Linux Compatible
  • News
    • Channels
    • Archive
    • Search
    • Submit
  • Articles
    • Categories
  • Knowledgebase
  • Compatibility
    • Search
  • Links
  • Forums
  • Twitter
Advertisement

Latest News
[ Windows | Linux | Apple ]

· GCC-4.9-Backport New Package for Debian 7 LTS
· NVIDIA Geforce Game Ready Driver 397.31 released
· Samsung 970 SSDs Reviews and more
· Windows Server 2019 Insider Preview Build 17650 released
· iOS 11.3.1 and macOS 10.13.4 released
· Shotwell 0.29.1 released
· PackageKit Update for Ubuntu 17.10
· Psensor and Lucene-Solr Updates for Debian 7 LTS
· Librelp and PackageKit Updates for Oracle Linux
· Linux-tools Update for Debian 8

Upcoming News
· Samsung 860 Pro SSD Review @ Vortez
· Raijintek Orcus 240 @ TechPowerUp
· Team Group Cardea Zero 240 GB @ TechPowerUp
· Guru3D Rig of the Month - January 2018
· Cooler Master MK750 Review @ Vortez
· Seagate Skyhawk 10TB SATA III HDD Review
· Vulkan Continues To Show Its Gaming Strength On Low-End Hardware
· Seagate IronWolf ST12000VN0007 12TB Hard Drive Review @ APH Networks
· Sennheiser Game One @ TechPowerUp
· be quiet! Straight Power 11 1000W Power Supply Review

Linux Compatibility
· Brother DCP-L2540DN
· Sound Blaster E5
· WD Elements 500GB external hard drive
· Canon D660U Flatbad scanner
· Umax Astra 4500 USB Scanner
· Logitech QuickCam Pro 4000
· Dell Latitude E6420
· Creative Sound Blaster Z
· Photosmart 5520
· TB-5300 Slimline Design Tablet

New Forum Topics
· Dale
by: Dale Blinco
on: 2018-02-05 00:26
1 replies, 1220 views

· modem driver needed
by: jongiffen777
on: 2017-12-13 11:11
1 replies, 2402 views

· Need a decent browser for XP Pro!
by: percy
on: 2017-12-05 11:02
2 replies, 4284 views

· Comodo Time Machine + Faronics Deep Freeze
by: Jabberwocky
on: 2017-11-15 23:17
1 replies, 2888 views

· Linux compatablity
by: ibme
on: 2017-10-04 18:05
1 replies, 4806 views

News Channels
· Drivers
· Guides
· Reviews
· Security
· Software
· Press Release
· Updates
· Interviews
· Linux
· General
· Debian
· Red Hat
· Slackware
· Gentoo
· Mandriva
· White Box
· SUSE
· GNOME
· KDE
· CentOS
· Ubuntu
· MEPIS
· Android
· Oracle Linux
· Arch Linux

What's New
Login to see an overview of all news stories since your last visit.

Welcome to our website

To take full advantage of all features you need to login or register. Registration is completely free and takes only a few seconds.

Linux Compatible » News » December 2017 » Firefox/OpenSaml/Java/Xen Updates for SUSE Enterprise Linux

Firefox/OpenSaml/Java/Xen Updates for SUSE Enterprise Linux

Posted by Philipp Esselbach on: 12/08/2017 08:24 AM [ Print | 0 comment(s) ]

The following updates has been released for SUSE Enterprise Linux:

SUSE-SU-2017:3233-1: important: Security update for MozillaFirefox
SUSE-SU-2017:3234-1: important: Security update for opensaml
SUSE-SU-2017:3235-1: important: Security update for java-1_6_0-ibm
SUSE-SU-2017:3236-1: important: Security update for xen




SUSE-SU-2017:3233-1: important: Security update for MozillaFirefox
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3233-1
Rating: important
References: #1068101
Cross-References: CVE-2017-7826 CVE-2017-7828 CVE-2017-7830

Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout
(bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing
API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-MozillaFirefox-13369=1

- SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-MozillaFirefox-13369=1

- SUSE Linux Enterprise Server 11-SP3-LTSS:

zypper in -t patch slessp3-MozillaFirefox-13369=1

- SUSE Linux Enterprise Point of Sale 11-SP3:

zypper in -t patch sleposp3-MozillaFirefox-13369=1

- SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-MozillaFirefox-13369=1

- SUSE Linux Enterprise Debuginfo 11-SP3:

zypper in -t patch dbgsp3-MozillaFirefox-13369=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

