the output_section pointer in the case of a symtab entry with a 'SECTION' type that has a '0' value, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy (bsc#1091365).
  • CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data Directory size with an unbounded loop that increased the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c (bsc#1091368).

These non-security issues were fixed:
  • The AArch64 port now supports showing disassembly notes which are emitted when inconsistencies are found with the instruction that may result in the instruction being invalid. These can be turned on with the option -M notes to objdump.
  • The AArch64 port now emits warnings when a combination of an instruction and a named register could be invalid.
  • Added O modifier to ar to display member offsets inside an archive
  • The ADR and ADRL pseudo-instructions supported by the ARM assembler now only set the bottom bit of the address of thumb function symbols if the -mthumb-interwork command line option is active.
  • Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU Build Attribute notes if none are present in the input sources. Add a --enable-generate-build-notes=[yes|no] configure time option to set the default behaviour. Set the default if the configure option is not used to 'no'.
  • Remove -mold-gcc command-line option for x86 targets.
  • Add -O[2|s] command-line options to x86 assembler to enable alternate shorter instruction encoding.
  • Add support for .nops directive. It is currently supported only for x86 targets.
  • Speed up direct linking with DLLs for Cygwin and Mingw targets.
  • Add a configure option --enable-separate-code to decide whether -z separate-code should be enabled in ELF linker by default. Default to yes for Linux/x86 targets. Note that -z separate-code can increase disk and memory size.
  • RISC-V: Fix symbol address problem with versioned symbols
  • Restore riscv64-elf cross prefix via symlinks
  • RISC-V: Don't enable relaxation in relocatable link
  • Prevent linking faiures on i386 with assertion (bsc#1085784)
  • Fix symbol size bug when relaxation deletes bytes
  • Add --debug-dump=links option to readelf and --dwarf=links option to objdump which displays the contents of any .gnu_debuglink or .gnu_debugaltlink sections. Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links option to objdump which causes indirect links into separate debug info files to be followed when dumping other DWARF sections.
  • Add support for loaction views in DWARF debug line information.
  • Add -z separate-code to generate separate code PT_LOAD segment.
  • Add '-z undefs' command line option as the inverse of the '-z defs' option.
  • Add -z globalaudit command line option to force audit libraries to be run for every dynamic object loaded by an executable - provided that the loader supports this functionality.
  • Tighten linker script grammar around file name specifiers to prevent the use of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames. These would previously be accepted but had no effect.
  • The EXCLUDE_FILE directive can now be placed within any SORT_* directive within input section lists.
  • Fix linker relaxation with --wrap
  • Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which there was not CVE assigned at the time the update was released or no mapping between code change and CVE existed:
  • CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel Hex objects (bsc#1030296).
  • CVE-2017-7225: The find_nearest_line function in addr2line did not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash (bsc#1030585).
  • CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash (bsc#1030588).
  • CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash (bsc#1030589).
  • CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of size 4049 because it used the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well (bsc#1030584).
  • CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) did not check the format of the input file trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash (bsc#1031644).
  • CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash (bsc#1031656).
  • CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability caused Binutils utilities like strip to crash (bsc#1031595).
  • CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers attempting to match them. This vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
  • CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it did not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
  • CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field attempting to follow it. This vulnerability caused Binutils utilities like strip to crash (bsc#1031590).
  • CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability caused programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash (bsc#1037052).
  • CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability caused programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash (bsc#1037057).
  • CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability caused programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash (bsc#1037061).
  • CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability caused programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash (bsc#1037066).
  • CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor (BFD) library (aka libbfd) had a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file (bsc#1037273).
  • CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during 'objdump -D' execution (bsc#1044891).
  • CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor (BFD) library (aka libbfd) might have allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during 'objdump -D' execution (bsc#1044897).
  • CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD) library (aka libbfd) might have allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during 'objdump -D' execution (bsc#1044901).
  • CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale arrays, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during 'objdump -D' execution (bsc#1044909).
  • CVE-2017-9755: Not considering the the number of registers for bnd mode allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during 'objdump -D' execution (bsc#1044925).
  • CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during 'objdump -D' execution (bsc#1044927).
  • CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL pointer while reading section contents in a corrupt binary, leading to a program crash (bsc#1030298).
  • CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow (bsc#1029909).
  • CVE-2017-6966: readelf had a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations (bsc#1029908).
  • CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well (bsc#1029907).
  • CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash (bsc#1030297).


