openSUSE Recommended Update: yast2-installation: do not restart second stage on upgrade.
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0693-1
Rating: moderate
References: #812630
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
yast2-installation was updated to tell systemd not to
restart Second Stage service on upgrade (bnc#812630).
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-347
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (noarch):
yast2-installation-2.23.14-1.8.6
yast2-installation-2.23.14-1.8.7
yast2-installation-devel-doc-2.23.14-1.8.6
yast2-installation-devel-doc-2.23.14-1.8.7
References:
https://bugzilla.novell.com/812630
openSUSE Recommended Update: seahorse: bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0690-1
Rating: moderate
References: #814536
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
seahorse was updated to fix two bugs:
- fix D-Bus application name claimed by seahorse
(bgo#694053, bnc#814536).
- fix command line parsing (bgo#686980).
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-350
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
seahorse-3.6.3-2.5.1
seahorse-debuginfo-3.6.3-2.5.1
seahorse-debugsource-3.6.3-2.5.1
- openSUSE 12.3 (noarch):
seahorse-lang-3.6.3-2.5.1
References:
https://bugzilla.novell.com/814536
openSUSE Recommended Update: xen: bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0688-1
Rating: moderate
References: #797014 #801910 #803712 #805579 #811764 #813156
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that has 6 recommended fixes can now be installed.
Description:
XEN was updated to fix various bugs:
- bnc#813156 - IndentationError in XendCheckpoint.py
xend-domain-lock.patch
- bnc#797014 - no way to control live migrations
- bnc#803712 - after live migration rcu_sched_state
detected stalls
xen.migrate.tools-xend_move_assert_to_exception_block.patch
xen.migrate.tools-libxc_print_stats_if_migration_is_aborted.
patch
xen.migrate.tools_set_number_of_dirty_pages_during_migration
.patch
xen.migrate.tools_notify_restore_to_hangup_during_migration_
--abort_if_busy.patch
- bnc#811764 - XEN (hypervisor or kernel) has a problem
with EFI variable services
x86-EFI-set-variable-permit-attrs.patch
- Upstream patches from Jan
26060-ACPI-ERST-table-size-checks.patch
26692-x86-fully-protect-MSI-X-table-from-PV-guest-accesses.p
atch
26702-powernow-add-fixups-for-AMD-P-state-figures.patch
26704-x86-MCA-suppress-bank-clearing-for-certain-injected-ev
ents.patch (bnc#805579)
26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-m
appings.patch
26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-message
s.patch
26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
26737-ACPI-APEI-Add-apei_exec_run_optional.patch
26742-IOMMU-properly-check-whether-interrupt-remapping-is-en
abled.patch
26743-VT-d-deal-with-5500-5520-X58-errata.patch
(bnc#801910)
26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.pat
ch
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-346
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
xen-debugsource-4.2.1_12-1.8.1
xen-devel-4.2.1_12-1.8.1
xen-kmp-default-4.2.1_12_k3.7.10_1.1-1.8.1
xen-kmp-default-debuginfo-4.2.1_12_k3.7.10_1.1-1.8.1
xen-kmp-desktop-4.2.1_12_k3.7.10_1.1-1.8.1
xen-kmp-desktop-debuginfo-4.2.1_12_k3.7.10_1.1-1.8.1
xen-libs-4.2.1_12-1.8.1
xen-libs-debuginfo-4.2.1_12-1.8.1
xen-tools-domU-4.2.1_12-1.8.1
xen-tools-domU-debuginfo-4.2.1_12-1.8.1
- openSUSE 12.3 (x86_64):
xen-4.2.1_12-1.8.1
xen-doc-html-4.2.1_12-1.8.1
xen-doc-pdf-4.2.1_12-1.8.1
xen-libs-32bit-4.2.1_12-1.8.1
xen-libs-debuginfo-32bit-4.2.1_12-1.8.1
xen-tools-4.2.1_12-1.8.1
xen-tools-debuginfo-4.2.1_12-1.8.1
- openSUSE 12.3 (i586):
xen-kmp-pae-4.2.1_12_k3.7.10_1.1-1.8.1
xen-kmp-pae-debuginfo-4.2.1_12_k3.7.10_1.1-1.8.1
References:
https://bugzilla.novell.com/797014https://bugzilla.novell.com/801910https://bugzilla.novell.com/803712https://bugzilla.novell.com/805579https://bugzilla.novell.com/811764https://bugzilla.novell.com/813156
openSUSE Security Update: subversion: security and bugfix minor version updates
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0687-1
Rating: moderate
References: #813913
Cross-References: CVE-2013-1845 CVE-2013-1846 CVE-2013-1847
CVE-2013-1849 CVE-2013-1884
Affected Products:
openSUSE 12.3
openSUSE 12.2
openSUSE 12.1
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
Subversion received minor version updates to fix remote
triggerable vulnerabilities in mod_dav_svn which may result
in denial of service.
