I have been trying to find out exactly what patch addresses the openssl
DTLS problem (CVE-2007-4995) for SLES 9, but have not had any luck yet.
I've found http://www.suse.de/~meissner/cve/CVE-2007-4995.html which
shows the info for SuSe 10, but not 9.
Can anyone point me in the right direction?
Thanks,
Jeff
Marcus Meissner said the following on 10/19/07 10:24 AM:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ______________________________________________________________________________
>
> SUSE Security Summary Report
>
> Announcement ID: SUSE-SR:2007:021
> Date: Fri, 19 Oct 2007 17:00:00 +0000
> Cross-References: CVE-2006-1861, CVE-2006-3467, CVE-2007-4074
> CVE-2007-4224, CVE-2007-4569, CVE-2007-4924
> CVE-2007-4995, CVE-2007-5208
>
> Content of this advisory:
> 1) Solved Security Vulnerabilities:
> - hplip command injection
> - kdelibs3, kdebase3 security update
> - NX security update for PCF handling
> - festival daemon command injection
> - opal denial of service problem
> - openssl DTLS problem
> 2) Pending Vulnerabilities, Solutions, and Work-Arounds:
> - None listed this week.
> 3) Authenticity Verification and Additional Information
>
> ______________________________________________________________________________
>
> 1) Solved Security Vulnerabilities
>
> To avoid flooding mailing lists with SUSE Security Announcements for minor
> issues, SUSE Security releases weekly summary reports for the low profile
> vulnerability fixes. The SUSE Security Summary Reports do not list md5 sums
> or download URLs like the SUSE Security Announcements that are released for
> more severe vulnerabilities.
>
> Fixed packages for the following incidents are already available on our FTP
> server and via the YaST Online Update.
>
> - hplip command injection
>
> The daemon 'hpssd' could be exploited by users to execute arbitrary
> commands as root. hpssd only runs on systems that have HP all-in-one
> devices configured. In the default configuration the problem is
> not remotely exploitable as hpssd only listens on local interfaces
> (CVE-2007-5208).
>
> This issue has been fixed for SUSE Linux 10.0-10.3, and SUSE Linux
> Enterprise Desktop 10.
>
>
> - kdelibs3, kdebase3 security update
>
> kdebase3 and kdelibs3 were updated on all affected SUSE Linux
> products to fix the following problems:
>
> - Users could log in as root without having to enter the password
> if auto login was enabled and if kdm was configured to require
> the root password to shutdown the system (CVE-2007-4569).
>
> - Javascript code could modify the URL in the address bar to make
> the currently displayed web site appear to come from a different
> site (CVE-2007-4224).
>
>
> - NX security update for PCF handling
>
> The XFree code contained in NX was prone to integer overflows
> (CVE-2006-1861) and insufficiently protected against specially
> crafted PCF files (CVE-2006-3467).
>
> NX has been updated on SUSE Linux 10.0-10.3, it is not contained
> on other distributions.
>
>
> - festival daemon command injection
>
> The festival daemon runs as root (if started). The default config
> doesn't have a password set. A local attacker could therefore connect
> to the daemon to have commands executed as root (CVE-2007-4074).
>
> festival has been updated on all affected products.
>
>
> - opal denial of service problem
>
> The opal library contained a bug in the SIP protocol handler that
> could be exploited by attackers to crash applications using opal
> (CVE-2007-4924).
>
> Opal has been updated on openSUSE 10.2, 10.3 and SUSE Linux
> Desktop 10.
>
> - openssl DTLS problem
>
> A buffer overflow in the DTLS implementation of openssl could
> be exploited by attackers to potentially execute arbitrary code
> (CVE-2007-4995).
>
> openssl has been updated on all distributions that contain DTLS
> support.
>
> It is questionable if the DTLS support even worked before or used
> by applications at all, so we were likely not affected.
> ______________________________________________________________________________
>
> 2) Pending Vulnerabilities, Solutions, and Work-Arounds
>
> None listed this week.
