SUSE Security Update: Security update for libxml2
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0117-1
Rating: important
References: #739894
Cross-References: CVE-2011-3919
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A heap-based buffer overflow during decoding of entity
references with overly long names has been fixed.
CVE-2011-3919 has been assigned.
Security Issue reference:
* CVE-2011-3919
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-libxml2-5654
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-libxml2-5654
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-libxml2-5654
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-libxml2-5654
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64):
libxml2-devel-2.7.6-0.13.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64):
libxml2-devel-32bit-2.7.6-0.13.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
libxml2-2.7.6-0.13.1
libxml2-doc-2.7.6-0.13.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64):
libxml2-32bit-2.7.6-0.13.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):
libxml2-2.7.6-0.13.1
libxml2-doc-2.7.6-0.13.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64):
libxml2-32bit-2.7.6-0.13.1
- SUSE Linux Enterprise Server 11 SP1 (ia64):
libxml2-x86-2.7.6-0.13.1
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
libxml2-2.6.23-15.27.1
libxml2-devel-2.6.23-15.27.1
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
libxml2-32bit-2.6.23-15.27.1
libxml2-devel-32bit-2.6.23-15.27.1
- SUSE Linux Enterprise Server 10 SP4 (ia64):
libxml2-x86-2.6.23-15.27.1
- SUSE Linux Enterprise Server 10 SP4 (ppc):
libxml2-64bit-2.6.23-15.27.1
libxml2-devel-64bit-2.6.23-15.27.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):
libxml2-2.7.6-0.13.1
- SUSE Linux Enterprise Desktop 11 SP1 (x86_64):
libxml2-32bit-2.7.6-0.13.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
libxml2-2.6.23-15.27.1
libxml2-devel-2.6.23-15.27.1
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
libxml2-32bit-2.6.23-15.27.1
libxml2-devel-32bit-2.6.23-15.27.1
References:
http://support.novell.com/security/cve/CVE-2011-3919.htmlhttps://bugzilla.novell.com/739894http://download.novell.com/patch/finder/?keywords=2a9a16773f62000d9967a5742…http://download.novell.com/patch/finder/?keywords=bdfcc7d229d9bdc2471a30fac…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: libxml2: fixing heap-based buffer overflow (CVE-2011-3919)
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0107-1
Rating: important
References: #739894
Cross-References: CVE-2011-3919
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A heap-based buffer overflow during decoding of entity
references with overly long names has been fixed.
CVE-2011-3919 has been assigned.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libxml2-5659
- openSUSE 11.3:
zypper in -t patch libxml2-5659
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
libxml2-2.7.8-16.21.1
libxml2-devel-2.7.8-16.21.1
- openSUSE 11.4 (x86_64):
libxml2-32bit-2.7.8-16.21.1
libxml2-devel-32bit-2.7.8-16.21.1
- openSUSE 11.4 (noarch):
libxml2-doc-2.7.8-16.21.1
- openSUSE 11.3 (i586 x86_64):
libxml2-2.7.7-4.11.1
libxml2-devel-2.7.7-4.11.1
- openSUSE 11.3 (x86_64):
libxml2-32bit-2.7.7-4.11.1
libxml2-devel-32bit-2.7.7-4.11.1
- openSUSE 11.3 (noarch):
libxml2-doc-2.7.7-4.11.1
References:
http://support.novell.com/security/cve/CVE-2011-3919.htmlhttps://bugzilla.novell.com/739894
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for libqt4
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0097-1
Rating: important
References: #739904
Cross-References: CVE-2011-3922
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
A stack-based buffer overflow in the glyph handling of
libqt4's harfbuzz has been fixed. CVE-2011-3922 has been
assigned to this issue.
Security Issuereference:
* CVE-2011-3922
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-libQtWebKit-devel-5624
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-libQtWebKit-devel-5624
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-libQtWebKit-devel-5624
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-libQtWebKit-devel-5624
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 4.6.3]:
libQtWebKit-devel-4.6.3-5.12.1
libqt4-devel-4.6.3-5.12.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64) [New Version: 4.6.3]:
libQtWebKit4-32bit-4.6.3-5.12.1
libqt4-sql-sqlite-32bit-4.6.3-5.12.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (ia64) [New Version: 4.6.3]:
libQtWebKit4-x86-4.6.3-5.12.1
libqt4-sql-sqlite-x86-4.6.3-5.12.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 4.6.3]:
libQtWebKit4-4.6.3-5.12.1
libqt4-4.6.3-5.12.1
libqt4-qt3support-4.6.3-5.12.1
libqt4-sql-4.6.3-5.12.1
libqt4-sql-sqlite-4.6.3-5.12.1
libqt4-x11-4.6.3-5.12.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version: 4.6.3]:
libQtWebKit4-32bit-4.6.3-5.12.1
libqt4-32bit-4.6.3-5.12.1
libqt4-qt3support-32bit-4.6.3-5.12.1
libqt4-sql-32bit-4.6.3-5.12.1
libqt4-x11-32bit-4.6.3-5.12.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 4.6.3]:
libQtWebKit4-4.6.3-5.12.1
libqt4-4.6.3-5.12.1
libqt4-qt3support-4.6.3-5.12.1
libqt4-sql-4.6.3-5.12.1
libqt4-sql-sqlite-4.6.3-5.12.1
libqt4-x11-4.6.3-5.12.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version: 4.6.3]:
libQtWebKit4-32bit-4.6.3-5.12.1
libqt4-32bit-4.6.3-5.12.1
libqt4-qt3support-32bit-4.6.3-5.12.1
libqt4-sql-32bit-4.6.3-5.12.1
libqt4-x11-32bit-4.6.3-5.12.1
- SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 4.6.3]:
libQtWebKit4-x86-4.6.3-5.12.1
libqt4-qt3support-x86-4.6.3-5.12.1
libqt4-sql-x86-4.6.3-5.12.1
libqt4-x11-x86-4.6.3-5.12.1
libqt4-x86-4.6.3-5.12.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 4.6.3]:
libQtWebKit4-4.6.3-5.12.1
libqt4-4.6.3-5.12.1
libqt4-qt3support-4.6.3-5.12.1
libqt4-sql-4.6.3-5.12.1
libqt4-sql-sqlite-4.6.3-5.12.1
libqt4-x11-4.6.3-5.12.1
- SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 4.6.3]:
libQtWebKit4-32bit-4.6.3-5.12.1
libqt4-32bit-4.6.3-5.12.1
libqt4-qt3support-32bit-4.6.3-5.12.1
libqt4-sql-32bit-4.6.3-5.12.1
libqt4-sql-sqlite-32bit-4.6.3-5.12.1
libqt4-x11-32bit-4.6.3-5.12.1
References:
http://support.novell.com/security/cve/CVE-2011-3922.htmlhttps://bugzilla.novell.com/739904http://download.novell.com/patch/finder/?keywords=a173a1a6d496f9364a4dbb524…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: libqt4: fixed stack-based buffer overflow in glyph handling (CVE-2011-3922)
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0091-1
Rating: important
References: #739904
Cross-References: CVE-2011-3922
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A stack-based buffer overflow in the glyph handling of
libqt4's harfbuzz has been fixed. CVE-2011-3922 has been
assigned to this issue.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libQtWebKit-devel-5628
- openSUSE 11.3:
zypper in -t patch libQtWebKit-devel-5628
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
libQtWebKit-devel-4.7.1-8.17.1
libQtWebKit4-4.7.1-8.17.1
libqt4-4.7.1-8.17.1
libqt4-devel-4.7.1-8.17.1
libqt4-qt3support-4.7.1-8.17.1