On openSUSE 12.1:
- update to 1.6.21 [bnc#813913], addressing remotely
triggerable
+ CVE-2013-1845: mod_dav_svn excessive memory usage from
property changes
+ CVE-2013-1846: mod_dav_svn crashes on LOCK requests
against activity URLs
+ CVE-2013-1847: mod_dav_svn crashes on LOCK requests
against non-existant URLs
+ CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests
against activity URLs
- further changes:
+ mod_dav_svn will omit some property values for activity
urls
+ improve memory usage when committing properties in
mod_dav_svn
+ fix mod_dav_svn runs pre-revprop-change twice
+ fixed: post-revprop-change errors cancel commit
+ improved logic in mod_dav_svn's implementation of lock.
+ fix a compatibility issue with g++ 4.7
On openSUSE 12.2 and 12.3:
- update to 1.7.9 [bnc#813913], addressing remotely
triggerable vulnerabilities in mod_dav_svn which may
result in denial of service:
+ CVE-2013-1845: mod_dav_svn excessive memory usage from
property changes
+ CVE-2013-1846: mod_dav_svn crashes on LOCK requests
against activity URLs
+ CVE-2013-1847: mod_dav_svn crashes on LOCK requests
against non-existant URLs
+ CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests
against activity URLs
+ CVE-2013-1884: mod_dav_svn crashes on out of range
limit in log REPORT
- further changes:
+ Client-side bugfixes:
* improved error messages about svn:date and svn:author
props.
* fix local_relpath assertion
* fix memory leak in `svn log` over svn://
* fix incorrect authz failure when using neon http
library
* fix segfault when using kwallet
+ Server-side bugfixes:
* svnserve will log the replayed rev not the low-water
rev.
* mod_dav_svn will omit some property values for
activity urls
* fix an assertion in mod_dav_svn when acting as a
proxy on /
* improve memory usage when committing properties in
mod_dav_svn
* fix svnrdump to load dump files with non-LF line
endings
* fix assertion when rep-cache is inaccessible
* improved logic in mod_dav_svn's implementation of
lock.