> ______________________________________________________________________________
>
> 3) Authenticity Verification and Additional Information
>
> - Announcement authenticity verification:
>
> SUSE security announcements are published via mailing lists and on Web
> sites. The authenticity and integrity of a SUSE security announcement is
> guaranteed by a cryptographic signature in each announcement. All SUSE
> security announcements are published with a valid signature.
>
> To verify the signature of the announcement, save it as text into a file
> and run the command
>
> gpg --verify <file>
>
> replacing <file> with the name of the file containing the announcement.
> The output for a valid signature looks like:
>
> gpg: Signature made <DATE> using RSA key ID 3D25D3D9
> gpg: Good signature from "SuSE Security Team <security(a)suse.de>"
>
> where <DATE> is replaced by the date the document was signed.
>
> If the security team's key is not contained in your key ring, you can
> import it from the first installation CD. To import the key, use the
> command
>
> gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
>
> - Package authenticity verification:
>
> SUSE update packages are available on many mirror FTP servers all over the
> world. While this service is considered valuable and important to the free
> and open source software community, the authenticity and integrity of a
> package needs to be verified to ensure that it has not been tampered with.
>
> The internal RPM package signatures provide an easy way to verify the
> authenticity of an RPM package. Use the command
>
> rpm -v --checksig <file.rpm>
>
> to verify the signature of the package, replacing <file.rpm> with the
> filename of the RPM package downloaded. The package is unmodified if it
> contains a valid signature from build(a)suse.de with the key ID 9C800ACA.
>
> This key is automatically imported into the RPM database (on RPMv4-based
> distributions) and the gpg key ring of 'root' during installation. You can
> also find it on the first installation CD and included at the end of this
> announcement.
>
> - SUSE runs two security mailing lists to which any interested party may
> subscribe:
>
> opensuse-security(a)opensuse.org
> - General Linux and SUSE security discussion.
> All SUSE security announcements are sent to this list.
> To subscribe, send an e-mail to
> <opensuse-security+subscribe(a)opensuse.org>.
>
> opensuse-security-announce(a)opensuse.org
> - SUSE's announce-only mailing list.
> Only SUSE's security announcements are sent to this list.
> To subscribe, send an e-mail to
> <opensuse-security-announce+subscribe(a)opensuse.org>.
>
> =====================================================================
> SUSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
> The <security(a)suse.de> public key is listed below.
> =====================================================================
> ______________________________________________________________________________
>
> The information in this advisory may be distributed or reproduced,
> provided that the advisory is not modified in any way. In particular, the
> clear text signature should show proof of the authenticity of the text.
>
> SUSE Linux Products GmbH provides no warranties of any kind whatsoever
> with respect to the information contained in this security advisory.
>
> Type Bits/KeyID Date User ID
> pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
> pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
>
> - -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.4.2 (GNU/Linux)
>
> mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
> BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
> JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
> 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
> P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
> cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
> VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
> yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
> tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
> xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
> Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
> choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
> BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
> v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
> x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
> Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
> MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
> saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
> L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
> F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
> FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
> tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
> Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
> AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
> 3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
> YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
> +Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
> 8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
> 8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
> cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
> ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
> UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
> AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
> KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
> BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
> nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
> KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
> yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
> B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
> wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
> UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
> 5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
> D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
> zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
> 9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
> a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
> CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
> 271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
> t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
> B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
> rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
> IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
> rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
> RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
> g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
> CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
> =ypVs
> - -----END PGP PUBLIC KEY BLOCK-----
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.4-svn0 (GNU/Linux)
>
> iQEVAwUBRxi+Eney5gA9JdPZAQJLPAf/UMbdLsBuHBCkOTZAfw0EnVg9g9t1lvKe
> EaRLCzJVcG0UK4vIs+ngcZC0egKVIMBBwJOinZqoWzahPw0t5nd+zPt2Lj29aets
> EpKaSIRX4jleiGy80Ry2B6HwONU3JYWzAtz6iX+hlpu8IJIoWD4CGvAD1sElz3IV
> 0tdxAPqcpZtNjOQ9Bt/fZmxSfzblc0p10TiMON+dMZpQWi8KxqhCrKoCvPUL71ub
> cWf+lHdAmuQVw3Ap3K9jhtoF/i94026KO+KLpmKqw/b96XfTN36/kmSyVq1ALwWI
> GC5oWsW2jYq6/v2TNWi1+/eFfScoVSJgLR5wmjSVe48Cnfg1fRfFlg==
> =Hml1
> -----END PGP SIGNATURE-----
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org
On Fri, Feb 08, 2008 at 10:15:16AM +0000, Bob Vickers wrote:
> On Thu, 7 Feb 2008, Bob Vickers wrote:
>
> > I have spent the last couple of days wrestling with some major
problems,
> > and discovered that both are caused by the recent nss_ldap fix. I'm
going
> > to submit some bug reports on Bugzilla, but I just thought I would
see if
> > anyone else was suffering from the same thing.
