openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
January 2009
- 2 participants
- 10 discussions
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2009:008)
by Marcus Meissner 29 Jan '09
by Marcus Meissner 29 Jan '09
29 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2009:008
Date: Thu, 29 Jan 2009 13:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
SLE SDK 10 SP2
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2008-4933, CVE-2008-5025, CVE-2008-5029
CVE-2008-5079, CVE-2008-5182
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The SUSE Linux Enterprise 10 Service Pack 2 kernel was updated to
version 2.6.16.60-0.34 to fix some security issues and various bugs.
The following security problems have been fixed:
CVE-2008-5079: net/atm/svc.c in the ATM subsystem allowed local users
to cause a denial of service (kernel infinite loop) by making two calls
to svc_listen for the same socket, and then reading a /proc/net/atm/
*vc file, related to corruption of the vcc table.
CVE-2008-5029: The __scm_destroy function in net/core/scm.c makes
indirect recursive calls to itself through calls to the fput function,
which allows local users to cause a denial of service (panic) via
vectors related to sending an SCM_RIGHTS message through a UNIX domain
socket and closing file descriptors.
CVE-2008-4933: Buffer overflow in the hfsplus_find_cat function in
fs/hfsplus/catalog.c allowed attackers to cause a denial of service
(memory corruption or system crash) via an hfsplus filesystem
image with an invalid catalog namelength field, related to the
hfsplus_cat_build_key_uni function.
CVE-2008-5025: Stack-based buffer overflow in the hfs_cat_find_brec
function in fs/hfs/catalog.c allowed attackers to cause a denial of
service (memory corruption or system crash) via an hfs filesystem
image with an invalid catalog namelength field, a related issue to
CVE-2008-4933.
CVE-2008-5182: The inotify functionality might allow local users to
gain privileges via unknown vectors related to race conditions in
inotify watch removal and umount.
A lot of other bugs were fixed, a detailed list can be found in the
RPM changelog.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise 10 SP2 DEBUGINFO for IBM POWER
http://download.novell.com/index.jsp?search=Search&keywords=315c54bd455583c…
SUSE Linux Enterprise 10 SP2 DEBUGINFO for IPF
http://download.novell.com/index.jsp?search=Search&keywords=a91d4196357d841…
SUSE Linux Enterprise 10 SP2 DEBUGINFO for IBM zSeries 64bit
http://download.novell.com/index.jsp?search=Search&keywords=25b427c3c9c9b79…
SUSE Linux Enterprise Desktop 10 SP2 for AMD64 and Intel EM64T
http://download.novell.com/index.jsp?search=Search&keywords=a12607704b9e518…
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=315c54bd455583c…
http://download.novell.com/index.jsp?search=Search&keywords=a91d4196357d841…
http://download.novell.com/index.jsp?search=Search&keywords=25b427c3c9c9b79…
http://download.novell.com/index.jsp?search=Search&keywords=a12607704b9e518…
http://download.novell.com/index.jsp?search=Search&keywords=14d206b16e1f6db…
SLE SDK 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=315c54bd455583c…
http://download.novell.com/index.jsp?search=Search&keywords=a91d4196357d841…
http://download.novell.com/index.jsp?search=Search&keywords=a12607704b9e518…
http://download.novell.com/index.jsp?search=Search&keywords=14d206b16e1f6db…
SUSE Linux Enterprise 10 SP2 DEBUGINFO
http://download.novell.com/index.jsp?search=Search&keywords=315c54bd455583c…
http://download.novell.com/index.jsp?search=Search&keywords=a91d4196357d841…
http://download.novell.com/index.jsp?search=Search&keywords=a12607704b9e518…
http://download.novell.com/index.jsp?search=Search&keywords=14d206b16e1f6db…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=a12607704b9e518…
http://download.novell.com/index.jsp?search=Search&keywords=14d206b16e1f6db…
SUSE Linux Enterprise Desktop 10 SP2 for x86
http://download.novell.com/index.jsp?search=Search&keywords=14d206b16e1f6db…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSYHHK3ey5gA9JdPZAQK3kQf/SvJ30fIjfofyfMTWlmO/55kySqkM12QV
k/NK6n8x142eVIk8XYizjI8u7/EsnJqlRYh2Lcvp4h8c6u5n0uME1VdAiflE5617
DNtfjA6tyu979+ik6V9zCPJ/i3K8L5Onk3UhMyIayQZr3OkBv0I9gO4DkQxaMt9m
LyDgZEbDYnAqfhpZiL+XQg09YjtJueg753fvmaIkvYKn8sdiIz5mDBoB7mQw5+WD
6Ngnonj3rCj6omFj3p+0BvL7iesOA331zKLepyfhL/uaCL+v/gc+nebtcKRS/haI
a4gSeXhq/TtFjmLSnw7xSMitRjFUie7myRHCquW3yR87b2mhtz7f5w==
=2/T0
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: IBM Java 5 (SUSE-SA:2009:007)
by Marcus Meissner 29 Jan '09
by Marcus Meissner 29 Jan '09
29 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: IBMJava5-JRE,java-1_5_0-ibm
Announcement ID: SUSE-SA:2009:007
Date: Thu, 29 Jan 2009 14:00:00 +0000
Affected Products: SUSE SLES 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2008-2086, CVE-2008-5339, CVE-2008-5340
CVE-2008-5341, CVE-2008-5342, CVE-2008-5343
CVE-2008-5344, CVE-2008-5345, CVE-2008-5346
CVE-2008-5348, CVE-2008-5350, CVE-2008-5351
CVE-2008-5352, CVE-2008-5353, CVE-2008-5354
CVE-2008-5356, CVE-2008-5357, CVE-2008-5359
CVE-2008-5360
Content of This Advisory:
1) Security Vulnerability Resolved:
IBM Java security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The IBM Java JRE 5 was brought to Service Release 9 fixing quite a
number of security issues and bugs.
The update fixes the following security problems:
CVE-2008-5350: A security vulnerability in the Java Runtime Environment
(JRE) may allow an untrusted applet or application to list the contents
of the home directory of the user running the applet or application.
CVE-2008-5346: A security vulnerability in the Java Runtime Environment
(JRE) with parsing zip files may allow an untrusted applet or
application to read arbitrary memory locations in the process that
the applet or application is running in.
CVE-2008-5343: A vulnerability in Java Web Start and Java Plug-in may
allow hidden code on a host to make network connections to that host
and to hijack HTTP sessions using cookies stored in the browser.