* avoid executing unnecessary code in log with limit
- Developer-visible changes:
+ General:
* fix an assertion in dav_svn_get_repos_path() on
Windows
* fix get-deps.sh to correctly download zlib
* doxygen docs will now ignore prefixes when producing
the index
* fix get-deps.sh on freebsd
+ Bindings:
* javahl status api now respects the ignoreExternals
boolean
- refresh subversion-no-build-date.patch for upstream
source changes
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-345
- openSUSE 12.2:
zypper in -t patch openSUSE-2013-345
- openSUSE 12.1:
zypper in -t patch openSUSE-2013-345
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1
libsvn_auth_gnome_keyring-1-0-debuginfo-1.7.9-2.4.1
libsvn_auth_kwallet-1-0-1.7.9-2.4.1
libsvn_auth_kwallet-1-0-debuginfo-1.7.9-2.4.1
subversion-1.7.9-2.4.1
subversion-debuginfo-1.7.9-2.4.1
subversion-debugsource-1.7.9-2.4.1
subversion-devel-1.7.9-2.4.1
subversion-perl-1.7.9-2.4.1
subversion-perl-debuginfo-1.7.9-2.4.1
subversion-python-1.7.9-2.4.1
subversion-python-debuginfo-1.7.9-2.4.1
subversion-server-1.7.9-2.4.1
subversion-server-debuginfo-1.7.9-2.4.1
subversion-tools-1.7.9-2.4.1
subversion-tools-debuginfo-1.7.9-2.4.1
- openSUSE 12.3 (noarch):
subversion-bash-completion-1.7.9-2.4.1
- openSUSE 12.2 (i586 x86_64):
libsvn_auth_gnome_keyring-1-0-1.7.9-4.12.1
libsvn_auth_gnome_keyring-1-0-debuginfo-1.7.9-4.12.1
libsvn_auth_kwallet-1-0-1.7.9-4.12.1
libsvn_auth_kwallet-1-0-debuginfo-1.7.9-4.12.1
subversion-1.7.9-4.12.1
subversion-debuginfo-1.7.9-4.12.1
subversion-debugsource-1.7.9-4.12.1
subversion-devel-1.7.9-4.12.1
subversion-perl-1.7.9-4.12.1
subversion-perl-debuginfo-1.7.9-4.12.1
subversion-python-1.7.9-4.12.1
subversion-python-debuginfo-1.7.9-4.12.1
subversion-server-1.7.9-4.12.1
subversion-server-debuginfo-1.7.9-4.12.1
subversion-tools-1.7.9-4.12.1
subversion-tools-debuginfo-1.7.9-4.12.1
- openSUSE 12.2 (noarch):
subversion-bash-completion-1.7.9-4.12.1
- openSUSE 12.1 (i586 x86_64):
libsvn_auth_gnome_keyring-1-0-1.6.21-2.17.1
libsvn_auth_gnome_keyring-1-0-debuginfo-1.6.21-2.17.1
libsvn_auth_kwallet-1-0-1.6.21-2.17.1
libsvn_auth_kwallet-1-0-debuginfo-1.6.21-2.17.1
subversion-1.6.21-2.17.1
subversion-debuginfo-1.6.21-2.17.1
subversion-debugsource-1.6.21-2.17.1
subversion-devel-1.6.21-2.17.1
subversion-perl-1.6.21-2.17.1
subversion-perl-debuginfo-1.6.21-2.17.1
subversion-python-1.6.21-2.17.1
subversion-python-debuginfo-1.6.21-2.17.1
subversion-ruby-1.6.21-2.17.1
subversion-ruby-debuginfo-1.6.21-2.17.1
subversion-server-1.6.21-2.17.1
subversion-server-debuginfo-1.6.21-2.17.1
subversion-tools-1.6.21-2.17.1
subversion-tools-debuginfo-1.6.21-2.17.1
References:
http://support.novell.com/security/cve/CVE-2013-1845.htmlhttp://support.novell.com/security/cve/CVE-2013-1846.htmlhttp://support.novell.com/security/cve/CVE-2013-1847.htmlhttp://support.novell.com/security/cve/CVE-2013-1849.htmlhttp://support.novell.com/security/cve/CVE-2013-1884.htmlhttps://bugzilla.novell.com/813913
openSUSE Security Update: opera: security and bugfix update to 12.15
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0686-1
Rating: moderate
References: #813495
Affected Products:
openSUSE 12.3:NonFree
openSUSE 12.2:NonFree
openSUSE 12.1
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
Opera 12.15 is a recommended upgrade offering security and
stability enhancements. It provides:
-fixed an issue where the search bar's default engine could
be overridden by third-party apps;
-fixed a moderately severe issue;
-added safeguards against attacks on the RC4 encryption
protocol; see our advisory.
