openSUSE Security Update: Opera to version 12.3
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0273-2
Rating: moderate
References: #801233
Affected Products:
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
Opera 12.13 is a recommended upgrade offering security and
stability enhancements.
-fixed an issue where Opera gets internal communication
errors on Facebook
-fixed an issue where no webpages load on startup, if
Opera is disconnected from the Internet
-fixed an issue where images will not load after back
navigation, when a site uses the HTML5 history API
(deviantart.com)
-improved protection against hijacking of the default
search, including a one-time reset
-fixed an issue where DOM events manipulation might be
used to execute arbitrary code;
-fixed an issue where use of SVG clipPaths could allow
execution of arbitrary code;
-fixed a low severity security issue; details will be
disclosed at a later date
-fixed an issue where CORS requests could omit the
preflight request;
Also check out
http://www.opera.com/docs/changelogs/unix/1213
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2013-109
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2:NonFree (i586 x86_64):
opera-12.13-1.12.1
opera-gtk-12.13-1.12.1
opera-kde4-12.13-1.12.1
References:
https://bugzilla.novell.com/801233
openSUSE Recommended Update: openmotif: Use MWMRCDIR instead of rcdir in spec file
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0365-1
Rating: low
References: #786848
Affected Products:
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update fixes the following issue for openmotif:
- bnc#786848: Use MWMRCDIR instead of rcdir in spec file
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2012-759
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2:NonFree (i586 x86_64):
openmotif-2.3.3-2.4.1
openmotif-debuginfo-2.3.3-2.4.1
openmotif-debugsource-2.3.3-2.4.1
openmotif-devel-2.3.3-2.4.1
openmotif-devel-debuginfo-2.3.3-2.4.1
openmotif-libs-2.3.3-2.4.1
openmotif-libs-debuginfo-2.3.3-2.4.1
- openSUSE 12.2:NonFree (x86_64):
openmotif-devel-32bit-2.3.3-2.4.1
openmotif-devel-debuginfo-32bit-2.3.3-2.4.1
openmotif-libs-32bit-2.3.3-2.4.1
openmotif-libs-debuginfo-32bit-2.3.3-2.4.1
References:
https://bugzilla.novell.com/786848
openSUSE Security Update: flash-player to 11.2.202.273
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0359-2
Rating: critical
References: #806415
Cross-References: CVE-2013-0504 CVE-2013-0643 CVE-2013-0648
Affected Products:
openSUSE 12.3:NonFree
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
Flash Player was updated to 11.2.202.273 to fix critical
security issues: (bnc#806415)
* APSB13-08, CVE-2013-0504, CVE-2013-0643, CVE-2013-0648
More information can be found on:
https://www.adobe.com/support/security/bulletins/apsb13-08.h
tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:NonFree:
zypper in -t patch openSUSE-2013-162
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2013-162
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3:NonFree (i586 x86_64):
flash-player-11.2.202.273-2.8.1
flash-player-gnome-11.2.202.273-2.8.1
flash-player-kde4-11.2.202.273-2.8.1
- openSUSE 12.2:NonFree (i586 x86_64):
flash-player-11.2.202.273-1.30.1
flash-player-gnome-11.2.202.273-1.30.1
flash-player-kde4-11.2.202.273-1.30.1
References:
http://support.novell.com/security/cve/CVE-2013-0504.htmlhttp://support.novell.com/security/cve/CVE-2013-0643.htmlhttp://support.novell.com/security/cve/CVE-2013-0648.htmlhttps://bugzilla.novell.com/806415
openSUSE Security Update: acroread to 9.5.4
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0335-2
Rating: critical
References: #803939
Cross-References: CVE-2013-0640 CVE-2013-0641
Affected Products:
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
acroread was updated to 9.5.4 to fix remote code execution
problems. (CVE-2013-0640, CVE-2013-0641)
More information can be found on:
http://www.adobe.com/support/security/bulletins/apsb13-07.ht
ml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2013-151
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2:NonFree (noarch):
acroread-cmaps-9.4.1-3.8.1
acroread-fonts-ja-9.4.1-3.8.1
acroread-fonts-ko-9.4.1-3.8.1
acroread-fonts-zh_CN-9.4.1-3.8.1
acroread-fonts-zh_TW-9.4.1-3.8.1
- openSUSE 12.2:NonFree (i586):
acroread-9.5.4-3.8.1
acroread-browser-plugin-9.5.4-3.8.1
References:
http://support.novell.com/security/cve/CVE-2013-0640.htmlhttp://support.novell.com/security/cve/CVE-2013-0641.htmlhttps://bugzilla.novell.com/803939
openSUSE Security Update: update for flash-player
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0364-1