CVE-2008-5344: A vulnerability in the Java Runtime Environment
(JRE) with applet classloading may allow an untrusted applet to read
arbitrary files on a system that the applet runs on and make network
connections to hosts other than the host it was loaded from.
CVE-2008-5359: A buffer overflow vulnerability in the Java Runtime
Environment (JRE) image processing code may allow an untrusted applet
or application to escalate privileges. For example, an untrusted
applet may grant itself permissions to read and write local files or
execute local applications that are accessible to the user running
the untrusted applet.
CVE-2008-5341: A vulnerability in the Java Runtime Environment
may allow an untrusted Java Web Start application to determine the
location of the Java Web Start cache and the user name of the user
running the Java Web Start application.
CVE-2008-5339: A vulnerability in the Java Runtime Environment (JRE)
may allow an untrusted Java Web Start application to make network
connections to hosts other than the host that the application is
downloaded from.
CVE-2008-5340: A vulnerability in the Java Runtime Environment with
launching Java Web Start applications may allow an untrusted Java Web
Start application to escalate privileges. For example, an untrusted
application may grant itself permissions to read and write local
files or execute local applications that are accessible to the user
running the untrusted application.
CVE-2008-5348: A security vulnerability in the Java Runtime Environment
(JRE) with authenticating users through Kerberos may lead to a Denial
of Service (DoS) to the system as a whole, due to excessive consumption
of operating system resources.
CVE-2008-2086: A vulnerability in Java Web Start may allow certain
trusted operations to be performed, such as modifying system
properties.
CVE-2008-5345: The Java Runtime Environment (JRE) allows code loaded
from the local filesystem to access localhost. This may allow code that
is maliciously placed on the local filesystem and then subsequently
run, to have network access to localhost that would not otherwise
be allowed if the code were loaded from a remote host. This may be
leveraged to steal cookies and hijack sessions (for domains that map
a name to the localhost).
CVE-2008-5351: The UTF-8 (Unicode Transformation Format-8) decoder in
the Java Runtime Environment (JRE) accepts encodings that are longer
than the "shortest" form. This behavior is not a vulnerability in Java
SE. However, it may be leveraged to exploit systems running software
that relies on the JRE UTF-8 decoder to reject non-shortest form
sequences. For example, non-shortest form sequences may be decoded
into illegal URIs, which may then allow files that are not otherwise
accessible to be read, if the URIs are not checked following UTF-8
decoding.
CVE-2008-5360: The Java Runtime Environment creates temporary files
with insufficiently random names. This may be leveraged to write JAR
files which may then be loaded as untrusted applets and Java Web Start
applications to access and provide services from localhost and hence
steal cookies.
CVE-2008-5353: A security vulnerability in the Java Runtime Environment
(JRE) related to deserializing calendar objects may allow an untrusted
applet or application to escalate privileges. For example, an untrusted
applet may grant itself permissions to read and write local files or
execute local applications that are accessible to the user running
the untrusted applet.
CVE-2008-5356: A buffer vulnerability in the Java Runtime Environment
(JRE) with processing fonts may allow an untrusted applet or Java Web
Start application to escalate privileges. For example, an untrusted
applet may grant itself permissions to read and write local files or
execute local applications that are accessible to the user running
the untrusted applet.
CVE-2008-5354: A buffer overflow vulnerability in the Java Runtime
Environment (JRE) may allow an untrusted Java application that is
launched through the command line to escalate privileges. For example,
the untrusted Java application may grant itself permissions to read
and write local files or execute local applications that are accessible
to the user running the untrusted Java application.
This vulnerability cannot be exploited by an applet or Java Web
Start application.
CVE-2008-5357: A buffer vulnerability in the Java Runtime Environment
(JRE) with processing fonts may allow an untrusted applet or Java Web
Start application to escalate privileges. For example, an untrusted
applet may grant itself permissions to read and write local files or
execute local applications that are accessible to the user running
the untrusted applet.
CVE-2008-5352: A buffer overflow vulnerability in the Java
Runtime Environment (JRE) with unpacking applets and Java Web Start
applications using the "unpack200" JAR unpacking utility may allow an
untrusted applet or application to escalate privileges. For example,
an untrusted applet may grant itself permissions to read and write
local files or execute local applications that are accessible to the
user running the untrusted applet.
CVE-2008-5342: A security vulnerability in the the Java Web Start
BasicService allows untrusted applications that are downloaded from
another system to request local files to be displayed by the browser
of the user running the untrusted application.
References can be found on:
http://www-128.ibm.com/developerworks/java/jdk/alerts/
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Make sure you restart all Java using applications after installing this update.
While letting them run will usually work, they for instance lose access to dynamically
loaded information like timezone data.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=9a91147409995ad…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=9a91147409995ad…
Open Enterprise Server
http://download.novell.com/index.jsp?search=Search&keywords=8671eb8081c281a…
Novell Linux POS 9
http://download.novell.com/index.jsp?search=Search&keywords=8671eb8081c281a…
SUSE SLES 9
http://download.novell.com/index.jsp?search=Search&keywords=8671eb8081c281a…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSYGqF3ey5gA9JdPZAQI2ygf/Ro0uc9uQV+BmTQ7J1tn9Bjle7q0YaEsV
/j94mfZEz3rnEbmWwpmhr1SvgENZFp7SvE95sS5b8mEToCqTN0r0bkdnVe4OGjdC
t1g3ptKL59M4Q6ab/5GLjonT9Ve+6MZhOCZjGlkJIiFXhO3oY+J900zUPgo/O3+Y
AUvrONxwUqXEKD/T64GXd0tN/UawWZCPafSkwmP84t5VVavK4Cm0cyasNbL4Xwwr
19RriF1CZGQm0KY04uKpgWNJS6+j5T+ov1v1iRS7v2F6ynw1u1H4Ybuwsp/Azp5F
0vJPcdg/j/U2moVdbDEt+fDp0FoDIqWJUnhzgPyVD/3eRcLSmI5ZIQ==
=G0xN
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: OpenSSL certificate verification problem (SUSE-SA:2009:006)
by Marcus Meissner 23 Jan '09
by Marcus Meissner 23 Jan '09
23 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: openssl
Announcement ID: SUSE-SA:2009:006
Date: Fri, 23 Jan 2009 16:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SuSE Linux Enterprise Server 8
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SLE SDK 10 SP2
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: SSL certificate checking bypass
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-5077
Content of This Advisory:
1) Security Vulnerability Resolved:
OpenSSL EVP_VerifyFinal return value checking
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The OpenSSL certificate checking routines EVP_VerifyFinal can return
negative values and 0 on failure. In some places negative values
were not checked and considered successful verification.
