news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
SUSE Security Update: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1294-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 3.12.69-60_64_29 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-774=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_69-60_64_29-default-4-2.1 kgraft-patch-3_12_69-60_64_29-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1293-1 Rating: important References: #1030467 #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has three fixes is now available. Description: This update for the Linux Kernel 3.12.59-60_45 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). - bsc#1030467: Updated Dirty COW fix. The former patch caused some apps to freeze in rare circumstances Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-780=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_45-default-10-2.1 kgraft-patch-3_12_59-60_45-xen-10-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030467 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
[security-announce] openSUSE-SU-2017:1292-1: important: Security update for tomcat
news posted a topic in Upcoming News
openSUSE Security Update: Security update for tomcat ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1292-1 Rating: important References: #1015119 #1033447 #1033448 Cross-References: CVE-2016-8745 CVE-2017-5647 CVE-2017-5648 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for tomcat fixes the following issues: - CVE-2017-5647 Pipelined requests could lead to information disclosure (bsc#1033448) - CVE-2017-5648 Untrusted application could retain listener leading to information disclosure (bsc#1033447) - CVE-2016-8745 shared Processor on Connector code could lead to information disclosure (bsc#1015119) This update was imported from the SUSE:SLE-12-SP1:Update and SUSE:SLE-12-SP2:Update update projects. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-586=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-586=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (noarch): tomcat-8.0.43-6.7.1 tomcat-admin-webapps-8.0.43-6.7.1 tomcat-docs-webapp-8.0.43-6.7.1 tomcat-el-3_0-api-8.0.43-6.7.1 tomcat-embed-8.0.43-6.7.1 tomcat-javadoc-8.0.43-6.7.1 tomcat-jsp-2_3-api-8.0.43-6.7.1 tomcat-jsvc-8.0.43-6.7.1 tomcat-lib-8.0.43-6.7.1 tomcat-servlet-3_1-api-8.0.43-6.7.1 tomcat-webapps-8.0.43-6.7.1 - openSUSE Leap 42.1 (noarch): tomcat-8.0.43-17.1 tomcat-admin-webapps-8.0.43-17.1 tomcat-docs-webapp-8.0.43-17.1 tomcat-el-3_0-api-8.0.43-17.1 tomcat-embed-8.0.43-17.1 tomcat-javadoc-8.0.43-17.1 tomcat-jsp-2_3-api-8.0.43-17.1 tomcat-jsvc-8.0.43-17.1 tomcat-lib-8.0.43-17.1 tomcat-servlet-3_1-api-8.0.43-17.1 tomcat-webapps-8.0.43-17.1 References: https://www.suse.com/security/cve/CVE-2016-8745.html https://www.suse.com/security/cve/CVE-2017-5647.html https://www.suse.com/security/cve/CVE-2017-5648.html https://bugzilla.suse.com/1015119 https://bugzilla.suse.com/1033447 https://bugzilla.suse.com/1033448 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
SUSE Security Update: Security update for Linux Kernel Live Patch 13 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1299-1 Rating: important References: #1030467 #1030575 #1031660 Cross-References: CVE-2017-7308 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update for the Linux Kernel 3.12.55-52_45 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - bsc#1030467: Updated Dirty COW fix. The former patch caused some apps to freeze in rare circumstances Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-782=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-782=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_55-52_45-default-9-2.1 kgraft-patch-3_12_55-52_45-xen-9-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_55-52_45-default-9-2.1 kgraft-patch-3_12_55-52_45-xen-9-2.1 References: https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030467 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1300-1 Rating: important References: #1030467 #1030575 #1031660 Cross-References: CVE-2017-7308 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update for the Linux Kernel 3.12.60-52_54 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - bsc#1030467: Updated Dirty COW fix. The former patch caused some apps to freeze in rare circumstances Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-768=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-768=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_54-default-9-2.1 kgraft-patch-3_12_60-52_54-xen-9-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_54-default-9-2.1 kgraft-patch-3_12_60-52_54-xen-9-2.1 