openSUSE Recommended Update: gxditview
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0644-1
Rating: low
References: #668254 #682913
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has two recommended fixes can now be
installed.
Description:
This update fixes the following issues:
* 668254: "xditview does not show the tilde character"
* 682913: "groff: device X100 is missing"
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch groff-devx-4718
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
gxditview-1.20.1-4.4.1
References:
https://bugzilla.novell.com/668254https://bugzilla.novell.com/682913
openSUSE Security Update: libvirt
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0643-1
Rating: moderate
References: #697904
Cross-References: CVE-2011-2178
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A regression re-introduced automatic disk probing again
which potentially allowed to uses to access arbitrary files
(CVE-2011-2178).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libvirt-4712
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
libvirt-0.8.8-0.10.1
libvirt-client-0.8.8-0.10.1
libvirt-devel-0.8.8-0.10.1
libvirt-doc-0.8.8-0.10.1
libvirt-python-0.8.8-0.10.1
References:
http://support.novell.com/security/cve/CVE-2011-2178.htmlhttps://bugzilla.novell.com/697904
openSUSE Security Update: groff
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0642-1
Rating: low
References: #683857 #698290
Cross-References: CVE-2009-5044
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
groff created temporary files in an insecure way. Local
attackers could potentially exploit that to overwrite files
of other users.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch groff-4709
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
groff-1.20.1-3.4.1
groff-doc-1.20.1-3.4.1
References:
http://support.novell.com/security/cve/CVE-2009-5044.htmlhttps://bugzilla.novell.com/683857https://bugzilla.novell.com/698290
openSUSE Security Update: ConsoleKit
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0639-1
Rating: moderate
References: #686150
Cross-References: CVE-2010-4664
Affected Products:
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Remote users logged in via e.g. ssh could open a consolekit
session that is considered local and therefore gain
additional privileges, e.g. via policykit (CVE-2010-4664).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch ConsoleKit-4687
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64):
ConsoleKit-0.4.1-7.3.1
ConsoleKit-devel-0.4.1-7.3.1
ConsoleKit-x11-0.4.1-7.3.1
- openSUSE 11.3 (x86_64):
ConsoleKit-32bit-0.4.1-7.3.1
References:
http://support.novell.com/security/cve/CVE-2010-4664.htmlhttps://bugzilla.novell.com/686150
openSUSE Security Update: flash-player: Update to 10.3.181.26
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0637-1
Rating: critical
References: #699942
Cross-References: CVE-2011-2110
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
A critical vulnerability has been identified in Adobe Flash
Player 10.3.181.23 and earlier versions for Windows,
Macintosh, Linux and Solaris, and Adobe Flash Player
10.3.185.23 and earlier versions for Android. This memory
corruption vulnerability (CVE-2011-2110) could cause a
crash and potentially allow an attacker to take control of
the affected system. There are reports that this
vulnerability is being exploited in the wild in targeted
attacks via malicious Web pages.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch flash-player-4716
- openSUSE 11.3:
zypper in -t patch flash-player-4716
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586) [New Version: 10.3.181.26]:
flash-player-10.3.181.26-0.2.1
- openSUSE 11.3 (i586) [New Version: 10.3.181.26]:
flash-player-10.3.181.26-0.2.1
References:
http://support.novell.com/security/cve/CVE-2011-2110.htmlhttps://bugzilla.novell.com/699942
openSUSE Security Update: openssl
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0634-1
Rating: moderate
References: #693027
Cross-References: CVE-2011-1945
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update of openssl fixes a timing attack. This attack
can be used to obtain the private key of a TLS server
whenever ECDSA signatures are used. CVE-2011-1945: CVSS v2
Base Score: 4.3 (important) (AV:N/AC:M/Au:N/C:P/I:N/A:N):
Cryptographic Issues (CWE-310)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libopenssl-devel-4669
- openSUSE 11.3:
zypper in -t patch libopenssl-devel-4669
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
libopenssl-devel-1.0.0c-18.19.2
libopenssl1_0_0-1.0.0c-18.19.2
openssl-1.0.0c-18.19.2
- openSUSE 11.4 (x86_64):
libopenssl1_0_0-32bit-1.0.0c-18.19.2
- openSUSE 11.4 (noarch):
openssl-doc-1.0.0c-18.19.2
- openSUSE 11.3 (i586 x86_64):
libopenssl-devel-1.0.0-6.9.1
libopenssl1_0_0-1.0.0-6.9.1
openssl-1.0.0-6.9.1
- openSUSE 11.3 (x86_64):
libopenssl1_0_0-32bit-1.0.0-6.9.1
- openSUSE 11.3 (noarch):
openssl-doc-1.0.0-6.9.1
References:
http://support.novell.com/security/cve/CVE-2011-1945.htmlhttps://bugzilla.novell.com/693027
openSUSE Recommended Update: zlib: It segfaults when passing NULL to gzopen
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0631-1
Rating: low
References: #679345
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
zlib-1.2.5 segfaults when passing NULL in path argument to
gzopen. As the previous version returns NULL in such case
and there is software expecting it (most notable example is
KDE3), this update return the older behavior back. This
update fixes bug#679345.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch zlib-4664
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
zlib-1.2.5-9.10.1
zlib-devel-1.2.5-9.10.1
zlib-devel-static-1.2.5-9.10.1
- openSUSE 11.4 (x86_64):
zlib-32bit-1.2.5-9.10.1
zlib-devel-32bit-1.2.5-9.10.1
References:
https://bugzilla.novell.com/679345