openSUSE Security Update: xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0580-1
Rating: moderate
References: #623680 #665610 #672833 #675363 #675817 #678152
#678229 #678871 #679344 #680824 #687981 #688473
#688757 #691238
Cross-References: CVE-2011-1146 CVE-2011-1166 CVE-2011-1486
CVE-2011-1583
Affected Products:
openSUSE 11.3
______________________________________________________________________________
An update that solves four vulnerabilities and has 10 fixes
is now available. It includes one version update.
Description:
Collective May/2011 update for Xen
Xen:
- 691238 - L3: question on behaviour change xm list
- 623680 - xen kernel freezes during boot when processor
module is loaded
- 680824 - dom0 can't recognize boot disk when IOMMU is
enabled
- 688473 - VUL-0: potential buffer overflow in tools
- 679344 - VUL-0: Xen: multi-vCPU pv guest may crash host
- 687981 - L3: mistyping model type when defining VIF
crashes
- 675817 - Kernel panic when creating HVM guests on AMD
platforms with XSAVE
- 678871 - dom0 hangs long time when starting hvm guests
with memory >= 64GB
- 675363 - Random lockups with kernel-xen. Possibly
graphics related
- 678229 - restore of sles HVM fails
- 672833 - xen-tools bug causing problems with Ubuntu 10.10
under Xen 4.
- 665610 - xm console > 1 to same VM messes up both consoles
vm-install:
- 688757 - SLED10SP4 fully virtualized in SLES10SP4 XEN -
kernel panic
- 678152 - Xen: virt-manager: harmless block device admin
actions on FV guests mess up network (VIF) device type
==> network lost.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch xen-201105-4525
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64) [New Version: 0.4.30]:
vm-install-0.4.30-0.4.1
xen-4.0.1_21326_08-0.7.1
xen-devel-4.0.1_21326_08-0.7.1
xen-doc-html-4.0.1_21326_08-0.7.1
xen-doc-pdf-4.0.1_21326_08-0.7.1
xen-kmp-default-4.0.1_21326_08_k2.6.34.8_0.2-0.7.1
xen-kmp-desktop-4.0.1_21326_08_k2.6.34.8_0.2-0.7.1
xen-libs-4.0.1_21326_08-0.7.1
xen-tools-4.0.1_21326_08-0.7.1
xen-tools-domU-4.0.1_21326_08-0.7.1
- openSUSE 11.3 (i586):
xen-kmp-pae-4.0.1_21326_08_k2.6.34.8_0.2-0.7.1
References:
http://support.novell.com/security/cve/CVE-2011-1146.htmlhttp://support.novell.com/security/cve/CVE-2011-1166.htmlhttp://support.novell.com/security/cve/CVE-2011-1486.htmlhttp://support.novell.com/security/cve/CVE-2011-1583.htmlhttps://bugzilla.novell.com/623680https://bugzilla.novell.com/665610https://bugzilla.novell.com/672833https://bugzilla.novell.com/675363https://bugzilla.novell.com/675817https://bugzilla.novell.com/678152https://bugzilla.novell.com/678229https://bugzilla.novell.com/678871https://bugzilla.novell.com/679344https://bugzilla.novell.com/680824https://bugzilla.novell.com/687981https://bugzilla.novell.com/688473https://bugzilla.novell.com/688757https://bugzilla.novell.com/691238
openSUSE Recommended Update: yast2-qt: YaST Tree widget does no longer work in QT GUI since openSUSE 11.4
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0569-1
Rating: low
References: #680107
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has one recommended fix can now be
installed. It includes one version update.
Description:
YaST Tree widget does no longer work in QT GUI since
openSUSE 11.4. Fixed by this update.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch yast2-qt-4602
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 2.20.5]:
yast2-qt-2.20.5-0.3.1
yast2-qt-devel-2.20.5-0.3.1
References:
https://bugzilla.novell.com/680107
openSUSE Recommended Update: puppet: Incorrect firewall rule in puppet package
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0568-1
Rating: low
References: #683441 #694825
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has two recommended fixes can now be
installed.
Description:
There is an incorrect firewall rule in the puppet package.
Fixed by this update.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch puppet-4606
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
puppet-2.6.4-4.5.1
puppet-server-2.6.4-4.5.1
References:
https://bugzilla.novell.com/683441https://bugzilla.novell.com/694825
openSUSE Recommended Update: aaa_base
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0567-1
Rating: low
References: #661715 #664550 #690871
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has three recommended fixes can now be
installed.
