The OVAL Repository5.52015-09-03T07:31:25.299-04:00SUSE-SU-2015:1150-1 -- Security update for compat-openssl098 (important)SUSE Linux Enterprise Desktop 12compat-openssl098This update fixes the following security issues:
- CVE-2015-4000 (boo#931698)
* The Logjam Attack / weakdh.org
* reject connections with DH parameters shorter than 1024 bits
* generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
* Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
* Exploitable out-of-bounds read in X509_cmp_timeSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0805-1 -- Security update for cups-filters (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12cups-filterscups-filters was updated to fix one security issue.
This security issue was fixed:
- CVE-2015-2265: Remote command execution in remove_bad_chars()
(bnc#921753).
This non-security issue was fixed:
- LSB compliance of foomatic-rip (bnc#915545).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0979-1 -- Security update for dnsmasq (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12dnsmasqThe DNS server dnsmasq was updated to fix one security issue and one
non-security bug.
The following vulnerability was fixed:
* CVE-2015-3294: A remote unauthenticated attacker could have caused a
denial of service (DoS) or read heap memory, potentially disclosing
information such as performed DNS queries or encryption keys.
(bsc#928867)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0108-1 -- Security update for evolution-data-server (moderate)SUSE Linux Enterprise Desktop 12evolution-data-serverevolution-data-server was updated to disable support for SSLv3.
This security issues was fixed:
- SSLv3 POODLE attack (CVE-2014-3566)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:1077-1 -- Security update for openldap2 (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12openldap2openldap2 was updated to fix two security issues and one non-security bug.
The following vulnerabilities were fixed:
* A remote attacker could cause a denial of service through a NULL pointer
dereference and crash via an empty attribute list in a deref control in
a search request. (bnc#916897 CVE-2015-1545)
* A remote attacker could cause a denial of service (crash) via a crafted
search query with a matched values control. (bnc#916914 CVE-2015-1546)
The following non-security issue was fixed:
* Prevent connection-0 (internal connection) from showing up in the
monitor backend (bnc#905959)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0515-1 -- Security update for gnome-settings-daemon (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12gnome-settings-daemongnome-settings-daemon was updated to fix a bug and a security issue:
Security issue fixed:
- CVE-2014-7300: The lockscreen can be bypassed with the Print Screen
button.
Bug fixed:
- Do not hide the cursor while there was no mutter running (bsc#905158).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0990-1 -- Security update for curl (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12curlcurl was updated to fix five security issues.
The following vulnerabilities were fixed:
* CVE-2015-3143: curl could re-use NTML authenticateds connections
* CVE-2015-3144: curl could access memory out of bounds with zero length
host names
* CVE-2015-3145: curl cookie parser could access memory out of boundary
* CVE-2015-3148: curl could treat Negotiate as not connection-oriented
* CVE-2015-3153: curl could have sent sensitive HTTP headers also to
proxiesSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:1020-1 -- Security update for autofs (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12autofsautofs was updated to fix one security issue.
This security issue was fixed:
- CVE-2014-8169: Prevent potential privilege escalation via interpreter
load path for program-based automount maps (bnc#917977).
These non-security issues were fixed:
- Dont pass sloppy option for other than nfs mounts (bnc#901448,
bnc#916203)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0942-1 -- Security update for gstreamer-0_10-plugins-bad (moderate)SUSE Linux Enterprise Desktop 12gstreamer-0_10-plugins-badgstreamer-0_10-plugins-bad was updated to fix a security issue, a buffer
overflow in mp4 parsing (bnc#927559 CVE-2015-0797).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:1013-1 -- Security update for wpa_supplicant (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12wpa_supplicantwpa_supplicant was updated to fix three security issues:
- CVE-2015-0210: wpa_supplicant: broken certificate subject check this
adds the "domain_match" config option from upstream (additional to the
already existing domain_suffix_match)
- CVE-2014-3686: hostapd command execution
- CVE-2015-1863: P2P SSID processing vulnerabilitySergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0953-2 -- Security update for perl-YAML-LibYAML (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12perl-YAML-LibYAMLerl-YAML-LibYAML was updated to fix three security issues.
