Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in webkit2gtk3
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in webkit2gtk3
ID: SUSE-SU-2018:0219-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 12-SP2, SUSE Linux Enterprise Software Development Kit 12-SP2, SUSE Linux Enterprise Server 12-SP2, SUSE Linux Enterprise Server for Raspberry Pi 12-SP2, SUSE Linux Enterprise Workstation Extension 12-SP2, SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Workstation Extension 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3
Datum: Do, 25. Januar 2018, 22:59
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2539
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7030
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7632
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13856
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7654
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7157
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7652
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7156
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7598
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7048
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2354
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7610
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7049
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7034
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7656
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7599
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7586
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7589
Applikationen: webkit2gtk3

Originalnachricht

   SUSE Security Update: Security update for webkit2gtk3
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:0219-1
Rating: important
References: #1020950 #1024749 #1050469 #1066892 #1069925
#1073654 #1075419
Cross-References: CVE-2016-4692 CVE-2016-4743 CVE-2016-7586
CVE-2016-7587 CVE-2016-7589 CVE-2016-7592
CVE-2016-7598 CVE-2016-7599 CVE-2016-7610
CVE-2016-7623 CVE-2016-7632 CVE-2016-7635
CVE-2016-7639 CVE-2016-7641 CVE-2016-7645
CVE-2016-7652 CVE-2016-7654 CVE-2016-7656
CVE-2017-13788 CVE-2017-13798 CVE-2017-13803
CVE-2017-13856 CVE-2017-13866 CVE-2017-13870
CVE-2017-2350 CVE-2017-2354 CVE-2017-2355
CVE-2017-2356 CVE-2017-2362 CVE-2017-2363
CVE-2017-2364 CVE-2017-2365 CVE-2017-2366
CVE-2017-2369 CVE-2017-2371 CVE-2017-2373
CVE-2017-2496 CVE-2017-2510 CVE-2017-2539
CVE-2017-5715 CVE-2017-5753 CVE-2017-5754
CVE-2017-7006 CVE-2017-7011 CVE-2017-7012
CVE-2017-7018 CVE-2017-7019 CVE-2017-7020
CVE-2017-7030 CVE-2017-7034 CVE-2017-7037
CVE-2017-7038 CVE-2017-7039 CVE-2017-7040
CVE-2017-7041 CVE-2017-7042 CVE-2017-7043
CVE-2017-7046 CVE-2017-7048 CVE-2017-7049
CVE-2017-7052 CVE-2017-7055 CVE-2017-7056
CVE-2017-7059 CVE-2017-7061 CVE-2017-7064
CVE-2017-7081 CVE-2017-7087 CVE-2017-7089
CVE-2017-7090 CVE-2017-7091 CVE-2017-7092
CVE-2017-7093 CVE-2017-7094 CVE-2017-7095
CVE-2017-7096 CVE-2017-7098 CVE-2017-7099
CVE-2017-7100 CVE-2017-7102 CVE-2017-7104
CVE-2017-7107 CVE-2017-7109 CVE-2017-7111
CVE-2017-7117 CVE-2017-7120 CVE-2017-7142
CVE-2017-7156 CVE-2017-7157
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP3
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that fixes 89 vulnerabilities is now available.

Description:



This update for webkit2gtk3 fixes the following issues:

Update to version 2.18.5:

+ Disable SharedArrayBuffers from Web API.
+ Reduce the precision of "high" resolution time to 1ms.
+ bsc#1075419 - Security fixes: includes improvements to mitigate the
effects of Spectre and Meltdown (CVE-2017-5753 and CVE-2017-5715).

Update to version 2.18.4:

+ Make WebDriver implementation more spec compliant.
+ Fix a bug when trying to remove cookies before a web process is
spawned.
+ WebKitWebDriver process no longer links to libjavascriptcoregtk.
+ Fix several memory leaks in GStreamer media backend.
+ bsc#1073654 - Security fixes: CVE-2017-13866, CVE-2017-13870,
CVE-2017-7156, CVE-2017-13856.

Update to version 2.18.3:

+ Improve calculation of font metrics to prevent scrollbars from being
shown unnecessarily in some cases.
+ Fix handling of null capabilities in WebDriver implementation.
+ Security fixes: CVE-2017-13798, CVE-2017-13788, CVE-2017-13803.

Update to version 2.18.2:

+ Fix rendering of arabic text.
+ Fix a crash in the web process when decoding GIF images.
+ Fix rendering of wind in Windy.com.
+ Fix several crashes and rendering issues.

Update to version 2.18.1:

+ Improve performance of GIF animations.
+ Fix garbled display in GMail.
+ Fix rendering of several material design icons when using the web font.
+ Fix flickering when resizing the window in Wayland.
+ Prevent default kerberos authentication credentials from being used in
ephemeral sessions.
+ Fix a crash when webkit_web_resource_get_data() is cancelled.
+ Correctly handle touchmove and touchend events in WebKitWebView.
+ Fix the build with enchant 2.1.1.
+ Fix the build in HPPA and Alpha.
+ Fix several crashes and rendering issues.
+ Security fixes: CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,
CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093,
CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098,
CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104,
CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117,
CVE-2017-7120, CVE-2017-7142.