MozillaFirefox-devel-52.5.0esr-72.17.1

- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

MozillaFirefox-52.5.0esr-72.17.1
MozillaFirefox-translations-52.5.0esr-72.17.1

- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

MozillaFirefox-52.5.0esr-72.17.1
MozillaFirefox-translations-52.5.0esr-72.17.1

- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

MozillaFirefox-52.5.0esr-72.17.1
MozillaFirefox-translations-52.5.0esr-72.17.1

- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

MozillaFirefox-debuginfo-52.5.0esr-72.17.1

- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

MozillaFirefox-debuginfo-52.5.0esr-72.17.1


References:

https://www.suse.com/security/cve/CVE-2017-7826.html
https://www.suse.com/security/cve/CVE-2017-7828.html
https://www.suse.com/security/cve/CVE-2017-7830.html
https://bugzilla.suse.com/1068101


SUSE-SU-2017:3234-1: important: Security update for opensaml
SUSE Security Update: Security update for opensaml
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3234-1
Rating: important
References: #1068685
Cross-References: CVE-2017-16853
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for opensaml fixes the following issues:

Security issue fixed:

- CVE-2017-16853: Fix the DynamicMetadataProvider class to properly
configure itself with the MetadataFilter plugins, to avoid possible MITM
attacks (bsc#1068685).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-2011=1

- SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-2011=1

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-2011=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-2011=1

- SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-2011=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

libsaml-devel-2.5.5-3.3.1
opensaml-debugsource-2.5.5-3.3.1

- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

libsaml-devel-2.5.5-3.3.1
opensaml-debugsource-2.5.5-3.3.1

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

libsaml8-2.5.5-3.3.1
libsaml8-debuginfo-2.5.5-3.3.1
opensaml-bin-2.5.5-3.3.1
opensaml-bin-debuginfo-2.5.5-3.3.1
opensaml-debugsource-2.5.5-3.3.1
opensaml-schemas-2.5.5-3.3.1

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

libsaml8-2.5.5-3.3.1
libsaml8-debuginfo-2.5.5-3.3.1
opensaml-bin-2.5.5-3.3.1
opensaml-bin-debuginfo-2.5.5-3.3.1
opensaml-debugsource-2.5.5-3.3.1
opensaml-schemas-2.5.5-3.3.1

- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

libsaml8-2.5.5-3.3.1
libsaml8-debuginfo-2.5.5-3.3.1
opensaml-bin-2.5.5-3.3.1
opensaml-bin-debuginfo-2.5.5-3.3.1
opensaml-debugsource-2.5.5-3.3.1
opensaml-schemas-2.5.5-3.3.1


References:

https://www.suse.com/security/cve/CVE-2017-16853.html
https://bugzilla.suse.com/1068685


SUSE-SU-2017:3235-1: important: Security update for java-1_6_0-ibm
SUSE Security Update: Security update for java-1_6_0-ibm
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3235-1
Rating: important
References: #1070162
Cross-References: CVE-2016-9841 CVE-2017-10281 CVE-2017-10285
CVE-2017-10293 CVE-2017-10295 CVE-2017-10345
CVE-2017-10346 CVE-2017-10347 CVE-2017-10348
CVE-2017-10349 CVE-2017-10350 CVE-2017-10355
CVE-2017-10356 CVE-2017-10357 CVE-2017-10388

Affected Products:
SUSE Linux Enterprise Module for Legacy Software 12
______________________________________________________________________________

An update that fixes 15 vulnerabilities is now available.

Description:

This update for java-1_6_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 6.0.16.50 (bsc#1070162)
* CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
CVE-2017-10293 CVE-2016-9841 CVE-2017-10355 CVE-2017-10357
CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350
CVE-2017-10281 CVE-2017-10295 CVE-2017-10345


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Legacy Software 12:

zypper in -t patch SUSE-SLE-Module-Legacy-12-2017-2018=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Module for Legacy Software 12 (s390x x86_64):

java-1_6_0-ibm-1.6.0_sr16.50-50.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.50-50.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.50-50.3.1

- SUSE Linux Enterprise Module for Legacy Software 12 (x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr16.50-50.3.1


References:

https://www.suse.com/security/cve/CVE-2016-9841.html
https://www.suse.com/security/cve/CVE-2017-10281.html
https://www.suse.com/security/cve/CVE-2017-10285.html
https://www.suse.com/security/cve/CVE-2017-10293.html
https://www.suse.com/security/cve/CVE-2017-10295.html
https://www.suse.com/security/cve/CVE-2017-10345.html
https://www.suse.com/security/cve/CVE-2017-10346.html
https://www.suse.com/security/cve/CVE-2017-10347.html
https://www.suse.com/security/cve/CVE-2017-10348.html
https://www.suse.com/security/cve/CVE-2017-10349.html
https://www.suse.com/security/cve/CVE-2017-10350.html
https://www.suse.com/security/cve/CVE-2017-10355.html
https://www.suse.com/security/cve/CVE-2017-10356.html
https://www.suse.com/security/cve/CVE-2017-10357.html
https://www.suse.com/security/cve/CVE-2017-10388.html
https://bugzilla.suse.com/1070162


SUSE-SU-2017:3236-1: important: Security update for xen
SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3236-1
Rating: important
References: #1055047 #1056336 #1061075 #1061081 #1061086
#1063123 #1068187 #1068191
Cross-References: CVE-2017-13672 CVE-2017-15289 CVE-2017-15592
CVE-2017-15595 CVE-2017-15597
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves 5 vulnerabilities and has three fixes
is now available.