Prior to this update it was possible to bypass the certification
chain checks of openssl.
This advisory is for the updates that improve the verification of
return values inside the OpenSSL library itself.
Several client programs also need to receive fixes to check that
return value.
A bind update which fixes this was already released yesterday,
tracked in SUSE-SA:2009:005.
A boinc-client and libnasl update was also released yesterday.
Updates for ntp,xntp, and eID-Belgium are being prepared.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Restart applications using OpenSSL.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/libopenssl-d…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/libopenssl0_…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/openssl-0.9.…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/openssl-doc-…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libopenssl-d…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libopenssl0_…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openssl-0.9.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openssl-cert…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openssl-doc-…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libopenssl-d…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libopenssl0_…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openssl-0.9.…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openssl-cert…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openssl-doc-…
Platform Independent:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/noarch/openssl-ce…
Power PC Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/ppc/libopenssl-de…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/ppc/libopenssl0_9…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/ppc/libopenssl0_9…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/ppc/openssl-0.9.8…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/ppc/openssl-doc-0…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/libopenssl-de…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/libopenssl0_9…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/libopenssl0_9…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/openssl-0.9.8…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/openssl-certs…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/openssl-doc-0…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/libopenssl-de…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/libopenssl0_9…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/libopenssl0_9…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/openssl-0.9.8…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/openssl-certs…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/openssl-doc-0…
x86-64 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/openssl-0.…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/openssl-do…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/openssl-0.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/openssl-ce…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/openssl-do…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/libopenssl…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/openssl-0.…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/openssl-ce…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/openssl-do…
Sources:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/openssl-0.9.8…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/openssl-certs…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/openssl-0.9.8…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/openssl-0.9.8…
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=11f6326cece4b23…
SLE SDK 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=11f6326cece4b23…
SUSE Linux Enterprise 10 SP2 DEBUGINFO
http://download.novell.com/index.jsp?search=Search&keywords=11f6326cece4b23…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=11f6326cece4b23…
Open Enterprise Server
http://download.novell.com/index.jsp?search=Search&keywords=0a0c29d2fa5ecac…
Novell Linux POS 9
http://download.novell.com/index.jsp?search=Search&keywords=0a0c29d2fa5ecac…
Novell Linux Desktop 9
http://download.novell.com/index.jsp?search=Search&keywords=0a0c29d2fa5ecac…
SUSE SLES 9
http://download.novell.com/index.jsp?search=Search&keywords=0a0c29d2fa5ecac…
SuSE Linux Enterprise Server 8
http://download.novell.com/index.jsp?search=Search&keywords=d105c9b195233c7…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSXnim3ey5gA9JdPZAQLaiwf/bRRzXxqlylNouUrNC16muaftWMLK1L5M
8VUPlx1/nk/S5PSWt07WgoZ7SEwUGw1jSHGnIIspje1kGXtMpLyBzd3+2yo+Yb4Q
ZLpDGldhvlxKqqz8uzY9QQ46T15Jful6+N30A36RJb97VR+EywQ5KVSYGbGs4g7g
oal4fnrxz+d6D8COX1Pm9W/75U27i4SJ2Aef/TLxZB3GvyFzZjHG4g3QKXQkVBHv
rC8CytEkLDbwnKHGQWFBI035pQilYRy2CJKbjHAKQs/nAGfROm9rLjIPa31SyKLH
fIG4GFn4lDjaTH3f+urkUpdWnEjE+qahbOBgziQzK5r/HXVfIvWgOw==
=6uYt
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
22 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: bind
Announcement ID: SUSE-SA:2009:005
Date: Thu, 22 Jan 2009 12:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SLE SDK 10 SP2
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: information disclosure
Severity (1-10): 7
SUSE Default Package: no
Cross-References: CVE-2009-0025
Content of This Advisory:
1) Security Vulnerability Resolved:
bind does not completely verify the OpenSSL certification chain
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The DNS daemon bind is used to resolve and lookup addresses on the inter-
net.
Some month ago a vulnerability in the DNS protocol and its numbers was
published that allowed easy spoofing of DNS entries. The only way to pro-
tect against spoofing is to use DNSSEC.
Unfortunately the bind code that verifys the certification chain of a DNS-
SEC zone transfer does not properly check the return value of function
DSA_do_verify(). This allows the spoofing of records signed with DSA or
NSEC3DSA.
2) Solution or Work-Around
none
3) Special Instructions and Notes
Please restart bind.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/bind-d…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/bind-d…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-9.5.0P2…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-chroote…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-devel-9…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-doc-9.5…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-libs-9.…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-utils-9…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/bind-d…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/bind-d…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-9.4.2-3…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-chroote…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-devel-9…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-doc-9.4…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-libs-9.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-utils-9…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-9.4.1.P…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-chroote…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-devel-9…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-doc-9.4…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-libs-9.…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-utils-9…
x86-64 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/bind-libs-…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/bind-libs-…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/bind-libs-…
Sources:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/bind-9.5.0P2-…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/bind-9.4.2-39…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/bind-9.4.1.P1…
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
Open Enterprise Server
http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100…
Novell Linux POS 9
http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100…
Novell Linux Desktop 9
http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100…
SUSE SLES 9
http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100…
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622…
SLE SDK 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622…
SUSE Linux Enterprise 10 SP2 DEBUGINFO
http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSXhPUHey5gA9JdPZAQKuIQf/VwWo1gPIInRmgmBAbUKgUdbU9kwsd2Wa
CKQGV0zubTPBxSigwTY7VVENHLvgEcDkfzX48KQfryma29hVfksgTiyh2FYcmo07
SeEQgOkg2QNAasups2+n2TFM2B+EB5zOA/F/J81H4nfT0wUqXmPyOAJ9IqBcCXGo
ybAqn7Tnf1Q6GYuvZ251ep+B+KLt3XOei2Lrl6MfoUVzeYlBd7v0gYN12fYF5i3Z
V12RXWbdvzolQRaPX88If6PFm4Rwjd7GiZGGA1z7i3qeWUPxgFWmJmcPiVNjfH0Z
cS2ssXUWHiajcqxwz1m3LlDfBfK359aBZz1nrm1Omlp153i7VmCZjA==
=+C3i
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Linux kernel (SUSE:2009:004)
by Marcus Meissner 21 Jan '09
by Marcus Meissner 21 Jan '09
21 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2009:004
Date: Wed, 21 Jan 2009 16:00:00 +0000
Affected Products: openSUSE 10.3
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2008-4933, CVE-2008-5025, CVE-2008-5029
CVE-2008-5079, CVE-2008-5134, CVE-2008-5182
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The openSUSE 10.3 kernel was updated to fix various security problems
and bugs. Following security bugs were fixed:
CVE-2008-5079: net/atm/svc.c in the ATM subsystem allowed local users
to cause a denial of service (kernel infinite loop) by making two calls
to svc_listen for the same socket, and then reading a /proc/net/atm/*vc
file, related to corruption of the vcc table.