References: https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030467 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1301-1 Rating: important References: #1005651 #1008374 #1008893 #1013018 #1013070 #1013800 #1013862 #1016489 #1017143 #1018263 #1018446 #1019168 #1020229 #1021256 #1021913 #1022971 #1023014 #1023163 #1023888 #1024508 #1024788 #1024938 #1025235 #1025702 #1026024 #1026260 #1026722 #1026914 #1027066 #1027101 #1027178 #1028415 #1028880 #1029212 #1029770 #1030213 #1030573 #1031003 #1031052 #1031440 #1031579 #1032141 #1033336 #1033771 #1033794 #1033804 #1033816 #1034026 #909486 #911105 #931620 #979021 #982783 #983212 #985561 #988065 #989056 #995542 #999245 Cross-References: CVE-2015-3288 CVE-2015-8970 CVE-2016-10200 CVE-2016-5243 CVE-2017-2671 CVE-2017-5669 CVE-2017-5970 CVE-2017-5986 CVE-2017-6074 CVE-2017-6214 CVE-2017-6348 CVE-2017-6353 CVE-2017-7184 CVE-2017-7187 CVE-2017-7261 CVE-2017-7294 CVE-2017-7308 CVE-2017-7616 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-EXTRA SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 18 vulnerabilities and has 41 fixes is now available. Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. Notable new features: - Toleration of newer crypto hardware for z Systems - USB 2.0 Link power management for Haswell-ULT The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579) - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003) - CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573). - CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938). - CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440) - CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052) - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213) - CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178) - CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914) - CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bsc#979021). - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415) - CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212) - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application (bnc#1027066) - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722) - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024) - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235) - CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c (bsc#1008374). The following non-security bugs were fixed: - NFSD: do not risk using duplicate owner/file/delegation ids (bsc#1029212). - RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783, bsc#1026260). - SUNRPC: Clean up the slot table allocation (bsc#1013862). - SUNRPC: Initalise the struct xprt upon allocation (bsc#1013862). - USB: cdc-acm: fix broken runtime suspend (bsc#1033771). - USB: cdc-acm: fix open and suspend race (bsc#1033771). - USB: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771). - USB: cdc-acm: fix runtime PM for control messages (bsc#1033771). - USB: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771). - USB: cdc-acm: fix shutdown and suspend race (bsc#1033771). - USB: cdc-acm: fix write and resume race (bsc#1033771). - USB: cdc-acm: fix write and suspend race (bsc#1033771). - USB: hub: Fix crash after failure to read BOS descriptor - USB: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794). - USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256). - USB: serial: mos7720: fix NULL-deref at open (bsc#1033816). - USB: serial: mos7720: fix parallel probe (bsc#1033816). - USB: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816). - USB: serial: mos7720: fix use-after-free on probe errors (bsc#1033816). - USB: serial: mos7840: fix NULL-deref at open (bsc#1034026). - USB: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014). - Update metadata for serial fixes (bsc#1013070) - Use PF_LESS_THROTTLE in loop device thread (bsc#1027101). - clocksource: Remove "weak" from clocksource_default_clock() declaration (bnc#1013018). - dlm: backport "fix lvb invalidation conditions" (bsc#1005651). - drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81) - enic: set skb->hash type properly (bsc#911105). - ext4: fix mballoc breakage with 64k block size (bsc#1013018). - ext4: fix stack memory corruption with 64k block size (bsc#1013018). - ext4: reject inodes with negative size (bsc#1013018). - fuse: initialize fc->release before calling it (bsc#1013018). - i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561). - i40e/i40evf: Fix mixed size frags and linearization (bsc#985561). - i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561). - i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561). - i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561). - i40e: Impose a lower limit on gso size (bsc#985561). - i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561). - i40e: avoid null pointer dereference (bsc#909486). - jbd: Fix oops in journal_remove_journal_head() (bsc#1017143). - jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229). - kABI: mask struct xfs_icdinode change (bsc#1024788). - kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508). - kabi: fix (bsc#1008893). - lockd: use init_utsname for id encoding (bsc#1033804). - lockd: use rpc client's cl_nodename for id encoding (bsc#1033804). - md linear: fix a race between linear_add() and linear_congested() (bsc#1018446). - md/linear: shutup lockdep warnning (bsc#1018446). - mm/mempolicy.c: do not put mempolicy before using its nodemask (bnc#931620). - ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018). - ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800). - ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018). - ocfs2: null deref on allocation error (bsc#1013018). - pciback: only check PF if actually dealing with a VF (bsc#999245). - pciback: use pci_physfn() (bsc#999245). - posix-timers: Fix stack info leak in timer_create() (bnc#1013018). - powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163). - powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971). - powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141). - powerpc/fadump: Update fadump documentation (bsc#1032141). - powerpc/nvram: Fix an incorrect partition merge (bsc#1016489). - powerpc/vdso64: Use double word compare on pointers (bsc#1016489). - rcu: Call out dangers of expedited RCU primitives (bsc#1008893). - rcu: Direct algorithmic SRCU implementation (bsc#1008893). - rcu: Flip ->completed only once per SRCU grace period (bsc#1008893). - rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893). - rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893). - rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893). - s390/kmsg: add missing kmsg descriptions (bnc#1025702). - s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702). - s390/zcrypt: Introduce CEX6 toleration - sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018). - sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018). - scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702). - scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702). - scsi: zfcp: fix use-after-"free" in FC ingress path after TMF (bnc#1025702). - scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702). - sfc: reduce severity of PIO buffer alloc failures (bsc#1019168). - tcp: abort orphan sockets stalling on zero window probes (bsc#1021913). - vfs: split generic splice code from i_mutex locking (bsc#1024788). - virtio_scsi: fix memory leak on full queue condition (bsc#1028880). - vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770). - xen-blkfront: correct maximum segment accounting (bsc#1018263). - xen-blkfront: do not call talk_to_blkback when already connected to blkback. - xen-blkfront: free resources if xlvbd_alloc_gendisk fails. - xfs: Fix lock ordering in splice write (bsc#1024788). - xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788). - xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508). - xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508). - xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056). - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888). - xfs: kill xfs_itruncate_start (bsc#1024788). - xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788). - xfs: remove the i_size field in struct xfs_inode (bsc#1024788). - xfs: remove xfs_itruncate_data (bsc#1024788). - xfs: replace global xfslogd wq with per-mount wq (bsc#1024508). - xfs: split xfs_itruncate_finish (bsc#1024788). - xfs: split xfs_setattr (bsc#1024788). - xfs: track and serialize in-flight async buffers against unmount (bsc#1024508). - xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-linux-kernel-13105=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-linux-kernel-13105=1 - SUSE Linux Enterprise Server 11-EXTRA: zypper in -t patch slexsp3-linux-kernel-13105=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-linux-kernel-13105=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch): kernel-docs-3.0.101-100.2 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-3.0.101-100.1 kernel-default-base-3.0.101-100.1 kernel-default-devel-3.0.101-100.1 kernel-source-3.0.101-100.1 kernel-syms-3.0.101-100.1 kernel-trace-3.0.101-100.1 kernel-trace-base-3.0.101-100.1 kernel-trace-devel-3.0.101-100.1 - SUSE Linux Enterprise Server 11-SP4 (i586 x86_64): kernel-ec2-3.0.101-100.1 kernel-ec2-base-3.0.101-100.1 kernel-ec2-devel-3.0.101-100.1 kernel-xen-3.0.101-100.1 kernel-xen-base-3.0.101-100.1 kernel-xen-devel-3.0.101-100.