- Enable gold linker on s390/s390x on SLE15/Tumbleweed.


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Workstation Extension 12-SP3:

zypper in -t patch SUSE-SLE-WE-12-SP3-2018-150=1

- SUSE Linux Enterprise Workstation Extension 12-SP2:

zypper in -t patch SUSE-SLE-WE-12-SP2-2018-150=1

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-150=1

- SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-150=1

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-150=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-150=1

- SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-150=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-150=1

- SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-150=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Workstation Extension 12-SP3 (noarch):

libwebkit2gtk3-lang-2.18.5-2.18.1

- SUSE Linux Enterprise Workstation Extension 12-SP2 (noarch):

libwebkit2gtk3-lang-2.18.5-2.18.1

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le
s390x x86_64):

webkit2gtk3-debugsource-2.18.5-2.18.1
webkit2gtk3-devel-2.18.5-2.18.1

- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le
s390x x86_64):

webkit2gtk3-debugsource-2.18.5-2.18.1
webkit2gtk3-devel-2.18.5-2.18.1

- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

libjavascriptcoregtk-4_0-18-2.18.5-2.18.1
libjavascriptcoregtk-4_0-18-debuginfo-2.18.5-2.18.1
libwebkit2gtk-4_0-37-2.18.5-2.18.1
libwebkit2gtk-4_0-37-debuginfo-2.18.5-2.18.1
typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1
typelib-1_0-WebKit2-4_0-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.18.5-2.18.1
webkit2gtk3-debugsource-2.18.5-2.18.1

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

libjavascriptcoregtk-4_0-18-2.18.5-2.18.1
libjavascriptcoregtk-4_0-18-debuginfo-2.18.5-2.18.1
libwebkit2gtk-4_0-37-2.18.5-2.18.1
libwebkit2gtk-4_0-37-debuginfo-2.18.5-2.18.1
typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1
typelib-1_0-WebKit2-4_0-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.18.5-2.18.1
webkit2gtk3-debugsource-2.18.5-2.18.1

- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

libjavascriptcoregtk-4_0-18-2.18.5-2.18.1
libjavascriptcoregtk-4_0-18-debuginfo-2.18.5-2.18.1
libwebkit2gtk-4_0-37-2.18.5-2.18.1
libwebkit2gtk-4_0-37-debuginfo-2.18.5-2.18.1
typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1
typelib-1_0-WebKit2-4_0-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.18.5-2.18.1
webkit2gtk3-debugsource-2.18.5-2.18.1

- SUSE Linux Enterprise Desktop 12-SP3 (noarch):

libwebkit2gtk3-lang-2.18.5-2.18.1

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

libjavascriptcoregtk-4_0-18-2.18.5-2.18.1
libjavascriptcoregtk-4_0-18-debuginfo-2.18.5-2.18.1
libwebkit2gtk-4_0-37-2.18.5-2.18.1
libwebkit2gtk-4_0-37-debuginfo-2.18.5-2.18.1
typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1
typelib-1_0-WebKit2-4_0-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.18.5-2.18.1
webkit2gtk3-debugsource-2.18.5-2.18.1

- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

libjavascriptcoregtk-4_0-18-2.18.5-2.18.1
libjavascriptcoregtk-4_0-18-debuginfo-2.18.5-2.18.1
libwebkit2gtk-4_0-37-2.18.5-2.18.1
libwebkit2gtk-4_0-37-debuginfo-2.18.5-2.18.1
typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1
typelib-1_0-WebKit2-4_0-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.18.5-2.18.1
webkit2gtk3-debugsource-2.18.5-2.18.1

- SUSE Linux Enterprise Desktop 12-SP2 (noarch):

libwebkit2gtk3-lang-2.18.5-2.18.1


References:

