openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
February 2008
- 1 participants
- 11 discussions
[security-announce] SUSE Security Announcement: Opera 9.26 (SUSE-SA:2008:011)
by Marcus Meissner 29 Feb '08
by Marcus Meissner 29 Feb '08
29 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: opera
Announcement ID: SUSE-SA:2008:011
Date: Fri, 29 Feb 2008 12:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-1080, CVE-2008-1081, CVE-2008-1082
Content of This Advisory:
1) Security Vulnerability Resolved:
Opera 9.26 security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This is a version update for Opera to version 9.26 to fix:
- CVE-2008-1080: Fixed an issue where simulated text inputs could
trick users into uploading arbitrary files, as reported by Mozilla.
- CVE-2008-1081: Image properties can no longer be used to execute
scripts, as reported by Max Leonov.
- CVE-2008-1082: Fixed an issue where the representation of DOM
attribute values could allow cross site scripting, as reported
by Arnaud.lb.
For more information read http://www.opera.com/docs/changelogs/linux/926/
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Opera after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/opera-9.26-0…
a6764918ad766c0248c9f524e00f5951
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/opera-9.26-0.1.i586.rpm
fc41ab67407c92d1856f73e033560638
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/opera-9.26-0.1.i586.rpm
9dadb3fca00429b5d52875c8dbd5c5ff
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/opera-9.26-0.…
7ffe25a160a3af379a402b5c69932afa
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/opera-9.26-0.1.ppc.rpm
0faf9095c64429170f2f758312c83a4d
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/opera-9.26-0.1.ppc.rpm
cca1233487937cacca80b747b6a3b0e8
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/opera-9.26…
b5777f17f77730da045a40c3a5f2d9e1
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/opera-9.26-0.1.x86_64.rpm
fc6e10dd69b97814095f9b63d605ddab
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/opera-9.26-0.1.x86_64.rpm
bb702365f8906b1ced3e2a4de9cfdd84
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/opera-9.26-0.…
c7fde336aacb449baca2df7819158646
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/opera-9.26-0.1.nosrc.rpm
445d3404f3546f8c19a73863aa6baf1a
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/opera-9.26-0.1.nosrc.rpm
ac0b42970810baa8d986bb42d1a5d979
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security(a)suse.de) the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR8ffjHey5gA9JdPZAQIFbwgAiob/XcclQ4wkzO3QTYCRN07kZQn5HY20
nKvRsOk6kO5N/eCwYdR3ck4D4Y046lO41QhQL39LKyaA3pUTzMG/VdlvYkWbfNxt
tPXt9+iltugjmhLOV3Es+12W7Vfn6MlFSVBTVnN2FldjwlswcF4hFl0NNs5k4eM3
q/4ifciDgdHlHzL2tPGQO674ZE9+Zn5V8K5lZlISsk1KVLCSuVzV5KP1qwAIr8gx
cBHuj/2TDFlVtHW7mU9tRyKe9QD/Nkv2ZujT01eJeaq3yLSbXs8BZ4UgBY6Moniz
CRtkpbvTDdtegxCzr3ga3q9PEP8z6Js3O99c6bGZ3V75LGIsxusfEA==
=ZC17
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: ghostscript (SUSE-SA:2008:010)
by Marcus Meissner 28 Feb '08
by Marcus Meissner 28 Feb '08
28 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: ghostscript
Announcement ID: SUSE-SA:2008:010
Date: Thu, 28 Feb 2008 18:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP1
SLE SDK 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 9
SUSE Default Package: yes
Cross-References: CVE-2008-0411
Content of This Advisory:
1) Security Vulnerability Resolved:
ghostscript stack buffer overflow
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
A stack based buffer overflow was fixed in the ghostscript interpreter,
which can be used to execute code or at least crash ghostscript.
(CVE-2008-0411)
This can be exploited for instance by site local users printing to
a print server which uses ghostscript to raster data, making this a
remote problem.
Unfortunately this error is not caught by the stack overflow protection
technologies we use.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
None.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
05c26798bfee1d1ac485dc4944685451
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
67b196591d3d1b0d200039a4ba3ebbb6
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
563bf69cb6d6069524e57e0dd7ca9476
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
751455ecb54519e3fa5da8902497bedf
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
7e28b2ce7e4d92c2d73d5965953acea2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
e502beaa163c7444041caaad03faddd0
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/ghostscript-…
1a7119348ebabc9b38db692dc3e2659f
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libgimpprint…
125d30ebf6439bcb7ae5ab0976b1da3a
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libgimpprint…
0e03796bcb2b21e9eb8f0b47deac4c8c
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/ghostscript-fonts-other-8.…
f6ad3b546db1ad8e79f7368e4572f27a
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/ghostscript-fonts-rus-8.15…
9e149743dd89d07b877da5ffe93d2034
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/ghostscript-fonts-std-8.15…
f89c3780227c32d694478c585955825e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/ghostscript-library-8.15.3…
3290631fd349fc804b5feb459ed54344
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/ghostscript-omni-8.15.3-26…
051fd8b006bf2905a86c038a23838238
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/ghostscript-x11-8.15.3-26.…
2da62d9674ccbf538c992e371df285b8
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/libgimpprint-4.2.7-103.i58…
8929198b42634125a9b0ffc371094ef3
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/libgimpprint-devel-4.2.7-1…
fc7eba73f889131341a528ddafcd9d31
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ghostscript-fonts-other-8.…
d02fcb3587e6fe0a6a17e4966263b8d8
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ghostscript-fonts-rus-8.15…
995cad9d91571bf52f799f2612133cb6
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ghostscript-fonts-std-8.15…
0a69a1be77b211f7b6b4adf63e3a2a03
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ghostscript-library-8.15.3…
ef3a688e378bd428487e9c9b7c3e1c5a
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ghostscript-omni-8.15.3-18…
f4cde3301fb7e437196c20b720935fe4
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/ghostscript-x11-8.15.3-18.…
f502690a8db5c47b492633fb8b9d041b
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/libgimpprint-4.2.7-62.13.6…
6c773e7c01c7736578ee5d1e8ea93e4c
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/libgimpprint-devel-4.2.7-6…
29698e9a0402192bebed8f8ee2905c81
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-f…
9d0ad8ed4a930dedb13e72dae2647e09
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-f…
e78ae78695ceb32989632d92d2813584
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-f…
d2f241da4249c45e9a0b09a83bd06d8e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-i…
287bf2fbbd08e6a06e9612f5e1970f59
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-l…
80f6d5f320563547b2764e1b61d180a2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-o…
10bb840ae43fb89bf81e258a8837cf41
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/ghostscript-x…
a0ed0dae40899e16a7f04dcb34db1921
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/libgimpprint-…
3627cbd4741a30def0d26e4f21318ff2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/libgimpprint-…
d6f6800e6852848de69460aa53a01132
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/ghostscript-fonts-other-8.1…
138d892dd99c7c86897851b5a846e6bb
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/ghostscript-fonts-rus-8.15.…
ff25ee4dafb39f97e0b11e8a646b172b
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/ghostscript-fonts-std-8.15.…
8d54f6fa68b5d2d2de01fc4620d399c9
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/ghostscript-library-8.15.3-…
75967df132dc4020b64b22a4c23837e3
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/ghostscript-omni-8.15.3-26.…
4e336a1fef3cff170d80bc9bfbfb8e12
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/ghostscript-x11-8.15.3-26.p…
745c1f518bd95f3fe13dcee2bb59c464
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/libgimpprint-4.2.7-103.ppc.…
a9e56883439b727cf152846e546cd570
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/libgimpprint-devel-4.2.7-10…
461be101af38ead4d808cd5ffd17221d
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/ghostscript-fonts-other-8.1…
c1703411403083ae8c9c148feeddc930
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/ghostscript-fonts-rus-8.15.…
4a45ce719fad7bc995925dd704d43fa4
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/ghostscript-fonts-std-8.15.…
bfcb0d40594292c74c408e3a720eab8a
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/ghostscript-library-8.15.3-…
b3d12ce869d28f20131bbce84a1e8fa1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/ghostscript-omni-8.15.3-18.…
b9277596cfbd715b4832c38ebbbb08c4
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/ghostscript-x11-8.15.3-18.1…
b924d06fc86150b3c6fccaf8b7e8fee0
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/libgimpprint-4.2.7-62.13.6.…
a8b4dcb78c742843d948c59e0a591430
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/libgimpprint-devel-4.2.7-62…
33113b5fff54683c663fe8e5d7fd81b0
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
529e865fab29e88ee8845d433c6d581a
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
b31a29ded0690042e311f6a8215c5d85
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
29f3dbdf894f77a7d5c603994f3819c1
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
4e3565948b95727a5abb4f40dfd6e283
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
2437fc0db6412e0f7540f92ee1953174
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
5cb0793d546a1553de28b2e45f370998
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/ghostscrip…
7a9da0c62293aa82e3df67811cbc871c
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/libgimppri…
f9ac326b939f7675aeda140ae25bba79
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/libgimppri…
5138539b69ead80f0eabee252a6facf7
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/ghostscript-fonts-other-…
e1202cea643deaccea897582ea4ac779
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/ghostscript-fonts-rus-8.…
c78516a80f63065de9c54ae2c2ddb331
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/ghostscript-fonts-std-8.…
2ab6a471d8d93eb4498ba0589b155b83
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/ghostscript-library-8.15…
680f9a823943cadaf5d6e50bccf1702c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/ghostscript-omni-8.15.3-…
cf2a01afee4da2bcbd2d4b194af2adc7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/ghostscript-x11-8.15.3-2…
d85c29d5faec5c19d4fd855dccec887f
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/libgimpprint-4.2.7-103.x…
d564ae6664c5dea56c2fbffa9d2ff0d4
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/libgimpprint-devel-4.2.7…
64fcb3ce27c78ad55280e16e5c886a37
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ghostscript-fonts-other-…
7ba219e33b7324b2e9700546c52284ae
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ghostscript-fonts-rus-8.…
7f9eeaa069aa2ea2b86ac63f0069df66
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ghostscript-fonts-std-8.…
acae2607972858612ce7791f4c37fec6
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ghostscript-library-8.15…
bf3f219a42eaa7009eb10a2b1c92a37a
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ghostscript-omni-8.15.3-…
539ef9a571e2cb4139678b8178b23678
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/ghostscript-x11-8.15.3-1…
2e0b7df1dcd32ec325ae33da51c08060
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/libgimpprint-4.2.7-62.13…
6fdf97f361ced55f57a7815a3fe87e28
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/libgimpprint-devel-4.2.7…
df0eb59f12adf92962b0336b4af14f75
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/ghostscript-l…
ee12484171f9ecbe483468164f8c92ce
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/ghostscript-library-8.15.3-…
67a443373a70eac07525f9b8fc81f16b
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/ghostscript-library-8.15.3-…
62cab98b4de3a958755fdfc8205e91aa
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
Open Enterprise Server
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
Novell Linux POS 9
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
Novell Linux Desktop 9
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
SUSE Linux Enterprise Server 10 SP1
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
SLE SDK 10 SP1
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
SUSE Linux Enterprise Desktop 10 SP1
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
SUSE SLES 9
http://support.novell.com/techcenter/psdb/9c324f30fcb2a47560860b00be29ea05.…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security(a)suse.de) the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR8bpeHey5gA9JdPZAQKFWAgAjFTj1b9mIJolTNpwbUKkQOxnMOL59IQt
h+gJEPUj/RPXdfyybsFI6ubB9Ca2h6aGUuqJWRBjIsi8vpnuHGg5ymcx5XJXTKUP
o24701wk3MC5MIiQ4kRGbPAr5xReXun/eC6Yf9+7T+9v3IrvSeGdSi0gaAcTFHrJ
c+70d4clmPwiCCQVjBkK1ECHFVE+aY24tPWH2aqdyjd+H841gWeIkO4erJ8J1M2y
6A8leZICRyszGGYc8/oCsETewsgXXeOhFJYDTXkAvjthkn5MsNOmPE84smHwaP6c
7/cf2rXgGh62l9W93yHaAKAdcjeZzMafk8Z3Uf1gkV6vy7z2TemTuQ==
=4cRH
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
22 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2008:004
Date: Fri, 22 Feb 2008 14:00:00 +0000
Cross-References: CVE-2007-6111, CVE-2007-6112, CVE-2007-6113
CVE-2007-6114, CVE-2007-6115, CVE-2007-6116
CVE-2007-6117, CVE-2007-6118, CVE-2007-6119
CVE-2007-6120, CVE-2007-6121, CVE-2007-6438
CVE-2007-6439, CVE-2007-6441, CVE-2007-6450
CVE-2007-6451, CVE-2008-0318, CVE-2008-0386
CVE-2008-0674, CVE-2008-0728
Content of this advisory:
1) Solved Security Vulnerabilities:
- xdg-utils command injection
- clamav 0.92.1 security update
- wireshark 0.99.5 security release
- pcre utf-8 buffer overflow problem
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
None listed this week.
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list md5 sums
or download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- xdg-utils command injection
xdg-open and xdg-email didn't properly check their arguments.
Remote attackers could send prepared documents or mails with bad
links to users, where on activation of those links code could have
been executed. (CVE-2008-0386).
- clamav 0.92.1 security update
The clamav version was upgraded to 0.92.1 fixing numerous flaws
including some security problems (CVE-2008-0318, CVE-2008-0728).
Please note that the version number of the clamav library has changed
with version 0.92. Programs linked against older libclamav therefore
need to be updated as well.
clamav was upgraded on all affected products.
Updates were already released Friday 15th.
- wireshark 0.99.5 security release
This update fixes several security bugs in wireshark that can be
used to crash the application and to possibly execute arbitrary
code remotely.
Security issues tracked by the CVE IDs:
CVE-2007-6111, CVE-2007-6112, CVE-2007-6113
CVE-2007-6114, CVE-2007-6115, CVE-2007-6116
CVE-2007-6117, CVE-2007-6118, CVE-2007-6119
CVE-2007-6120, CVE-2007-6121, CVE-2007-6438
CVE-2007-6439, CVE-2007-6441, CVE-2007-6450
CVE-2007-6451
have been fixed.
Wireshark and on older products Ethereal were updated.
Please note that updates were already delivered on Jan 21st, they
were just not listed yet in any advisory.
- pcre utf-8 buffer overflow problem
Specially crafted regular expressions could lead to a buffer overflow
in the pcre library. Applications using pcre to process regular
expressions from untrusted sources could therefore potentially be
exploited by attackers to execute arbitrary code. (CVE-2008-0674)
This problem affected only openSUSE 10.3 and was fixed there.
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
None listed this week.
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR77ouney5gA9JdPZAQKbeQf/SNu7yqrux2WAPJZdNsLiRZpSwCiarup7
SafY9lbfgz6+h4bZkYc8mLPX3iMzn+tsbebDVsFpltEeJuqxrbrtyp//aFXC+9u7
gGeAFdgEBvTaFBDmGlhhO+u7Raq+sNciGEGkHNTYI9iTs6R5wxuRzSPLDBRuXK4Z
Ke8BYt/E2EWOylUSIAkf+jxcUIZEnDlTzh6Ip+FJ2/h9Ba4wdLrMmO5MXjrG502k
OV6cjNlDDvYXCWhJFeva6UKhbbltSnFiRd/w8FwqIFvscY7pabuZyPhSvkop2dfL
/obbbrAKoJyMaH6UObmBDQMNXWCR5ycqbc5gpPQDqNGmmeZo6rHUIQ==
=A4eb
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Acrobat Reader (SUSE-SA:2008:009)
by Marcus Meissner 18 Feb '08
by Marcus Meissner 18 Feb '08
18 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: acroread
Announcement ID: SUSE-SA:2008:009
Date: Mon, 18 Feb 2008 17:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE Linux Enterprise Desktop 10 SP1
SLE SDK 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-0655, CVE-2008-0667, CVE-2008-0726
APSA08-01
Content of This Advisory:
1) Security Vulnerability Resolved:
Acrobat Reader Security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This version update to 8.1.2 fixes numerous bugs, including some
security problems.
While Adobe did not publish any details about those problems yet,
third parties have listed some.
The official Adobe page is:
http://www.adobe.com/support/security/advisories/apsa08-01.html
CVE-2008-0655: Multiple unspecified vulnerabilities in Adobe Reader
and Acrobat before 8.1.2 have unknown impact and
attack vectors.
CVE-2008-0667: The DOC.print function in the Adobe JavaScript API,
as used by Adobe Acrobat and Reader before 8.1.2, allows
remote attackers to configure silent non-interactive
printing, and trigger the printing of an arbitrary
number of copies of a document.
CVE-2008-0726: Integer overflow in Adobe Reader and Acrobat 8.1.1 and
earlier allows remote attackers to execute arbitrary
code via crafted arguments to the printSepsWithParams,
which triggers memory corruption.
Packages for SUSE Linux Enterprise Server 9 and Novell Linux Desktop
9 are not yet available, since we cannot upgrade to Acrobat Reader 8
on those machines. As soon as a fixed Acrobat Reader 7 is released,
they will receive updates.
2) Solution or Work-Around
A workaround would be to use one of the many Opensource PDF readers,
like kpdf, evince, xpdf or others.
3) Special Instructions and Notes
Please close and restart all running instances of Acrobat Reader after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/acroread-8.1.2-1.2.i586.rpm
09549cb71530f572a7dedb615e273ad8
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/acroread-8.1.2-1.4.i586.rpm
f78c32f0388b7866f55f5422c196bcab
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/acroread-8.1…
6242d084ed0063d808abda9c5660555c
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/acroread-8.1.…
d2b8e5a102765b52a34b4c102b0e2e6c
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/acroread-8.1.2-1.2.nosrc.rpm
8228592b0be3a57a0f045c389b22d111
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/acroread-8.1.2-1.4.nosrc.rpm
0f3fadc7dfd373a2a7eb62ae8fd8b891
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Desktop 10 SP1
http://support.novell.com/techcenter/psdb/d7cbebd806a6d19cb424ca24aa66538e.…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security(a)suse.de) the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR7m1xney5gA9JdPZAQIBKgf9GFTYysUULxNZuj4iiyQhX+In3coX6Yz2
PYU5Ulsazq4NWSYxm01kM4wCPhb3i0pTC2N5dwnoBQ/pdcbXtkKZ/TQpxQl8JwaT
AJea472OcB+vNAHFK+kFfx4M3y+gMY+LYig0744McPhTCm8EUZCpbhnd6t23pqPW
ObSGvG7NAV26VXOkj75BNV9CWEVoL6ZiHpROPV3iGaFOFQx+Shk8onC+BSDxBBng
WNL44aYq4LgJpRL+gWZE6Rt3Ks3RrzjEdBEHC4DBkyTNATbvPiQqGsGH0xKdXL9a
Hw3PzM+y9AubLlPnuMBGGIG9MtbFBbbA8QRxo6s/pCmIO4cn/9xLvg==
=hxGQ
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Mozilla Firefox and Seamonkey (SUSE-SA:2008:008)
by Marcus Meissner 15 Feb '08
by Marcus Meissner 15 Feb '08
15 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: MozillaFirefox,seamonkey
Announcement ID: SUSE-SA:2008:008
Date: Fri, 15 Feb 2008 17:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-0412, CVE-2008-0413, CVE-2008-0414
CVE-2008-0415, CVE-2008-0417, CVE-2008-0418
CVE-2008-0419, CVE-2008-0591, CVE-2008-0592
CVE-2008-0593, CVE-2008-0594, MFSA 2008-01
MFSA 2008-02, MFSA 2008-03, MFSA 2008-04
MFSA 2008-05, MFSA 2008-06, MFSA 2008-08
MFSA 2008-09, MFSA 2008-10, MFSA 2008-11
Content of This Advisory:
1) Security Vulnerability Resolved:
Mozilla Firefox, Seamonkey security updates
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The web browser Mozilla Firefox has been brought to security update
version 2.0.0.12.
The Firefox versions was upgraded to 2.0.0.12 on:
- SUSE Linux 10.1, openSUSE 10.2 and 10.3
- SUSE Linux Enterprise Server and Desktop 10
All Firefox fixes were also back ported to the Firefox 1.5.0.14 version
in Novell Linux Desktop 9.
Also released were Mozilla Seamonkey Suite 1.8.1.12 packages for
openSUSE 10.2 and 10.3. All Mozilla Seamonkey fixes were back ported
to the SUSE Linux 10.1 seamonkey 1.8.0 version.
Following security problems were fixed:
- MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with div overlay
- MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect
- MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files
- MFSA 2008-08/CVE-2008-0591 File action dialog tampering
- MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation
stealing
- MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI
- MFSA 2008-04/CVE-2008-0417 Stored password corruption
- MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code
Execution
- MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing
vulnerabilities
- MFSA 2008-01/CVE-2008-0412/CVE-2008-0413 Crashes with evidence of
memory corruption (rv:1.8.1.12)
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Firefox and seamonkey
after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/seamonkey-1.…
a8a852b6753d3a9a7449bb4a3f2f9765
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/seamonkey-do…
89df63709a92eca6b81a94fb4860bfab
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/seamonkey-ir…
0364ddd40bd602863b108a4e9a95d4c6
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/seamonkey-ma…
6c41ddb95c841f79e42d26f7d1ed1a05
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/seamonkey-sp…
826ca71e07414734e164a121562f8b42
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/seamonkey-ve…
556ca543d0c616b819205b48d18a8fd7
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/MozillaFirefox-2.0.0.12-0.…
7e9730173c71a84bf1fed6d3e421a896
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/MozillaFirefox-translation…
a0afdbfa5eebeec21134358f7b546a8c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/seamonkey-1.1.8-0.1.i586.r…
ddb1e906304f891d58f6389054a6212d
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/seamonkey-dom-inspector-1.…
5fc48ded7b9223878384fdb8b6e0022d
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/seamonkey-irc-1.1.8-0.1.i5…
dc4919a5df479b57990a25be41daac8c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/seamonkey-mail-1.1.8-0.1.i…
b0f0a1aac9fb239c9f5cf49c4154b980
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/seamonkey-spellchecker-1.1…
aef29179696e18fd9b0dd92cec9399c7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/seamonkey-venkman-1.1.8-0.…
550a4b7a989a26333bc4db233584c71a
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/MozillaFirefox-2.0.0.12-0.…
a36c6fddaf43f19fb6db426eb4252f82
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/MozillaFirefox-translation…
2421e25c0f104e55171eae7c9d8e6167
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-1.0.9-1.10.i586.…
29c195e77854053efdce833353ed0b76
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-calendar-1.0.9-1…
5926f72e2adf7677bdffd5e536128dd9
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-dom-inspector-1.…
ebf9c7d4c62b65c41b169506e8b40196
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-irc-1.0.9-1.10.i…
d883c2df0efde3473f02755bac0425ec
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-mail-1.0.9-1.10.…
b02f49069b91569f5694a8688a25703b
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-spellchecker-1.0…
7de69401d08169f3a308fdbb14f0a090
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/seamonkey-venkman-1.0.9-1.…
b1368668ad37aea4b71fe5af930c2454
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/MozillaFiref…
e0132d73ab722bbca579a79f253ffe48
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/MozillaFiref…
45ae7d71d9168715a631cab85ab36eda
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/MozillaFirefo…
abae9d38f2cb314696ccceb09b0a9b90
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/MozillaFirefo…
ba61a431ae34aae1a804f82c781f4ffe
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/seamonkey-1.1…
2a22a1a221bef5715d665530ad1bd233
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/seamonkey-dom…
c1f6c0ff2487f2e6d0e92a7d7f670d40
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/seamonkey-irc…
de9df3f24ed5852b098e5bb9eed5ff26
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/seamonkey-mai…
3a0a89d873a429b127100ec7f06e7f0f
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/seamonkey-spe…
d4520354bd3755487f8ba4e7770e6e69
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/seamonkey-ven…
bb8619aea4a3cab26885333dcb4f5edc
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/MozillaFirefox-2.0.0.12-0.1…
508a4703c1b69f2280f1c0ae7984ee30
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/MozillaFirefox-translations…
b89287432ea5d74460cc2a83484dbe54
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-1.1.8-0.1.ppc.rpm
91dab78e8bb89cf93fc722d05e041176
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-dom-inspector-1.1…
4fc802f1ab92b63902cbf12a133016df
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-irc-1.1.8-0.1.ppc…
304ed7aef3feecf40b4c9c0c5106580d
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-mail-1.1.8-0.1.pp…
0598850fbcce57d67b59d697567cace2
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-spellchecker-1.1.…
f6af75ff58c754f9834a4a73e45b6e7c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-venkman-1.1.8-0.1…
9856d718f6a4a952f3c606b5d1111c13
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/MozillaFirefox-2.0.0.12-0.2…
5a8e7d0860018f1b8caf8b6f46093df6
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/MozillaFirefox-translations…
0cbe495221155d2ef200215ed8dc9b94
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-1.0.9-1.10.ppc.rpm
691403e435c3014addffb3cc1cc1f555
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-calendar-1.0.9-1.…
0f9f800fc6929fa443f698905cec5a76
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-dom-inspector-1.0…
a8608e710c60d42ccc7b032807d741bb
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-irc-1.0.9-1.10.pp…
bbe83ebdcb12656f882347ef0b54e2a9
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-mail-1.0.9-1.10.p…
9dbde43fcb3faab1462116e45410ee64
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-spellchecker-1.0.…
1126c0eaa250a4f3d35edd0f009b350f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-venkman-1.0.9-1.1…
59ca36ad2c6a3f3415c0bcc2665686eb
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/MozillaFir…
d5207589aaa5f59008b92e7b861bedb2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/MozillaFir…
a8023cfa267fbef2b9fadf8091a45d56
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/seamonkey-…
f0e3bae6d0a9c2db81e9e5f4f14cff01
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/seamonkey-…
3c05f2619c650459481458e4af288e9b
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/seamonkey-…
7c37e3bf4e6e4e483200efcbf377cc31
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/seamonkey-…
e4546cc3a2d553c9451c0126fba56862
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/seamonkey-…
5a3547a8d6e13e3feaf03e8c0aeea72e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/seamonkey-…
a71168d175b21bdf72cf3689c783f9cc
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/MozillaFirefox-2.0.0.12-…
b4f22b31de60049b59cbf5250a6a528e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/MozillaFirefox-translati…
638cd35fedad0d32dd01c761115093f6
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/seamonkey-1.1.8-0.1.x86_…
d63901ff1b1dc3b3c9ca4be19630d5f5
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/seamonkey-dom-inspector-…
f96ce993ba6296a9e339b7b5edee1739
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/seamonkey-irc-1.1.8-0.1.…
946ff1773cbb270e5041bb202cc3bff8
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/seamonkey-mail-1.1.8-0.1…
c75eaef024493b08c50e0f98708686dc
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/seamonkey-spellchecker-1…
fc2da248d7af5695889218cdeb7b121f
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/seamonkey-venkman-1.1.8-…
b25ddffe225fd802b451eb873ea3ea83
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-1.0.9-1.10.x86…
b6c02874d473977cab1cc00b70565cb1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-calendar-1.0.9…
83f6aceefef48bcd1b4a045d6555308b
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-dom-inspector-…
39f4652b9970e2dbbca84ce66258dcbb
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-irc-1.0.9-1.10…
fb603db004367109928a2547014b5a63
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-mail-1.0.9-1.1…
74af4aaf3b63d82b03994198a84d67fd
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-spellchecker-1…
4749b27bfdeb8a9f32b2c1c12542a1ba
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/seamonkey-venkman-1.0.9-…
75edd9a8cadb8f0479cd876224012158
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/MozillaFirefo…
39fe144c735b8e7d74c331958d89ffe2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/seamonkey-1.1…
33c21b39a7a57aa16b8fe8de576c990f
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/MozillaFirefox-2.0.0.12-0.1…
e88392a655c700628dc8ad2b64d0e2c2
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/seamonkey-1.1.8-0.1.src.rpm
21f2e768b74d62a44c0f1ae1688dc23d
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/MozillaFirefox-2.0.0.12-0.2…
9485fce4fefea332b587efb16473149c
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/seamonkey-1.0.9-1.10.src.rpm
a0931f73bcad08e7794e883d517a56b8
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
Novell Linux Desktop 9
http://support.novell.com/techcenter/psdb/25e2ffcf469ccafcac7d9108475aa0a8.…
SUSE Linux Enterprise Server 10 SP1
http://support.novell.com/techcenter/psdb/7731713870954ee13e98b603bd413b0b.…
SUSE Linux Enterprise Desktop 10 SP1
http://support.novell.com/techcenter/psdb/7731713870954ee13e98b603bd413b0b.…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security(a)suse.de) the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR7W4jney5gA9JdPZAQJpfgf/eP+r+uw+jsevKfHOZZtIqubkjc1VHnKg
Azk5VZK2glSrGXyz0EwfepJuY03wrH8llHUnJyF8N4QH2gXnKOalQG/mMFDDnoZ9
2vhqmdRDaKAMwjlIdTlWbhQF3z2gRjDC6mFwSgTy/0F14ynbcj7vam3UwIRfI255
lMCbrZja95mQZblvbozS/NI72lfSwzaj+J2vINVKF7C2uGr+iAz2iwzu5e990PvY
h3embIgMP3SZgrJ7vBrjC/Es+OYpZ9FLFwqWeaFdBlS8qZhFvisxwaKNKBoicwg+
vyUYFeuu4EBSObzCrLVGJZd2whi6Tjp5kJLsdMnAppFMqxcwP1sSHA==
=tT2A
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2008:007)
by Marcus Meissner 12 Feb '08
by Marcus Meissner 12 Feb '08
12 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2008:007
Date: Tue, 12 Feb 2008 14:00:00 +0000
Affected Products: openSUSE 10.2
openSUSE 10.3
SUSE Linux Enterprise Realtime 10 SP1
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2007-6151, CVE-2007-6206, CVE-2008-0600
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This kernel update fixes the following critical security problem:
- CVE-2008-0600: A local privilege escalation was found in the
vmsplice_pipe system call, which could be used by local attackers
to gain root access.
This bug affects the following products:
- openSUSE 10.2 and 10.3
- SUSE Linux Enterprise Realtime 10 (SP1)
Fixed packages have been released for openSUSE 10.2 and 10.3.
For SUSE Linux Enterprise Realtime 10 packages are being prepared
currently.
Since this problem affects Linux kernels starting with 2.6.17 and
vmsplice was not back-ported, no older products are affected.
- SUSE Linux Enterprise Server 8, 9, and 10: Not affected.
- SUSE Linux Enterprise Desktop 10: Not affected.
- Novell Linux Desktop 9: Not affected.
- SUSE Linux 10.1: Not affected.
Following minor security problems were fixed additionally:
- CVE-2007-6206: Core dumps from root might be accessible to the
wrong owner. This was fixed for openSUSE 10.3 only.
- CVE-2007-6151: The isdn_ioctl function in isdn_common.c allowed
local users to cause a denial of service via a crafted ioctl
struct in which iocts is not null terminated, which triggers a
buffer overflow. This problem was fixed for openSUSE 10.2.
And the following bugs were fixed for openSUSE 10.3 (numbers are
https://bugzilla.novell.com/ references):
- Update to minor kernel version 2.6.22.17
- networking bugfixes
- contains the following patches which were removed:
- patches.arch/acpica-psd.patch
- patches.fixes/invalid-semicolon
- patches.fixes/nopage-range-fix.patch
- patches.arch/acpi_thermal_blacklist_add_r50p.patch:
Avoid critical temp shutdowns on specific ThinkPad R50p
(https://bugzilla.novell.com/show_bug.cgi?id=333043)
- patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid SAS
IRQ to non-threaded IRQ (337489).
- patches.drivers/libata-implement-force-parameter added to
series.conf.
- patches.xen/xen3-fixup-arch-i386: Xen3 i386 build fixes.
- patches.xen/xenfb-module-param: Re: Patching Xen virtual
framebuffer.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
The machine needs to be rebooted to make the changes active.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-bigsm…
8a25326349043f763b7ee1f272575ac9
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-debug…
aef17fa619bb8d1d1f7f78f7506c267b
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-defau…
34fae134fcffe0740d6899e7a86f5e6e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-rt-2.…
265b5a744299f6f7c519c6f837de1014
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-rt_de…
3735cb1d57a65b414dfee6fda8d6d43f
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-sourc…
3a57ed041fb4141c733cc84e541c6324
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-syms-…
a69110f06587ac06e8e25550b59b6f2e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-xen-2…
a31013e9d5ef5fa996ae8b96b274619d
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-xenpa…
3ae38037c32f05a238a15dde7a1c5f88
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-bigsmp-2.6.18.8-0.9…
a5b4202bf5a5ff0ffe12d805deb90b58
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-default-2.6.18.8-0.…
feb311251d01e4fd6268071e24a36c6c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-kdump-2.6.18.8-0.9.…
c35a4735a2420ec71bdabadbf39a1ce9
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-source-2.6.18.8-0.9…
6fd2e6ebfeba11f8919bd733284f996a
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-syms-2.6.18.8-0.9.i…
034dea6d325dcdc49154be9e37109140
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-xen-2.6.18.8-0.9.i5…
90bdfca8529c3b44e2dfa1db601f719e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-xenpae-2.6.18.8-0.9…
7c5be80194d1eb8c395424252df085f2
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-defaul…
4d0f63b55789fc47175ae6b844cb0620
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-kdump-…
5b0389aeb6d557a2e7da967b7c76166f
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-ppc64-…
ca3d9cd4140c0253e80a67429594deec
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-source…
ae9adbe9443fa26830c9de1fd4c6ac94
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-syms-2…
164db9fcacd161845961533e71423538
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-default-2.6.18.8-0.9…
20ffaec3185ce5f206208070373d574c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-iseries64-2.6.18.8-0…
e37869df68d1b0a6c8317267278694fd
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-kdump-2.6.18.8-0.9.p…
6fffa75e425ea70cd25a3f1e66495174
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-ppc64-2.6.18.8-0.9.p…
a424a54166b46cea9147643a2a3c4bd8
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-source-2.6.18.8-0.9.…
0add877d14ac642a2628cba1d2489188
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-syms-2.6.18.8-0.9.pp…
003d0da5609b7d94290333c745b72ede
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-deb…
bd39e73becbf676056c8b41f4acc6b76
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-def…
059b6dc223093f8cb59ab78446b62571
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-rt-…
efe310fb3170d6baa5f40031b1680719
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-rt_…
200011e3dfb75954d67c0624c7cbe82c
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-sou…
a14f480d53d42ce0f4f5c5a65f7f58c1
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-sym…
5cd6db35cfef3dd48451d7143537f528
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-xen…
49ff7963dcead4fe6bee5abd2ee05d97
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-default-2.6.18.8-…
db176b500fd6e1d4f7cf6ccd75a6f60b
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-kdump-2.6.18.8-0.…
cea61bcc88d50628ffab9324f9b47391
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-source-2.6.18.8-0…
f36b8b48f8c0162c9b0e49f7dc4c99a8
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-syms-2.6.18.8-0.9…
056bc674cf94e69afdca3b45c1c43fa0
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-xen-2.6.18.8-0.9.…
edab93cccd1d91fbe97f070c26a9f051
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-bigsmp…
6d7a9c38144edb1dacb2c18b5c300d7d
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-debug-…
d33f96f601a117378e701b9bfff31470
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-defaul…
3febbdc8006a591913f9b3f717636fc9
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-kdump-…
a42aaff6d71df9b96f6795096e732d1d
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-ppc64-…
eb0fd7e940a020b84cd67136569c2fd5
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-rt-2.6…
45db3caca01b280a18ca65b3948ef2e0
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-rt_deb…
9979595ac1d609ea204f556494d52960
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-source…
72f3f44ea5f330853963e56c481ee3f7
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-syms-2…
0e4ff163cd849db30e6e5f556a674b48
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-xen-2.…
3916440c8650d6926a724b3de667c80c
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-xenpae…
5e90eda74a91b6432d44ae18e070bd74
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-bigsmp-2.6.18.8-0.9.…
fc384cf47a5aec37cf813116cba4e6d7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-default-2.6.18.8-0.9…
06d97aa363493f028e8368eebe996493
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-iseries64-2.6.18.8-0…
a35675c22809cd88757afc0d5f66741c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-kdump-2.6.18.8-0.9.n…
e7276d68bbd8be2b67cb2bb769b70ad7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-ppc64-2.6.18.8-0.9.n…
635d0921aec1af3053d508c014fcf94c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-source-2.6.18.8-0.9.…
93c89ce1da9f1f752af9ae0a9bff2cf4
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-syms-2.6.18.8-0.9.sr…
2a288f8e12e899961febf5de7ae6a2b7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-xen-2.6.18.8-0.9.nos…
796394be803069751082eb2cfebcc04f
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-xenpae-2.6.18.8-0.9.…
94ba5b49d8890452b957b11705f20534
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security(a)suse.de) the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR7GUa3ey5gA9JdPZAQJNkQf/RzRaTNLzSYICpTQvOrXHyKPgXasnStGo
ocSAbfUKiFyyLoJ7fj5b80gSXFuztr4Yeqf/1VHWWIcmnCqbPfXumvagAYLyvGtR
vDS1t2+515XLlyxMolhLxtGHCMCzH6W0sts6zVmWoSNmqR0vWdvEUOCuynKUBdrq
lk0Cno7dV4VSqyjBPRNtcK7ic1G8ahwfFXJheDwDwmEgHNEUdDkhWqSlBiFTocMu
bgwh2tVNc0wVodjZczGI6IhWxVyNrtv2fMcWUBm9oNbPqD9K+30Q9EVhuFlT4db/
xX7dGnCl+suf9o8cnrpnIlPx982j4RJwMROv0B6xZGz4Wf4D/zJFOw==
=TjgI
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] Heads up on vmsplice local root exploit (CVE-2008-0600)
by Marcus Meissner 11 Feb '08
by Marcus Meissner 11 Feb '08
11 Feb '08
Hi folks,
As you are undoubtly aware a new local root exploit has been
discovered on the weekend and reported to a wide audience.
The CVE identifier is CVE-2008-0600.
The problem affects only kernels 2.6.17 and newer, so it affects
only following of our products:
- openSUSE 10.2 (2.6.18.x kernel)
- openSUSE 10.3 (2.6.22.x kernel)
This problem does NOT affect all others products:
- SUSE Linux 10.1 (2.6.16.x kernel)
- SUSE Linux Enterprise 10 (2.6.16.x kernel)
- SUSE Linux Enterprise Server 9 (2.6.5 kernel)
- Novell Linux Desktop 9 (2.6.5 kernel)
- SUSE Linux Enterprise Server 8 (2.4.21 kernel)
Updates are in preparation for openSUSE 10.2 and 10.3 and will hopefully
be released tomorrow (Tuesday) morning german time.
Test kernel updates are available in our Online Update Betatest Repositories:
- openSUSE 10.3: http://download.opensuse.org/update/10.3-test/
kernel version-release of fixed kernel: 2.6.22.17-0.1
- openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2-test/
kernel version-release of fixed kernel: 2.6.18.8-0.9
Please note that these update channels contain "beta" quality updates,
so are not recommended for production use systems. Only use the kernel.
Ciao, Marcus
1
0
07 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2008:003
Date: Thu, 07 Feb 2008 18:00:00 +0000
Cross-References: CVE-2006-4484, CVE-2007-2583, CVE-2007-2691
CVE-2007-2692, CVE-2007-4965, CVE-2007-5503
CVE-2007-5794, CVE-2007-5925, CVE-2007-5969
CVE-2007-6109, CVE-2007-6303, CVE-2007-6304
CVE-2007-6427, CVE-2007-6428, CVE-2007-6429
CVE-2008-0123
Content of this advisory:
1) Solved Security Vulnerabilities:
- SUN Java 1.5 and 1.6 update
- nss_ldap incorrect data
- cairo integer overflows in PNG decoder
- geronimo start script problems
- moodle XSS problems
- SDL_image GIF problems
- python imageop integer overflow
- Mysql security problems
- NX also affected by X.org security problems
- xemacs commandline buffer overflow
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
None listed this week.
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list md5 sums
or download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- SUN Java 1.5 and 1.6 update
SUN Java 1.5.0 was brought to update14 and SUN Java 1.6.0 was
brought to update4. Details for the security issues fixed are not
yet publicly known, but the changelog lists several issues marked
as security.
The update also contains timezone update 2007k and was released
for SUSE Linux 10.1, openSUSE 10.2 and 10.3.
- nss_ldap incorrect data
nss_ldap returned incorrect data under certain circumstances to
the calling process. Some applications could therefore work with
wrong user data (CVE-2007-5794).
This has been fixed for all distributions containing nss_ldap.
- cairo integer overflows in PNG decoder
The cairo libraries were updated to fix several integer overflows
while decoding PNG images. This can be exploited remotely with
user-assistance to execute arbitrary code. (CVE-2007-5503)
Updates have been provided for SUSE Linux Enterprise 10, SUSE Linux
10.1, openSUSE 10.2 and 10.3
- geronimo start script problems
A chown in the SUSE supplied Apache geronimo init script could
change ownership of directories it did not own, due to following
symlinks. The default setup would corrupt /var/tmp on start
of geronimo.
While there is potential to exploit this problem,
the administrator will have likely noticed this before already.
- moodle XSS problems
The install script of moodle is vulnerable to cross site scripting
(XSS). This flaw is only exploitable if moodle isn't fully installed
yet. Therefore it's unlikely to be much of a problem in practice. To
actually exploit it an attacker would have to know about a person
that is just about to install moodle (CVE-2008-0123).
- SDL_image GIF problems
Specially crafted GIF files could crash the SDL_image library
(CVE-2006-4484).
Updates have been released for SUSE Linux 10.1, openSUSE 10.2
and 10.3.
- python imageop integer overflow
Specially crafted images could trigger an integer overflow in the
imageop module of python (CVE-2007-4965).
Python has been updated on all SUSE Linux based distributions.
- Mysql security problems
The database server MySQL was updated to fix various security
vulnerabilities. Note: not all versions are affected by every bug:
- CVE-2007-2583: a denial of service attack in in_decimal::set for
logged in users.
- CVE-2007-2691: RENAME TABLE did not require DROP privileges,
allowing remote authenticated users to rename arbitrary tables
- CVE-2007-2692: remote authenticated users could gain privileges
due to a bug in SQL SECURITY INVOKER stored routine handling
- CVE-2007-5925: a denial of service attack by remote authenticated
users via a certain CONTAINS operation on an indexed column
- CVE-2007-5969: allowed remote authenticated users to overwrite
system table information and gain privileges via symlinks
- CVE-2007-6303: allowed remote authenticated users to gain
privileges via CREATE SQL SECURITY DEFINER VIEW and ALTER VIEW
statements
- CVE-2007-6304: denial of service attack by remote authenticated
users by performing a specific SHOW TABLE STATUS query
MySQL has been updated on all SUSE Linux based distributions.
- NX also affected by X.org security problems
This update fixes various Xserver security issues that are also
present in NX:
XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427].
TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428].
EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].
MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429].
- xemacs commandline buffer overflow
A buffer overflow in xemacs commandline handling was
fixed. (CVE-2007-6109)
This problem affected only openSUSE 10.3.
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
None listed this week.
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR6szq3ey5gA9JdPZAQJ8ZQf6AtW2HK/qrOzDpts4HHyRR6KRaZh+rnGu
58vWpz6FbywNQaC00N3Lu2UDpK302x43uwcFwzi2kzRb5H9rIjP+uteqaag/tae2
ZC5umi0uByoYnypafLOGVgaHdpzxIXYzitpKmYh++Jmb5vr0kIDmux7KaPPb0GvD
XhcHgR0ws+17MWS2hpUhXJqQth32mq9oLopd5Z4whciVE1PG1vc4+dZOb7U+8aa0
w6Dx2qWhwNWno0Uthddjfn5ZBSLtKDZIsao/tKcxJ0+5RwZTMGHeeLjBAbiph5NC
eUvmZYDZWlAAda9cvejH+NDaCD+gAMzq3qwbaR35I/uu5wobynxlTA==
=pEvN
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2008:006)
by Marcus Meissner 07 Feb '08
by Marcus Meissner 07 Feb '08
07 Feb '08
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2008:006
Date: Thu, 07 Feb 2008 11:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE Linux Enterprise Desktop 10 SP1
SUSE Linux Enterprise 10 SP1 DEBUGINFO
SLE SDK 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2007-2242, CVE-2007-3740, CVE-2007-3843
CVE-2007-3848, CVE-2007-4308, CVE-2007-4997
CVE-2007-5966, CVE-2007-6063, CVE-2007-6417
CVE-2008-0001, CVE-2008-0007
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The Linux kernel contained various security problems for which we
released updates.
This round of updates covers kernels for following product families:
- SUSE Linux Enterprise 10
- SUSE Linux 10.1
- openSUSE 10.2 and 10.3.
This kernel update fixes the following security problems:
CVE-2008-0007: Insufficient range checks in certain fault handlers
could be used by local attackers to potentially read or write kernel
memory. (all)
CVE-2008-0001: Incorrect access mode checks could be used by local
attackers to corrupt directory contents and so cause denial of service
attacks or potentially execute code. (all) Please note that this
problem does not affect SLES 9 or SLES 8.
CVE-2007-5966: Integer overflow in the hrtimer_start function in
kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local
users to execute arbitrary code or cause a denial of service (panic)
via a large relative timeout value. (all)
CVE-2007-3843: The Linux kernel checked the wrong global variable
for the CIFS sec mount option, which might allow remote attackers to
spoof CIFS network traffic that the client configured for security
signatures, as demonstrated by lack of signing despite sec=ntlmv2i
in a SetupAndX request. (openSUSE 10.2, 10.3)
CVE-2007-2242: The IPv6 protocol allows remote attackers to
cause a denial of service via crafted IPv6 type 0 route headers
(IPV6_RTHDR_TYPE_0) that create network amplification between two
routers. A non-kABI breaking patch has now been applied to all
product trees.
CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel
2.6.11 through 2.6.23 does not properly clear allocated memory in some
rare circumstances, which might allow local users to read sensitive
kernel data or cause a denial of service (crash). (all)
CVE-2007-4308: The (1) aac_cfg_open and (2) aac_compat_ioctl functions
in the SCSI layer ioctl path in aacraid in the Linux kernel did not
check permissions for ioctls, which might have allowed local users
to cause a denial of service or gain privileges. (openSUSE 10.2)
CVE-2007-3740: The CIFS filesystem, when Unix extension support is
enabled, does not honor the umask of a process, which allows local
users to gain privileges. (openSUSE 10.2)
CVE-2007-3848: The Linux kernel allowed local users to send
arbitrary signals to a child process that is running at higher
privileges by causing a setuid-root parent process to die, which
delivers an attacker-controlled parent process death signal
(PR_SET_PDEATHSIG). (openSUSE 10.2)
CVE-2007-4997: Integer underflow in the ieee80211_rx function in
net/ieee80211/ieee80211_rx.c in the Linux kernel allowed remote
attackers to cause a denial of service (crash) via a crafted SKB length
value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA
flag is set, aka an "off-by-two error." (openSUSE 10.2)
CVE-2007-6063: Buffer overflow in the isdn_net_setcfg function in
isdn_net.c in the Linux kernel allowed local users to have an unknown
impact via a crafted argument to the isdn_ioctl function. (openSUSE
10.2)
A failed AppArmor change_hat system call can result in an apparmored
task becoming unconfined (326546). (openSUSE 10.2)
Also quite a number of non-security bugs were fixed.