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64): kernel-bigmem-3.0.101-100.1 kernel-bigmem-base-3.0.101-100.1 kernel-bigmem-devel-3.0.101-100.1 kernel-ppc64-3.0.101-100.1 kernel-ppc64-base-3.0.101-100.1 kernel-ppc64-devel-3.0.101-100.1 - SUSE Linux Enterprise Server 11-SP4 (s390x): kernel-default-man-3.0.101-100.1 - SUSE Linux Enterprise Server 11-SP4 (i586): kernel-pae-3.0.101-100.1 kernel-pae-base-3.0.101-100.1 kernel-pae-devel-3.0.101-100.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-100.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64): kernel-xen-extra-3.0.101-100.1 - SUSE Linux Enterprise Server 11-EXTRA (x86_64): kernel-trace-extra-3.0.101-100.1 - SUSE Linux Enterprise Server 11-EXTRA (ppc64): kernel-ppc64-extra-3.0.101-100.1 - SUSE Linux Enterprise Server 11-EXTRA (i586): kernel-pae-extra-3.0.101-100.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-debuginfo-3.0.101-100.1 kernel-default-debugsource-3.0.101-100.1 kernel-trace-debuginfo-3.0.101-100.1 kernel-trace-debugsource-3.0.101-100.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 s390x x86_64): kernel-default-devel-debuginfo-3.0.101-100.1 kernel-trace-devel-debuginfo-3.0.101-100.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-100.1 kernel-ec2-debugsource-3.0.101-100.1 kernel-xen-debuginfo-3.0.101-100.1 kernel-xen-debugsource-3.0.101-100.1 kernel-xen-devel-debuginfo-3.0.101-100.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64): kernel-bigmem-debuginfo-3.0.101-100.1 kernel-bigmem-debugsource-3.0.101-100.1 kernel-ppc64-debuginfo-3.0.101-100.1 kernel-ppc64-debugsource-3.0.101-100.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586): kernel-pae-debuginfo-3.0.101-100.1 kernel-pae-debugsource-3.0.101-100.1 kernel-pae-devel-debuginfo-3.0.101-100.1 References: https://www.suse.com/security/cve/CVE-2015-3288.html https://www.suse.com/security/cve/CVE-2015-8970.html https://www.suse.com/security/cve/CVE-2016-10200.html https://www.suse.com/security/cve/CVE-2016-5243.html https://www.suse.com/security/cve/CVE-2017-2671.html https://www.suse.com/security/cve/CVE-2017-5669.html https://www.suse.com/security/cve/CVE-2017-5970.html https://www.suse.com/security/cve/CVE-2017-5986.html https://www.suse.com/security/cve/CVE-2017-6074.html https://www.suse.com/security/cve/CVE-2017-6214.html https://www.suse.com/security/cve/CVE-2017-6348.html https://www.suse.com/security/cve/CVE-2017-6353.html https://www.suse.com/security/cve/CVE-2017-7184.html https://www.suse.com/security/cve/CVE-2017-7187.html https://www.suse.com/security/cve/CVE-2017-7261.html https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://www.suse.com/security/cve/CVE-2017-7616.html https://bugzilla.suse.com/1005651 https://bugzilla.suse.com/1008374 https://bugzilla.suse.com/1008893 https://bugzilla.suse.com/1013018 https://bugzilla.suse.com/1013070 https://bugzilla.suse.com/1013800 https://bugzilla.suse.com/1013862 https://bugzilla.suse.com/1016489 https://bugzilla.suse.com/1017143 https://bugzilla.suse.com/1018263 https://bugzilla.suse.com/1018446 https://bugzilla.suse.com/1019168 https://bugzilla.suse.com/1020229 https://bugzilla.suse.com/1021256 https://bugzilla.suse.com/1021913 https://bugzilla.suse.com/1022971 https://bugzilla.suse.com/1023014 https://bugzilla.suse.com/1023163 https://bugzilla.suse.com/1023888 https://bugzilla.suse.com/1024508 https://bugzilla.suse.com/1024788 https://bugzilla.suse.com/1024938 https://bugzilla.suse.com/1025235 https://bugzilla.suse.com/1025702 https://bugzilla.suse.com/1026024 https://bugzilla.suse.com/1026260 https://bugzilla.suse.com/1026722 https://bugzilla.suse.com/1026914 https://bugzilla.suse.com/1027066 https://bugzilla.suse.com/1027101 https://bugzilla.suse.com/1027178 https://bugzilla.suse.com/1028415 https://bugzilla.suse.com/1028880 https://bugzilla.suse.com/1029212 https://bugzilla.suse.com/1029770 https://bugzilla.suse.com/1030213 https://bugzilla.suse.com/1030573 https://bugzilla.suse.com/1031003 https://bugzilla.suse.com/1031052 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031579 https://bugzilla.suse.com/1032141 https://bugzilla.suse.com/1033336 https://bugzilla.suse.com/1033771 https://bugzilla.suse.com/1033794 https://bugzilla.suse.com/1033804 https://bugzilla.suse.com/1033816 https://bugzilla.suse.com/1034026 https://bugzilla.suse.com/909486 https://bugzilla.suse.com/911105 https://bugzilla.suse.com/931620 https://bugzilla.suse.com/979021 https://bugzilla.suse.com/982783 https://bugzilla.suse.com/983212 