Rating: moderate
References: #797442
Cross-References: CVE-2013-0630
Affected Products:
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
- Update to 11.2.202.261: (bnc#797442)
* CVE-2013-0630 More details can be found on
https://www.adobe.com/support/security/bulletins/apsb13-01.h
tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2013-16
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2:NonFree (i586 x86_64):
flash-player-11.2.202.261-1.18.1
flash-player-gnome-11.2.202.261-1.18.1
flash-player-kde4-11.2.202.261-1.18.1
References:
http://support.novell.com/security/cve/CVE-2013-0630.htmlhttps://bugzilla.novell.com/797442
openSUSE Security Update: flash-player to 11.2.202.238
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0362-1
Rating: critical
References: #775986
Cross-References: CVE-2012-1535
Affected Products:
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Adobe Flash Player was updated to 11.2.202.238 fixing
various bugs and security issues.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2012-519
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2:NonFree (i586 x86_64):
flash-player-11.2.202.238-2.3.1
flash-player-gnome-11.2.202.238-2.3.1
flash-player-kde4-11.2.202.238-2.3.1
References:
http://support.novell.com/security/cve/CVE-2012-1535.htmlhttps://bugzilla.novell.com/775986
openSUSE Security Update: opera - security and bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0361-1
Rating: moderate
References: #795061
Affected Products:
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
- Update to 12.12
* Fixes and Stability Enhancements
- New option 'Delete settings and data for all
extensions' option (off by default) in the Delete Private
Data dialog
- Corrected an issue where using the 'Delete Private
Data' dialog could delete extension and settings data
- Redesigned the 'Delete Private Data' dialog to be
more usable with small screens
- Fixed an issue where quitting Opera while in
fullscreen mode could cripple the interface on the next
start-up
- Fixed an issue where malformed GIF images could
allow execution of arbitrary code
- Fixed an issue where repeated attempts to access a
target site could trigger address field spoofing
- Fixed an issue where private data could be disclosed
to other computer users, or be modified by them
* full changelog available at:
http://www.opera.com/docs/changelogs/unix/1212
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2012-885
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2:NonFree (i586 x86_64):
opera-12.12-1.8.1
opera-gtk-12.12-1.8.1
opera-kde4-12.12-1.8.1
References:
https://bugzilla.novell.com/795061
openSUSE Security Update: flash-player to 11.2.202.273
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0360-1
Rating: critical
References: #806415
Cross-References: CVE-2013-0504 CVE-2013-0643 CVE-2013-0648
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
Flash Player was updated to 11.2.202.273 to fix critical
security issues: (bnc#806415)
* APSB13-08, CVE-2013-0504, CVE-2013-0643, CVE-2013-0648
More information can be found on:
https://www.adobe.com/support/security/bulletins/apsb13-08.h
tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2013-32
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
flash-player-11.2.202.273-51.1
flash-player-gnome-11.2.202.273-51.1
flash-player-kde4-11.2.202.273-51.1
References:
http://support.novell.com/security/cve/CVE-2013-0504.htmlhttp://support.novell.com/security/cve/CVE-2013-0643.htmlhttp://support.novell.com/security/cve/CVE-2013-0648.htmlhttps://bugzilla.novell.com/806415
openSUSE Security Update: flash-player to 11.2.202.273
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0359-1
Rating: critical
References: #806415
Cross-References: CVE-2013-0504 CVE-2013-0643 CVE-2013-0648
Affected Products:
openSUSE 12.1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
Flash Player was updated to 11.2.202.273 to fix critical
security issues: (bnc#806415)
* APSB13-08, CVE-2013-0504, CVE-2013-0643, CVE-2013-0648
More information can be found on:
https://www.adobe.com/support/security/bulletins/apsb13-08.h
tml
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.1:
zypper in -t patch openSUSE-2013-162
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.1 (i586 x86_64):
flash-player-11.2.202.273-54.1
flash-player-gnome-11.2.202.273-54.1
flash-player-kde4-11.2.202.273-54.1
References:
http://support.novell.com/security/cve/CVE-2013-0504.htmlhttp://support.novell.com/security/cve/CVE-2013-0643.htmlhttp://support.novell.com/security/cve/CVE-2013-0648.htmlhttps://bugzilla.novell.com/806415