Description:

This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD)
code allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged
guests to retain a writable mapping of freed memory leading to
information leaks, privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest
privileged users to cause a denial of service (out-of-bounds write
access and Qemu process crash) via vectors related to dst calculation
(bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying
domain allowed a malicious guest administrator to corrupt hypervisor
memory, allowing for DoS or potentially privilege escalation and
information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS
(unbounded recursion, stack consumption, and hypervisor crash) or
possibly gain privileges via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS
(hypervisor crash) or possibly gain privileges because self-linear
shadow mappings were mishandled for translated guests (bsc#1061086).
- CVE-2017-13672: The VGA display emulator support allowed local guest OS
privileged users to cause a denial of service (out-of-bounds read and
QEMU process crash) via vectors involving display update (bsc#1056336)

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-2013=1

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-2013=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-2013=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE OpenStack Cloud 6 (x86_64):

xen-4.5.5_20-22.36.3
xen-debugsource-4.5.5_20-22.36.3
xen-doc-html-4.5.5_20-22.36.3
xen-kmp-default-4.5.5_20_k3.12.74_60.64.63-22.36.3
xen-kmp-default-debuginfo-4.5.5_20_k3.12.74_60.64.63-22.36.3
xen-libs-32bit-4.5.5_20-22.36.3
xen-libs-4.5.5_20-22.36.3
xen-libs-debuginfo-32bit-4.5.5_20-22.36.3
xen-libs-debuginfo-4.5.5_20-22.36.3
xen-tools-4.5.5_20-22.36.3
xen-tools-debuginfo-4.5.5_20-22.36.3
xen-tools-domU-4.5.5_20-22.36.3
xen-tools-domU-debuginfo-4.5.5_20-22.36.3

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

xen-4.5.5_20-22.36.3
xen-debugsource-4.5.5_20-22.36.3
xen-doc-html-4.5.5_20-22.36.3
xen-kmp-default-4.5.5_20_k3.12.74_60.64.63-22.36.3
xen-kmp-default-debuginfo-4.5.5_20_k3.12.74_60.64.63-22.36.3
xen-libs-32bit-4.5.5_20-22.36.3
xen-libs-4.5.5_20-22.36.3
xen-libs-debuginfo-32bit-4.5.5_20-22.36.3
xen-libs-debuginfo-4.5.5_20-22.36.3
xen-tools-4.5.5_20-22.36.3
xen-tools-debuginfo-4.5.5_20-22.36.3
xen-tools-domU-4.5.5_20-22.36.3
xen-tools-domU-debuginfo-4.5.5_20-22.36.3

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

xen-4.5.5_20-22.36.3
xen-debugsource-4.5.5_20-22.36.3
xen-doc-html-4.5.5_20-22.36.3
xen-kmp-default-4.5.5_20_k3.12.74_60.64.63-22.36.3
xen-kmp-default-debuginfo-4.5.5_20_k3.12.74_60.64.63-22.36.3
xen-libs-32bit-4.5.5_20-22.36.3
xen-libs-4.5.5_20-22.36.3
xen-libs-debuginfo-32bit-4.5.5_20-22.36.3
xen-libs-debuginfo-4.5.5_20-22.36.3
xen-tools-4.5.5_20-22.36.3
xen-tools-debuginfo-4.5.5_20-22.36.3
xen-tools-domU-4.5.5_20-22.36.3
xen-tools-domU-debuginfo-4.5.5_20-22.36.3


References:

https://www.suse.com/security/cve/CVE-2017-13672.html
https://www.suse.com/security/cve/CVE-2017-15289.html
https://www.suse.com/security/cve/CVE-2017-15592.html
https://www.suse.com/security/cve/CVE-2017-15595.html
https://www.suse.com/security/cve/CVE-2017-15597.html
https://bugzilla.suse.com/1055047
https://bugzilla.suse.com/1056336
https://bugzilla.suse.com/1061075
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1061086
https://bugzilla.suse.com/1063123
https://bugzilla.suse.com/1068187
https://bugzilla.suse.com/1068191





Bookmark and Share

« Heimdal/Nova/Erlang Updates for Debian · Libvirt Bug Fix Update for Oracle Linux 7 »

Linux Compatible » News » December 2017 » Firefox/OpenSaml/Java/Xen Updates for SUSE Enterprise Linux
All products mentioned are registered trademarks or trademarks of their respective owners.
© 2002-2018 Esselbach Internet Solutions - All Rights Reserved. Terms and privacy policy
Powered by Contentteller® Business Edition