https://bugzilla.suse.com/985561 https://bugzilla.suse.com/988065 https://bugzilla.suse.com/989056 https://bugzilla.suse.com/995542 https://bugzilla.suse.com/999245 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1297-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 3.12.67-60_64_18 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-777=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_18-default-7-2.1 kgraft-patch-3_12_67-60_64_18-xen-7-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1302-1 Rating: important References: #1030575 #1031660 Cross-References: CVE-2017-7308 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for the Linux Kernel 3.12.61-52_66 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-764=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-764=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_61-52_66-default-4-2.1 kgraft-patch-3_12_61-52_66-xen-4-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_66-default-4-2.1 kgraft-patch-3_12_61-52_66-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
openSUSE Security Update: Security update for kauth, kdelibs4 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1254-1 Rating: important References: #1036244 Cross-References: CVE-2017-8422 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for kauth and kdelibs4 fixes the following issues: - CVE-2017-8422: logic flaw in the KAuth framework allowed privilege escalation (boo#1036244). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2017-575=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64): kdelibs4-4.14.18-9.1 kdelibs4-4.14.25-8.2 kdelibs4-branding-upstream-4.14.18-9.1 kdelibs4-branding-upstream-4.14.25-8.2 kdelibs4-core-4.14.18-9.1 kdelibs4-core-4.14.25-8.2 kdelibs4-core-debuginfo-4.14.18-9.1 kdelibs4-core-debuginfo-4.14.25-8.2 kdelibs4-debuginfo-4.14.18-9.1 kdelibs4-debuginfo-4.14.25-8.2 kdelibs4-debugsource-4.14.18-9.1 kdelibs4-debugsource-4.14.25-8.2 kdelibs4-doc-4.14.18-9.1 kdelibs4-doc-4.14.25-8.2 kdelibs4-doc-debuginfo-4.14.18-9.1 kdelibs4-doc-debuginfo-4.14.25-8.2 libkde4-4.14.18-9.1 libkde4-4.14.25-8.2 libkde4-debuginfo-4.14.18-9.1 libkde4-debuginfo-4.14.25-8.2 libkde4-devel-4.14.18-9.1 libkde4-devel-4.14.25-8.2 libkdecore4-4.14.18-9.1 libkdecore4-4.14.25-8.2 libkdecore4-debuginfo-4.14.18-9.1 libkdecore4-debuginfo-4.14.25-8.2 libkdecore4-devel-4.14.18-9.1 libkdecore4-devel-4.14.25-8.2 libkdecore4-devel-debuginfo-4.14.18-9.1 libkdecore4-devel-debuginfo-4.14.25-8.2 libksuseinstall-devel-4.14.18-9.1 libksuseinstall-devel-4.14.25-8.2 libksuseinstall1-4.14.18-9.1 libksuseinstall1-4.14.25-8.2 libksuseinstall1-debuginfo-4.14.18-9.1 libksuseinstall1-debuginfo-4.14.25-8.2 - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): kauth-debugsource-5.20.0-7.1 kauth-debugsource-5.26.0-6.1 kauth-devel-5.20.0-7.1 kauth-devel-5.26.0-6.1 libKF5Auth5-5.20.0-7.1 libKF5Auth5-5.26.0-6.1 libKF5Auth5-debuginfo-5.20.0-7.1 libKF5Auth5-debuginfo-5.26.0-6.1 - SUSE Package Hub for SUSE Linux Enterprise 12 (noarch): kdelibs4-apidocs-4.14.18-9.1 kdelibs4-apidocs-4.14.25-8.2 libKF5Auth5-lang-5.20.0-7.1 libKF5Auth5-lang-5.26.0-6.1 References: https://www.suse.com/security/cve/CVE-2017-8422.html https://bugzilla.suse.com/1036244 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
openSUSE Security Update: Security update for kauth, kdelibs4 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1272-1 Rating: important References: #1036244 Cross-References: CVE-2017-8422 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for kauth and kdelibs4 fixes the following issues: - CVE-2017-8422: logic flaw in the KAuth framework allowed privilege escalation (boo#1036244). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-575=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-575=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): kauth-debugsource-5.26.0-2.3.1 kauth-devel-5.26.0-2.3.1 kdelibs4-4.14.25-7.4.1 kdelibs4-branding-upstream-4.14.25-7.4.1 kdelibs4-core-4.14.25-7.4.1 kdelibs4-core-debuginfo-4.14.25-7.4.1 kdelibs4-debuginfo-4.14.25-7.4.1 kdelibs4-debugsource-4.14.25-7.4.1 kdelibs4-doc-4.14.25-7.4.1 kdelibs4-doc-debuginfo-4.14.25-7.4.1 libKF5Auth5-5.26.0-2.3.1 libKF5Auth5-debuginfo-5.26.0-2.3.1 libkde4-4.14.25-7.4.1 libkde4-debuginfo-4.14.25-7.4.1 libkde4-devel-4.14.25-7.4.1 libkdecore4-4.14.25-7.4.1 libkdecore4-debuginfo-4.14.25-7.4.1 libkdecore4-devel-4.14.25-7.4.1 libkdecore4-devel-debuginfo-4.14.25-7.4.1 libksuseinstall-devel-4.14.25-7.4.1 libksuseinstall1-4.14.25-7.4.1 libksuseinstall1-debuginfo-4.14.25-7.4.1 - openSUSE Leap 42.2 (x86_64): kauth-devel-32bit-5.26.0-2.3.1 libKF5Auth5-32bit-5.26.0-2.3.1 libKF5Auth5-debuginfo-32bit-5.26.0-2.3.1 