The openSUSE 10.3 kernel update was reissued twice, the second time
to fix a regression with CPU Frequency handling on Laptops.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Reboot the machine after the update was installed.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-bigsmp-2.6.18.8-0.8…
6b30c0f6b5fe198b4ebd23f6b1de5a46
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-default-2.6.18.8-0.…
67389ed92ce18de513468abe660022e5
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-kdump-2.6.18.8-0.8.…
ce3e6dc292a76102942c62a58ef9ce04
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-source-2.6.18.8-0.8…
e32fb89e27108994f0fe6e3876323e51
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-syms-2.6.18.8-0.8.i…
798e676cb0a7f530851dc46a28e4bf6e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-xen-2.6.18.8-0.8.i5…
0989490a7814f41ae51f4839a22d557a
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/kernel-xenpae-2.6.18.8-0.8…
2c2d9686f7d90a1f81107ed205c8a790
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-bigsmp-2.6.16.54-0.…
55066bb31e04f8b79d0da7ff9827f30d
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-debug-2.6.16.54-0.2…
a5097da2476f09337024c21159987204
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-default-2.6.16.54-0…
fccffd12adaabbda8eaf1c69433c9291
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-kdump-2.6.16.54-0.2…
5ceb48c63d78b5959ba3d8b6e70966aa
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-smp-2.6.16.54-0.2.5…
9f71ac339ae9c5453b3150aeb0646387
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-source-2.6.16.54-0.…
77b0084460abe7a4f5cd0cd0c0a58d1b
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-syms-2.6.16.54-0.2.…
90dd8f95db71279095329361e8c3d73f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-um-2.6.16.54-0.2.5.…
6c1f740eca319add6d729b312db07207
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xen-2.6.16.54-0.2.5…
b16c6061bafb2c0ce7b867889cd43188
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xenpae-2.6.16.54-0.…
64500669a605d88076c32c39e6852705
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kexec-tools-1.101-32.45.1.…
efa013af4db9ed57f22805d3401bd485
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/mkinitrd-1.2-106.62.1.i586…
c903241873b0fbc549da135eb2fb94da
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/multipath-tools-0.4.6-25.2…
8e9f55ad45fedc3ea0f2ce06b94ffc36
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/open-iscsi-2.0.707-0.32.i5…
bd0e23420b4658755d3ccd9bea24e0c8
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/udev-085-30.44.1.i586.rpm
c701acc0a3a16a067e97d3a2aceba390
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-bigsm…
41448cd843ac63bc8de28e31bb82f8e2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-debug…
95f3c4460d4676ec1f087ef567b7d330
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-defau…
b080a71bd69e48f78c71fcd9e56da0c6
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-rt-2.…
55e1128a35962b39c00a4a41f322af3c
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-rt_de…
b5c6afe0bb67b4376645c781dcb08616
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-sourc…
3b62ece33abd259434801d81ab411aa7
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-syms-…
13cede05bdcbcd04a94027b5c9e8d28e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-xen-2…
16c6915fb1563f620002a701ec41a1f2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-xenpa…
a84470279bf821950d2123f3df1b79d0
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-defaul…
3395fb9a74c5317a82b35aa647b14aec
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-kdump-…
ccb918faed4b75080d81590a38311f81
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-ppc64-…
ebe9744e18467ddbcedf1933e3000f2e
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-source…
159b7cf1878f789fc2eb889690d61f36
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-syms-2…
0cb94248eca16f1ee6326058de75d43d
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-default-2.6.18.8-0.8…
a4a79b51ae8d4759132e2d7077cb04c7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-iseries64-2.6.18.8-0…
2466312dadabd2a2d330f16670fde62e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-kdump-2.6.18.8-0.8.p…
19e4bd2e587fd3b353671344fb067d30
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-ppc64-2.6.18.8-0.8.p…
23e9428529494a5db8e69edafcfd5df4
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-source-2.6.18.8-0.8.…
0b5bd5ec63e465899a597a98534212d9
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/kernel-syms-2.6.18.8-0.8.pp…
9fd39b260063f1efd5fa60452212480d
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-default-2.6.16.54-0.…
8d9b69a4e53b1a3fdf291e52b5e98c1b
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-iseries64-2.6.16.54-…
a890c7a5130a2bb6d0f65ce02c19d939
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-kdump-2.6.16.54-0.2.…
0e4f4bcb8c0d3db2b5b6aae462a175f2
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-ppc64-2.6.16.54-0.2.…
3da7452688c2259a1ad925842e3b4883
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-source-2.6.16.54-0.2…
1e03a4667f48ddb937f3980807dcc562
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-syms-2.6.16.54-0.2.5…
92ac5021e7e889027acc13822382bc10
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/mkinitrd-1.2-106.62.1.ppc.r…
0f82ea42a79bfbe5a31daca7cd847b1f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/multipath-tools-0.4.6-25.23…
158d27c0ac1686521c7ef28982338828
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/open-iscsi-2.0.707-0.32.ppc…
a40c30538b4364405a8e89ab493e9e6f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/udev-085-30.44.1.ppc.rpm
5ddaa0773661c8184d35dd79955734b6
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-deb…
1c926edab5b156f483969b71a8ccc704
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-def…
92a1b0bce330c5fb6937e62ed4d266b2
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-rt-…
3e9af395ea84c50e21b17a9dbf80a9b5
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-rt_…
47f914fe58e3ebd5bcd7cf0b1ed2f7f5
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-sou…
ae34ffe4e260ad752c409d93d96c5784
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-sym…
2feb185fc65bf0257cf28585eba53ee7
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-xen…
588bcb3236d7a9e25433eba913c02176
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-default-2.6.18.8-…
55df5895160ce7c688f1980fd419cb1f
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-kdump-2.6.18.8-0.…
7b18c42d20207432c6b0a9073c57f997
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-source-2.6.18.8-0…
7f670b5c452dc9a1ede21425a35a84b7
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-syms-2.6.18.8-0.8…
8887043420ece5fbbb56c0bc16619c1e
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/kernel-xen-2.6.18.8-0.8.…
a1822ab01a4f90d3e16bedc4fa9f554f
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-debug-2.6.16.54-0…
f7b29cf7c3ebfa96f94b1aeabc433542
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-default-2.6.16.54…
659a81d2a81aacbba9505e67360e06c1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-kdump-2.6.16.54-0…
e58a503a7ed7eb7179d0d3ec984f1d11
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-smp-2.6.16.54-0.2…
4b0105ed79b7c5022f254477afe0fdef
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-source-2.6.16.54-…
6fa444dedad477db1627d657a2e01fa0
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-syms-2.6.16.54-0.…
607821be303c03134b5c12544c9e784f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-xen-2.6.16.54-0.2…
cff19b6ddfe7f4cc8f0677d8a963a59c
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kexec-tools-1.101-32.45.…
c000a4332bdfa9a665a6c4df39258b0f
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/mkinitrd-1.2-106.62.1.x8…
de69d8c6b2502b08f7df770e7f7a5b32
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/multipath-tools-0.4.6-25…
7a477c903c904112b1d2f9faef26fc57
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/open-iscsi-2.0.707-0.32.…
570785167c6dd58839c4da6164949368
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/udev-085-30.44.1.x86_64.…
64cbc9e5a5220d0503f0826c8cdf1cc6
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-bigsmp…
344df7491fce32e7c8fffc078d230891
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-debug-…
67300ecc6ff83459b6c6ca3d4f230e85
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-defaul…
7531d60b4352681fe4c238dc0da87ecc
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-kdump-…
cc0435185e2df116002a09732bc3bc0d
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-ppc64-…
b968bd3652d4f78898f46b608d75958f
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-rt-2.6…
de2b3b9a1d38e09d3174f94b3c6c9e42
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-rt_deb…