These security issues were fixed:
- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in
LibYAML before 0.1.5 performed an incorrect cast, which allowed remote
attackers to cause a denial of service (application crash) and possibly
execute arbitrary code via crafted tags in a YAML document, which
triggered a heap-based buffer overflow (bnc#860617, bnc#911782).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0803-1 -- Security update for gdm (low)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12gdmThe GNOME Display Manager was updated to fix several bugs:
Security issue fixed:
- Removed gdm-fingerprint and gdm-smartcard pamfiles that allowed
unlocking the screen without password or fingerprint if fingerprint
reader support was enabled. (boo#900836).
Bugs fixed:
- Fix support for DISPLAYMANAGER_STARTS_XSERVER from
/etc/sysconfig/displaymanager (bsc#919723).
- Ensure ShowLocalGreeter configuration key is properly handled
(bgo#743440).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0866-1 -- Security update for gd (low)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12gdThe graphics drawing library gd was updated to fix one security issue.
The following vulnerability was fixed:
* possible buffer read overflow (CVE-2014-9709)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:1014-1 -- Security update for vorbis-tools (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12vorbis-toolsVorbis tools was updated to fix division by zero and integer overflows by
crafted WAV files (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441),
that would allow attackers to crash the vorbis tools processes.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1628-1 -- Security update for gnutls (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12gnutlsgnutls was updated to fix one security issue.
- Fixed parsing problem in elliptic curve blobs over TLS that could lead
to remote crashes (CVE-2014-8564).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1592-1 -- Security update for tigervnc (moderate)SUSE Linux Enterprise Desktop 12tigervncThis update for tigervnc provides the following fixes:
- Fixed integer overflow flaw, leading to a heap-based buffer overflow in
screen size handling. (CVE-2014-8240)
- Send correctly keys that don't type any characters, such as CTRL+Space.
(bnc#906922)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1649-1 -- Security update for flash-player (moderate)SUSE Linux Enterprise Desktop 12flash-playerThis flash-player security version update fixes the following issues:
- Security update to 11.2.202.425 (bsc#909219):
* APSB14-27, CVE-2014-0580, CVE-2014-0587, CVE-2014-8443, CVE-2014-9162,
CVE-2014-9163, CVE-2014-9164Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1595-1 -- Security update for ImageMagick (moderate)SUSE Linux Enterprise Desktop 12ImageMagickImageMagick was updated to fix four security issues.
These security issues were fixed:
- Crafted JPEG file could lead to DOS (CVE-2014-8716).
- Out-of-bounds memory access in PCX parser (CVE-2014-8355).
- Out-of-bounds memory access in resize code (CVE-2014-8354).
- Out-of-bounds memory error in DCM decode (CVE-2014-8562).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1652-1 -- Security update for cpio (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12cpioThis cpio security update fixes the following buffer overflow issue and
two non security issues:
- fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112)
- prevent cpio from extracting over a symlink (bnc#658010)
- fix a truncation check in mtSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1512-1 -- Security update for compat-openssl098 (moderate)SUSE Linux Enterprise Desktop 12compat-openssl098compat-openssl098 was updated to fix three security issues.
NOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
OpenSSL only adds downgrade detection support for client applications. See
https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.
These security issues were fixed:
- Session ticket memory leak (CVE-2014-3567).
- Fixed build option no-ssl3 (CVE-2014-3568).
- Added support for TLS_FALLBACK_SCSV (CVE-2014-3566).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1555-1 -- Security update for file (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12filefile was updated to fix one security issue.
This security issue was fixed:
- Out-of-bounds read in elf note headers (CVE-2014-3710).
This non-security issues was fixed:
- Correctly identify GDBM files created by libgdbm4 (bnc#888308).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1423-1 -- Security update for flash-player (important)SUSE Linux Enterprise Desktop 12flash-playerAdobe Flash Player was updated to 11.2.202.411, fixing security issues and
bugs.
For more information please read:
http://helpx.adobe.com/security/products/flash-player/apsb14-22.htmlSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1464-1 -- Security update for wget (moderate)SUSE Linux Enterprise Desktop 12wgetwget was updated to fix one security issue.
This security issue was fixed:
- FTP symlink arbitrary filesystem access (CVE-2014-4877).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1438-1 -- update for rsyslog (moderate)SUSE Linux Enterprise Desktop 12rsyslogThis update for rsyslog provides the following fixes:
- Fixed remote PRI DoS vulnerability patch (CVE-2014-3683, bnc#899756)
- Removed broken, unsupported and dropped by upstream zpipe utility from
rsyslog-diag-tools package (bnc#890228)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1494-1 -- Security update for libreoffice (moderate)SUSE Linux Enterprise Desktop 12libreofficelibreoffice was updated to version 4.3.3.2 to fix two security issues:
These security issues were fixed:
- "Document as E-mail" vulnerability (bnc#900218).
- Impress remote control use-after-free vulnerability (CVE-2014-3693).
Various other fixes are included in the update.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0743-1 -- Security update for mariadb (important)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12mariadbmariadb was updated to version 10.0.16 to fix 40 security issues.
These security issues were fixed:
- CVE-2015-0411: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier, and 5.6.21 and earlier, allowed remote attackers to affect
confidentiality, integrity, and availability via unknown vectors related
to Server : Security : Encryption (bnc#915911).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1422-1 -- Security update for java-1_7_0-openjdk (important)SUSE Linux Enterprise Desktop 12java-1_7_0-openjdkOpenJDK was updated to icedtea 2.5.3 (OpenJDK 7u71) fixing security issues
and bugs.
* Security:
- S8015256: Better class accessibility
- S8022783, CVE-2014-6504: Optimize C2 optimizations
- S8035162: Service printing service
- S8035781: Improve equality for annotations
- S8036805: Correct linker method lookup.
- S8036810: Correct linker field lookup
- S8036936: Use local locales
- S8037066, CVE-2014-6457: Secure transport layer
- S8037846, CVE-2014-6558: Ensure streaming of input cipher streams
- S8038364: Use certificate exceptions correctly
- S8038899: Safer safepoints
- S8038903: More native monitor monitoring
- S8038908: Make Signature more robust
- S8038913: Bolster XML support
- S8039509, CVE-2014-6512: Wrap sockets more thoroughly
- S8039533, CVE-2014-6517: Higher resolution resolvers
- S8041540, CVE-2014-6511: Better use of pages in font processing
- S8041529: Better parameterization of parameter lists
- S8041545: Better validation of generated rasters
- S8041564, CVE-2014-6506: Improved management of logger resources
- S8041717, CVE-2014-6519: Issue with class file parser
- S8042609, CVE-2014-6513: Limit splashiness of splash images
- S8042797, CVE-2014-6502: Avoid strawberries in LogRecord
- S8044274, CVE-2014-6531: Proper property processingSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1178-1 -- Update for update-test-security (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12update-test-securityThis is a security update to test the software update stack.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1615-1 -- Security update for pidgin (moderate)SUSE Linux Enterprise Desktop 12pidginThis pidgin security update fixes the following issues:
- bnc#902408: remote information leak via crafted XMPP message.
(CVE-2014-3698)
- bnc#902410: denial of service parsing Groupwise server message.
(CVE-2014-3696)
- bnc#902409: crash in MXit protocol plug-in. (CVE-2014-3695)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:0884-1 -- Security update for spice (important)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12spiceThe remote desktop software SPICE was updated to address one security
issue.
The following vulnerabilitiy was fixed:
* A stack-based buffer overflow in the password handling code allowed
remote attackers to cause a denial of service (crash) via a long
password in a SPICE ticket. (bsc#848279, CVE-2013-4282)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1524-1 -- Security update for openssl (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12opensslopenssl was updated to fix four security issues.
These security issues were fixed:
- SRTP Memory Leak (CVE-2014-3513).
- Session Ticket Memory Leak (CVE-2014-3567).
- Fixed incomplete no-ssl3 build option (CVE-2014-3568).
- Add support for TLS_FALLBACK_SCSV (CVE-2014-3566).
NOTE: This update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
OpenSSL only adds downgrade detection support for client applications. See
https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2015:1143-1 -- Security update for openssl (important)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12opensslThis update of openssl fixes the following security issues:
- CVE-2015-4000 (bsc#931698)
* The Logjam Attack / weakdh.org
* reject connections with DH parameters shorter than 1024 bits
* generates 2048-bit DH parameters by default
- CVE-2015-1788 (bsc#934487)
* Malformed ECParameters causes infinite loop
- CVE-2015-1789 (bsc#934489)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1542-1 -- Security update for flash-player (moderate)SUSE Linux Enterprise Desktop 12flash-playerflash-player was updated to fix one security issue.
This security issue was fixed:
- Hardening against a code execution flaw (CVE-2014-8439).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1465-1 -- Security update for flash-player (moderate)SUSE Linux Enterprise Desktop 12flash-playerflash-player was updated to version 11.2.202.418 to fix 18 security issues.
These security issues were fixed:
- Memory corruption vulnerabilities that could lead to code execution
(CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).
- Use-after-free vulnerabilities that could lead to code execution
(CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).
- A double free vulnerability that could lead to code execution
(CVE-2014-0574).
- Type confusion vulnerabilities that could lead to code execution
(CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0590).
- Heap buffer overflow vulnerabilities that could lead to code execution
(CVE-2014-0582, CVE-2014-0589).
- An information disclosure vulnerability that could be exploited to
disclose session tokens (CVE-2014-8437).
- A heap buffer overflow vulnerability that could be exploited to perform
privilege escalation from low to medium integrity level (CVE-2014-0583).
- A permission issue that could be exploited to perform privilege
escalation from low to medium integrity level (CVE-2014-8442).
More information can be found at
http://helpx.adobe.com/security/products/flash-player/apsb14-24.htmlSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1510-1 -- Security update for MozillaFirefox and mozilla-nss
(moderate)SUSE Linux Enterprise Desktop 12MozillaFirefoxmozilla-nss- update to Firefox 31.2.0 ESR (bnc#900941) * MFSA
2014-74/CVE-2014-1574/CVE-2014-1575 (bmo#1001994, bmo#1011354, bmo#1018916, bmo#1020034,
bmo#1023035, bmo#1032208, bmo#1033020, bmo#1034230, bmo#1061214, bmo#1061600, bmo#1064346,
bmo#1072044, bmo#1072174) Miscellaneous memory safety hazards (rv:33.0/rv:31.2) * MFSA
2014-75/CVE-2014-1576 (bmo#1041512) Buffer overflow during CSS manipulation * MFSA
2014-76/CVE-2014-1577 (bmo#1012609) Web Audio memory corruption issues with custom
waveforms * MFSA 2014-77/CVE-2014-1578 (bmo#1063327) Out-of-bounds write with WebM video *
MFSA 2014-79/CVE-2014-1581 (bmo#1068218) Use-after-free interacting with text
directionality * MFSA 2014-81/CVE-2014-1585/CVE-2014-1586 (bmo#1062876, bmo#1062981)
Inconsistent video sharing within iframe * MFSA 2014-82/CVE-2014-1583 (bmo#1015540)
Accessing cross-origin objects via the Alarms API - SSLv3 is disabled by default. See
README.POODLE for more detailed information. - disable call home features - update to
3.17.2 (bnc#900941) Bugfix release * bmo#1049435 - Importing an RSA private key fails if p
< q * bmo#1057161 - NSS hangs with 100% CPU on invalid EC key * bmo#1078669 - certutil
crashes when using the --certVersion parameter - changes from earlier version of the 3.17
branch: update to 3.17.1 (bnc#897890) * MFSA 2014-73/CVE-2014-1568 (bmo#1064636,
bmo#1069405) RSA Signature Forgery in NSS * Change library's signature algorithm default
to SHA256 * Add support for draft-ietf-tls-downgrade-scsv * Add clang-cl support to the
NSS build system * Implement TLS 1.3: * Part 1. Negotiate TLS 1.3 * Part 2. Remove
deprecated cipher suites andcompression. * Add support for little-endian powerpc64 update
to 3.17 * required for Firefox 33 New functionality: * When using ECDHE, the TLS server
code may be configured to generate a fresh ephemeral ECDH key for each handshake, by
setting the SSL_REUSE_SERVER_ECDHE_KEY socket option to PR_FALSE. The
SSL_REUSE_SERVER_ECDHE_KEY option defaults to PR_TRUE, which means the server's ephemeral
ECDH key is reused for multiple handshakes. This option does not affect the TLS client
code, which always generates a fresh ephemeral ECDH key for each handshake. New Macros *
SSL_REUSE_SERVER_ECDHE_KEY Notable Changes: * The manual pages for the certutil and pp
tools have been updated to document the new parameters that had been added in NSS
3.16.2.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1259-1 -- bash (important)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12The command-line shell 'bash' evaluates environment variables, which
allows the injection of characters and might be used to access files on
the system in some circumstances (CVE-2014-7169).