libkde4-32bit-4.14.25-7.4.1 libkde4-debuginfo-32bit-4.14.25-7.4.1 libkdecore4-32bit-4.14.25-7.4.1 libkdecore4-debuginfo-32bit-4.14.25-7.4.1 libksuseinstall1-32bit-4.14.25-7.4.1 libksuseinstall1-debuginfo-32bit-4.14.25-7.4.1 - openSUSE Leap 42.2 (noarch): kdelibs4-apidocs-4.14.25-7.4.1 libKF5Auth5-lang-5.26.0-2.3.1 - openSUSE Leap 42.1 (i586 x86_64): kauth-debugsource-5.21.0-16.1 kauth-devel-5.21.0-16.1 kdelibs4-4.14.18-18.1 kdelibs4-branding-upstream-4.14.18-18.1 kdelibs4-core-4.14.18-18.1 kdelibs4-core-debuginfo-4.14.18-18.1 kdelibs4-debuginfo-4.14.18-18.1 kdelibs4-debugsource-4.14.18-18.1 kdelibs4-doc-4.14.18-18.1 kdelibs4-doc-debuginfo-4.14.18-18.1 libKF5Auth5-5.21.0-16.1 libKF5Auth5-debuginfo-5.21.0-16.1 libkde4-4.14.18-18.1 libkde4-debuginfo-4.14.18-18.1 libkde4-devel-4.14.18-18.1 libkdecore4-4.14.18-18.1 libkdecore4-debuginfo-4.14.18-18.1 libkdecore4-devel-4.14.18-18.1 libkdecore4-devel-debuginfo-4.14.18-18.1 libksuseinstall-devel-4.14.18-18.1 libksuseinstall1-4.14.18-18.1 libksuseinstall1-debuginfo-4.14.18-18.1 - openSUSE Leap 42.1 (noarch): kdelibs4-apidocs-4.14.18-18.1 libKF5Auth5-lang-5.21.0-16.1 - openSUSE Leap 42.1 (x86_64): kauth-devel-32bit-5.21.0-16.1 libKF5Auth5-32bit-5.21.0-16.1 libKF5Auth5-debuginfo-32bit-5.21.0-16.1 libkde4-32bit-4.14.18-18.1 libkde4-debuginfo-32bit-4.14.18-18.1 libkdecore4-32bit-4.14.18-18.1 libkdecore4-debuginfo-32bit-4.14.18-18.1 libksuseinstall1-32bit-4.14.18-18.1 libksuseinstall1-debuginfo-32bit-4.14.18-18.1 References: https://www.suse.com/security/cve/CVE-2017-8422.html https://bugzilla.suse.com/1036244 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
openSUSE Security Update: Security update for graphite2 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1273-1 Rating: important References: #1035204 Cross-References: CVE-2017-5436 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for graphite2 fixes one issue. This security issues was fixed: - CVE-2017-5436: An out-of-bounds write triggered with a maliciously crafted Graphite font could lead to a crash or potentially code execution (bsc#1035204). This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-570=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-570=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): graphite2-1.3.1-4.3.1 graphite2-debuginfo-1.3.1-4.3.1 graphite2-debugsource-1.3.1-4.3.1 graphite2-devel-1.3.1-4.3.1 libgraphite2-3-1.3.1-4.3.1 libgraphite2-3-debuginfo-1.3.1-4.3.1 - openSUSE Leap 42.2 (x86_64): libgraphite2-3-32bit-1.3.1-4.3.1 libgraphite2-3-debuginfo-32bit-1.3.1-4.3.1 - openSUSE Leap 42.1 (i586 x86_64): graphite2-1.3.1-6.1 graphite2-debuginfo-1.3.1-6.1 graphite2-debugsource-1.3.1-6.1 graphite2-devel-1.3.1-6.1 libgraphite2-3-1.3.1-6.1 libgraphite2-3-debuginfo-1.3.1-6.1 - openSUSE Leap 42.1 (x86_64): libgraphite2-3-32bit-1.3.1-6.1 libgraphite2-3-debuginfo-32bit-1.3.1-6.1 References: https://www.suse.com/security/cve/CVE-2017-5436.html https://bugzilla.suse.com/1035204 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
[CentOS-announce] CESA-2017:1230 Important CentOS 6 ghostscript Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1230 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1230.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 5a76fb12c6c3c14c0961c03320e8d7770ce72c09a21e614a7aed3864d87943e5 ghostscript-8.70-23.el6_9.2.i686.rpm d8ce9d3bc452838b99d3613f71dafdcaefe8ba989f48f7933bf3aa81b7531f5b ghostscript-devel-8.70-23.el6_9.2.i686.rpm dcc02d7bd26fa4b2c1eb3a9c9066780f327325917f6f6a7d1c95f7bca715248e ghostscript-doc-8.70-23.el6_9.2.i686.rpm 1ae49f1a618b81c2fc128ad0eaf399e3c0f11742a5517106ae84260001d48582 ghostscript-gtk-8.70-23.el6_9.2.i686.rpm x86_64: 5a76fb12c6c3c14c0961c03320e8d7770ce72c09a21e614a7aed3864d87943e5 ghostscript-8.70-23.el6_9.2.i686.rpm a5f9fe8c575085bba8c5b5e437e7b82cac128ec023617ca75766fef175b271db ghostscript-8.70-23.el6_9.2.x86_64.rpm d8ce9d3bc452838b99d3613f71dafdcaefe8ba989f48f7933bf3aa81b7531f5b ghostscript-devel-8.70-23.el6_9.2.i686.rpm 9e9079054a2e805d877c3d6f8b039649170ed6721cfd9178fa158ce5e7aaaa7b ghostscript-devel-8.70-23.el6_9.2.x86_64.rpm 9e2d67a2fd1be67f0d0637baea8f71fa077a69803e95d7a5240473edbef4762c ghostscript-doc-8.70-23.el6_9.2.x86_64.rpm 7a9b3f8e415a5d88701631590a58d0dd40f105c13b215739115e6b8b8ed99b4e ghostscript-gtk-8.70-23.el6_9.2.x86_64.rpm Source: 1d42f1dfb0b4fac0fb35bd46b712b429691c0f56d9637d3cc6bb23092681053e ghostscript-8.70-23.el6_9.2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
[CentOS-announce] CESA-2017:1230 Important CentOS 7 ghostscript Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1230 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1230.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 13b528fab28b799cb7821c627dba7610b800724b72013a457d0b8e307a51dd97 ghostscript-9.07-20.el7_3.5.i686.rpm 98164b6667981379add6d5aaca6e636afc09705f28876bbbd55b39662b1355ae ghostscript-9.07-20.el7_3.5.x86_64.rpm 08099c3554cc5cc69e6b39fb46653b521c78d5f7dd898299bb8509b46c60da5c ghostscript-cups-9.07-20.el7_3.5.x86_64.rpm d8955de29347efbb508e0347f733c5fcc9cea0fcd6c67b38f9cee4753a5af259 ghostscript-devel-9.07-20.el7_3.5.i686.rpm dfc06dd01dfd83596c32838d1299bd7627ff4448638d4965a5b18d374c426ba2 ghostscript-devel-9.07-20.el7_3.5.x86_64.rpm 17930cd40d86834840e4f647512d9d90c7aba63b752910d7cc72594e329c9441 ghostscript-doc-9.07-20.el7_3.5.noarch.rpm 71928ee68a7cfbad0f986b1af5e1d534b37625a2f3b7190841b51a6b9150dfe5 ghostscript-gtk-9.07-20.el7_3.5.x86_64.rpm Source: ba98ea2b439b24ff44f59cb96fef42bdc616f6834aa9b97e7baa6d22194b7960 ghostscript-9.07-20.el7_3.5.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
[CentOS-announce] CESA-2017:1208 Important CentOS 7 jasper Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1208 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1208.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: bf4bec0731557d9200609d59f46d1b66da039a1887828d2d477be9b93675a137 jasper-1.900.1-30.el7_3.x86_64.rpm 094699ed29af7ed7ba8dffbdbcd8cd345339acf9b4da7a519d1bfcea7bef23b0 jasper-devel-1.900.1-30.el7_3.i686.rpm d7c8e089c540c9d1ed779130e51a7637fd242cdea676c545216a2cb49fdd77a9 jasper-devel-1.900.1-30.el7_3.x86_64.rpm 33528f9a2f5eaffc09abaed6f5b81f336815820969406a24dfb7526d587ed54b jasper-libs-1.900.1-30.el7_3.i686.rpm 63ee65983ed5bd9f8d2516f4066d3642cdff69f63b5251a52470094e7a816150 jasper-libs-1.900.1-30.el7_3.x86_64.rpm a7863af6605c1c32063a611a530c0b4da2312b98fb2da4138e4071fa8f6762c2 jasper-utils-1.900.1-30.el7_3.x86_64.rpm Source: 37135c918505fca6233f9ab55193602bb9ed97dcde43a50ed6f2dae3a45038fc jasper-1.900.1-30.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
[CentOS-announce] CESA-2017:1208 Important CentOS 6 jasper Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1208 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1208.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 065e0d1bf12c76b8c069e195cc766f413513de631fc2068102c6274bf32a5331 jasper-1.900.1-21.el6_9.i686.rpm fb061499b5f77715cc8edcb8be8bb9e7be45a5471eafcec4f2b108a8a66a6caf jasper-devel-1.900.1-21.el6_9.i686.rpm 2e159a9085ea69dc5494e61caa75a2baad3b313d4c9aaa28d210019d39e1dcc1 jasper-libs-1.900.1-21.el6_9.i686.rpm 6bff2a512a3a02648e7a7e576430def2da83ce3b9e04d9d4645d272028bf74b5 jasper-utils-1.900.1-21.el6_9.i686.rpm x86_64: f2796377490accb35ffc0e76528f712659d30add0842887ce504b8d6645fd220 jasper-1.900.1-21.el6_9.x86_64.rpm fb061499b5f77715cc8edcb8be8bb9e7be45a5471eafcec4f2b108a8a66a6caf jasper-devel-1.900.1-21.el6_9.i686.rpm c5df9adf35d20e7a849fbf7e377cb0cb8902f01f2bcb94c94e31001c9ca058ab jasper-devel-1.900.1-21.el6_9.x86_64.rpm 2e159a9085ea69dc5494e61caa75a2baad3b313d4c9aaa28d210019d39e1dcc1 jasper-libs-1.900.1-21.el6_9.i686.rpm 2d59e1277757dc31c39400a7276f08d8afd03504ce8440facce1f84bb4be714f jasper-libs-1.900.1-21.el6_9.x86_64.rpm b61bc76d97dad867740d8774637fc055cc28289fa4f02b3e6dcaf5d8b3ffa76c jasper-utils-1.900.1-21.el6_9.x86_64.rpm Source: ef8e5d52a2bc6ad50c48ef1ebe4490a67bb92df075afacc102b16d8f076fb162 jasper-1.900.1-21.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
Cherry MX Board Silent Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/cherry-mx-board-silent-review/ Image URL: http://www.thinkcomputers.org/reviews/cherry_mx_silent/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/cherry_mx_silent/small.jpg Quote: "When it comes to companies that in general do nothing but make exceptional products, Cherry, known mostly for their mechanical key switches, resides permanently towards the top of that list.  While they have made full keyboards since 1967 their prowess has been in the manufacture of the world’s best mechanical switches.  Recent times have seen the company make a push to inject themselves back into the complete keyboard market, mostly targeting business professionals.  While normally ThinkComputers is all about gaming and computer hardware we couldn’t help ourselves when we saw the board that we will be taking a look at today.  That deck is the MX Board Silent (G80-3000).  It’s an entirely modern mechanical keyboard internally and a completely oldschool IBM esque deck on the outside.  And that’s not all, while the board is fully mechanical it also claims to be fully silent thanks to Cherry’s brand new MX Silent switches.  Follow along as we find out if this board can bring you back that Commodore 64 feeling while still crushing along at 75 words per minute."
-
** TECHSPOT ------------------------------------------------------------ ** 5 Ways to Access a Locked Windows Account ------------------------------------------------------------ ** http://www.techspot.com/article/1391-locked-windows-account-fix/ ------------------------------------------------------------ Here are five of the most approachable ways for resetting or recovering your Windows password along with abridged instructions on how to execute them and some alternatives. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
Corsair Glaive RGB Mouse Review ------------------------------------------------------------ http://mailchi.mp/kitguru/corsair-glaive-rgb-mouse-review?e=872093acb5 http://www.kitguru.net Corsair Glaive RGB Mouse Review Corsair is back with a brand-new gaming mouse in the shape of the Glaive RGB. With a focus on ultimate comfort, the Glaive RGB actually comes bundled with three interchangeable thumb grips to give you the best experience possible. Priced at £69.99, is it worth the cash? Read the review here: http://www.kitguru.net/peripherals/mouse/dominic-moass/corsair-glaive-rgb-mouse-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=02945ee664&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
TITLE: SteelSeries Arctis 7 Review ( -at -) Vortez CONTENT: The main party piece of the Arctis 7 is that it features lag-free wireless connectivity of up to 12m, with a 15 hour battery life. Gaming headsets, especially of this calibre tend to have a 10-20hr battery life, which isn't very long comparatively, though this tends to be entirely down to the size and quality of the drivers used. LINK: https://www.vortez.net/review.php?id=1301 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
<http://www.eteknix.com> Create Your Own Router and Firewall Solution With pfSense Over-the-counter routers are fine and work as they should, but they simply aren't enough for some of us. Quite a few of the standard routers located around the homes of the world allow for an open source WRT-based firmware to be installed, but that might still not be enough. If that's the case, you might want to look into the idea of building your router. Today, I'm going to take you through the basics and show just how easily you can get a router and firewall with any feature you could want on more powerful hardware than pre-built routers offer. URL - https://www.eteknix.com/create-your-own-router-and-firewall-solution-with-pfsense/ --
-
<http://www.eteknix.com> Corsair Vengeance RGB 3000 MHz DDR4 Review Ready to take your system to the next level? Then you're in the right place! Today we are taking a look at the new Vengeance RGB 3000 MHz DDR4 memory from Corsair <http://www.eteknix.com/category/Corsair> . Delivering blazing fast performance, and hopefully some overclocking headroom. Of course, speed isn't the only thing on offer today. The kit comes equipped with 32GB (4 x 8GB) C15 memory; more than enough for high-end gaming systems, workstations, and more. URL - https://www.eteknix.com/corsair-vengeance-rgb-3000-mhz-ddr4-review/ --
-
Title: SteelSeries Rival 700 Elite Performance Gaming Mouse Review ( -at -) NikKTech Description: SteelSeries claims that the Rival 700 with its many features, ergonomic housing and blazing fast and accurate PMW3360 optical sensor is the best gaming mouse in the market today and after spending almost an entire month with it we do believe it comes very close to that. Article Link: https://www.nikktech.com/main/articles/peripherals/mice/7783-steelseries-riv al-700-elite-performance-gaming-mouse-review Image Link: http://www.nikktech.com/main/images/pics/reviews/steelseries/rival_700/steel series_rival_700a.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
** Win a pair of Sony MDR-Z1R headphones worth £2000! ------------------------------------------------------------ ------------------------------------------------------------ http://mailchi.mp/kitguru/win-a-pair-of-sony-mdr-z1r-headphones-worth-2000?e=872093acb5 http://www.kitguru.net ** Win a pair of Sony MDR-Z1R headphones worth £2000! ------------------------------------------------------------ Last week, we took a look at the exceptional MDR-Z1R Headphones from Sony. This particular pair of headphones marks Sony’s return to the high-end market but at £2000, it’s not going to be an easy purchase for most- so being the generous souls we are – we are giving a pair of them away! Enter here: http://www.kitguru.net/tech-news/competitions/matthew-wilson/win-a-pair-of-sony-mdr-z1r-headphones-worth-2000/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=4b909f8cf2&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Scythe Fuma Link: https://www.techpowerup.com/reviews/Scythe/Fuma Brief: The Scythe Fuma might be quite small for a dual tower design, but should not be looked down upon, offering exceptional performance and little noise. It has all the right attributes to sneak up on and dispatch the competition.
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Corsair Glaive RGB ( -at -) LanOC Reviews <https://lanoc.org/review/input-devices/7525-corsair-glaive-rgb> *DESCRIPTION:* Just last week Corsair introduced their latest gaming mouse, the Glaive RGB. We were originally going to cover it at launch but our sample was a little late coming in and I still needed time to test it out. Well, today that waits is over. The Glaive packs in all of the normal features of a modern mouse including RGB, rubber grips, and a DPI higher than anyone would ever have any use for. What caught my eye though were the swappable thumb grips. So today I’m going to take a closer look at the shape and features of the Glaive RGB then check out how well it has performed for me so far. *ARTICLE URL:* https://lanoc.org/review/input-devices/7525-corsair-glaive-rgb *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/corsair_glaive_rgb/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/corsair_glaive_rgb/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>