> >
> > Briefly (on SuSE 10.2):
> >
> > (1) dhcpd will not start: it falls over immediately after forking.
Can be
> > worked round by starting in debug mode.
> >
Hi,
Yes I have the same probleme with 10.2. dhcpd stops after forking. It
works with the nofork flag -f or in debug mode.
webmin-1.121-1 do the same: it stops juste after it is started by
"/etc/init.d/webmin start"
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
I post this on request of another lister from the Spanish mail list; I
don't have personal knowledge of this problem. I would like to see
comments on this.
The vulnerability allows a user to become root with any kernel newer than
2.6.17 with vmsplice compiled in. Opensuse 10.3 is affected. A remote
attacker gaining access as an unprivileged user (flash hack?) could get
root privilege's.
Solutions:
- recompile kernel without vmsplice
- use dynamic patcher from
<http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c>
it uses the exploit to patch the kernel in memory, disabling vmsplice.
Compile with
cc -o disable-vmsplice-if-exploitable disable-vmsplice-if-exploitable.c
and run as user. It could be added to "/etc/rc.d/rc.local" till an update
is made available.
- ----
That's all the information I have.
- --
Cheers
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
iD8DBQFHr32ptTMYHG2NR9URAt5sAKCR5Zam/fcLch9M0pm1nLoraxzp1gCbBaTM
QktfJNQHlT21BTUIAo9rluk=
=XBsl
-----END PGP SIGNATURE-----
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org
Hi
I made address book on openldap in 10.3. It works over ssl but I saw strange
behaviour. Book required user and password (simple autorization) and when I
add this book to mail client, ldap ask for user and password and then ask for
certifikate. Is this normal?
I think at the begin should ask for certifikate and then sent the password
over ssl.
Regs
Marcin Matyla
Hi,
Does anyone have fwknop running without problem on openSUSE 10.2
x86_64, or even on any openSUSE with x86_64?
Its very unstable on my machine and it is proving quite difficult to
track down what is causing the difficulty.
I'd appreciate any indications of success or failure.
Regards
Mark
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org
I have spent the last couple of days wrestling with some major problems,
and discovered that both are caused by the recent nss_ldap fix. I'm going
to submit some bug reports on Bugzilla, but I just thought I would see if
anyone else was suffering from the same thing.
Briefly (on SuSE 10.2):
(1) dhcpd will not start: it falls over immediately after forking. Can be
worked round by starting in debug mode.
(2) If a terminal session starts when nscd is not running then no
processes can be run at all, e.g. typing 'date' produces no output and
simply returns a new shell prompt
More information to follow on bugzilla
Bob Vickers
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org
Roger Larsson schrieb:
> On onsdag 06 februari 2008, Marcus Meissner wrote:
>
>> On Wed, Feb 06, 2008 at 02:40:45PM +0100, Rainer Duffner wrote:
>>
>>> Dr. Peter Poeml schrieb:
>>>
>>>> It sounds like a bug in the actual dependencies to me, like an
>>>> incomplete or broken update.
>>>>
>>>>
>>>>> Is the mirror I'm suing not fully synched?