9b535879d5e14287d165099fd533c16a
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-source…
cf2dba3b0be5e1c7bc4541a8d79920dc
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-syms-2…
1a0089e1b007d04b50cb4ef8ba9fc837
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-xen-2.…
2364a3b500108c62e9e6ca4fc8d185ea
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-xenpae…
6ca7641327f9403b1e90090c94ceaf7f
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-bigsmp-2.6.18.8-0.8.…
05dbce4b0cd449718cac4df57548efbf
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-default-2.6.18.8-0.8…
5ad84cb740f94769bc21d62096c47119
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-iseries64-2.6.18.8-0…
3522caa4dfa06b018e02c01ef22f8b79
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-kdump-2.6.18.8-0.8.n…
9e05616ade6ba96434910fc9a15a770d
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-ppc64-2.6.18.8-0.8.n…
b9717c16be648e33d2be9319b5737067
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-source-2.6.18.8-0.8.…
4a97d064ef5708fe5537c6536e1cc0a3
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-syms-2.6.18.8-0.8.sr…
aef035b5c338665b0dfc837a817b92c3
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-xen-2.6.18.8-0.8.nos…
b1a46a875a257401090ee39b554a2c86
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/kernel-xenpae-2.6.18.8-0.8.…
27418633717ed50ee454a5d2d4ca974e
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-bigsmp-2.6.16.54-0.2…
89ea1afeab799bce54e5bf193e7b1094
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-debug-2.6.16.54-0.2.…
37661118196c48b941175e81388f5bb5
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-default-2.6.16.54-0.…
0996f3615a35a9b3bc9a208507c47596
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-iseries64-2.6.16.54-…
1da29ebf8abbdfa7309df4bbb72a7d8e
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-kdump-2.6.16.54-0.2.…
88bffad4a022f05d4327345db5b62608
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-ppc64-2.6.16.54-0.2.…
827f803a9ba50113bb987eac88af9714
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-smp-2.6.16.54-0.2.5.…
b7f12f858c2270cabb74c42b20dc6df1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-source-2.6.16.54-0.2…
bf082324c147eeb33af1b2c7d87554c7
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-syms-2.6.16.54-0.2.5…
9cb9cdddf017646583734d49fed7fd64
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-um-2.6.16.54-0.2.5.n…
6baee91f8186b5c27a0a8ae0de99458c
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xen-2.6.16.54-0.2.5.…
45eadc085c7f343687de6f09b8ecfac7
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xenpae-2.6.16.54-0.2…
06d67279ee9aac781fe3870917758eaf
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kexec-tools-1.101-32.45.1.s…
0d753b3e5f78f3e203101ebb0fdf0c55
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/mkinitrd-1.2-106.62.1.src.r…
fbd7daeaf0bdf37b14d554f5b2d27ebf
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/multipath-tools-0.4.6-25.23…
6570728f19ddbc198597a99319f146e4
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/open-iscsi-2.0.707-0.32.src…
9f97118c75eeed9107bcad66ff82e35d
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/udev-085-30.44.1.src.rpm
cf6ef2ad00b66cce395122e8416833b5
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Desktop 10 SP1 for AMD64 and Intel EM64T
http://support.novell.com/techcenter/psdb/77ce3c74a6caf6fca743d8880665caa3.…
SUSE Linux Enterprise 10 SP1 DEBUGINFO for IBM zSeries 64bit
http://support.novell.com/techcenter/psdb/d4cff2b1abe0fb52b37ff429ac257008.…
SUSE Linux Enterprise 10 SP1 DEBUGINFO for IBM POWER
http://support.novell.com/techcenter/psdb/d1087847584deef8eb5071a114eb5560.…
SUSE Linux Enterprise 10 SP1 DEBUGINFO for IPF
http://support.novell.com/techcenter/psdb/e8fcad0e5b1e2b84bd1cdf22e4eaf477.…
SUSE Linux Enterprise Server 10 SP1
http://support.novell.com/techcenter/psdb/77ce3c74a6caf6fca743d8880665caa3.…
http://support.novell.com/techcenter/psdb/d4cff2b1abe0fb52b37ff429ac257008.…
http://support.novell.com/techcenter/psdb/d1087847584deef8eb5071a114eb5560.…
http://support.novell.com/techcenter/psdb/e8fcad0e5b1e2b84bd1cdf22e4eaf477.…
http://support.novell.com/techcenter/psdb/e1a28e357307ceda78d1b761f138dfcb.…
SLE SDK 10 SP1
http://support.novell.com/techcenter/psdb/77ce3c74a6caf6fca743d8880665caa3.…
http://support.novell.com/techcenter/psdb/d1087847584deef8eb5071a114eb5560.…
http://support.novell.com/techcenter/psdb/e8fcad0e5b1e2b84bd1cdf22e4eaf477.…
http://support.novell.com/techcenter/psdb/e1a28e357307ceda78d1b761f138dfcb.…
SUSE Linux Enterprise 10 SP1 DEBUGINFO
http://support.novell.com/techcenter/psdb/77ce3c74a6caf6fca743d8880665caa3.…
http://support.novell.com/techcenter/psdb/d1087847584deef8eb5071a114eb5560.…
http://support.novell.com/techcenter/psdb/e8fcad0e5b1e2b84bd1cdf22e4eaf477.…
http://support.novell.com/techcenter/psdb/e1a28e357307ceda78d1b761f138dfcb.…
SUSE Linux Enterprise Desktop 10 SP1
http://support.novell.com/techcenter/psdb/77ce3c74a6caf6fca743d8880665caa3.…
http://support.novell.com/techcenter/psdb/e1a28e357307ceda78d1b761f138dfcb.…
SUSE Linux Enterprise Desktop 10 SP1 for x86
http://support.novell.com/techcenter/psdb/e1a28e357307ceda78d1b761f138dfcb.…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security(a)suse.de) the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iQEVAwUBR6ra7Xey5gA9JdPZAQILgwf9H9MNdTuxoyHyejlCz56Z3ZqG2yeBoV9P
fpeAG3MCP3+25a4Z38pERe2v1jcEaQkDO1Q4OzO0oaEBj2jKywTN7NbwAyLAV/Ye
EVCMEWc+pTihIskI0iZdXYQpvLg2C7shxZPsmsfFmcSjVi8ParGT4E8Py1ZdeaaN
EbLNm8TfrYzI7QnZK2RZXSBw3QRm06gvGVYcKG6PuDj8wzv2ZUVH7R1xDNssiqCb
whNlLcRxomOOU6r2ZuU7jpRIlNYorF9GWhNbCsRlp3Lbbqu3SAK/SdQtaId8eki6
Qggjrnq2ukEZe97M1xn7DJFrE8CZlr2T5hVd7RZwWrdPiOz1QQZQ7w==
=Q6Ei
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SuSE Linux Enterprise Server 8 has entered Extended Maintenance
by Marcus Meissner 06 Feb '08
by Marcus Meissner 06 Feb '08
06 Feb '08
Hi,
With the release of a Squid security fix on December 30 2007 we have
entered a new maintenance phase for the SuSE Linux Enterprise Server 8
(SLES 8) line of products.
Following product life time changes become active as of now:
1. Extended Maintenance for a SUSE Linux Enterprise Server 8 subset
Following subset of products have now entered extended maintenance:
- SuSE Linux Enterprise Server 8 for x86 (Intel 32bit)
- SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries (S/390 31bit)
Using this maintenance extension requires an additional subscription.
The conditions and how-to-buy for the extension are shown in the
following 2 page document:
http://www.novell.com/rc/docrepository/public/14/basedocument.2007-11-05.20…
To migrate your machine to SLES 8 Extended Maintenance, replace in the files:
/var/adm/YaST/ProdDB/prod_*
the line (if present):
=YouPath: i386/update/SuSE-SLES/8
by:
=YouPath: i386/update/SuSE-SLES/8-EXTENDED
(replace i386 by s390 for the the S/390 version).
2. End of Life for the rest of the SLES 8 architectures
Following products have reached End of Life, support for them is
discontinued and no more updates will be published for them:
- SuSE Linux Enterprise Server 8 for AMD64 (AMD 64bit)
- SuSE Linux Enterprise Server 8 for IPF (Intel Itanium)
- SuSE Linux Enterprise Server 8 for IBM zSeries (IBM zSeries 64bit)
- SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries (IBM PowerPC)
Currently the following additional SUSE Linux Enterprise Server products exist
and are in maintenance (regular / extended maintenance):
- SUSE Linux Enterprise Server 9 (regular maintenance until July 30th 2009)
- SUSE Linux Enterprise Server 10 (regular maintenance until July 31st 2011)
Please see the product lifecycle page at http://support.novell.com/lifecycle/
for more information.
So lets take a look back at the history of SLES 8...
SuSE Linux Enterprise Server 8 was released end of October 2002, making its
regular maintenance lifetime 5 years.
SLES 8 was based on the UnitedLinux development also done by SUSE which
was a cooperation between SUSE, Caldera, Connectiva and TurboLinux.
The Linux kernel was originally 2.4.19, but was upgraded to 2.4.21 base with
Service Pack 3.
Some statistics regarding our online updates:
Total: 696 (367 active)
Security: 517 (251 active)
Recommended: 156 (104 active)
Optional: 21 ( 12 active)
YAST: 2 ( 0 active)
Top issues (with 5 or more updates):
32 kernel
26 mod_php4
20 ethereal
14 mozilla
13 samba
13 cups
11 squid
9 openssl
9 mysql
8 sendmail
8 openssh
8 cyrus-imapd
7 libpng
7 heimdal
7 gpg
7 cvs
6 xshared
6 timezone
6 rsync
6 openldap2
5 tcpdump
5 snort
5 ruby
5 qt3
5 mc
5 libtiff
5 laus
5 java2
5 fetchmail
5 dhcp-server
5 bind9
5 apache
Ciao, Marcus
--
Working, but not speaking, for the following german company:
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
1
0