libqt4-sql-4.7.1-8.17.1
libqt4-sql-sqlite-4.7.1-8.17.1
libqt4-x11-4.7.1-8.17.1
- openSUSE 11.4 (x86_64):
libQtWebKit4-32bit-4.7.1-8.17.1
libqt4-32bit-4.7.1-8.17.1
libqt4-qt3support-32bit-4.7.1-8.17.1
libqt4-sql-32bit-4.7.1-8.17.1
libqt4-sql-sqlite-32bit-4.7.1-8.17.1
libqt4-x11-32bit-4.7.1-8.17.1
- openSUSE 11.3 (i586 x86_64):
libQtWebKit-devel-4.6.3-2.7.1
libQtWebKit4-4.6.3-2.7.1
libqt4-4.6.3-2.7.1
libqt4-devel-4.6.3-2.7.1
libqt4-qt3support-4.6.3-2.7.1
libqt4-sql-4.6.3-2.7.1
libqt4-sql-sqlite-4.6.3-2.7.1
libqt4-x11-4.6.3-2.7.1
- openSUSE 11.3 (x86_64):
libQtWebKit4-32bit-4.6.3-2.7.1
libqt4-32bit-4.6.3-2.7.1
libqt4-qt3support-32bit-4.6.3-2.7.1
libqt4-sql-32bit-4.6.3-2.7.1
libqt4-sql-sqlite-32bit-4.6.3-2.7.1
libqt4-x11-32bit-4.6.3-2.7.1
References:
http://support.novell.com/security/cve/CVE-2011-3922.htmlhttps://bugzilla.novell.com/739904
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: acroread
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0087-1
Rating: important
References: #735275
Cross-References: CVE-2011-2462 CVE-2011-4369
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
Acrobat Reader was updated to version 9.4.7 to fix security
issues (CVE-2011-2462, CVE-2011-4369)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch acroread-5650
- openSUSE 11.3:
zypper in -t patch acroread-5650
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586) [New Version: 9.4.7]:
acroread-9.4.7-0.3.1
- openSUSE 11.3 (i586) [New Version: 9.4.7]:
acroread-9.4.7-0.3.1
References:
http://support.novell.com/security/cve/CVE-2011-2462.htmlhttp://support.novell.com/security/cve/CVE-2011-4369.htmlhttps://bugzilla.novell.com/735275
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0086-1
Rating: important
References: #735275
Cross-References: CVE-2011-2462 CVE-2011-4369
Affected Products:
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes two new package versions.
Description:
Acrobat Reader was updated to version 9.4.7 to fix two
security issues (CVE-2011-2462, CVE-2011-4369)
Security Issue references:
* CVE-2011-4369
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4369
>
* CVE-2011-2462
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2462
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-acroread-5649
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP1 (noarch) [New Version: 9.4.6]:
acroread-cmaps-9.4.6-0.4.2.2
acroread-fonts-ja-9.4.6-0.4.2.2
acroread-fonts-ko-9.4.6-0.4.2.2
acroread-fonts-zh_CN-9.4.6-0.4.2.2
acroread-fonts-zh_TW-9.4.6-0.4.2.2
- SUSE Linux Enterprise Desktop 11 SP1 (i586) [New Version: 9.4.7]:
acroread-9.4.7-0.2.2.1
- SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:
acroread-cmaps-9.4.6-0.5.9
acroread-fonts-ja-9.4.6-0.5.9
acroread-fonts-ko-9.4.6-0.5.9
acroread-fonts-zh_CN-9.4.6-0.5.9
acroread-fonts-zh_TW-9.4.6-0.5.9
- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.4.7]:
acroread-9.4.7-0.5.1
References:
http://support.novell.com/security/cve/CVE-2011-2462.htmlhttp://support.novell.com/security/cve/CVE-2011-4369.htmlhttps://bugzilla.novell.com/735275http://download.novell.com/patch/finder/?keywords=b7032f742fda7a15dea6b1561…http://download.novell.com/patch/finder/?keywords=c4cebcc03c1219adc40eac640…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org