>>>>>
>>>> Which mirror are you using?
>>>>
>>>> To rule out if a mirror is at fault, simply use
>>>> http://download.opensuse.org/update/10.3/ directly. (You can always use
>>>> that server by the way, it is designed to redirect you to mirrors where
>>>> possible.)
>>>>
>>>> If it works with that, the mirror is not the problem.
>>>>
>>> I just checked, I do use download.opensuse.org as main update repository.
>>> The others are packman and the videolan-repo.
>>>
>>>
>
> I have learned the hard way that packages with naming like this
> glibc-32bit-2.6.1-18.3.x86_64 comes from factory and not /10.3
> [factory is alpha/beta software]
> This gives lots of conflicts/missing packages even when the package exists.
>
> Are you sure that you are using the exact path from above?
>
Well, the RPM says:
rduffner@suse2:/> rpm -qi glibc-32bit-2.6.1-18.3
Name : glibc-32bit Relocations: (not relocatable)
Version : 2.6.1 Vendor: SUSE LINUX
Products GmbH, Nuernberg, Germany
Release : 18.3 Build Date: Di 23 Okt 2007
14:59:49 CEST
Install Date: Mi 16 Jan 2008 10:16:12 CET Build Host: linux-r2dp
Group : System/Libraries Source RPM:
glibc-2.6.1-18.3.src.rpm
Size : 2345225 License: BSD 3-Clause;
GPL v2 or later; LGPL v2 or later
Signature : DSA/SHA1, Di 23 Okt 2007 15:05:15 CEST, Key ID
a84edae89c800aca
Packager : http://bugs.opensuse.org
URL : http://www.gnu.org/software/libc/libc.html
Summary : Standard Shared Libraries (from the GNU C Library)
Description :
The GNU C Library provides the most important standard libraries used
by nearly all programs: the standard C library, the standard math
library, and the POSIX thread library. A system is not functional
without these libraries.
Distribution: openSUSE 10.3 (i686)
I don't think this is alpha ;-)
And yes, I only have the download.opensuse.org....10.3 directory
configured as repository (in addition to the others mentioned)
rduffner@suse2:/> ll /etc/zypp/repos.d/
http:__download.opensuse.org_distribution_10.3_repo_debug_.repo
http:__download.opensuse.org_distribution_10.3_repo_non-oss__1.repo
http:__download.videolan.org_pub_videolan_vlc_SuSE_10.3_.repo
http:__ftp.skynet.be_pub_packman_suse_10.3_.repo
openSUSE-10.3-FTP 10.3.repo
openSUSE-10.3-Updates.repo
What I don't understand about the 32bit vs. 64bit situation is that the
plugin did work (with konq, that is) - before the last update came in.
It never worked with Firefox or Opera.
cheers,
Rainer
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org
Hi,
this is what I get when trying to go through the updates (OpenSuSE 10.3
x86_64):
2 Probleme: Problem: Wenn nur Abhängigkeiten der besten Architektur
verwendet werden, wird keine eindeutige Lösung gefunden. Problem:
java-1_6_0-sun-plugin kann aufgrund fehlender Abhängigkeiten nicht
installiert werden Problem: Wenn nur Abhängigkeiten der besten
Architektur verwendet werden, wird keine eindeutige Lösung gefunden. Bei
diesem Lösungsversuch wurden nur Abhängigkeiten in der besten
Architektur berücksichtigt. Alle auflösbaren Objekte zu berücksichtigen
braucht viel Zeit, kann aber zu einem besseren Ergebnis führen. Lösung
1: Versuche eine Lösung zu finden, die ALLE Möglichkeiten
berücksichtigt. Bezieht sich auf auflösbare Objekte mit kompatibler
Architektur.
Is the mirror I'm suing not fully synched?
Or what do I have to do?
I've got
1_6
1_6-alsa
1_6-devel
1_6-jdbc
1_6-plugin
installed.
cheers,
Rainer
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-security+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security+help(a)opensuse.org