https://www.suse.com/security/cve/CVE-2016-4692.html
https://www.suse.com/security/cve/CVE-2016-4743.html
https://www.suse.com/security/cve/CVE-2016-7586.html
https://www.suse.com/security/cve/CVE-2016-7587.html
https://www.suse.com/security/cve/CVE-2016-7589.html
https://www.suse.com/security/cve/CVE-2016-7592.html
https://www.suse.com/security/cve/CVE-2016-7598.html
https://www.suse.com/security/cve/CVE-2016-7599.html
https://www.suse.com/security/cve/CVE-2016-7610.html
https://www.suse.com/security/cve/CVE-2016-7623.html
https://www.suse.com/security/cve/CVE-2016-7632.html
https://www.suse.com/security/cve/CVE-2016-7635.html
https://www.suse.com/security/cve/CVE-2016-7639.html
https://www.suse.com/security/cve/CVE-2016-7641.html
https://www.suse.com/security/cve/CVE-2016-7645.html
https://www.suse.com/security/cve/CVE-2016-7652.html
https://www.suse.com/security/cve/CVE-2016-7654.html
https://www.suse.com/security/cve/CVE-2016-7656.html
https://www.suse.com/security/cve/CVE-2017-13788.html
https://www.suse.com/security/cve/CVE-2017-13798.html
https://www.suse.com/security/cve/CVE-2017-13803.html
https://www.suse.com/security/cve/CVE-2017-13856.html
https://www.suse.com/security/cve/CVE-2017-13866.html
https://www.suse.com/security/cve/CVE-2017-13870.html
https://www.suse.com/security/cve/CVE-2017-2350.html
https://www.suse.com/security/cve/CVE-2017-2354.html
https://www.suse.com/security/cve/CVE-2017-2355.html
https://www.suse.com/security/cve/CVE-2017-2356.html
https://www.suse.com/security/cve/CVE-2017-2362.html
https://www.suse.com/security/cve/CVE-2017-2363.html
https://www.suse.com/security/cve/CVE-2017-2364.html
https://www.suse.com/security/cve/CVE-2017-2365.html
https://www.suse.com/security/cve/CVE-2017-2366.html
https://www.suse.com/security/cve/CVE-2017-2369.html
https://www.suse.com/security/cve/CVE-2017-2371.html
https://www.suse.com/security/cve/CVE-2017-2373.html
https://www.suse.com/security/cve/CVE-2017-2496.html
https://www.suse.com/security/cve/CVE-2017-2510.html
https://www.suse.com/security/cve/CVE-2017-2539.html
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2017-5753.html
https://www.suse.com/security/cve/CVE-2017-5754.html
https://www.suse.com/security/cve/CVE-2017-7006.html
https://www.suse.com/security/cve/CVE-2017-7011.html
https://www.suse.com/security/cve/CVE-2017-7012.html
https://www.suse.com/security/cve/CVE-2017-7018.html
https://www.suse.com/security/cve/CVE-2017-7019.html
https://www.suse.com/security/cve/CVE-2017-7020.html
https://www.suse.com/security/cve/CVE-2017-7030.html
https://www.suse.com/security/cve/CVE-2017-7034.html
https://www.suse.com/security/cve/CVE-2017-7037.html
https://www.suse.com/security/cve/CVE-2017-7038.html
https://www.suse.com/security/cve/CVE-2017-7039.html
https://www.suse.com/security/cve/CVE-2017-7040.html
https://www.suse.com/security/cve/CVE-2017-7041.html
https://www.suse.com/security/cve/CVE-2017-7042.html
https://www.suse.com/security/cve/CVE-2017-7043.html
https://www.suse.com/security/cve/CVE-2017-7046.html
https://www.suse.com/security/cve/CVE-2017-7048.html
https://www.suse.com/security/cve/CVE-2017-7049.html
https://www.suse.com/security/cve/CVE-2017-7052.html
https://www.suse.com/security/cve/CVE-2017-7055.html
https://www.suse.com/security/cve/CVE-2017-7056.html
https://www.suse.com/security/cve/CVE-2017-7059.html
https://www.suse.com/security/cve/CVE-2017-7061.html
https://www.suse.com/security/cve/CVE-2017-7064.html
https://www.suse.com/security/cve/CVE-2017-7081.html
https://www.suse.com/security/cve/CVE-2017-7087.html
https://www.suse.com/security/cve/CVE-2017-7089.html
https://www.suse.com/security/cve/CVE-2017-7090.html
https://www.suse.com/security/cve/CVE-2017-7091.html
https://www.suse.com/security/cve/CVE-2017-7092.html
https://www.suse.com/security/cve/CVE-2017-7093.html
https://www.suse.com/security/cve/CVE-2017-7094.html
https://www.suse.com/security/cve/CVE-2017-7095.html
https://www.suse.com/security/cve/CVE-2017-7096.html
https://www.suse.com/security/cve/CVE-2017-7098.html
https://www.suse.com/security/cve/CVE-2017-7099.html
https://www.suse.com/security/cve/CVE-2017-7100.html
https://www.suse.com/security/cve/CVE-2017-7102.html
https://www.suse.com/security/cve/CVE-2017-7104.html
https://www.suse.com/security/cve/CVE-2017-7107.html
https://www.suse.com/security/cve/CVE-2017-7109.html
https://www.suse.com/security/cve/CVE-2017-7111.html
https://www.suse.com/security/cve/CVE-2017-7117.html
https://www.suse.com/security/cve/CVE-2017-7120.html
https://www.suse.com/security/cve/CVE-2017-7142.html
https://www.suse.com/security/cve/CVE-2017-7156.html
https://www.suse.com/security/cve/CVE-2017-7157.html
https://bugzilla.suse.com/1020950
https://bugzilla.suse.com/1024749
https://bugzilla.suse.com/1050469
https://bugzilla.suse.com/1066892
https://bugzilla.suse.com/1069925
https://bugzilla.suse.com/1073654
https://bugzilla.suse.com/1075419

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung