openSUSE Recommended Update: minicom: fix lockdev support
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0982-1
Rating: moderate
References: #713330
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update fixes a regression introduced by the SUSE
included lockdev patch which broke interoperability of
minicom and mgetty.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch minicom-5069
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
minicom-2.5-5.8.1
References:
https://bugzilla.novell.com/713330
openSUSE Recommended Update: kdebase4-openSUSE: Fix build service search provider
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0977-1
Rating: low
References: #695417
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update fixes the build service search provider to
search for openSUSE 11.4 packages by default (#695417)
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch kdebase4-openSUSE-5043
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
kdebase4-openSUSE-11.4-33.42.1
kdebase4-runtime-branding-openSUSE-11.4-33.42.1
kdebase4-workspace-branding-openSUSE-11.4-33.42.1
kdelibs4-branding-openSUSE-11.4-33.42.1
kdm-branding-openSUSE-11.4-33.42.1
kio_sysinfo-11.4-33.42.1
kio_sysinfo-branding-openSUSE-11.4-33.42.1
- openSUSE 11.4 (noarch):
kdebase4-openSUSE-lang-11.4-33.42.1
References:
https://bugzilla.novell.com/695417
openSUSE Recommended Update: valgrind: fix debugging of 32bit binaries
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0976-1
Rating: low
References: #705405
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has one recommended fix can now be
installed. It includes one version update.
Description:
This update adds back the 32bit helpers for debugging 32bit
applications on x86_64 (bnc#705405)
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch valgrind-5053
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 3.6.1]:
valgrind-3.6.1-1.12.1
valgrind-devel-3.6.1-1.12.1
References:
https://bugzilla.novell.com/705405
openSUSE Recommended Update: apparmor: Fix support for dovecot
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0975-1
Rating: low
References: #691072
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This profile update fixes access to the /var/mail symlink
which points to /var/spool/mail
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch apache2-mod_apparmor-4985
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
apache2-mod_apparmor-2.5.1.r1445-52.61.1
apparmor-parser-2.5.1.r1445-52.63.1
libapparmor-devel-2.5.1.r1445-52.61.1
libapparmor1-2.5.1.r1445-52.61.1
pam_apparmor-2.5.1.r1445-52.61.1
perl-apparmor-2.5.1.r1445-52.61.1
tomcat_apparmor-2.5.1.r1445-52.61.1
- openSUSE 11.4 (x86_64):
libapparmor1-32bit-2.5.1.r1445-52.61.1
pam_apparmor-32bit-2.5.1.r1445-52.61.1
- openSUSE 11.4 (noarch):
apparmor-docs-2.5.1.r1445-52.63.1
apparmor-parser-lang-2.5.1.r1445-52.63.1
apparmor-profiles-2.5.1.r1445-52.63.1
apparmor-utils-2.5.1.r1445-52.63.1
apparmor-utils-lang-2.5.1.r1445-52.63.1
References:
https://bugzilla.novell.com/691072
openSUSE Security Update: libxcrypt update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0972-1
Rating: moderate
References: #713727
Cross-References: CVE-2011-2483
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The security update for CVE-2011-2483 broke changing
blowfish passwords if compat mode was turned on (default).
This update fixes the regression.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libxcrypt-5049
- openSUSE 11.3:
zypper in -t patch libxcrypt-5049
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
libxcrypt-3.0.3-9.12.1
libxcrypt-devel-3.0.3-9.12.1
- openSUSE 11.4 (x86_64):
libxcrypt-32bit-3.0.3-9.12.1
- openSUSE 11.3 (i586 x86_64):
libxcrypt-3.0.3-5.11.1
libxcrypt-devel-3.0.3-5.11.1
- openSUSE 11.3 (x86_64):
libxcrypt-32bit-3.0.3-5.11.1
References:
http://support.novell.com/security/cve/CVE-2011-2483.htmlhttps://bugzilla.novell.com/713727
openSUSE Security Update: man-pages update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0970-1
Rating: moderate
References: #713389
Cross-References: CVE-2011-2483
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The crypt(3) manpage was updated to also list the 2y prefix.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch man-pages-5032
- openSUSE 11.3:
zypper in -t patch man-pages-5032
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (noarch):
man-pages-3.32-4.5.1
- openSUSE 11.3 (noarch):
man-pages-3.25-2.3.1
References:
http://support.novell.com/security/cve/CVE-2011-2483.htmlhttps://bugzilla.novell.com/713389
openSUSE Security Update: MozillaFirefox: Update to Firefox 6
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0957-2
Rating: important
References: #712224
Cross-References: CVE-2011-0084 CVE-2011-2985 CVE-2011-2986
CVE-2011-2987 CVE-2011-2988 CVE-2011-2989
CVE-2011-2990 CVE-2011-2991 CVE-2011-2992
CVE-2011-2993
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
It includes one version update.
Description:
Mozilla Firefox was updated to version 6.
It brings new features, fixes bugs and security issues.
Following security issues were fixed:
http://www.mozilla.org/security/announce/2011/mfsa2011-29.ht
ml Mozilla Foundation Security Advisory 2011-29 (MFSA
2011-29)
* Miscellaneous memory safety hazards: Mozilla identified
and fixed several memory safety bugs in the browser
engine used in Firefox 4, Firefox 5 and other
Mozilla-based products. Some of these bugs showed
evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code.
Aral Yaman reported a WebGL crash which affected Firefox
4 and Firefox 5. (CVE-2011-2989)
Vivekanand Bolajwar reported a JavaScript crash which
affected Firefox 4 and Firefox 5. (CVE-2011-2991)
Bert Hubert and Theo Snelleman of Fox-IT reported a crash
in the Ogg reader which affected Firefox 4 and Firefox 5.
(CVE-2011-2992)
Mozilla developers and community members Robert Kaiser,
Jesse Ruderman, moz_bug_r_a4, Mardeg, Gary Kwong, Christoph
Diehl, Martijn Wargers, Travis Emmitt, Bob Clary and
Jonathan Watt reported memory safety issues which affected
Firefox 4 and Firefox 5. (CVE-2011-2985)
* Unsigned scripts can call script inside signed JAR Rafael
Gieschke reported that unsigned JavaScript could call
into script inside a signed JAR thereby inheriting the
identity of the site that signed the JAR as well as any
permissions that a user had granted the signed JAR.
(CVE-2011-2993)
* String crash using WebGL shaders Michael Jordon of
Context IS reported that an overly long shader program
could cause a buffer overrun and crash in a string class
used to store the shader source code. (CVE-2011-2988)
* Heap overflow in ANGLE library Michael Jordon of Context
IS reported a potentially exploitable heap overflow in
the ANGLE library used by Mozilla's WebGL implementation.
(CVE-2011-2987)
* Crash in SVGTextElement.getCharNumAtPosition() Security
researcher regenrecht reported via TippingPoint's Zero
Day Initiative that a SVG text manipulation routine
contained a dangling pointer vulnerability.
(CVE-2011-0084)
* Credential leakage using Content Security Policy reports
Mike Cardwell reported that Content Security Policy
violation reports failed to strip out proxy authorization
credentials from the list of request headers. Daniel
Veditz reported that redirecting to a website with
Content Security Policy resulted in the incorrect
resolution of hosts in the constructed policy.
(CVE-2011-2990)
* Cross-origin data theft using canvas and Windows D2D
nasalislarvatus3000 reported that when using Windows D2D
hardware acceleration, image data from one domain could
be inserted into a canvas and read by a different domain.
(CVE-2011-2986)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch MozillaFirefox-5020
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 6.0]:
MozillaFirefox-6.0-2.2.1
MozillaFirefox-branding-upstream-6.0-2.2.1
MozillaFirefox-buildsymbols-6.0-2.2.1
MozillaFirefox-devel-6.0-2.2.1
MozillaFirefox-translations-common-6.0-2.2.1
MozillaFirefox-translations-other-6.0-2.2.1
References:
http://support.novell.com/security/cve/CVE-2011-0084.htmlhttp://support.novell.com/security/cve/CVE-2011-2985.htmlhttp://support.novell.com/security/cve/CVE-2011-2986.htmlhttp://support.novell.com/security/cve/CVE-2011-2987.htmlhttp://support.novell.com/security/cve/CVE-2011-2988.htmlhttp://support.novell.com/security/cve/CVE-2011-2989.htmlhttp://support.novell.com/security/cve/CVE-2011-2990.htmlhttp://support.novell.com/security/cve/CVE-2011-2991.htmlhttp://support.novell.com/security/cve/CVE-2011-2992.htmlhttp://support.novell.com/security/cve/CVE-2011-2993.htmlhttps://bugzilla.novell.com/712224
openSUSE Security Update: MozillaThunderbird: Update to 3.1.12
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0935-2
Rating: important
References: #712224
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that contains security fixes can now be
installed. It includes three new package versions.
Description:
Mozilla Thunderbird was updated to 3.1.12 fixing various
bugs and security issues:
Mozilla Foundation Security Advisory 2011-32 (MFSA 2011-32)
http://www.mozilla.org/security/announce/2011/mfsa2011-32.ht
ml
Many of the issues listed below are not exploitable through
mail since JavaScript is disabled by default in
Thunderbird. These particular issues may be triggered while
viewing RSS feeds and displaying full remote content rather
than the feed summary. Addons that expose browser
functionality may also enable such issues to be exploited.
* Miscellaneous memory safety hazards (rv:1.9.2.20)
Mozilla developers and community members identified and
fixed several memory safety bugs in the browser engine used
in Thunderbird 3.1 and other Mozilla-based products. Some
of these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.
Gary Kwong, Igor Bukanov, Nils and Bob Clary reported
memory safety issues which affected Thunderbird 3.1.
(CVE-2011-2982)
* Crash in SVGTextElement.getCharNumAtPosition()
Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that a SVG text
manipulation routine contained a dangling pointer
vulnerability. (CVE-2011-0084)
* Privilege escalation using event handlers
Mozilla security researcher moz_bug_r_a_4 reported a
vulnerability in event management code that would permit
JavaScript to be run in the wrong context, including that
of a different website or potentially in a
chrome-privileged context. (CVE-2011-2981)
* Dangling pointer vulnerability in appendChild
Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that appendChild did not
correctly account for DOM objects it operated upon and
could be exploited to dereference an invalid pointer.
(CVE-2011-2378)
* Privilege escalation dropping a tab element in content
area
Mozilla security researcher moz_bug_r_a4 reported that
web content could receive chrome privileges if it
registered for drop events and a browser tab element was
dropped into the content area. (CVE-2011-2984)
* Binary planting vulnerability in ThinkPadSensor::Startup
Security researcher Mitja Kolsek of Acros Security
reported that ThinkPadSensor::Startup could potentially be
exploited to load a malicious DLL into the running process.
(CVE-2011-2980)
* Private data leakage using RegExp.input
Security researcher shutdown reported that data from
other domains could be read when RegExp.input was set.
(CVE-2011-2983)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch MozillaThunderbird-5050 mozilla-js192-5010
- openSUSE 11.3:
zypper in -t patch MozillaThunderbird-5050
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 1.9.2.20 and 3.1.12]:
MozillaThunderbird-3.1.12-0.11.1
MozillaThunderbird-buildsymbols-3.1.12-0.11.1
MozillaThunderbird-devel-3.1.12-0.11.1
MozillaThunderbird-translations-common-3.1.12-0.11.1
MozillaThunderbird-translations-other-3.1.12-0.11.1
enigmail-1.1.2+3.1.12-0.11.1
mozilla-js192-1.9.2.20-1.2.1
mozilla-xulrunner192-1.9.2.20-1.2.1
mozilla-xulrunner192-buildsymbols-1.9.2.20-1.2.1
mozilla-xulrunner192-devel-1.9.2.20-1.2.1
mozilla-xulrunner192-gnome-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-common-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-other-1.9.2.20-1.2.1
- openSUSE 11.4 (x86_64) [New Version: 1.9.2.20]:
mozilla-js192-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-gnome-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-common-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-other-32bit-1.9.2.20-1.2.1
- openSUSE 11.3 (i586 x86_64) [New Version: 3.1.12]:
MozillaThunderbird-3.1.12-0.15.1
MozillaThunderbird-devel-3.1.12-0.15.1
MozillaThunderbird-translations-common-3.1.12-0.15.1
MozillaThunderbird-translations-other-3.1.12-0.15.1
enigmail-1.1.2+3.1.12-0.15.1
References:
https://bugzilla.novell.com/712224
openSUSE Recommended Update: Flash Player 10.3.183.7 released
______________________________________________________________________________
Announcement ID: openSUSE-RU-2011:0963-1
Rating: important
References: #714365
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that has one recommended fix can now be
installed. It includes one version update.
Description:
This update provides Flash Player 10.3.183.7:
* Shared library/gotoAndPlay() or gotoAndStop() bug
* Textfields are displaying text vertically in 10.3.183.5
release
* Massive Animation Slowdown following install of FP
0.3.183.5
* Flash player 10.3 displays a black screen (2943064)
* Sound repeating and building up bug (2941616)
* Flash applications at certain websites
(http://www.justin.tv, http://heylenmichel.de) now load
correctly (2939645, 944081)
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch flash-player-5068
- openSUSE 11.3:
zypper in -t patch flash-player-5068
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586) [New Version: 10.3.183.7]:
flash-player-10.3.183.7-0.2.1
- openSUSE 11.3 (i586) [New Version: 10.3.183.7]:
flash-player-10.3.183.7-0.2.1
References:
https://bugzilla.novell.com/714365
openSUSE Security Update: MozillaFirefox: Update to Firefox 3.6.20
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0958-1
Rating: important
References: #712224
Cross-References: CVE-2011-0084 CVE-2011-2378 CVE-2011-2980
CVE-2011-2981 CVE-2011-2982 CVE-2011-2983
CVE-2011-2984
Affected Products:
openSUSE 11.3
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available. It
includes two new package versions.
Description:
Mozilla Firefox was updated to version 3.6.20.
It fixes bugs and security issues. Following security
issues were fixed:
http://www.mozilla.org/security/announce/2011/mfsa2011-30.ht
ml Mozilla Foundation Security Advisory 2011-30 (MFSA
2011-30)
* Miscellaneous memory safety hazards
Mozilla developers and community members identified and
fixed several memory safety bugs in the browser engine used
in Firefox 3.6 and other Mozilla-based products. Some of
these bugs showed evidence of memory corruption under
certain circumstances, and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.
Gary Kwong, Igor Bukanov, Nils and Bob Clary reported
memory safety issues which affected Firefox 3.6.
(CVE-2011-2982)
* Crash in SVGTextElement.getCharNumAtPosition()
Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that a SVG text
manipulation routine contained a dangling pointer
vulnerability. (CVE-2011-0084)
* Privilege escalation using event handlers
Mozilla security researcher moz_bug_r_a_4 reported a
vulnerability in event management code that would permit
JavaScript to be run in the wrong context, including that
of a different website or potentially in a
chrome-privileged context. (CVE-2011-2981)
* Dangling pointer vulnerability in appendChild
Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that appendChild did
not correctly account for DOM objects it operated upon and
could be exploited to dereference an invalid pointer.
(CVE-2011-2378)
* Privilege escalation dropping a tab element in content
area
Mozilla security researcher moz_bug_r_a4 reported that
web content could receive chrome privileges if it
registered for drop events and a browser tab element was
dropped into the content area. (CVE-2011-2984)
* Binary planting vulnerability in ThinkPadSensor::Startup
Security researcher Mitja Kolsek of Acros Security
reported that ThinkPadSensor::Startup could potentially be
exploited to load a malicious DLL into the running process.
(CVE-2011-2980) (This issue is likely Windows only)
* Private data leakage using RegExp.input
Security researcher shutdown reported that data from
other domains could be read when RegExp.input was set.
(CVE-2011-2983)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch MozillaFirefox-5013
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64) [New Version: 1.9.2.20 and 3.6.20]:
MozillaFirefox-3.6.20-0.2.1
MozillaFirefox-branding-upstream-3.6.20-0.2.1
MozillaFirefox-translations-common-3.6.20-0.2.1
MozillaFirefox-translations-other-3.6.20-0.2.1
mozilla-js192-1.9.2.20-1.2.1
mozilla-xulrunner192-1.9.2.20-1.2.1
mozilla-xulrunner192-buildsymbols-1.9.2.20-1.2.1
mozilla-xulrunner192-devel-1.9.2.20-1.2.1
mozilla-xulrunner192-gnome-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-common-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-other-1.9.2.20-1.2.1
- openSUSE 11.3 (x86_64) [New Version: 1.9.2.20]:
mozilla-js192-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-gnome-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-common-32bit-1.9.2.20-1.2.1
mozilla-xulrunner192-translations-other-32bit-1.9.2.20-1.2.1
References:
http://support.novell.com/security/cve/CVE-2011-0084.htmlhttp://support.novell.com/security/cve/CVE-2011-2378.htmlhttp://support.novell.com/security/cve/CVE-2011-2980.htmlhttp://support.novell.com/security/cve/CVE-2011-2981.htmlhttp://support.novell.com/security/cve/CVE-2011-2982.htmlhttp://support.novell.com/security/cve/CVE-2011-2983.htmlhttp://support.novell.com/security/cve/CVE-2011-2984.htmlhttps://bugzilla.novell.com/712224