openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
March 2009
- 2 participants
- 6 discussions
[security-announce] SUSE Security Announcement: acroread (SUSE-SA:2009:014)
by Ludwig Nussel 27 Mar '09
by Ludwig Nussel 27 Mar '09
27 Mar '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: acroread
Announcement ID: SUSE-SA:2009:014
Date: Fri, 27 Mar 2009 14:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE Linux Enterprise Desktop 10 SP2
SLED 11
Novell Linux Desktop 9
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2009-0193, CVE-2009-0658, CVE-2009-0927
CVE-2009-0928, CVE-2009-1061, CVE-2009-1062
Content of This Advisory:
1) Security Vulnerability Resolved:
Adobe Reader code execution
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- see SUSE Security Summary Report
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Multiple flaws in the JBIG2 decoder and the JavaScript engine of the
Adobe Reader allowed attackers to crash acroread or even execute
arbitrary code by tricking users into opening specially crafted PDF
files.
Please find more details at Adobe's site:
http://www.adobe.com/support/security/bulletins/apsb09-04.html
Note that Adobe did not provide updates for Adobe Reader 7 as used
on NLD9. We cannot upgrade to newer versions due to library
dependencies. We strongly encourage users of acroread on NLD9 to
uninstall the package and to use an alternative, open source pdf
viewer instead. We're currently evaluating the possibility of
disabling acroread on NLD9 via online update.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of acroread after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/i586/acroread-8.1.4-0.1.1.i586…
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/i586/acroread-8.1.4-0.1.i586.r…
openSUSE 10.3:
http://download.opensuse.org/update/10.3/rpm/i586/acroread-8.1.4-0.1.i586.r…
Sources:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/src/acroread-8.1.4-0.1.1.nosrc…
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/src/acroread-8.1.4-0.1.nosrc.r…
openSUSE 10.3:
http://download.opensuse.org/update/10.3/rpm/src/acroread-8.1.4-0.1.nosrc.r…
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=9d9b560bfc9ce2b…
SLED 11
http://download.novell.com/index.jsp?search=Search&keywords=a04133df2de1f0d…
SLES 11 DEBUGINFO
http://download.novell.com/index.jsp?search=Search&keywords=a04133df2de1f0d…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- see SUSE Security Summary Report
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSczR0Xey5gA9JdPZAQLm/ggAlJjs44cI3NCvjGrrj2P3P2pCRS5lS5CS
f+SqXd8vW2tRrxWVf2ovRLpACpJuumjihVjTezShGJvT2nQOlkVrxaVvWsMZXsOB
8YcqZ5oPnUrDDbd3j1wbQ67QPKIt23ODEIPfoC0zVbI9IiGWNwisnWE1TRHaQmo2
FFPsZRPKXz4kO0VN8bmYoWDJWGeE07zBUTYDqKxR0YlMvQKZT1v02FpsoG7t5iG1
UxPwgpLtI4+z1CxCbD4a/FqB06F0L72VS4Y1+qdguA0CjvyDsLrg0/JMwH/KuLi5
fIU364wZaMeWZgTTM3NNGmsK05RR0vfqsqFKRi6WqtOoRO8nLVbsCw==
=heH2
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
24 Mar '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:007
Date: Tue, 24 Mar 2009 16:00:00 +0000
Cross-References: CVE-2007-6018, CVE-2008-2364, CVE-2008-2712
CVE-2008-3074, CVE-2008-3075, CVE-2008-3076
CVE-2008-4677, CVE-2008-5917, CVE-2008-6235
CVE-2009-0115, CVE-2009-0499, CVE-2009-0500
CVE-2009-0501, CVE-2009-0502, CVE-2009-0581
CVE-2009-0583, CVE-2009-0584, CVE-2009-0723
CVE-2009-0733, CVE-2009-0914, CVE-2009-0915
CVE-2009-0916, CVE-2009-0930, CVE-2009-0932
Content of this advisory:
1) Solved Security Vulnerabilities:
- vim, gvim
- apache2
- opera
- multipath tools
- java-1_6_0-openjdk
- imp
- horde
- lcms
- moodle
- ghostscript
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
- NetworkManager
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- vim, gvim
The VI Improved editor (vim) was prone to several security problems:
CVE-2008-4677: The netrw plugin sent credentials to all servers.
CVE-2008-2712: Arbitrary code execution in vim helper plugins
filetype, zip, xpm, gzip and netrw.
CVE-2008-3074: tarplugin code injection
CVE-2008-3075: zipplugin code injection
CVE-2008-3076: several netrw bugs, code injection
CVE-2008-6235: code injection in the netrw plugin
CVE-2008-4677: credential disclosure by netrw plugin
Affected Products: openSUSE 10.3-11.1, SLES9, SLES10
On openSUSE vim was upgraded to version 7.2.108 to fix those issues.
SLES9 and 10 were only affected by a subset, patches were backported
to fix the problems.
- apache2
A DoS condition in apache2's mod_proxy has been fixed
(CVE-2008-2364).
Affected Products: openSUSE 10.3
- opera
Opera 9.64 is a recommended security and stability upgrade,
incorporating the Opera Presto 2.1.1 user agent engine. Opera highly
recommends all users to upgrade to Opera 9.64 to take advantage of
these improvements (CVE-2009-0914, CVE-2009-0915, CVE-2009-0916).
A detailed changelog can be found at
http://www.opera.com/docs/changelogs/linux/964/
- multipath tools
/var/run/multipathd.sock was world-writable allowing local users to
issue commands to the multipath daemon (CVE-2009-0115).
Affected Products: openSUSE 10.3-11.0, SLES10
- java-1_6_0-openjdk
Specially crafted image files could cause an integer overflow in the
lcms library contained in openjdk. Attackers could potentially
exploit that to crash applications using lcms or even execute
arbitrary code (CVE-2009-0723, CVE-2009-0581, CVE-2009-0733).
Previous update packages contained broken dependencies and couldn't
be installed. Therefore the update had to be re-released.
Affected Products: openSUSE 11.0 and 11.1
- imp
Version update to IMP 4.1.6 fixes a problem with validating HTTP requests that
allowed attackers to delete emails (CVE-2007-6018) and some
cross-site-scripting issues (CVE-2009-0930).
Affected Products: openSUSE 10.3-11.0
- horde
Version update to horde 3.1.9 fixes a cross-site-scripting (XSS) issue
(CVE-2008-5917) and an include file problem (CVE-2009-0932).
Affected Products: openSUSE 10.3-11.0
- lcms
Specially crafted image files could cause an integer overflow in
lcms. Attackers could potentially exploit that to crash applications
using lcms or even execute arbitrary code (CVE-2009-0723,
CVE-2009-0581, CVE-2009-0733).
Affected Products: openSUSE 10.3-11.1, SLES9, SLES10
- moodle
moodle was prone to several cross-site-scripting (XSS) and
cross-site-request-forgery (CSRF) problems (CVE-2009-0499, CVE-2009-0500,
CVE-2009-0501, CVE-2009-0502).
Affected Products: openSUSE 10.3-11.0
- ghostscript
Integer overflows and missing upper bounds checks in Ghostscript's
ICC library potentially allowed attackers to crash Ghostscript or
even cause execution of arbitrary code via specially crafted PS or
PDF files (CVE-2009-0583, CVE-2009-0584).
Affected Products: openSUSE 10.3-11.0, SLES9, SLES10
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
- NetworkManager
The NetworkManager update caused WLAN to stop working on some
systems. Those systems most likely have a stale directory
/var/run/dbus/at_console/root. It's most likely a leftover from a
root session. Removing the directory and restarting networking
should fix the problems. Please avoid logging in as root in the future.
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBScj9xXey5gA9JdPZAQKaAAf8DLJXnrQLYk3CctL9DwtlmABMxi5/14b9
8zTSHc/M8MzlkLDvW9WS6fhDGN2NBXuOq2yZ5+v3LuwwYmp9575cPXEWzNtPYobf
IDgWDlDfRpXK5sRgkbr7OA8DOxALAJ+iuJCQNrSQeX0SXOQIgsJd3UfqqysSmXPN
E5eOSDOOmpiAHpWcSm9Nt/ql99JgOsOX1nDR/sztlFotq31VzR6vx9F85sTnuj+I
/0UV7eo/hVt3DsGx20rqh5+iU1vl/Ii+Rvs7tGj3Cu46qYxjfJUo5AE1W2zDEAWf
e7GUrscGxGfL9gpSJf0yLlEmFJcwFRXrrruxhWXqT6zNrEvL3WsnOQ==
=Tqs/
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: dbus-1 (SUSE-SA:2009:013)
by Ludwig Nussel 17 Mar '09
by Ludwig Nussel 17 Mar '09
17 Mar '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: dbus-1, hal, NetworkManager, PackageKit, ...
Announcement ID: SUSE-SA:2009:013
Date: Tue, 17 Mar 2009 16:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SLE SDK 10 SP2
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2008-4311, CVE-2009-0365, CVE-2009-0578
Content of This Advisory:
1) Security Vulnerability Resolved:
DBus access control bypass
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- NetworkManager, NetworkManager-gnome, NetworkManager-kde
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Joachim Breitner discovered that the default DBus system policy was
too permissive. In fact the default policy was to allow all calls on
the bus. Many services expected that the default was to deny
everything and therefore only installed rules that explicitly allow
certain calls with the result that intended access control for some
services was not applied.
The updated DBus package now installs a new policy that denies
access by default. Unfortunately some DBus services actually relied
on the insecure default setting and break with the new policy.
Therefore quite a number of packages is affected by this DBus
update.
The updated DBus daemon now logs access violations via syslog. If
you see log entries about rejected messages of type "method_call"
during normal operation the application that caused it likely needs
an updated DBus policy. Please contact the application vendor in
this case.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
The new DBus policy is applied immediately to new connections so it
is advisable to apply the update for the affected packages in the
same update run as DBus.
To enable the syslog code the dbus-daemon needs to be restarted.
Doing so in the running system is not recommended so please reboot
the system after applying all updates.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/debug/update/11.1/rpm/i586/ConsoleKit-debuginf…
http://download.opensuse.org/debug/update/11.1/rpm/i586/ConsoleKit-debugsou…
http://download.opensuse.org/debug/update/11.1/rpm/i586/PackageKit-debuginf…
http://download.opensuse.org/debug/update/11.1/rpm/i586/PackageKit-debugsou…
http://download.opensuse.org/debug/update/11.1/rpm/i586/PolicyKit-debuginfo…
http://download.opensuse.org/debug/update/11.1/rpm/i586/PolicyKit-debugsour…
http://download.opensuse.org/debug/update/11.1/rpm/i586/bluez-debuginfo-4.2…
http://download.opensuse.org/debug/update/11.1/rpm/i586/bluez-debugsource-4…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-debuginfo-1.…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-debugsource-…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-glib-debugin…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-glib-debugso…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-python-debug…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-python-debug…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-qt3-debuginf…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-qt3-debugsou…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-x11-debuginf…
http://download.opensuse.org/debug/update/11.1/rpm/i586/dbus-1-x11-debugsou…
http://download.opensuse.org/debug/update/11.1/rpm/i586/hal-debuginfo-0.5.1…
http://download.opensuse.org/debug/update/11.1/rpm/i586/hal-debugsource-0.5…
http://download.opensuse.org/debug/update/11.1/rpm/i586/pommed-debuginfo-1.…
http://download.opensuse.org/debug/update/11.1/rpm/i586/pommed-debugsource-…
http://download.opensuse.org/update/11.1/rpm/i586/ConsoleKit-0.2.10-60.26.1…
http://download.opensuse.org/update/11.1/rpm/i586/ConsoleKit-devel-0.2.10-6…
http://download.opensuse.org/update/11.1/rpm/i586/ConsoleKit-x11-0.2.10-60.…
http://download.opensuse.org/update/11.1/rpm/i586/PackageKit-0.3.11-1.13.1.…
http://download.opensuse.org/update/11.1/rpm/i586/PackageKit-devel-0.3.11-1…
http://download.opensuse.org/update/11.1/rpm/i586/PackageKit-lang-0.3.11-1.…
http://download.opensuse.org/update/11.1/rpm/i586/PolicyKit-0.9-13.17.1.i58…
http://download.opensuse.org/update/11.1/rpm/i586/PolicyKit-devel-0.9-13.17…
http://download.opensuse.org/update/11.1/rpm/i586/bluez-4.22-6.1.1.i586.rpm
http://download.opensuse.org/update/11.1/rpm/i586/bluez-alsa-4.22-6.1.1.i58…
http://download.opensuse.org/update/11.1/rpm/i586/bluez-compat-4.22-6.1.1.i…
http://download.opensuse.org/update/11.1/rpm/i586/bluez-cups-4.22-6.1.1.i58…
http://download.opensuse.org/update/11.1/rpm/i586/bluez-devel-4.22-6.1.1.i5…
http://download.opensuse.org/update/11.1/rpm/i586/bluez-test-4.22-6.1.1.i58…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-1.2.10-5.3.1.i586.…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-devel-1.2.10-5.3.1…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-devel-doc-1.2.10-5…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-glib-0.76-32.33.1.…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-glib-devel-0.76-32…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-glib-doc-0.76-32.3…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-mono-0.63-118.117.…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-python-0.83.0-22.2…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-python-devel-0.83.…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-qt3-0.62-221.222.1…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-qt3-devel-0.62-221…
http://download.opensuse.org/update/11.1/rpm/i586/dbus-1-x11-1.2.10-5.3.1.i…
http://download.opensuse.org/update/11.1/rpm/i586/gpomme-1.22-1.15.1.i586.r…
http://download.opensuse.org/update/11.1/rpm/i586/hal-0.5.12-10.13.1.i586.r…
http://download.opensuse.org/update/11.1/rpm/i586/hal-devel-0.5.12-10.13.1.…
http://download.opensuse.org/update/11.1/rpm/i586/libbluetooth3-4.22-6.1.1.…
http://download.opensuse.org/update/11.1/rpm/i586/libpackagekit-glib10-0.3.…
http://download.opensuse.org/update/11.1/rpm/i586/libpackagekit-glib10-deve…
http://download.opensuse.org/update/11.1/rpm/i586/libpackagekit-qt10-0.3.11…
http://download.opensuse.org/update/11.1/rpm/i586/libpackagekit-qt10-devel-…
http://download.opensuse.org/update/11.1/rpm/i586/pommed-1.22-1.15.1.i586.r…
http://download.opensuse.org/update/11.1/rpm/i586/wmpomme-1.22-1.15.1.i586.…
openSUSE 11.0:
http://download.opensuse.org/debug/update/11.0/rpm/i586/ConsoleKit-debuginf…
http://download.opensuse.org/debug/update/11.0/rpm/i586/ConsoleKit-debugsou…
http://download.opensuse.org/debug/update/11.0/rpm/i586/PackageKit-debuginf…
http://download.opensuse.org/debug/update/11.0/rpm/i586/PackageKit-debugsou…
http://download.opensuse.org/debug/update/11.0/rpm/i586/PolicyKit-debuginfo…
http://download.opensuse.org/debug/update/11.0/rpm/i586/PolicyKit-debugsour…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-debuginfo-1.…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-debugsource-…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-glib-debugin…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-glib-debugso…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-python-debug…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-python-debug…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-qt3-debuginf…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-qt3-debugsou…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-x11-debuginf…
http://download.opensuse.org/debug/update/11.0/rpm/i586/dbus-1-x11-debugsou…
http://download.opensuse.org/debug/update/11.0/rpm/i586/hal-debuginfo-0.5.1…
http://download.opensuse.org/debug/update/11.0/rpm/i586/hal-debugsource-0.5…
http://download.opensuse.org/debug/update/11.0/rpm/i586/pommed-debuginfo-1.…
http://download.opensuse.org/debug/update/11.0/rpm/i586/pommed-debugsource-…
http://download.opensuse.org/debug/update/11.0/rpm/i586/powersave-debuginfo…
http://download.opensuse.org/debug/update/11.0/rpm/i586/powersave-debugsour…
http://download.opensuse.org/update/11.0/rpm/i586/ConsoleKit-0.2.10-14.4.i5…
http://download.opensuse.org/update/11.0/rpm/i586/ConsoleKit-devel-0.2.10-1…
http://download.opensuse.org/update/11.0/rpm/i586/ConsoleKit-x11-0.2.10-14.…
http://download.opensuse.org/update/11.0/rpm/i586/PackageKit-0.2.1-15.10.i5…
http://download.opensuse.org/update/11.0/rpm/i586/PackageKit-devel-0.2.1-15…
http://download.opensuse.org/update/11.0/rpm/i586/PolicyKit-0.8-14.2.i586.r…
http://download.opensuse.org/update/11.0/rpm/i586/PolicyKit-devel-0.8-14.2.…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-1.2.1-15.4.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-devel-1.2.1-15.4.i…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-devel-doc-1.2.1-15…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-glib-0.74-88.1.i58…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-glib-devel-0.74-88…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-glib-doc-0.74-88.1…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-mono-0.63-154.1.i5…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-python-0.82.4-49.1…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-python-devel-0.82.…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-qt3-0.62-179.1.i58…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-qt3-devel-0.62-179…
http://download.opensuse.org/update/11.0/rpm/i586/dbus-1-x11-1.2.1-18.4.i58…
http://download.opensuse.org/update/11.0/rpm/i586/gpomme-1.15-38.2.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/hal-0.5.11-8.4.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/hal-devel-0.5.11-8.4.i586…
http://download.opensuse.org/update/11.0/rpm/i586/pommed-1.15-38.2.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/powersave-0.15.20-38.2.i5…
http://download.opensuse.org/update/11.0/rpm/i586/powersave-devel-0.15.20-3…
http://download.opensuse.org/update/11.0/rpm/i586/powersave-libs-0.15.20-38…
http://download.opensuse.org/update/11.0/rpm/i586/wmpomme-1.15-38.2.i586.rpm
openSUSE 10.3:
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-1.0.2-59.8.i586.rpm
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-devel-1.0.2-59.8.i…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-devel-doc-1.0.2-59…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-glib-0.74-25.2.i58…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-glib-devel-0.74-25…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-glib-doc-0.74-25.2…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-mono-0.63-90.2.i58…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-python-0.82.0-28.2…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-python-devel-0.82.…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-qt3-0.62-110.2.i58…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-qt3-devel-0.62-110…
http://download.opensuse.org/update/10.3/rpm/i586/dbus-1-x11-1.0.2-67.7.i58…
http://download.opensuse.org/update/10.3/rpm/i586/gpomme-1.9-4.2.i586.rpm
http://download.opensuse.org/update/10.3/rpm/i586/hal-0.5.9_git20070831-13.…
http://download.opensuse.org/update/10.3/rpm/i586/hal-devel-0.5.9_git200708…
http://download.opensuse.org/update/10.3/rpm/i586/pommed-1.9-4.2.i586.rpm
http://download.opensuse.org/update/10.3/rpm/i586/powersave-0.15.17-10.3.i5…
http://download.opensuse.org/update/10.3/rpm/i586/powersave-devel-0.15.17-1…
http://download.opensuse.org/update/10.3/rpm/i586/powersave-libs-0.15.17-10…
http://download.opensuse.org/update/10.3/rpm/i586/wmpomme-1.9-4.2.i586.rpm
Power PC Platform:
openSUSE 11.1:
http://download.opensuse.org/debug/update/11.1/rpm/ppc/ConsoleKit-debuginfo…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/ConsoleKit-debugsour…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/PackageKit-debuginfo…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/PackageKit-debugsour…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/PolicyKit-debuginfo-…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/PolicyKit-debugsourc…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/bluez-debuginfo-4.22…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/bluez-debugsource-4.…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-debuginfo-1.2…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-debuginfo-64b…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-debugsource-1…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-glib-debuginf…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-glib-debuginf…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-glib-debugsou…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-python-debugi…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-python-debugs…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-qt3-debuginfo…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-qt3-debugsour…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-x11-debuginfo…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/dbus-1-x11-debugsour…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/hal-debuginfo-0.5.12…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/hal-debuginfo-64bit-…
http://download.opensuse.org/debug/update/11.1/rpm/ppc/hal-debugsource-0.5.…
http://download.opensuse.org/update/11.1/rpm/ppc/ConsoleKit-0.2.10-60.26.1.…
http://download.opensuse.org/update/11.1/rpm/ppc/ConsoleKit-64bit-0.2.10-60…
http://download.opensuse.org/update/11.1/rpm/ppc/ConsoleKit-devel-0.2.10-60…
http://download.opensuse.org/update/11.1/rpm/ppc/ConsoleKit-x11-0.2.10-60.2…
http://download.opensuse.org/update/11.1/rpm/ppc/PackageKit-0.3.11-1.13.1.p…
http://download.opensuse.org/update/11.1/rpm/ppc/PackageKit-devel-0.3.11-1.…
http://download.opensuse.org/update/11.1/rpm/ppc/PackageKit-lang-0.3.11-1.1…
http://download.opensuse.org/update/11.1/rpm/ppc/PolicyKit-0.9-13.17.1.ppc.…
http://download.opensuse.org/update/11.1/rpm/ppc/PolicyKit-64bit-0.9-13.17.…
http://download.opensuse.org/update/11.1/rpm/ppc/PolicyKit-devel-0.9-13.17.…
http://download.opensuse.org/update/11.1/rpm/ppc/bluez-4.22-6.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/bluez-alsa-4.22-6.1.1.ppc.…
http://download.opensuse.org/update/11.1/rpm/ppc/bluez-compat-4.22-6.1.1.pp…
http://download.opensuse.org/update/11.1/rpm/ppc/bluez-cups-4.22-6.1.1.ppc.…
http://download.opensuse.org/update/11.1/rpm/ppc/bluez-devel-4.22-6.1.1.ppc…
http://download.opensuse.org/update/11.1/rpm/ppc/bluez-test-4.22-6.1.1.ppc.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-1.2.10-5.3.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-64bit-1.2.10-5.3.1.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-devel-1.2.10-5.3.1.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-devel-doc-1.2.10-5.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-glib-0.76-32.33.1.p…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-glib-64bit-0.76-32.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-glib-devel-0.76-32.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-glib-doc-0.76-32.33…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-mono-0.63-118.117.1…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-python-0.83.0-22.22…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-python-devel-0.83.0…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-qt3-0.62-221.222.1.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-qt3-64bit-0.62-221.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-qt3-devel-0.62-221.…
http://download.opensuse.org/update/11.1/rpm/ppc/dbus-1-x11-1.2.10-5.3.1.pp…
http://download.opensuse.org/update/11.1/rpm/ppc/hal-0.5.12-10.13.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/hal-64bit-0.5.12-10.13.1.p…
http://download.opensuse.org/update/11.1/rpm/ppc/hal-devel-0.5.12-10.13.1.p…
http://download.opensuse.org/update/11.1/rpm/ppc/libbluetooth3-4.22-6.1.1.p…
http://download.opensuse.org/update/11.1/rpm/ppc/libpackagekit-glib10-0.3.1…
http://download.opensuse.org/update/11.1/rpm/ppc/libpackagekit-glib10-devel…
http://download.opensuse.org/update/11.1/rpm/ppc/libpackagekit-qt10-0.3.11-…
http://download.opensuse.org/update/11.1/rpm/ppc/libpackagekit-qt10-devel-0…
openSUSE 11.0:
http://download.opensuse.org/debug/update/11.0/rpm/ppc/ConsoleKit-debuginfo…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/ConsoleKit-debugsour…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/PackageKit-debuginfo…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/PackageKit-debugsour…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/PolicyKit-debuginfo-…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/PolicyKit-debugsourc…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-debuginfo-1.2…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-debugsource-1…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-glib-debuginf…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-glib-debugsou…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-python-debugi…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-python-debugs…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-qt3-debuginfo…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-qt3-debugsour…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-x11-debuginfo…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/dbus-1-x11-debugsour…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/hal-debuginfo-0.5.11…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/hal-debugsource-0.5.…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/powersave-debuginfo-…
http://download.opensuse.org/debug/update/11.0/rpm/ppc/powersave-debugsourc…
http://download.opensuse.org/update/11.0/rpm/ppc/ConsoleKit-0.2.10-14.4.ppc…
http://download.opensuse.org/update/11.0/rpm/ppc/ConsoleKit-64bit-0.2.10-14…
http://download.opensuse.org/update/11.0/rpm/ppc/ConsoleKit-devel-0.2.10-14…
http://download.opensuse.org/update/11.0/rpm/ppc/ConsoleKit-x11-0.2.10-14.4…
http://download.opensuse.org/update/11.0/rpm/ppc/PackageKit-0.2.1-15.10.ppc…
http://download.opensuse.org/update/11.0/rpm/ppc/PackageKit-devel-0.2.1-15.…
http://download.opensuse.org/update/11.0/rpm/ppc/PolicyKit-0.8-14.2.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/PolicyKit-64bit-0.8-14.2.p…
http://download.opensuse.org/update/11.0/rpm/ppc/PolicyKit-devel-0.8-14.2.p…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-1.2.1-15.4.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-64bit-1.2.1-15.4.pp…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-devel-1.2.1-15.4.pp…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-devel-doc-1.2.1-15.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-glib-0.74-88.1.ppc.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-glib-64bit-0.74-88.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-glib-devel-0.74-88.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-glib-doc-0.74-88.1.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-mono-0.63-154.1.ppc…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-python-0.82.4-49.1.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-python-devel-0.82.4…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-qt3-0.62-179.1.ppc.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-qt3-64bit-0.62-179.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-qt3-devel-0.62-179.…
http://download.opensuse.org/update/11.0/rpm/ppc/dbus-1-x11-1.2.1-18.4.ppc.…
http://download.opensuse.org/update/11.0/rpm/ppc/hal-0.5.11-8.4.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/hal-64bit-0.5.11-8.4.ppc.r…
http://download.opensuse.org/update/11.0/rpm/ppc/hal-devel-0.5.11-8.4.ppc.r…
http://download.opensuse.org/update/11.0/rpm/ppc/powersave-0.15.20-38.2.ppc…
http://download.opensuse.org/update/11.0/rpm/ppc/powersave-devel-0.15.20-38…
http://download.opensuse.org/update/11.0/rpm/ppc/powersave-libs-0.15.20-38.…
http://download.opensuse.org/update/11.0/rpm/ppc/powersave-libs-64bit-0.15.…
openSUSE 10.3:
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-1.0.2-59.8.ppc.rpm
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-64bit-1.0.2-59.8.pp…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-devel-1.0.2-59.8.pp…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-devel-doc-1.0.2-59.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-glib-0.74-25.2.ppc.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-glib-64bit-0.74-25.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-glib-devel-0.74-25.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-glib-doc-0.74-25.2.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-mono-0.63-90.2.ppc.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-python-0.82.0-28.2.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-python-devel-0.82.0…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-qt3-0.62-110.2.ppc.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-qt3-64bit-0.62-110.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-qt3-devel-0.62-110.…
http://download.opensuse.org/update/10.3/rpm/ppc/dbus-1-x11-1.0.2-67.7.ppc.…
http://download.opensuse.org/update/10.3/rpm/ppc/hal-0.5.9_git20070831-13.5…
http://download.opensuse.org/update/10.3/rpm/ppc/hal-64bit-0.5.9_git2007083…
http://download.opensuse.org/update/10.3/rpm/ppc/hal-devel-0.5.9_git2007083…
http://download.opensuse.org/update/10.3/rpm/ppc/powersave-0.15.17-10.3.ppc…
http://download.opensuse.org/update/10.3/rpm/ppc/powersave-devel-0.15.17-10…
http://download.opensuse.org/update/10.3/rpm/ppc/powersave-libs-0.15.17-10.…
http://download.opensuse.org/update/10.3/rpm/ppc/powersave-libs-64bit-0.15.…
x86-64 Platform:
openSUSE 11.1:
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/ConsoleKit-debugi…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/ConsoleKit-debugs…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/PackageKit-debugi…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/PackageKit-debugs…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/PolicyKit-debugin…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/PolicyKit-debugso…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/bluez-debuginfo-4…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/bluez-debugsource…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-debuginfo-…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-debuginfo-…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-debugsourc…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-glib-debug…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-glib-debug…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-glib-debug…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-python-deb…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-python-deb…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-qt3-debugi…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-qt3-debugs…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-x11-debugi…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/dbus-1-x11-debugs…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/hal-debuginfo-0.5…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/hal-debuginfo-32b…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/hal-debugsource-0…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/pommed-debuginfo-…
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/pommed-debugsourc…
http://download.opensuse.org/update/11.1/rpm/x86_64/ConsoleKit-0.2.10-60.26…
http://download.opensuse.org/update/11.1/rpm/x86_64/ConsoleKit-32bit-0.2.10…
http://download.opensuse.org/update/11.1/rpm/x86_64/ConsoleKit-devel-0.2.10…
http://download.opensuse.org/update/11.1/rpm/x86_64/ConsoleKit-x11-0.2.10-6…
http://download.opensuse.org/update/11.1/rpm/x86_64/PackageKit-0.3.11-1.13.…
http://download.opensuse.org/update/11.1/rpm/x86_64/PackageKit-devel-0.3.11…
http://download.opensuse.org/update/11.1/rpm/x86_64/PackageKit-lang-0.3.11-…
http://download.opensuse.org/update/11.1/rpm/x86_64/PolicyKit-0.9-13.17.1.x…
http://download.opensuse.org/update/11.1/rpm/x86_64/PolicyKit-32bit-0.9-13.…
http://download.opensuse.org/update/11.1/rpm/x86_64/PolicyKit-devel-0.9-13.…
http://download.opensuse.org/update/11.1/rpm/x86_64/bluez-4.22-6.1.1.x86_64…
http://download.opensuse.org/update/11.1/rpm/x86_64/bluez-alsa-4.22-6.1.1.x…
http://download.opensuse.org/update/11.1/rpm/x86_64/bluez-compat-4.22-6.1.1…
http://download.opensuse.org/update/11.1/rpm/x86_64/bluez-cups-4.22-6.1.1.x…
http://download.opensuse.org/update/11.1/rpm/x86_64/bluez-devel-4.22-6.1.1.…
http://download.opensuse.org/update/11.1/rpm/x86_64/bluez-test-4.22-6.1.1.x…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-1.2.10-5.3.1.x86…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-32bit-1.2.10-5.3…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-devel-1.2.10-5.3…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-devel-doc-1.2.10…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-glib-0.76-32.33.…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-glib-32bit-0.76-…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-glib-devel-0.76-…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-glib-doc-0.76-32…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-mono-0.63-118.11…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-python-0.83.0-22…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-python-devel-0.8…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-qt3-0.62-221.222…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-qt3-32bit-0.62-2…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-qt3-devel-0.62-2…
http://download.opensuse.org/update/11.1/rpm/x86_64/dbus-1-x11-1.2.10-5.3.1…
http://download.opensuse.org/update/11.1/rpm/x86_64/gpomme-1.22-1.15.1.x86_…
http://download.opensuse.org/update/11.1/rpm/x86_64/hal-0.5.12-10.13.1.x86_…
http://download.opensuse.org/update/11.1/rpm/x86_64/hal-32bit-0.5.12-10.13.…
http://download.opensuse.org/update/11.1/rpm/x86_64/hal-devel-0.5.12-10.13.…
http://download.opensuse.org/update/11.1/rpm/x86_64/libbluetooth3-4.22-6.1.…
http://download.opensuse.org/update/11.1/rpm/x86_64/libpackagekit-glib10-0.…
http://download.opensuse.org/update/11.1/rpm/x86_64/libpackagekit-glib10-de…
http://download.opensuse.org/update/11.1/rpm/x86_64/libpackagekit-qt10-0.3.…
http://download.opensuse.org/update/11.1/rpm/x86_64/libpackagekit-qt10-deve…
http://download.opensuse.org/update/11.1/rpm/x86_64/pommed-1.22-1.15.1.x86_…
http://download.opensuse.org/update/11.1/rpm/x86_64/wmpomme-1.22-1.15.1.x86…
openSUSE 11.0:
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/ConsoleKit-debugi…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/ConsoleKit-debugs…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/PackageKit-debugi…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/PackageKit-debugs…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/PolicyKit-debugin…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/PolicyKit-debugso…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-debuginfo-…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-debugsourc…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-glib-debug…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-glib-debug…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-python-deb…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-python-deb…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-qt3-debugi…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-qt3-debugs…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-x11-debugi…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/dbus-1-x11-debugs…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/hal-debuginfo-0.5…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/hal-debugsource-0…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/pommed-debuginfo-…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/pommed-debugsourc…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/powersave-debugin…
http://download.opensuse.org/debug/update/11.0/rpm/x86_64/powersave-debugso…
http://download.opensuse.org/update/11.0/rpm/x86_64/ConsoleKit-0.2.10-14.4.…
http://download.opensuse.org/update/11.0/rpm/x86_64/ConsoleKit-32bit-0.2.10…
http://download.opensuse.org/update/11.0/rpm/x86_64/ConsoleKit-devel-0.2.10…
http://download.opensuse.org/update/11.0/rpm/x86_64/ConsoleKit-x11-0.2.10-1…
http://download.opensuse.org/update/11.0/rpm/x86_64/PackageKit-0.2.1-15.10.…
http://download.opensuse.org/update/11.0/rpm/x86_64/PackageKit-devel-0.2.1-…
http://download.opensuse.org/update/11.0/rpm/x86_64/PolicyKit-0.8-14.2.x86_…
http://download.opensuse.org/update/11.0/rpm/x86_64/PolicyKit-32bit-0.8-14.…
http://download.opensuse.org/update/11.0/rpm/x86_64/PolicyKit-devel-0.8-14.…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-1.2.1-15.4.x86_6…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-32bit-1.2.1-15.4…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-devel-1.2.1-15.4…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-devel-doc-1.2.1-…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-glib-0.74-88.1.x…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-glib-32bit-0.74-…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-glib-devel-0.74-…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-glib-doc-0.74-88…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-mono-0.63-154.1.…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-python-0.82.4-49…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-python-devel-0.8…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-qt3-0.62-179.1.x…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-qt3-32bit-0.62-1…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-qt3-devel-0.62-1…
http://download.opensuse.org/update/11.0/rpm/x86_64/dbus-1-x11-1.2.1-18.4.x…
http://download.opensuse.org/update/11.0/rpm/x86_64/gpomme-1.15-38.2.x86_64…
http://download.opensuse.org/update/11.0/rpm/x86_64/hal-0.5.11-8.4.x86_64.r…
http://download.opensuse.org/update/11.0/rpm/x86_64/hal-32bit-0.5.11-8.4.x8…
http://download.opensuse.org/update/11.0/rpm/x86_64/hal-devel-0.5.11-8.4.x8…
http://download.opensuse.org/update/11.0/rpm/x86_64/pommed-1.15-38.2.x86_64…
http://download.opensuse.org/update/11.0/rpm/x86_64/powersave-0.15.20-38.2.…
http://download.opensuse.org/update/11.0/rpm/x86_64/powersave-devel-0.15.20…
http://download.opensuse.org/update/11.0/rpm/x86_64/powersave-libs-0.15.20-…
http://download.opensuse.org/update/11.0/rpm/x86_64/powersave-libs-32bit-0.…
http://download.opensuse.org/update/11.0/rpm/x86_64/wmpomme-1.15-38.2.x86_6…
openSUSE 10.3:
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-1.0.2-59.8.x86_6…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-32bit-1.0.2-59.8…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-devel-1.0.2-59.8…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-devel-doc-1.0.2-…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-glib-0.74-25.2.x…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-glib-32bit-0.74-…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-glib-devel-0.74-…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-glib-doc-0.74-25…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-mono-0.63-90.2.x…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-python-0.82.0-28…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-python-devel-0.8…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-qt3-0.62-110.2.x…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-qt3-32bit-0.62-1…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-qt3-devel-0.62-1…
http://download.opensuse.org/update/10.3/rpm/x86_64/dbus-1-x11-1.0.2-67.7.x…
http://download.opensuse.org/update/10.3/rpm/x86_64/gpomme-1.9-4.2.x86_64.r…
http://download.opensuse.org/update/10.3/rpm/x86_64/hal-0.5.9_git20070831-1…
http://download.opensuse.org/update/10.3/rpm/x86_64/hal-32bit-0.5.9_git2007…
http://download.opensuse.org/update/10.3/rpm/x86_64/hal-devel-0.5.9_git2007…
http://download.opensuse.org/update/10.3/rpm/x86_64/pommed-1.9-4.2.x86_64.r…
http://download.opensuse.org/update/10.3/rpm/x86_64/powersave-0.15.17-10.3.…
http://download.opensuse.org/update/10.3/rpm/x86_64/powersave-devel-0.15.17…
http://download.opensuse.org/update/10.3/rpm/x86_64/powersave-libs-0.15.17-…
http://download.opensuse.org/update/10.3/rpm/x86_64/powersave-libs-32bit-0.…
http://download.opensuse.org/update/10.3/rpm/x86_64/wmpomme-1.9-4.2.x86_64.…
Sources:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/src/ConsoleKit-0.2.10-60.26.1.…
http://download.opensuse.org/update/11.1/rpm/src/PackageKit-0.3.11-1.13.1.s…
http://download.opensuse.org/update/11.1/rpm/src/PolicyKit-0.9-13.17.1.src.…
http://download.opensuse.org/update/11.1/rpm/src/bluez-4.22-6.1.1.src.rpm
http://download.opensuse.org/update/11.1/rpm/src/dbus-1-1.2.10-5.3.1.src.rpm
http://download.opensuse.org/update/11.1/rpm/src/dbus-1-glib-0.76-32.33.1.s…
http://download.opensuse.org/update/11.1/rpm/src/dbus-1-mono-0.63-118.117.1…
http://download.opensuse.org/update/11.1/rpm/src/dbus-1-python-0.83.0-22.22…
http://download.opensuse.org/update/11.1/rpm/src/dbus-1-qt3-0.62-221.222.1.…
http://download.opensuse.org/update/11.1/rpm/src/dbus-1-x11-1.2.10-5.3.1.sr…
http://download.opensuse.org/update/11.1/rpm/src/hal-0.5.12-10.13.1.src.rpm
http://download.opensuse.org/update/11.1/rpm/src/pommed-1.22-1.15.1.src.rpm
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/src/ConsoleKit-0.2.10-14.4.src…
http://download.opensuse.org/update/11.0/rpm/src/PackageKit-0.2.1-15.10.src…
http://download.opensuse.org/update/11.0/rpm/src/PolicyKit-0.8-14.2.src.rpm
http://download.opensuse.org/update/11.0/rpm/src/dbus-1-1.2.1-15.4.src.rpm
http://download.opensuse.org/update/11.0/rpm/src/dbus-1-glib-0.74-88.1.src.…
http://download.opensuse.org/update/11.0/rpm/src/dbus-1-mono-0.63-154.1.src…
http://download.opensuse.org/update/11.0/rpm/src/dbus-1-python-0.82.4-49.1.…
http://download.opensuse.org/update/11.0/rpm/src/dbus-1-qt3-0.62-179.1.src.…
http://download.opensuse.org/update/11.0/rpm/src/dbus-1-x11-1.2.1-18.4.src.…
http://download.opensuse.org/update/11.0/rpm/src/hal-0.5.11-8.4.src.rpm
http://download.opensuse.org/update/11.0/rpm/src/pommed-1.15-38.2.src.rpm
http://download.opensuse.org/update/11.0/rpm/src/powersave-0.15.20-38.2.src…
openSUSE 10.3:
http://download.opensuse.org/update/10.3/rpm/src/dbus-1-1.0.2-59.8.src.rpm
http://download.opensuse.org/update/10.3/rpm/src/dbus-1-glib-0.74-25.2.src.…
http://download.opensuse.org/update/10.3/rpm/src/dbus-1-mono-0.63-90.2.src.…
http://download.opensuse.org/update/10.3/rpm/src/dbus-1-python-0.82.0-28.2.…
http://download.opensuse.org/update/10.3/rpm/src/dbus-1-qt3-0.62-110.2.src.…
http://download.opensuse.org/update/10.3/rpm/src/dbus-1-x11-1.0.2-67.7.src.…
http://download.opensuse.org/update/10.3/rpm/src/hal-0.5.9_git20070831-13.5…
http://download.opensuse.org/update/10.3/rpm/src/pommed-1.9-4.2.src.rpm
http://download.opensuse.org/update/10.3/rpm/src/powersave-0.15.17-10.3.src…
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=61dfb5ba17f6ff5…
http://download.novell.com/index.jsp?search=Search&keywords=311751acc19cbdd…
SLE SDK 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=311751acc19cbdd…
SUSE Linux Enterprise 10 SP2 DEBUGINFO
http://download.novell.com/index.jsp?search=Search&keywords=61dfb5ba17f6ff5…
http://download.novell.com/index.jsp?search=Search&keywords=311751acc19cbdd…
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&keywords=61dfb5ba17f6ff5…
http://download.novell.com/index.jsp?search=Search&keywords=311751acc19cbdd…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- NetworkManager, NetworkManager-gnome, NetworkManager-kde
The NetworkManager configuration was too permissive and allowed any
user to read secrets (CVE-2009-0365) or manipulate the
configuration of other users (CVE-2009-0578).
NetworkManager without the security update breaks due to the DBus
policy change.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSb/KOHey5gA9JdPZAQLi6Af+I42wLsT/mRv/TuwUfj3RmKDBaN1Kz4uI
IvpehJ7dyUU9I0hRcgHW8+x88v08o1Q6eaLuZY+I+bAEF7Gxeis+/s1y0LEtgUjI
VrVkttI7Xuoq//suOkqeqrCaaAUQvNwsfTCIuVb3spWd7Cexs9NsmWks/o/uW8El
3MMV2bT8viJ6zBMFMysHQjjPif9t4pvFh1K0sMOAPSTYSF2wVHpDoVdUt3OEci1U
afsm4mLuWLyePfzFesQyol02y6wq3Mgcwho3R6kCxzgtmGf+bv/3m9UUSyjGQNu2
ImGr3bcDoW+1DscbW5nLgM0sxkb5rtJQWSG1P7WlYtN7zwIy8nHpmQ==
=G7ln
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE Security Announcement: Mozilla Firefox (SUSE-SA:2009:012)
by Marcus Meissner 16 Mar '09
by Marcus Meissner 16 Mar '09
16 Mar '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: MozillaFirefox
Announcement ID: SUSE-SA:2009:012
Date: Mon, 16 Mar 2009 13:00:00 +0000
Affected Products: openSUSE 11.0
openSUSE 11.1
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2009-0040, CVE-2009-0771, CVE-2009-0772
CVE-2009-0773, CVE-2009-0774, CVE-2009-0775
CVE-2009-0776, CVE-2009-0777, MFSA 2009-07
MFSA 2009-08, MFSA 2009-09, MFSA 2009-10
MFSA 2009-11
Content of This Advisory:
1) Security Vulnerability Resolved:
Mozilla Firefox 3.0.7 security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The Mozilla Firefox browser is updated to version 3.0.7 fixing various
security and stability issues.
Updates are provided for openSUSE 11.0 and 11.1 currently, backports
for other Mozilla Firefox browsers and Mozilla Suite programs will
follow.
MFSA 2009-07 / CVE-2009-0771 / CVE-2009-0772 / CVE-2009-0773 /
CVE-2009-0774: Mozilla developers identified and fixed several
stability bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these crashes showed evidence of memory
corruption under certain circumstances and we presume that with enough
effort at least some of these could be exploited to run arbitrary code.
MFSA 2009-08 / CVE-2009-0775: An anonymous researcher, via
TippingPoint's Zero Day Initiative program, reported a vulnerability in
Mozilla's garbage collection process. The vulnerability was caused by
improper memory management of a set of cloned XUL DOM elements which
were linked as a parent and child. After reloading the browser on a
page with such linked elements, the browser would crash when attempting
to access an object which was already destroyed. An attacker could
use this crash to run arbitrary code on the victim's computer.
MFSA 2009-09 / CVE-2009-0776: Mozilla security researcher Georgi
Guninski reported that a website could use nsIRDFService and a
cross-domain redirect to steal arbitrary XML data from another domain,
a violation of the same-origin policy. This vulnerability could be used
by a malicious website to steal private data from users authenticated
to the redirected website.
MFSA 2009-10 / CVE-2009-0040: libpng maintainer Glenn Randers-Pehrson
reported several memory safety hazards in PNG libraries used by
Mozilla. These vulnerabilities could be used by a malicious website
to crash a victim's browser and potentially execute arbitrary code
on their computer. libpng was upgraded to a version which contained
fixes for these flaws.
MFSA 2009-11 / CVE-2009-0777: Mozilla contributor Masahiro Yamada
reported that certain invisible control characters were being decoded
when displayed in the location bar, resulting in fewer visible
characters than were present in the actual location. An attacker
could use this vulnerability to spoof the location bar and display
a misleading URL for their malicious web page.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of Firefox after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/i586/MozillaFirefox-3.0.7-1.1.…
http://download.opensuse.org/update/11.1/rpm/i586/MozillaFirefox-branding-u…
http://download.opensuse.org/update/11.1/rpm/i586/MozillaFirefox-translatio…
http://download.opensuse.org/update/11.1/rpm/i586/mozilla-xulrunner190-1.9.…
http://download.opensuse.org/update/11.1/rpm/i586/mozilla-xulrunner190-deve…
http://download.opensuse.org/update/11.1/rpm/i586/mozilla-xulrunner190-gnom…
http://download.opensuse.org/update/11.1/rpm/i586/mozilla-xulrunner190-tran…
http://download.opensuse.org/update/11.1/rpm/i586/python-xpcom190-1.9.0.7-1…
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/i586/MozillaFirefox-3.0.7-1.1.…
http://download.opensuse.org/update/11.0/rpm/i586/MozillaFirefox-translatio…
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-1.9.…
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-deve…
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-gnom…
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-tran…
Power PC Platform:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/ppc/MozillaFirefox-3.0.7-1.1.6…
http://download.opensuse.org/update/11.1/rpm/ppc/MozillaFirefox-branding-up…
http://download.opensuse.org/update/11.1/rpm/ppc/MozillaFirefox-translation…
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-1.9.0…
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-devel…
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-gnome…
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-trans…
http://download.opensuse.org/update/11.1/rpm/ppc/python-xpcom190-1.9.0.7-1.…
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/ppc/MozillaFirefox-3.0.7-1.1.p…
http://download.opensuse.org/update/11.0/rpm/ppc/MozillaFirefox-translation…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-1.9.0…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-64bit…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-devel…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-gnome…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-gnome…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-trans…
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-trans…
x86-64 Platform:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/x86_64/MozillaFirefox-3.0.7-1.…
http://download.opensuse.org/update/11.1/rpm/x86_64/MozillaFirefox-branding…
http://download.opensuse.org/update/11.1/rpm/x86_64/MozillaFirefox-translat…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-1.…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-32…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-de…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-gn…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-gn…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-tr…
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-tr…
http://download.opensuse.org/update/11.1/rpm/x86_64/python-xpcom190-1.9.0.7…
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/x86_64/MozillaFirefox-3.0.7-1.…
http://download.opensuse.org/update/11.0/rpm/x86_64/MozillaFirefox-translat…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-1.…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-32…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-de…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-gn…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-gn…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-tr…
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-tr…
Sources:
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/src/MozillaFirefox-3.0.7-1.1.6…
http://download.opensuse.org/update/11.1/rpm/src/mozilla-xulrunner190-1.9.0…
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/src/MozillaFirefox-3.0.7-1.1.s…
http://download.opensuse.org/update/11.0/rpm/src/mozilla-xulrunner190-1.9.0…
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSb5Qv3ey5gA9JdPZAQLhdggAnGJAmpRUO84YpjDDYFhmdxpAns/KKGNj
jiKioXPrQxD5Pxv7g/daFqZcS0rk3uitsK+7KC62NNJk1MQEzCkXWzmmFUyD2ypX
JwKJ69/xEbDzFI0alR6yq0cp+QTwPmJ1oCRZjdMRLReRKv0rWQrLwVO61ysDQ+h3
6p3Ol9xybnm9VrB1BN8VEURlRnoiGPJjNVI1JiY6CRVZ/LpjzUufh/EpPQ8UfrPu
0wRLvtkU12o1WAN1KMFCXPUfziFELGYnxT1yc/wEfqVP99q8woMG1Co95IkEKQn5
RB1PbQS+f1QgYWKBowbemjldq7PZdzgxDPhvPGM5DoU4HLP0mvJPXw==
=Qj7T
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
10 Mar '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:006
Date: Tue, 10 Mar 2009 15:00:00 +0000
Cross-References: CVE-2007-6720, CVE-2008-2364, CVE-2008-5101
CVE-2008-5347, CVE-2008-5348, CVE-2008-5349
CVE-2008-5350, CVE-2008-5351, CVE-2008-5352
CVE-2008-5353, CVE-2008-5354, CVE-2008-5356
CVE-2008-5357, CVE-2008-5358, CVE-2008-5359
CVE-2008-5360, CVE-2008-6393, CVE-2009-0037
CVE-2009-0179, CVE-2009-0749, CVE-2009-0848
Content of this advisory:
1) Solved Security Vulnerabilities:
- curl
- libmikmod
- apache2
- optipng
- psi
- java-1_6_0-openjdk
- gtk2
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- curl
When HTTP-redirect following was enabled curl followed any URL, even
one to e.g. local files (CVE-2009-0037).
Affected Products: openSUSE 10.3-11.1, SLES9, SLES10
- libmikmod
Specially crafted XM files or playing mod files with varying number
of channels could crash applications using libmikmod
(CVE-2009-0179, CVE-2007-6720).
Affected Products: openSUSE 10.3-11.1, SLES9, SLES10
- apache2
A DoS condition in apache2's mod_proxy has
been fixed (CVE-2008-2364).
Affected Products: SLES10
- optipng
Specially crafted BMP files could overflow a buffer in optipng
(CVE-2008-5101), specially crafted GIF files could crash optipng
(CVE-2009-0749).
Affected Products: openSUSE 10.3-11.1
- psi
Remote attackers could crash the Psi instant messaging client via
the file transfer port (CVE-2008-6393).
Affected Products: openSUSE 10.3-11.1
- java-1_6_0-openjdk
OpenJDK Java 1.6.0 was upgraded to build b14, fixing quite a lot of security issues.
It fixes at least:
4486841 UTF8 decoder should adhere to corrigendum to Unicode 3.0.1
CVE-2008-5351
6484091 FileSystemView leaks directory info
CVE-2008-5350 aka SUN SOLVE 246266
6497740 Limit the size of RSA public keys
CVE-2008-5349
6588160 jaas krb5 client leaks OS-level UDP sockets (all platforms)
CVE-2008-5348
6592792 Add com.sun.xml.internal to the "package.access" property in $JAVA_HOME/lib/security/java.security
CVE-2008-5347 aka SUN SOLVE 246366
6721753 File.createTempFile produces guessable file names
CVE-2008-5360
6726779 ConvolveOp on USHORT raster can cause the JVM crash.
CVE-2008-5359 aka SUN SOLVE 244987
6733336 Crash on malformed font
CVE-2008-5356 aka SUN SOLVE 244987
6733959 Insufficient checks for "Main-Class" manifest entry in JAR files
CVE-2008-5354 aka SUN SOLVE 244990
6734167 Calendar.readObject allows elevation of privileges
CVE-2008-5353
6751322 Vulnerability report: Sun Java JRE TrueType Font Parsing Heap Overflow
CVE-2008-5357 aka SUN SOLVE 244987
6755943 Java JAR Pack200 Decompression should enforce stricter header checks
CVE-2008-5352 aka SUN SOLVE 244992
6766136 corrupted gif image may cause crash in java splashscreen library.
CVE-2008-5358 aka SUN SOLVE 244987
Affected Products: openSUSE 11.0,11.1
- gtk2
A SUSE specific patch to GTK2 accidentally added a relative search
path for gtk modules therefore allowed local attackers have gtk
programs load modules from untrusted places (CVE-2009-0848).
Affected Products: openSUSE 11.0,11.1
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSbZ8AXey5gA9JdPZAQLf8AgAoB2NiVe4SrCHROxIfAHMfxULcWFscQ4N
GvpYOjBmXlX8N4j1pyY6hiZzSCuQcvzW/j+deA1LZUiJTJ0Kq9DOX37z6ESVKxIs
Kh9mND871AQUlbVg/w+ookDe/5c5kE57D910/la3/jYhTEJk9Aios0xt2GWXNl9Z
OiN3fXibombNDimMBIJEUwjgSvH5v8ptleqKDCbU/IyAEplK9CGRGNcnA/RS5uFI
WkRtsJeazV3rU1LNq6jTWPGwx9V3CNLA2sIcI9vDyD/hiSn2OWjgVpH00ci4V6u4
EyriN+xE94sBRGcNghUMOOJAE2iNmdITvTpz9vTK5lwrDAjfeUJLcw==
=3Kon
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
02 Mar '09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:005
Date: Mon, 02 Mar 2009 13:00:00 +0000
Cross-References: CVE-2007-0062, CVE-2008-5078, CVE-2008-5138
CVE-2009-0021, CVE-2009-0040, CVE-2009-0049
CVE-2009-0386, CVE-2009-0387, CVE-2009-0397
CVE-2009-0478, CVE-2009-0599, CVE-2009-0600
CVE-2009-0601
Content of this advisory:
1) Solved Security Vulnerabilities:
- dhcp
- ntp/xntp
- squid
- wireshark
- libpng
- pam_mount
- enscript
- eID-belgium
- gstreamer-0_10-plugins-good
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- dhcp
By sending requests with a large value for 'dhcp-max-message-size'
dhcp-clients could crash dhcpd if dhcpd was configured with a large
amount of DHCP options (CVE-2007-0062).
Affected Products: SLES9, SLES10, openSUSE 10.3-11.0
- ntp/xntp
ntp didn't properly check the return value of the openssl function
EVP_VerifyFinal (CVE-2009-0021).
Affected Products: SLES9, openSUSE 10.3-11.1
Packages for SLES10 got delayed due a fix for another problem and
will follow soon
- squid
A denial of service condition in HTTP-request processing
was fixed in squid (CVE-2009-0478).
Affected Products: openSUSE 11.1
- wireshark
wireshark could crash while reading capture files containing
NetScreen data (CVE-2009-0599), while reading Tektronix K12 capture
files (CVE-2009-0600) or if the HOME environment variable contained
format string specifiers (CVE-2009-0601).
Affected Products: openSUSE 10.3-11.1
- libpng
Specially crafted png files could crash applications using libpng or
potentially execute arbitrary code by causing free of an
uninitialized pointer (CVE-2009-0040).
Affected Products: SLES9, SLES10, openSUSE 10.3-11.1
- pam_mount
Temporary file handling of the passwdehd script was prone to symlink
attacks (CVE-2008-5138). In 11.0 and 11.1 the script was removed as
it doesn't work on those distributions anyways.
Affected Products: SLES9, SLES10, openSUSE 10.3-11.1
- enscript
long path names could overflow a buffer in enscript (CVE-2008-5078).
Affected Products: SLES9
- eID-belgium
eID-belgium didn't properly check the return value of the openssl
function EVP_VerifyFinal (CVE-2009-0049).
Affected Products: SLES10, openSUSE 10.3-11.1
- gstreamer-0_10-plugins-good
Specially crafted QuickTime media files could cause heap based
buffer overflows in gstreamer. Attackers could potentially exploit
that to execute arbitrary code (CVE-2009-0386, CVE-2009-0387,
CVE-2009-0397).
Affected Products: SLES9, openSUSE 10.3-11.1
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file containing the announcement.
The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and integrity of a
package needs to be verified to ensure that it has not been tampered with.
The internal RPM package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on RPMv4-based
distributions) and the gpg key ring of 'root' during installation. You can
also find it on the first installation CD and included at the end of this
announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security(a)opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe(a)opensuse.org>.
opensuse-security-announce(a)opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe(a)opensuse.org>.
=====================================================================
SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iQEVAwUBSavHwHey5gA9JdPZAQLYIQf/TB8NU5yeudYJYXrSqRMR86ROY0R6hdbJ
+gOGOAqff94+Lax9Ne0TLfIX3Iny6QgyzaulkRRvVX/0IsS6NIuuGfg0+aMLRPkq
JD1+02p4lg2xonO7dl5EV1nbJS1HaJ1HSrS0d0PfefV8+qF7u7sW5Izk2YmAqblH
5KPSVmFsvuvrK006vjcBZz3hPlA+8I4leBGAGbshn9kJ8XxHYhMycyvZa4AQjfsu
ywpGDL4oeW9cztW1JSb/m/3UdH1jljjhLyQNPVRHgRlu0rnbJ2gW+R/Yw5nrGW2l
GqSHVD6HmNJnLj90YO8/5W+Ic1816be0LY+Ha3axadzRi28CLl/bCw==
=StzG
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0