CVE-2008-5029: The __scm_destroy function in net/core/scm.c makes
indirect recursive calls to itself through calls to the fput function,
which allows local users to cause a denial of service (panic) via
vectors related to sending an SCM_RIGHTS message through a UNIX domain
socket and closing file descriptors.
CVE-2008-5134: Buffer overflow in the lbs_process_bss function
in drivers/net/wireless/libertas/scan.c in the libertas subsystem
allowed remote attackers to have an unknown impact via an "invalid
beacon/probe response."
CVE-2008-4933: Buffer overflow in the hfsplus_find_cat function in
fs/hfsplus/catalog.c allowed attackers to cause a denial of service
(memory corruption or system crash) via an hfsplus filesystem
image with an invalid catalog namelength field, related to the
hfsplus_cat_build_key_uni function.
CVE-2008-5025: Stack-based buffer overflow in the hfs_cat_find_brec
function in fs/hfs/catalog.c allowed attackers to cause a denial of
service (memory corruption or system crash) via an hfs filesystem
image with an invalid catalog namelength field, a related issue to
CVE-2008-4933.
CVE-2008-5182: The inotify functionality might allow local users to
gain privileges via unknown vectors related to race conditions in
inotify watch removal and umount.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please restart the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-bigsm…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-debug…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-defau…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-sourc…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-syms-…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-xen-2…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/kernel-xenpa…
Power PC Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-defaul…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-kdump-…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-ppc64-…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-source…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/kernel-syms-2…
x86-64 Platform:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-deb…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-def…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-sou…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-sym…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/kernel-xen…
Sources:
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-bigsmp…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-debug-…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-defaul…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-kdump-…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-ppc64-…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-source…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-syms-2…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-xen-2.…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/kernel-xenpae…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iQEVAwUBSXdyFHey5gA9JdPZAQIiHAf/aT5hcO0eJfgS9+EbYPPqKAlvJERUCIsv
y3W5AmOgWb2rhoH+TjBvbE5FQQRxLYHIGJrVkCRD+n5tvHFd+/5SRcHVCfwNToVU
OdEgu2rwjevpDzWy6UR3VywXZOspImOWiseuIZHPZlRXQY2fEDDlVcsfsjpIJ3Ya
/nO8uFCGVP7Rb1JAKNwMASoT9gA/+fwHHbiEHt8/iw/hrWAgiv3bKNsYAYCPQVIB
p81e1CAPUGViR0xFxowgYjojdcjWW4zp4st68FLBkbp9LeFDp9dvpq9jJXOiHkPz
iZuepeNFDfMqxdSElhatZbhWXDScAAQeAXZtU4bJW37chnx4R3AiXg==
=RIWJ
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:2009:003)
by Marcus Meissner 20 Jan '09
by Marcus Meissner 20 Jan '09
20 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel-debug
Announcement ID: SUSE-SA:2009:003
Date: Tue, 20 Jan 2009 18:00:00 +0000
Affected Products: openSUSE 11.0
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2008-3831, CVE-2008-4554, CVE-2008-4933
CVE-2008-5025, CVE-2008-5029, CVE-2008-5079
CVE-2008-5182, CVE-2008-5300, CVE-2008-5700
CVE-2008-5702
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update fixes various security issues and several bugs in the
openSUSE 11.0 kernel.
The kernel was also updated to the stable version 2.6.25.20,
including its bugfixes.
Following security issues were fixed:
CVE-2008-5702: Buffer underflow in the ibwdt_ioctl function in
drivers/watchdog/ib700wdt.c might allow local users to have an unknown
impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
CVE-2008-5700: libata did not set minimum timeouts for SG_IO requests,
which allows local users to cause a denial of service (Programmed
I/O mode on drives) via multiple simultaneous invocations of an
unspecified test program.
CVE-2008-5079: net/atm/svc.c in the ATM subsystem allowed local users
to cause a denial of service (kernel infinite loop) by making two calls
to svc_listen for the same socket, and then reading a /proc/net/atm/*vc
file, related to corruption of the vcc table.
CVE-2008-5300: Linux kernel 2.6.28 allows local users to cause a
denial of service ("soft lockup" and process loss) via a large number
of sendmsg function calls, which does not block during AF_UNIX garbage
collection and triggers an OOM condition, a different vulnerability
than CVE-2008-5029.
CVE-2008-5029: The __scm_destroy function in net/core/scm.c makes
indirect recursive calls to itself through calls to the fput function,
which allows local users to cause a denial of service (panic) via
vectors related to sending an SCM_RIGHTS message through a UNIX domain
socket and closing file descriptors.
CVE-2008-4933: Buffer overflow in the hfsplus_find_cat function in
fs/hfsplus/catalog.c allowed attackers to cause a denial of service
(memory corruption or system crash) via an hfsplus filesystem
image with an invalid catalog namelength field, related to the
hfsplus_cat_build_key_uni function.
CVE-2008-5025: Stack-based buffer overflow in the hfs_cat_find_brec
function in fs/hfs/catalog.c allowed attackers to cause a denial of
service (memory corruption or system crash) via an hfs filesystem
image with an invalid catalog namelength field, a related issue to
CVE-2008-4933.
CVE-2008-5182: The inotify functionality might allow local users to
gain privileges via unknown vectors related to race conditions in
inotify watch removal and umount.
CVE-2008-3831: The i915 driver in drivers/char/drm/i915_dma.c does not
restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager
(DRM) master, which allows local users to cause a denial of service
(memory corruption) via a crafted ioctl call, related to absence of
the DRM_MASTER and DRM_ROOT_ONLY flags in the ioctls configuration.