Description:
The following bugs are fixed by this update:
- The aaa_base package could not be installed in lxc
containers, because it tries to install block devices.
- boot.localfs took a long time waiting for bind mounts.
- The boot.proc script runs late, delaying boot.sysctl.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch aaa_base-4601
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
aaa_base-11.4-54.68.1
aaa_base-extras-11.4-54.68.1
References:
https://bugzilla.novell.com/661715https://bugzilla.novell.com/664550https://bugzilla.novell.com/690871
openSUSE Security Update: ruby
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0561-1
Rating: important
References: #600752 #655136 #673740 #673750 #682287
Cross-References: CVE-2010-0541 CVE-2011-0188 CVE-2011-1004
CVE-2011-1005
Affected Products:
openSUSE 11.3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
Ruby was prone to several security issues:
- a race condition allowed local users to delete arbitrary
files (CVE-2011-1004)
- exception methods could bypass safe mode (CVE-2011-1005)
- webrick cross site scripting issue (CVE-2010-0541)
- memory corruption in the BigDecimal class (CVE-2011-0188)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch ruby-4587
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64):
ruby-1.8.7.p249-8.9.1
ruby-devel-1.8.7.p249-8.9.1
ruby-examples-1.8.7.p249-8.9.1
ruby-test-suite-1.8.7.p249-8.9.1
ruby-tk-1.8.7.p249-8.9.1
- openSUSE 11.3 (noarch):
ruby-doc-html-1.8.7.p249-8.9.1
ruby-doc-ri-1.8.7.p249-8.9.1
References:
http://support.novell.com/security/cve/CVE-2010-0541.htmlhttp://support.novell.com/security/cve/CVE-2011-0188.htmlhttp://support.novell.com/security/cve/CVE-2011-1004.htmlhttp://support.novell.com/security/cve/CVE-2011-1005.htmlhttps://bugzilla.novell.com/600752https://bugzilla.novell.com/655136https://bugzilla.novell.com/673740https://bugzilla.novell.com/673750https://bugzilla.novell.com/682287
openSUSE Security Update: ruby: security update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0556-1
Rating: moderate
References: #682287
Cross-References: CVE-2011-0188
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A memory corruption in the BigDecimal class potentially
allowed attackers to execute arbitrary code (CVE-2011-0188).
Affects 64bit platforms only.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch ruby-4584
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
ruby-1.8.7.p334-1.4.1
ruby-devel-1.8.7.p334-1.4.1
ruby-examples-1.8.7.p334-1.4.1
ruby-test-suite-1.8.7.p334-1.4.1
ruby-tk-1.8.7.p334-1.4.1
- openSUSE 11.4 (noarch):
ruby-doc-html-1.8.7.p334-1.4.1
ruby-doc-ri-1.8.7.p334-1.4.1
References:
http://support.novell.com/security/cve/CVE-2011-0188.htmlhttps://bugzilla.novell.com/682287
openSUSE Security Update: perl-libwww-perl security update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0552-1
Rating: important
References: #693999
Cross-References: CVE-2011-0633
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
perl-libwww-perl did not verify enable host name checking
of SSL certificates by default (CVE-2011-0633).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch perl-libwww-perl-4589
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (noarch):
perl-libwww-perl-5.837-5.7.1
References:
http://support.novell.com/security/cve/CVE-2011-0633.htmlhttps://bugzilla.novell.com/693999
openSUSE Security Update: libmodplug security update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0551-1
Rating: moderate
References: #691137
Cross-References: CVE-2011-1761
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
specially crafted files could cause a stack overflow in
libmodplug (CVE-2011-1761). libmodplug version 0.8.8.3
fixes the problem.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libmodplug-4614
- openSUSE 11.3:
zypper in -t patch libmodplug-4614
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 0.8.8.3]:
libmodplug-devel-0.8.8.3-2.12.1
libmodplug0-0.8.8.3-2.12.1
- openSUSE 11.4 (x86_64) [New Version: 0.8.8.3]:
libmodplug0-32bit-0.8.8.3-2.12.1
- openSUSE 11.3 (i586 x86_64) [New Version: 0.8.8.3]:
libmodplug-devel-0.8.8.3-2.3.1
libmodplug0-0.8.8.3-2.3.1
- openSUSE 11.3 (x86_64) [New Version: 0.8.8.3]:
libmodplug0-32bit-0.8.8.3-2.3.1
References:
http://support.novell.com/security/cve/CVE-2011-1761.htmlhttps://bugzilla.novell.com/691137