Advisory IDSUSE-SU-2018:2373-1
ReleasedMon Oct 22 14:43:47 2018
SummarySecurity update for rpm
Typesecurity
Severitymoderate
References1077692,943457,CVE-2017-7500,CVE-2017-7501
Description:

This update for rpm fixes the following issues:
These security issues were fixed:

  • CVE-2017-7500: rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination (bsc#943457).
  • CVE-2017-7501: rpm used temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation (bsc#943457)

This non-security issue was fixed:
  • Use ksym-provides tool [bsc#1077692]


Advisory IDSUSE-RU-2018:2435-1
ReleasedWed Oct 24 14:42:43 2018
SummaryRecommended update for systemd
Typerecommended
Severityimportant
References1015254,1091677,1093753,1105031,1107640,1107941,1109197,991901
Description:

This update for systemd fixes the following issues:

  • detect-virt: do not try to read all of /proc/cpuinfo (bsc#1109197)
  • emergency: make sure console password agents don't interfere with the emergency shell
  • units: remove udev control socket when systemd stops the socket unit (#4039) (bsc#1015254)
  • man: document that 'nofail' also has an effect on ordering
  • journald: take leading spaces into account in syslog_parse_identifier
  • journal: do not remove multiple spaces after identifier in syslog message
  • syslog: fix segfault in syslog_parse_priority()
  • journal: fix syslog_parse_identifier()
  • tmpfiles: don't adjust qgroups on existing subvolumes (bsc#1093753)
  • socket-util: attempt SO_RCVBUFFORCE/SO_SNDBUFFORCE only if SO_RCVBUF/SO_SNDBUF fails (bsc#991901)
  • user@.service: don't kill user manager at runlevel switch (bsc#1091677)
  • units: make sure user@.service runs with dbus still up
  • fix race between daemon-reload and other commands (bsc#1105031)
  • nspawn: always use mode 555 for /sys (bsc#1107640)
  • cryptsetup: do not define arg_sector_size if libgcrypt is v1.x (#9990)
  • Enable or disable machines.target according to the presets (bsc#1107941)


Advisory IDSUSE-RU-2018:2475-1
ReleasedThu Oct 25 16:56:24 2018
SummaryRecommended update for libzypp
Typerecommended
Severitymoderate
References1099982,1109877,408814,556664,939392
Description:

This update for libzypp fixes the following issues:

  • Add filesize check for downloads with known size (bsc#408814)
  • Fix conversion of string and glob to regex when compiling queries (bsc#1099982, bsc#939392, bsc#556664)
  • Fix blocking wait for finished child process (bsc#1109877)


Advisory IDSUSE-RU-2018:2488-1
ReleasedFri Oct 26 12:39:59 2018
SummaryRecommended update for cpio
Typerecommended
Severitylow
References1076810,889138
Description:

This update for cpio provides the following fix:

  • Remove an obsolete patch that was causing cpio not to preserve folder permissions. (bsc#1076810, bsc#889138)


Advisory IDSUSE-RU-2018:2516-1
ReleasedMon Oct 29 16:14:48 2018
SummaryRecommended update for console-setup, kbd
Typerecommended
Severitymoderate
References1010880,1027379,1056449,1062303,1069468,1085432,360993,675317,825385,830805,958562,963942,984958
Description:

This update for kbd and console-setup provides the following fixes:
Changes in console-setup:

  • Add console-setup to SLE 12 to make it possible for kbd to provide converted X keymaps. (fate#325454, fate#318426)
  • Make the package build reproducible. (bsc#1062303)
  • Removed unneeded requires to kbd in order to resolve build cycle between kbd and console-setup. (bsc#963942)