CVE-2008-4554: The do_splice_from function in fs/splice.c did not
reject file descriptors that have the O_APPEND flag set, which allows
local users to bypass append mode and make arbitrary changes to other
locations in the file.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-debug…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-defau…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-pae-2…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-rt-2.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-rt_de…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-sourc…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-syms-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-vanil…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/kernel-xen-2…
Platform Independent:
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/noarch/kernel-doc…
Power PC Platform:
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-defaul…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-kdump-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-ppc64-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-ps3-2.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-source…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-syms-2…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/ppc/kernel-vanill…
x86-64 Platform:
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-deb…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-def…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-rt-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-rt_…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-sou…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-sym…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-van…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/kernel-xen…
Sources:
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-debug-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-defaul…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-docs-2…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-kdump-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-pae-2.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-ppc64-…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-ps3-2.…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-rt-2.6…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-rt_deb…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-source…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-syms-2…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-vanill…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/kernel-xen-2.…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSXX1H3ey5gA9JdPZAQJ0Ewf/UHfh83amFl4j32A+3oQpuKQBSoCjyroV
U9AiFcXFqmsZUOOPpukac30PHcUVF/72PlHLhg5m7arV1GaTx5eqTpA4gIQvyBqW
+n0UAFUCWO4E4tkq0V3TclyiQLadjTiwKb5vX+gLvMrKywiMHrWM95fGPTuaGP0I
cvQwOA0PYwamWKslrs5KCbqHXTSGd2MRyXvpwfOXo0CtcxqbJTexWebrDSKlo7E6
H6/z2ddeKp5h3/Df2u3t+5P9XX1o9/LR4iGl9EDxG9fSIEuLFxVz3YnVr/SKrrzw
/kwPQ9A7+FxcnkAkCchUaMw4co9kHJvvSXXOIWoGwt7lVVduvOXWnQ==
=A/0q
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
19 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:002
Date: Mon, 19 Jan 2009 14:00:00 +0000
Cross-References: CVE-2006-7234, CVE-2007-1320, CVE-2007-5729
CVE-2008-2382, CVE-2008-2383, CVE-2008-3641
CVE-2008-4690, CVE-2008-4865, CVE-2008-5187
CVE-2008-5286, CVE-2008-5714
Content of this advisory:
1) Solved Security Vulnerabilities:
- imlib2
- valgrind
- kvm
- cups
- lynx
- xterm
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- imlib2
A security problem was fixed in imlib2 where loading a specific XPM
file could corrupt memory. (CVE-2008-5187)
Affected products: SLED 10 SP2, SLE SDK 10 (updates for other products
were already released)
- valgrind
valgrind reads a file .valgrindrc in the current directory.
Therefore local users could place such a file a world writable
directory such as /tmp and influence other users' valgrind when it's
executed there (CVE-2008-4865).
Affected products: SLES9/SDK (updates for other products were already
released)
- kvm
Rogue VNC clients could make the built in VNC server of kvm run into
an infinite loop (CVE-2008-2382)
An off-by-one bug limited the length of VNC passwords to seven
instead of eight (CVE-2008-5714)
Virtualized guests could potentially execute code on the host by
triggering a buffer overflow in the network emulation code via large
ethernet frames (CVE-2007-5729)
Virtualized guests could potentially execute code on the host by
triggering a heap based buffer overflow in the Cirrus Graphics card
emulation (CVE-2007-1320).
Affected products: openSUSE 11.0, 11.1
- cups
Previous updates for the PNG and HPGL filters were incomplete and
are corrected now (CVE-2008-3641, CVE-2008-5286).
Affected products: openSUSE 10.3, 11.0, SLE10-SP2, SLES9
- lynx
This update of lynx fixes two security bugs:
- untrusted search path allows execution of arbitrary commands via
.mailcap or mime.types file (CVE-2006-7234)
- when advanced mode is enabled and lynx is used as URL handler, remote
attackers can execute arbitrary commands (CVE-2008-4690)
Affected products: NLD 9 SDK, SLE SDK 10 SP2, SLES SDK 9 (updates for
other products were already released)
- xterm
XTerm evaluated various ANSI Escape sequences so that command execution
was possible if an attacker could pipe raw data to an xterm.
(CVE-2008-2383)
(It is usually not recommended to display raw data on an xterm.)
Affected products: openSUSE 10.3-11.0, SLE10-SP2, (SLES9 packages will
be released within this week)
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSXR6P3ey5gA9JdPZAQIn1QgAlP57jumTyjhOWZPMueO3/EEg8UeUSL0E
sgepCYqPq5Ch7H8SlbR/3rU/la5Hu0ctpJoXSL1JdokWzJRpjb0MBWXOFXJUkdGM
QCmvFWR6Psvha381QXrYunwZJfyJS5nswAHwyNvcIf7P97LMp6fRequlKP9AxTRd
c4LftUkFHtqSHO9cn21j6ml4DE5adYjoau8HUEhr4C/s0UXLxOWnvYJ1SX2+RfDj
Cat3S+oRPhPY6XvNp+FDtIek65l/nsfDanYnlZNcpEeTTUoiOzTCVb1egFNyKbQz
3JEfSOFwVD/O5mQ2FENT8lE9zhgcl50wE4omvc8Dipo6+rdrkCPj4g==
=iXVZ
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Mozilla (SUSE-SA:2009:002)
by Marcus Meissner 14 Jan '09
by Marcus Meissner 14 Jan '09
14 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: MozillaFirefox,MozillaThunderbird,mozilla
Announcement ID: SUSE-SA:2009:002
Date: Wed, 14 Jan 2009 09:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SLE SDK 10 SP2
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-5500, CVE-2008-5501, CVE-2008-5502
CVE-2008-5503, CVE-2008-5504, CVE-2008-5505
CVE-2008-5506, CVE-2008-5507, CVE-2008-5508
CVE-2008-5510, CVE-2008-5511, CVE-2008-5512
CVE-2008-5513, MFSA 2008-37, MFSA 2008-60
MFSA 2008-61, MFSA 2008-62, MFSA 2008-63
MFSA 2008-64, MFSA 2008-65, MFSA 2008-66
MFSA 2008-67, MFSA 2008-68, MFSA 2008-69
Content of This Advisory:
1) Security Vulnerability Resolved:
Mozilla browser security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Various Mozilla browser suite programs were updated to the last
security release.
The Mozilla Firefox 3.0.5 browser, Seamonkey 1.1.14 and xulrunner190
update were already published before Christmas, please see
SUSE-SA:2008:058.
Mozilla Firefox for older products was updated to 2.0.0.19 and Mozilla
Thunderbird was updated to 2.0.0.19. Other packages received backports.
The following security issues were fixed:
MFSA 2008-69 / CVE-2008-5513: Mozilla security researcher moz_bug_r_a4
reported vulnerabilities in the session-restore feature by which
content could be injected into an incorrect document storage location,
including storage locations for other domains. An attacker could
utilize these issues to violate the browser's same-origin policy and
perform an XSS attack while SessionStore data is being restored.
moz_bug_r_a4 also reported that one variant could be used by an
attacker to run arbitrary JavaScript with chrome privileges.