Please note that this issue is different from a previously fixed
vulnerability tracked under CVE-2014-6271 and it is less serious due to
the special, non-default system configuration that is needed to create an
exploitable situation.
To remove further exploitation potential we now limit the
function-in-environment variable to variables prefixed with BASH_FUNC_ .
This hardening feature is work in progress and might be improved in later
updates.
Additionaly two more security issues were fixed in bash: CVE-2014-7186:
Nested HERE documents could lead to a crash of bash.
CVE-2014-7187: Nesting of for loops could lead to a crash of bash.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1260-1 -- bash (critical)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12Bash was updated to fix unexpected code execution with environment
variables (CVE-2014-6271).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2014:1511-1 -- Security update for python, python-base, python-doc (moderate)SUSE Linux Enterprise Server 12SUSE Linux Enterprise Desktop 12pythonython, python-base, python-doc was updated to fix one security issue.
This security issue was fixed:
- Fixed potential buffer overflow in buffer() (CVE-2014-7185).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE Linux Enterprise Server 12 is installedSUSE Linux Enterprise Server 12SUSE Linux Enterprise Server 12 is installed.Maria MikhnoDRAFTINTERIMACCEPTEDACCEPTEDSUSE Linux Enterprise Desktop 12 is installedSUSE Linux Enterprise Desktop 12SUSE Linux Enterprise Desktop 12 is installed.Maria MikhnoDRAFTINTERIMACCEPTEDACCEPTEDlibopenssl0_9_8-32bitlibopenssl0_9_8-debuginfo-32bitcups-filters-foomatic-rip-debuginfocups-filterscups-filters-debuginfocups-filters-foomatic-ripcups-filters-cups-browsed-debuginfocups-filters-ghostscript-debuginfocups-filters-debugsourcecups-filters-cups-browsedcups-filters-ghostscriptdnsmasqdnsmasq-debuginfodnsmasq-debugsourcelibebook-1_2-14-debuginfo-32bitlibedataserver-1_2-18libecal-1_2-16libebook-contacts-1_2-0-32bitlibebook-1_2-14evolution-data-server-debugsourcelibedata-book-1_2-20-debuginfo-32bitevolution-data-server-langlibedata-cal-1_2-23-32bitlibcamel-1_2-45libedata-book-1_2-20-debuginfolibedata-cal-1_2-23-debuginfolibebook-contacts-1_2-0libebackend-1_2-7-debuginfolibedataserver-1_2-18-32bitlibedata-cal-1_2-23libebook-contacts-1_2-0-debuginfolibebackend-1_2-7libedata-book-1_2-20-32bitlibecal-1_2-16-debuginfolibecal-1_2-16-32bitlibebook-contacts-1_2-0-debuginfo-32bitlibebackend-1_2-7-debuginfo-32bitlibebook-1_2-14-32bitevolution-data-server-debuginfolibedataserver-1_2-18-debuginfo-32bitlibedata-cal-1_2-23-debuginfo-32bitlibebackend-1_2-7-32bitlibebook-1_2-14-debuginfolibedataserver-1_2-18-debuginfolibcamel-1_2-45-debuginfo-32bitlibecal-1_2-16-debuginfo-32bitevolution-data-serverlibedata-book-1_2-20libcamel-1_2-45-debuginfolibcamel-1_2-45-32bitopenldap2-clientlibldap-2_4-2openldap2libldap-2_4-2-debuginfo-32bitopenldap2-back-metaopenldap2-client-