-fixed an issue where cookies could be set for a top-level
domain; see our advisory.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:NonFree:
zypper in -t patch openSUSE-2013-344
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2013-344
- openSUSE 12.1:
zypper in -t patch openSUSE-2013-344
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3:NonFree (i586 x86_64):
opera-12.15-4.1
opera-gtk-12.15-4.1
opera-kde4-12.15-4.1
- openSUSE 12.2:NonFree (i586 x86_64):
opera-12.15-1.22.1
opera-gtk-12.15-1.22.1
opera-kde4-12.15-1.22.1
- openSUSE 12.1 (i586 x86_64):
opera-12.15-49.1
opera-gtk-12.15-49.1
opera-kde4-12.15-49.1
References:
https://bugzilla.novell.com/813495
openSUSE Recommended Update: findutils: make updatedb ignore btrfs snapshots
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0685-1
Rating: low
References: #780918 #813293
Affected Products:
openSUSE 12.3
openSUSE 12.2
openSUSE 12.1
______________________________________________________________________________
An update that has two recommended fixes can now be
installed.
Description:
Updatedb was supposed to ignore btrfs snapshots but due to
misspelling it didn't. This update fixes the spelling and
thus the btrfs snapshots are indeed ignored.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-343
- openSUSE 12.2:
zypper in -t patch openSUSE-2013-343
- openSUSE 12.1:
zypper in -t patch openSUSE-2013-343
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
findutils-4.5.10-10.4.1
findutils-debuginfo-4.5.10-10.4.1
findutils-debugsource-4.5.10-10.4.1
findutils-locate-4.5.10-10.4.1
findutils-locate-debuginfo-4.5.10-10.4.1
- openSUSE 12.3 (noarch):
findutils-lang-4.5.10-10.4.1
- openSUSE 12.2 (i586 x86_64):
findutils-4.5.10-5.12.1
findutils-debuginfo-4.5.10-5.12.1
findutils-debugsource-4.5.10-5.12.1
findutils-locate-4.5.10-5.12.1
findutils-locate-debuginfo-4.5.10-5.12.1
- openSUSE 12.2 (noarch):
findutils-lang-4.5.10-5.12.1
- openSUSE 12.1 (i586 x86_64):
findutils-4.4.2-17.4.1
findutils-debuginfo-4.4.2-17.4.1
findutils-debugsource-4.4.2-17.4.1
findutils-locate-4.4.2-17.4.1
findutils-locate-debuginfo-4.4.2-17.4.1
- openSUSE 12.1 (noarch):
findutils-lang-4.4.2-17.4.1
References:
https://bugzilla.novell.com/780918https://bugzilla.novell.com/813293
openSUSE Recommended Update: wqy-bitmap-fonts: fixed configuration files
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0684-1
Rating: moderate
References: #813988
Affected Products:
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
Some bugs in wqy-bitmap-fonts were fixed, where fontconfig
language was incorrect.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-341
- openSUSE 12.2:
zypper in -t patch openSUSE-2013-341
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (noarch):
wqy-bitmap-fonts-0.9.9_0-8.4.1
- openSUSE 12.2 (noarch):
wqy-bitmap-fonts-0.9.9_0-3.4.1
References:
https://bugzilla.novell.com/813988
openSUSE Recommended Update: gedit-plugins: embedded terminal not loaded in gedit
______________________________________________________________________________
Announcement ID: openSUSE-RU-2013:0683-1
Rating: moderate
References: #811434
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
gedit was updated to have the embedded terminal specify
that it needs Vte 2.90. If it happens to load only Vte 0.0,
we end up with Gtk2 and Gtk3 in memory (which the gobject
introspection loader blocks). Fix bnc#811434.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-336
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
gedit-plugins-3.6.1-2.4.1
gedit-plugins-debuginfo-3.6.1-2.4.1
gedit-plugins-debugsource-3.6.1-2.4.1
- openSUSE 12.3 (noarch):
gedit-plugins-lang-3.6.1-2.4.1
References:
https://bugzilla.novell.com/811434