MFSA 2008-68 / CVE-2008-5512 / CVE-2008-5511: Mozilla security
researcher moz_bug_r_a4 reported that an XBL binding, when attached to
an unloaded document, can be used to violate the same-origin policy and
execute arbitrary JavaScript within the context of a different website.
moz_bug_r_a4 also reported two vulnerabilities by which page content
can pollute XPCNativeWrappers and run arbitrary JavaScript with chrome
privileges. Thunderbird shares the browser engine with Firefox and
could be vulnerable if JavaScript were to be enabled in mail. This is
not the default setting and we strongly discourage users from running
JavaScript in mail. Workaround Disable JavaScript until a version
containing these fixes can be installed.
MFSA 2008-67 / CVE-2008-5510: Kojima Hajime reported that unlike
literal null characters which were handled correctly, the escaped
form '\0' was ignored by the CSS parser and treated as if it was
not present in the CSS input string. This issue could potentially be
used to bypass script sanitation routines in web applications. The
severity of this issue was determined to be low.
MFSA 2008-66 / CVE-2008-5508: Perl developer Chip Salzenberg reported
that certain control characters, when placed at the beginning of a
URL, would lead to incorrect parsing resulting in a malformed URL
being output by the parser. IBM researchers Justin Schuh, Tom Cross,
and Peter William also reported a related symptom as part of their
research that resulted in MFSA 2008-37. There was no direct security
impact from this issue and its effect was limited to the improper
rendering of hyperlinks containing specific characters. The severity
of this issue was determined to be low.
MFSA 2008-65 / CVE-2008-5507: Google security researcher Chris Evans
reported that a website could access a limited amount of data from
a different domain by loading a same-domain JavaScript URL which
redirects to an off-domain target resource containing data which
is not parsable as JavaScript. Upon attempting to load the data as
JavaScript a syntax error is generated that can reveal some of the
file context via the window.onerror DOM API. This issue could be
used by a malicious website to steal private data from users who are
authenticated on the redirected website. How much data could be at risk
would depend on the format of the data and how the JavaScript parser
attempts to interpret it. For most files the amount of data that can
be recovered would be limited to the first word or two. Some data files
might allow deeper probing with repeated loads. Thunderbird shares the
browser engine with Firefox and could be vulnerable if JavaScript were
to be enabled in mail. This is not the default setting and we strongly
discourage users from running JavaScript in mail. Workaround Disable
JavaScript until a version containing these fixes can be installed.
MFSA 2008-64 / CVE-2008-5506: Marius Schilder of Google Security
reported that when a XMLHttpRequest is made to a same-origin resource
which 302 redirects to a resource in a different domain, the response
from the cross-domain resource is readable by the site issuing the
XHR. Cookies marked HttpOnly were not readable, but other potentially
sensitive data could be revealed in the XHR response including URL
parameters and content in the response body. Thunderbird shares the
browser engine with Firefox and could be vulnerable if JavaScript were
to be enabled in mail. This is not the default setting and we strongly
discourage users from running JavaScript in mail. Workaround Disable
JavaScript until a version containing these fixes can be installed.
MFSA 2008-63 / CVE-2008-5505: Security researcher Hish reported
that the persist attribute in XUL elements can be used to store
cookie-like information on a user's computer which could later be
read by a website. This creates a privacy issue for users who have a
non-standard cookie preference and wish to prevent sites from setting
cookies on their machine. Even with cookies turned off, this issue
could be used by a website to write persistent data in a user's
browser and track the user across browsing sessions. Additionally,
this issue could allow a website to bypass the limits normally placed
on cookie size and number.
MFSA 2008-62 / CVE-2008-5504: Mozilla security researcher moz_bug_r_a4
reported an additional variation on the feed preview vulnerabilities
fixed in Firefox 2.0.0.17. moz_bug_r_a4 demonstrated that it was
still possible to use the feed preview as a vector for JavaScript
privilege escalation. An attacker could use this issue to run arbitrary
JavaScript with chrome privileges. Firefox 3 is not affected by this
issue. Workaround Disable JavaScript until a version containing these
fixes can be installed.
MFSA 2008-61 / CVE-2008-5503: Mozilla developer Boris Zbarsky reported
that XBL bindings could be used to read data from other domains,
a violation of the same-origin policy. The severity of this issue
was determined to be moderate due to several mitigating factors:
The target document requires a <bindingsi> element in the XBL
namespace in order to be read. The reader of the data needs to know
the id attribute of the binding being read in advance. It is unlikely
that web services will expose private data in the manner described
above. Firefox 3 is not affected by this issue. Thunderbird shares the
browser engine with Firefox and could be vulnerable if JavaScript were
to be enabled in mail. This is not the default setting and we strongly
discourage users from running JavaScript in mail. Workaround Products
built from the Mozilla 1.9.0 branch and later, Firefox 3 for example,
are not affected by this issue. Upgrading to one of these products
is a reliable workaround for this particular issue and it is also
Mozilla's recommendation that the most current version of any Mozilla
product be used. Alternatively, you can disable JavaScript until a
version containing these fixes can be installed.
MFSA 2008-60 / CVE-2008-5502 / CVE-2008-5501 / CVE-2008-5500: Mozilla
developers identified and fixed several stability bugs in the browser
engine used in Firefox and other Mozilla-based products. Some of
these crashes showed evidence of memory corruption under certain
circumstances and we presume that with enough effort at least some of
these could be exploited to run arbitrary code. Thunderbird shares
the browser engine with Firefox and could be vulnerable if JavaScript
were to be enabled in mail. This is not the default setting and we
strongly discourage users from running JavaScript in mail. Without
further investigation we cannot rule out the possibility that for some
of these an attacker might be able to prepare memory for exploitation
through some means other than JavaScript such as large images.