debuginfolibldap-2_4-2-debuginfoopenldap2-client-debugsourceopenldap2-debugsourceopenldap2-debuginfoopenldap2-back-meta-debuginfolibldap-2_4-2-32bitgnome-settings-daemon-langgnome-settings-daemon-debuginfognome-settings-daemon-debugsourcegnome-settings-daemonlibcurl4-debuginfo-32bitcurl-debuginfolibcurl4-debuginfocurl-debugsourcelibcurl4curllibcurl4-32bitautofs-debuginfoautofsautofs-debugsourcelibgstbasevideo-0_10-23-debuginfo-32bitlibgstphotography-0_10-23-debuginfolibgstphotography-0_10-23-32bitlibgstphotography-0_10-23gstreamer-0_10-plugins-bad-langlibgstbasecamerabinsrc-0_10-23gstreamer-0_10-plugins-badlibgstphotography-0_10-23-debuginfo-32bitgstreamer-0_10-plugins-bad-debuginfolibgstbasevideo-0_10-23libgstsignalprocessor-0_10-23-debuginfo-32bitlibgstsignalprocessor-0_10-23-32bitlibgstvdp-0_10-23-debuginfolibgstsignalprocessor-0_10-23-debuginfolibgstbasecamerabinsrc-0_10-23-debuginfo-32bitgstreamer-0_10-plugins-bad-debuginfo-32bitgstreamer-0_10-plugins-bad-debugsourcelibgstbasevideo-0_10-23-32bitlibgstbasevideo-0_10-23-debuginfolibgstbasecamerabinsrc-0_10-23-32bitlibgstcodecparsers-0_10-23-debuginfolibgstvdp-0_10-23libgstvdp-0_10-23-debuginfo-32bitlibgstvdp-0_10-23-32bitlibgstsignalprocessor-0_10-23libgstcodecparsers-0_10-23libgstbasecamerabinsrc-0_10-23-debuginfowpa_supplicant-debugsourcewpa_supplicantwpa_supplicant-debuginfoperl-YAML-LibYAMLperl-YAML-LibYAML-debugsourceperl-YAML-LibYAML-debuginfolibgdm1typelib-1_0-Gdm-1_0gdm-branding-upstreamlibgdm1-debuginfogdm-debuginfogdmflexiservergdmgdm-debugsourcegdm-langgdgd-32bitgd-debugsourcegd-debuginfo-32bitgd-debuginfovorbis-tools-debugsourcevorbis-tools-debuginfovorbis-tools-langvorbis-toolslibgnutls28-debuginfo-32bitgnutls-debuginfolibgnutls28libgnutls28-32bitgnutls-debugsourcelibgnutls28-debuginfognutlstigervnc-debuginfoxorg-x11-Xvnc-debuginfotigervncxorg-x11-Xvnctigervnc-debugsourceImageMagickImageMagick-debugsourcelibMagickCore-6_Q16-1-debuginfo-32bitlibMagick++-6_Q16-3-debuginfolibMagickCore-6_Q16-1-32bitlibMagickCore-6_Q16-1libMagickWand-6_Q16-1-debuginfoImageMagick-debuginfolibMagick++-6_Q16-3libMagickWand-6_Q16-1libMagickCore-6_Q16-1-debuginfocpio-debugsourcecpio-langcpio-debuginfocpiolibopenssl0_9_8libopenssl0_9_8-debuginfocompat-openssl098-debugsourcelibmagic1file-magiclibmagic1-debuginfo-32bitlibmagic1-32bitfile-debugsourcefile-debuginfofilelibmagic1-debuginfowget-debugsourcewgetwget-debuginforsyslog-debugsourcersyslog-debuginforsysloglibreoffice-mathlibreoffice-l10n-arlibreoffice-officebeanlibreoffice-l10n-pllibreoffice-impresslibreoffice-calclibreoffice-writerlibreoffice-l10n-pt-PTlibreoffice-l10n-eslibreoffice-l10n-sklibreoffice-calc-extensionslibreoffice-writer-debuginfolibreoffice-debuginfolibreoffice-l10n-aflibreoffice-mailmergelibreoffice-impress-debuginfolibreoffice-l10n-rulibreoffice-l10n-enlibreoffice-l10n-kolibreoffice-l10n-itlibreoffice-math-debuginfolibreoffice-l10n-jalibreoffice-l10n-gulibreoffice-l10n-cslibreoffice-pyuno-debuginfolibreoffice-l10n