Changes in kbd:
  • Update to version 2.0.4, including the following fixes (FATE#325454): * Disable characters greater than or equal to =U+F000 as they do not work properly. (bsc#1085432) * Move initial NumLock handling from systemd back to kbd: * Add kbdsettings service. (bsc#1010880) * Exclude numlockbios support for non x86 platforms * Drop references to KEYTABLE and COMPOSETABLE. (bsc#1010880) * Drop from some fill-up templates and a couple of sysconfig variables not read by systemd anymore. (fate#319454) * Replace references to /var/adm/fillup-templates with new %_fillupdir macro. (bsc#1069468) * Add vlock.pamd PAM file. (bsc#1056449) * Enable vlock (bsc#1056449). * Revert dropping of kdb-legacy requirement as there are still packages and installation flows that needs this to be present. (bsc#1027379) * Fix data/keymaps/i386/querty/br-abnt2.map. (bsc#984958) * Fix missing dependency on coreutils for initrd macros. (bsc#958562) * Call missing initrd macro at postun. (bsc#958562) * Add the genmap4systemd.sh tool to generate entries for systemd's kbd-model-map table from xkeyboard-config converted keymaps. (fate#318426) * genmap4systemd.sh: Use 'abnt2' model for 'br' layouts, 'jp106' model for 'jp' layouts and 'microsoftpro' for anything else (instead of 'pc105' previously used). (fate#318426) * Include xkb layouts from xkeyboard-config converted to console keymaps. (fate#318426) * euro.map, euro1.map and euro2.map now produce correct unicode character for Euro sign. (bsc#360993) * Drop doshell reference from openvt.1 man page. (bsc#675317) * Drop the --userwait option as it is not used. (bsc#830805) * Fix a typo in the mac-querty-layout.inc. (bsc#825385)


Advisory IDSUSE-RU-2018:2525-1
ReleasedTue Oct 30 09:22:45 2018
SummaryRecommended update for bash
Typerecommended
Severityimportant
References1113117
Description:

This update for bash fixes the following issues:
Recently released update introduced a change of behavior which resulted in broken customers scripts. (bsc#1113117)


Advisory IDSUSE-SU-2018:2563-1
ReleasedFri Nov 2 17:09:49 2018
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1112758,1113660,CVE-2018-16840,CVE-2018-16842
Description:

This update for curl fixes the following issues:

  • CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)
  • CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)


Advisory IDSUSE-RU-2018:2567-1
ReleasedFri Nov 2 18:59:06 2018
SummaryRecommended update for apparmor
Typerecommended
Severitymoderate
References1047937,1057150,1057900,1099452,906858
Description:


This update for apparmor provides the following fixes:

  • Add profile for usr.bin.lessopen.sh (bsc#906858)
  • Fix dovecot apparmor profile (bsc#1057150)
  • Fix creating profile rules from scanned logs when the chown operation is used (bsc#1047937)
  • Fix the traceroute profile to allow ipv6 usage (bsc#1057900)
  • Fix duplicate entry of capability when performing aa-logprof (bsc#1099452)


Advisory IDSUSE-RU-2018:2593-1
ReleasedWed Nov 7 11:04:00 2018
SummaryRecommended update for rpm
Typerecommended
Severitymoderate
References1095148,1113100
Description:

This update for rpm fixes the following issues:

  • Fix superfluous TOC. dependency on PowerPC64 (bsc#1113100)
  • Update to current find-provides.ksyms and find-requires.ksyms scripts (bsc#1095148)


Advisory IDSUSE-SU-2018:2659-1
ReleasedWed Nov 14 14:14:41 2018
SummarySecurity update for systemd
Typesecurity
Severityimportant
References1106923,1108835,1109252,1110445,1111278,1112024,1113083,1113632,1113665,CVE-2018-15686,CVE-2018-15688
Description:


This update for systemd fixes the following issues:
Security issues fixed:

  • CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
  • CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:
  • dhcp6: split assert_return() to be more debuggable when hit
  • core: skip unit deserialization and move to the next one when unit_deserialize() fails
  • core: properly handle deserialization of unknown unit types (#6476)
  • core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
  • logind: use manager_get_user_by_pid() where appropriate
  • logind: rework manager_get_{user|session}_by_pid() a bit
  • login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
  • core: be more defensive if we can't determine per-connection socket peer (#7329)
  • socket-util: introduce port argument in sockaddr_port()
  • service: fixup ExecStop for socket-activated shutdown (#4120)
  • service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
  • cryptsetup: build fixes for 'add support for sector-size= option'
  • udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
  • core: keep the kernel coredump defaults when systemd-coredump is disabled
  • core: shorten main() a bit, split out coredump initialization
  • core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
  • core/mount: fstype may be NULL
  • journald: don't ship systemd-journald-audit.socket (bsc#1109252)
  • core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
  • mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
  • tmp.mount.hm4: After swap.target (#3087)

  • Ship systemd-sysv-install helper via the main package This script was part of systemd-sysvinit sub-package but it was wrong since systemd-sysv-install is a script used to redirect enable/disable operations to chkconfig when the unit targets are sysv init scripts. Therefore it's never been a SySV init tool.


Advisory IDSUSE-SU-2018:2760-1
ReleasedThu Nov 22 16:25:38 2018
SummarySecurity update for openssl
Typesecurity
Severitymoderate
References1112209,1113534,1113652,1113742,CVE-2018-0734,CVE-2018-5407
Description:

This update for openssl fixes the following issues:
Security issues fixed:

  • CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
  • CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
  • Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:
  • Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).


Advisory IDSUSE-SU-2018:2766-1
ReleasedFri Nov 23 17:07:27 2018
SummarySecurity update for rpm
Typesecurity
Severityimportant
References943457,CVE-2017-7500,CVE-2017-7501
Description:

This update for rpm fixes the following issues:
These security issues were fixed:

  • CVE-2017-7500: rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination (bsc#943457).
  • CVE-2017-7501: rpm used temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS, they have already been released for SUSE Linux Enterprise Server 12 SP3.


Advisory IDSUSE-SU-2018:1697-1
ReleasedFri Nov 23 17:08:32 2018
SummarySecurity update for libgcrypt
Typesecurity
Severitymoderate
References1064455,1090766,1097410,CVE-2018-0495
Description:

This update for libgcrypt fixes the following issues:
The following security vulnerability was addressed:

  • CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for ECDSA signatures (bsc#1097410).

The following other issues were fixed:
  • Extended the fipsdrv dsa-sign and dsa-verify commands with the --algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
  • Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)


Advisory IDSUSE-SU-2018:1696-1
ReleasedMon Nov 26 17:46:39 2018
SummarySecurity update for procps
Typesecurity
Severitymoderate
References1092100,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126
Description:

This update for procps fixes the following security issues:

  • CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top with HOME unset in an attacker-controlled directory, the attacker could have achieved privilege escalation by exploiting one of several vulnerabilities in the config_file() function (bsc#1092100).
  • CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maped a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service) (bsc#1092100).
  • CVE-2018-1124: Prevent multiple integer overflows leading to a heap corruption in file2strvec function. This allowed a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users (bsc#1092100).
  • CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
  • CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent truncation/integer overflow issues (bsc#1092100).


Advisory IDSUSE-SU-2018:1618-1
ReleasedTue Nov 27 13:39:49 2018
SummarySecurity update for util-linux
Typesecurity
Severitymoderate
References1072947,1078662,1080740,1084300,CVE-2018-7738
Description:

This update for util-linux fixes the following issues:
This non-security issue was fixed:

  • CVE-2018-7738: bash-completion/umount allowed local users to gain privileges by embedding shell commands in a mountpoint name, which was mishandled during a umount command by a different user (bsc#1084300).

These non-security issues were fixed:
  • Fixed crash loop in lscpu (bsc#1072947).
  • Fixed possible segfault of umount -a
  • Fixed mount -a on NFS bind mounts (bsc#1080740).
  • Fixed lsblk on NVMe (bsc#1078662).


Advisory IDSUSE-SU-2018:2824-1
ReleasedMon Dec 3 15:34:09 2018
SummarySecurity update for ncurses
Typesecurity
Severityimportant
References1115929,CVE-2018-19211
Description:

This update for ncurses fixes the following issue:
Security issue fixed:

  • CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).


Advisory IDSUSE-RU-2018:2836-1
ReleasedWed Dec 5 09:29:31 2018
SummaryRecommended update for apparmor
Typerecommended
Severitymoderate
References1111965,1113125
Description:

This update for apparmor fixes the following issues:

  • Systemd aware apparmor.spec, remove old insserv from spec file (bsc#1113125)
  • Fix warnings produced because of use of uninitialized variables (bsc#1111965)


Advisory IDSUSE-RU-2018:2840-1
ReleasedWed Dec 5 09:57:54 2018
SummaryRecommended update for permissions
Typerecommended
Severitymoderate
References1028304,1047247,1050467,1097665,1111251
Description:

This update for permissions fixes the following issues:

  • Allow setuid root for start-suid tool of singularity (group only) bsc#1028304
  • Allow setuid root for authbind binary (bsc#1111251)
  • A incorrect error message was adjusted (bsc#1047247 bsc#1097665)
  • Make btmp root:utmp (bsc#1050467)


Advisory IDSUSE-RU-2018:2841-1
ReleasedWed Dec 5 09:59:45 2018
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1105236,1110661,1112858
Description:

This update for glibc fixes the following issues:

  • Added more checks for valid ld.so.cache file (bsc#1110661)
  • Rewrite elf_machine_load_address using _DYNAMIC symbol (bsc#1112858)
  • Always use __IPC_64 on powerpc as required by the kernel (bsc#1105236)


Advisory IDSUSE-RU-2018:2906-1
ReleasedTue Dec 11 21:48:05 2018
SummaryRecommended update for blog
Typerecommended
Severitymoderate
References1071568
Description:

This update for blog fixes the following issues:

  • Hardening of the console list generation (bsc#1071568)
  • Changed description of blog-plymouth in same manner as used by the release notes


Advisory IDSUSE-SU-2018:2947-1
ReleasedMon Dec 17 08:51:28 2018
SummarySecurity update for openldap2
Typesecurity
Severitymoderate
References1073313,CVE-2017-17740
Description:

This update for openldap2 fixes the following issues:
Security issue fixed:

  • CVE-2017-17740: When both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation. (bsc#1073313)


Advisory IDSUSE-RU-2018:3029-1
ReleasedFri Dec 21 17:34:05 2018
SummaryRecommended update for libgcrypt
Typerecommended
Severitymoderate
References1117355
Description:

This update for libgcrypt provides the following fix:

  • Fail selftests when checksum file is missing in FIPS mode only. (bsc#1117355)


Advisory IDSUSE-RU-2019:43-1
ReleasedTue Jan 8 13:07:17 2019
SummaryRecommended update for acl
Typerecommended
Severitylow
References953659
Description:

This update for acl fixes the following issues:

  • quote: Escape literal backslashes (bsc#953659).


Advisory IDSUSE-SU-2019:111-1
ReleasedThu Jan 17 14:18:31 2019
SummarySecurity update for krb5
Typesecurity
Severityimportant
References1120489,CVE-2018-20217
Description:

This update for krb5 fixes the following issues:
Security issue fixed:

  • CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)


Advisory IDSUSE-SU-2019:135-1
ReleasedMon Jan 21 13:53:58 2019
SummarySecurity update for systemd
Typesecurity
Severitymoderate
References1005023,1076696,1101591,1114981,1115518,1119971,1120323,CVE-2018-16864,CVE-2018-16865,CVE-2018-16866
Description:

This update for systemd provides the following fixes:
Security issues fixed:

  • CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
  • CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
  • Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:
  • core: Queue loading transient units after setting their properties. (bsc#1115518)
  • logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
  • terminal-util: introduce vt_release() and vt_restore() helpers.
  • terminal: Unify code for resetting kbd utf8 mode a bit.
  • terminal Reset should honour default_utf8 kernel setting.
  • logind: Make session_restore_vt() static.
  • udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
  • log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
  • udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3, 80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to detect non-zvm environment. The systemd-detect-virt returns exit failure code when it detected _none_ state. The exit failure code causes that the hot-add memory block can not be set to online. (bsc#1076696)


Advisory IDSUSE-RU-2019:143-1
ReleasedTue Jan 22 14:21:55 2019
SummaryRecommended update for ncurses
Typerecommended
Severityimportant
References1121450
Description:


This update for ncurses fixes the following issues:

  • ncurses applications freezing (bsc#1121450)


Advisory IDSUSE-RU-2019:218-1
ReleasedThu Jan 31 20:30:20 2019
SummaryRecommended update for kmod
Typerecommended
Severitymoderate
References1118629
Description:

This update for kmod fixes the following issues:

  • Fix module dependency file corruption on parallel invocation (bsc#1118629).