Workaround Disable JavaScript until a version containing these fixes
can be installed.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Mozilla Firefox or Thunderbird after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/Mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/Mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/Mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/mozill…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/mozilla-xulr…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/mozilla-xulr…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/mozilla-xulr…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/Mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/Mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/epipha…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/epipha…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/epipha…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/epipha…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/mozill…
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/mozill…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/epiphany-2.2…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/epiphany-dev…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/epiphany-doc…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/epiphany-ext…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/mozilla-xulr…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/mozilla-xulr…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/mozilla-xulr…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/MozillaFiref…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/MozillaFiref…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/MozillaThund…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/epiphany-2.2…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/epiphany-dev…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/epiphany-doc…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/epiphany-ext…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/mozilla-xulr…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/mozilla-xulr…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/mozilla-xulr…
x86-64 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/x86_64/mozi…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/x86_64/mozi…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/mozilla-xu…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/mozilla-xu…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/mozilla-xu…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/mozilla-xu…
Sources:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/src/Mozilla…
http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/src/mozilla…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/MozillaThunde…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/mozilla-xulru…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/MozillaThunde…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/epiphany-2.22…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/epiphany-exte…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/mozilla-xulru…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/MozillaFirefo…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/MozillaThunde…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/epiphany-2.20…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/epiphany-exte…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/mozilla-xulru…
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SLE SDK 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=541ba20ce3672e8…
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=541ba20ce3672e8…
http://download.novell.com/index.jsp?search=Search&keywords=33506fec82dc35b…
SUSE Linux Enterprise 10 SP2 DEBUGINFO
http://download.novell.com/index.jsp?search=Search&keywords=33506fec82dc35b…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=541ba20ce3672e8…
http://download.novell.com/index.jsp?search=Search&keywords=33506fec82dc35b…
Open Enterprise Server
http://download.novell.com/index.jsp?search=Search&keywords=0e95b6241be3476…
Novell Linux POS 9
http://download.novell.com/index.jsp?search=Search&keywords=0e95b6241be3476…
Novell Linux Desktop 9
http://download.novell.com/index.jsp?search=Search&keywords=f3a7728c69c970d…
http://download.novell.com/index.jsp?search=Search&keywords=0e95b6241be3476…
SUSE SLES 9
http://download.novell.com/index.jsp?search=Search&keywords=0e95b6241be3476…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSW3ElHey5gA9JdPZAQJeWAf/YQyJ6sovCTZWnB7VHnZEj3I4PxDAItqV
Cb1isYL3ucLQnhM8Ifne05K3XNJSLnmU9sj4lC0k6aZmTpwZjCIoweDaiQFckgtV
/foWer9em7j6jucNimwpkmdezEsthM75ytKMxONh7sreFmaNxP/nAU/oVfoFtsVt
F+6eJwjbTf/d3uvgoWJUFxb4q0C/D0HdVk2l0T/ioDeLFbuWamSjcDKRfe0SmvXV
co8FxnGWzJUE6/EFSoJLv1WeMBsuZr1bwg1nc4Ke7uDyk2QCwsTiVufpj4Kw5hKS
8ettibCDcGHdwUTExB8arCqGQ6BpriZQlCNpY5zYle7GCWDy8iWTjA==
=G01B
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
12 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:001
Date: Mon, 12 Jan 2009 13:00:00 +0000
Cross-References: CVE-2008-2380, CVE-2008-3933, CVE-2008-3934
CVE-2008-3963, CVE-2008-4097, CVE-2008-4098
CVE-2008-4225, CVE-2008-4314, CVE-2008-4552
CVE-2008-4575, CVE-2008-4639, CVE-2008-4640
CVE-2008-4641, CVE-2008-4680, CVE-2008-4681
CVE-2008-4682, CVE-2008-4683, CVE-2008-4684
CVE-2008-4685, CVE-2008-4864, CVE-2008-5006
CVE-2008-5031, CVE-2008-5285, CVE-2008-5514
CVE-2008-5517, CVE-2008-5617
Content of this advisory:
1) Solved Security Vulnerabilities:
- ethereal, wireshark
- mysql
- imap
- rsyslog
- courier-authlib
- nfs-utils
- libxml2
- python
- jhead
- git
- samba
- vinagre
- opera
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- ethereal, wireshark
An update of wireshark/ethereal was released to fix various vulnerabili-
ties:
CVE-2008-3933 (crash when processing compressed data),
CVE-2008-3934 (crash when processing rf5 files),
CVE-2008-4680 (USB dissector crash),
CVE-2008-4681 (Bluetooth RFCOMM dissector crash),
CVE-2008-4682 (Tamos CommView dissector crash),
CVE-2008-4683 (Bluetooth ACL dissector crash),
CVE-2008-4684 (PRP and MATE dissector crash) and
CVE-2008-4685 (Q.931 dissector crash).
CVE-2008-5285 (SMTP dissector infinite loop)
and an infinite loop problem in the WLCCP dissector
Affected products: openSUSE 10.3-11.1, NLD 9 SDK, Novell Linux POS 9,
Open Enterprise Server, SLES 9, SLE SDK 10 SP2, SLED 10 SP2, SLES 10 SP2
- mysql
Due a flaw users could access tables of other users (CVE-2008-4097,
CVE-2008-4098); additionally empty bit-strings in a query could crash
the MySQL server (CVE-2008-3963)
Affected products: openSUSE 10.3-11.0, NLD 9 SDK, Novell Linux Desktop 9,
Novell Linux POS 9, Open Enterprise Server, SLES 9, SLES SDK 9
- imap
Insufficient buffer length checks in the imap client library may
crash applications that use the library to print formatted email
addresses. The imap daemon itself is not affected but certain
versions of e.g. the php imap module are (CVE-2008-5514).
The client library could also crash when a rogue server unexpectedly
closes the connection (CVE-2008-5006).
Affected products: openSUSE 10.3-11.1
- rsyslog
rsyslog ignored the $AllowedSender configuration directive,
therefore accepting log messages from anyone (CVE-2008-5617).
Additionally imudp logged a message when unauthorized senders tried
to send to it, therefore allowing attackers to flood the log
CVE-2008-5618).
Affected products: openSUSE 11.1
- courier-authlib
Insufficient quoting allowed attackers to inject SQL statements when
using the pgsql backend (CVE-2008-2380).
Affected products: openSUSE 10.3-11.1
- nfs-utils
This update of nfs-utils fixes the handling of the tcp wrapper ACLs.
(CVE-2008-4552)
Affected products: Novell Linux Desktop 9, Novell Linux POS 9, Open
Enterprise Server, SLE 10 DEBUGINFO SP2, SLED 10 SP2, SLES 10 SP2,
SLES 9
- libxml2
libxml2 could run into an endless loop when processing specially
crafted XML files (CVE-2008-4225)
Affected products: NLD 9 SDK, Novell Linux Desktop 9, Novell Linux POS 9,
Open Enterprise Server, SLES 9, SLES SDK 9, SuSE Linux Enterprise Server 8
for IBM S/390 and IBM zSeries, SuSE Linux Enterprise Server 8 for x86,
SLE 10 DEBUGINFO SP2, SLED 10 SP1, SLED 10 SP2, SLES 10 SP1, SLES 10 SP2
- python
Integer Overflows in the python imageop module and in the expandtabs method
potentially allowed attackers to execute arbitrary code (CVE-2008-4864,
CVE-2008-5031)
Affected products: openSUSE 10.3-11.0, Novell Linux Desktop 9, Novell Linux
POS 9, Open Enterprise Server, SLES 9, SLE SDK 10 SP2, SLED 10 SP2,
SLES 10 SP2
- jhead
An update of jhead fixes several security problems:
- CVE-2008-4575: buffer overflow in DoCommand()
- CVE-2008-4639: local symlink attack
- CVE-2008-4640: DoCommand() allowed deletion of arbitrary files
- CVE-2008-4641: execution of arbitrary shell commands in DoCommand()
Affected products: openSUSE 10.3-11.1
- git
Insufficient quoting of shell characters allowed remote attackers to
execute arbitrary commands via the git web interface (CVE-2008-5517)
Affected products: openSUSE 10.3
- samba
This update of samba fixes a bug that allowed the client to retrieve
arbitrary memory content from the server process. (CVE-2008-4314)
Additionally another bug was fixed that affects environments that
enabled registry shares by setting "registry shares = yes". In this case
an authenticated user is accidently allowed to access the root file-
system "/". (CVE-2009-0022)
Affected products: openSUSE 10.3-11.1
- vinagre
A format string problem in vinagre potentially allowed malicious VNC
servers to have a vinagre client that connects to the server execute
arbitrary code. (CVE-2008-5660)
Affected products: openSUSE 11.0-11.1
- opera
Opera 9.63 fixes the following security problems:
- Manipulating text input contents can allow execution of
arbitrary code
- HTML parsing flaw can cause Opera to execute arbitrary code.
- Long hostnames in file: URLs can cause execution of arbitrary
code.
- Script injection in feed preview can reveal contents of unrelated
news feeds.
- Built-in XSLT templates can allow cross-site scripting.
- Fixed an issue that could reveal random data.
- SVG images embedded using <img> tags can no longer execute Java or
plugin content.
Affected products: openSUSE 10.3-11.1
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSWtKs3ey5gA9JdPZAQJbNQf/Wb9ke1yj6YOo2eBPl0CQvAVS9CJhvM23
IwM1elXY6sBHcbp35Jr/38tD7OQaxdJTYb8SDsXnYPb2fNg6hOZBytY9D9q7b3T1
mTGGyLCeRf7f3yOTUjQGAK5+iMlplLgiQ4McLGIHkFieN298SrXUMxfc7I5cCxOB
crrPtrcrvRAIXhw4Iw1LeslEqs5TSjM1QHNm6SfUfCWncvQEbiHJvT7cenOXvnVz
0IdI6b4gsGJw6v+85NcxJm9LkXtFo5zmFDQMXR5dxxZSC1bOkR3CcIlHrWthQdlJ
L8jtvBuXcICPj4xl5PqLr6frBCOwPaWofHAkaRzmKAYDmsg5ULdfAw==
=WDSv
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Sun Java (SUSE-SA:2009:001)
by Marcus Meissner 09 Jan '09
by Marcus Meissner 09 Jan '09
09 Jan '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: Sun Java
Announcement ID: SUSE-SA:2009:001
Date: Fri, 09 Jan 2009 15:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-2086, CVE-2008-5339, CVE-2008-5340
CVE-2008-5341, CVE-2008-5342, CVE-2008-5343
CVE-2008-5344, CVE-2008-5345, CVE-2008-5346
CVE-2008-5347, CVE-2008-5348, CVE-2008-5349
CVE-2008-5350, CVE-2008-5351, CVE-2008-5352
CVE-2008-5353, CVE-2008-5354, CVE-2008-5355
CVE-2008-5356, CVE-2008-5357, CVE-2008-5358
CVE-2008-5359, CVE-2008-5360
Content of This Advisory:
1) Security Vulnerability Resolved:
Various Sun Java security issues
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Sun Java received several security fixes and was updated to:
- Sun Java 1.6.0 to Update 11-b03
- Sun Java 1.5.0 to Update 17
- Sun Java 1.4.2 to Update 19
Numerous security issues such as privilege escalations, and sandbox
breakouts were fixed.
(CVE-2008-5360, CVE-2008-5359, CVE-2008-5358, CVE-2008-5357,
CVE-2008-5356, CVE-2008-5344, CVE-2008-5343, CVE-2008-5342,
CVE-2008-5341, CVE-2008-5340, CVE-2008-5339, CVE-2008-2086,
CVE-2008-5355, CVE-2008-5354, CVE-2008-5353, CVE-2008-5352,
CVE-2008-5351, CVE-2008-5350, CVE-2008-5349, CVE-2008-5348,
CVE-2008-5347, CVE-2008-5345, CVE-2008-5346)
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Java using programs after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/java-1_6_0-s…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/java-1_6_0-s…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_5_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/java-1_6_0-s…
Sources:
openSUSE 11.1:
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/java-1_5_0-su…
http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/java-1_6_0-su…
openSUSE 11.0:
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/java-1_5_0-su…
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/java-1_6_0-su…
openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/java-1_5_0-su…
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/java-1_6_0-su…
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
Open Enterprise Server
http://download.novell.com/index.jsp?search=Search&keywords=f60c68e2df1e78d…
Novell Linux POS 9
http://download.novell.com/index.jsp?search=Search&keywords=f60c68e2df1e78d…
Novell Linux Desktop 9
http://download.novell.com/index.jsp?search=Search&keywords=f60c68e2df1e78d…
SUSE SLES 9
http://download.novell.com/index.jsp?search=Search&keywords=f60c68e2df1e78d…
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=3a14f0adb0cbe69…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=3a14f0adb0cbe69…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSWdj5Hey5gA9JdPZAQLDNgf/ZJc8rIKAgNXcVDMcRdhnIIrtzc0XHYun
5a+uyWV0WNM/yVmhfSx/EhyiFzLXFC23h3ncwxDUfd2p7P0+LDTy9UQpn18QdWjz
mxi1i0kCbAB9YVY/JKr0RaZBomo2KZNErsyP5bpkiIj6dXBe71BXjJrx6riAimj3
Gc+bB72ZVVLdbPWBaR1xpM2USwgimoTsfn6dQnin9Vsc6AhGCVYDyUWhPNqpdrNb
VJ7etD1IwEjLx12MyFlV7gSqR8+nwEx+jDkKzwIShe48mp3y1VeLh1zOfOtqLfz5
nnj9LNco86IxJtEmVd6sRuisYWOBn5OiTGvrgiB5YDKoIDZFL3YoSA==
=Kx/o
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0