-pt-BRlibreofficelibreoffice-filters-optionallibreoffice-l10n-hilibreoffice-l10n-nnlibreoffice-l10n-zh-Hantlibreoffice-l10n-filibreoffice-calc-debuginfolibreoffice-l10n-hulibreoffice-base-debuginfolibreoffice-gnome-debuginfolibreoffice-base-drivers-postgresql-debuginfolibreoffice-l10n-xhlibreoffice-base-drivers-mysqllibreoffice-icon-theme-tangolibreoffice-l10n-dalibreoffice-writer-extensionslibreoffice-pyunolibreoffice-l10n-calibreoffice-officebean-debuginfolibreoffice-l10n-zh-Hanslibreoffice-base-drivers-postgresqllibreoffice-l10n-nllibreoffice-l10n-frlibreoffice-l10n-svlibreoffice-l10n-zulibreoffice-l10n-nblibreoffice-gnomelibreoffice-drawlibreoffice-debugsourcelibreoffice-draw-debuginfolibreoffice-base-drivers-mysql-debuginfolibreoffice-l10n-delibreoffice-basemariadb-toolslibmysqlclient18libmysqlclient18-debuginfo-32bitlibmysqlclient_r18mariadb-debuginfomariadb-client-debuginfolibmysqlclient_r18-32bitmariadblibmysqlclient18-debuginfomariadb-errormessagesmariadb-clientmariadb-debugsourcelibmysqlclient18-32bitmariadb-tools-debuginfojava-1_7_0-openjdk-debugsourcejava-1_7_0-openjdkjava-1_7_0-openjdk-headless-debuginfojava-1_7_0-openjdk-headlessjava-1_7_0-openjdk-debuginfoupdate-test-securityfinch-debuginfopidginlibpurple-debuginfolibpurple-meanwhile-debuginfolibpurple-tcl-debuginfopidgin-debuginfolibpurple-langfinchlibpurple-tcllibpurplepidgin-debugsourcelibpurple-meanwhilelibspice-server1-debuginfolibspice-server1spice-debugsourceopenssl-docopenssllibopenssl1_0_0-debuginfolibopenssl1_0_0-debuginfo-32bitlibopenssl1_0_0-hmaclibopenssl1_0_0openssl-debuginfolibopenssl1_0_0-32bitopenssl-debugsourcelibopenssl1_0_0-hmac-32bitflash-player-gnomeflash-playermozilla-nss-debuginfolibfreebl3mozilla-nss-debugsourcelibfreebl3-debuginfoMozillaFirefox-branding-SLEMozillaFirefox-debuginfoMozillaFirefox-debugsourcelibsoftokn3mozilla-nssmozilla-nss-tools-debuginfoMozillaFirefoxmozilla-nss-certs-debuginfomozilla-nss-certsmozilla-nss-toolslibsoftokn3-debuginfoMozillaFirefox-translationslibreadline6-debuginforeadline-doclibreadline6bash-docbash-langbashbash-debuginfobash-debugsourcesles-releasesled-releasepython-cursespython-base-debugsourcepython-base-debuginfopython-docpython-tkpython-debugsourcepython-debuginfopython-tk-debuginfolibpython2_7-1_0-debuginfopython-curses-debuginfopython-doc-pdfpython-xml-debuginfopythonpython-basepython-xmlpython-devellibpython2_7-1_00:0.9.8j-78.10:1.0.58-5.10:2.71-4.10:3.10.4-5.110:2.4.39-16.10:3.10.2-20.10:7.37.0-15.10:5.0.9-8.10:0.10.23-17.10:2.2-8.10:0.38-10.10:3.10.0.1-16.10:2.1.0-5.10:1.4.0-23.10:3.2.15-4.10:1.3.0-22.30:11.2.202.425-19.10:6.8.8.1-8.20:2.11-29.10:0.9.8j-62.10:5.19-5.20:11.2.202.411-4.10:1.14-7.10:8.4.0-5.10:4.3.3.2-6.10:10.0.16-15.10:1.7.0.71-6.20:0-11.20:2.10.9-8.10:0.12.4-6.10:1.0.1i-5.10:1.0.1i-25.10:11.2.202.424-15.10:11.2.202.418-11.10:31-4.10:3.17.2-8.20:31.2.0esr-6.40:6.2-81.10:4.2-81.10:6.2-77.10:4.2-77.1^(i586$)|(x86_64$)|(s390x$)|(ppc64le$)$(none)12^12(\.\d)*$0:2.7.7-5.10:2.7.7-5.2