openSUSE Updates
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
September 2014
- 2 participants
- 64 discussions
openSUSE-SU-2014:1108-1: moderate: net-snmp: fix for remote denial of service issue
by opensuse-security@opensuse.org 10 Sep '14
by opensuse-security@opensuse.org 10 Sep '14
10 Sep '14
openSUSE Security Update: net-snmp: fix for remote denial of service issue
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1108-1
Rating: moderate
References: #894361
Cross-References: CVE-2014-3565
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
net-snmp was updated to fix a remote denial of service problem inside
snmptrapd when started with the "-OQ" option (CVE-2014-3565)(bnc#894361)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-533
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-533
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libsnmp30-5.7.2-9.8.1
libsnmp30-debuginfo-5.7.2-9.8.1
net-snmp-5.7.2-9.8.1
net-snmp-debuginfo-5.7.2-9.8.1
net-snmp-debugsource-5.7.2-9.8.1
net-snmp-devel-5.7.2-9.8.1
net-snmp-python-5.7.2-9.8.1
net-snmp-python-debuginfo-5.7.2-9.8.1
perl-SNMP-5.7.2-9.8.1
perl-SNMP-debuginfo-5.7.2-9.8.1
snmp-mibs-5.7.2-9.8.1
- openSUSE 13.1 (x86_64):
libsnmp30-32bit-5.7.2-9.8.1
libsnmp30-debuginfo-32bit-5.7.2-9.8.1
net-snmp-devel-32bit-5.7.2-9.8.1
- openSUSE 12.3 (i586 x86_64):
libsnmp30-5.7.2-3.12.1
libsnmp30-debuginfo-5.7.2-3.12.1
net-snmp-5.7.2-3.12.1
net-snmp-debuginfo-5.7.2-3.12.1
net-snmp-debugsource-5.7.2-3.12.1
net-snmp-devel-5.7.2-3.12.1
perl-SNMP-5.7.2-3.12.1
perl-SNMP-debuginfo-5.7.2-3.12.1
snmp-mibs-5.7.2-3.12.1
- openSUSE 12.3 (x86_64):
libsnmp30-32bit-5.7.2-3.12.1
libsnmp30-debuginfo-32bit-5.7.2-3.12.1
net-snmp-devel-32bit-5.7.2-3.12.1
References:
http://support.novell.com/security/cve/CVE-2014-3565.html
https://bugzilla.novell.com/894361
1
0
openSUSE-SU-2014:1100-1: important: Firefox update to 31.1esr
by opensuse-security@opensuse.org 09 Sep '14
by opensuse-security@opensuse.org 09 Sep '14
09 Sep '14
openSUSE Security Update: Firefox update to 31.1esr
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1100-1
Rating: important
References: #104586 #354469 #385739 #390992 #417869 #41903
#429179 #439841 #441084 #455804 #484321 #503151
#518603 #527418 #528406 #529180 #542809 #559819
#576969 #582276 #586567 #593807 #603356 #622506
#637303 #642502 #645315 #649492 #657016 #664211
#667155 #689281 #701296 #712224 #714931 #720264
#726758 #728520 #732898 #733002 #737533 #744275
#746616 #747328 #749440 #750044 #755060 #758408
#765204 #771583 #777588 #783533 #786522 #790140
#796895 #804248 #808243 #813026 #819204 #825935
#833389 #840485 #847708 #854370 #861847 #868603
#875378 #876833 #881874 #887746 #894201 #894370
Cross-References: CVE-2007-3089 CVE-2007-3285 CVE-2007-3656
CVE-2007-3670 CVE-2007-3734 CVE-2007-3735
CVE-2007-3736 CVE-2007-3737 CVE-2007-3738
CVE-2008-0016 CVE-2008-1233 CVE-2008-1234
CVE-2008-1235 CVE-2008-1236 CVE-2008-1237
CVE-2008-3835 CVE-2008-4058 CVE-2008-4059
CVE-2008-4060 CVE-2008-4061 CVE-2008-4062
CVE-2008-4063 CVE-2008-4064 CVE-2008-4065
CVE-2008-4066 CVE-2008-4067 CVE-2008-4068
CVE-2008-4070 CVE-2008-5012 CVE-2008-5014
CVE-2008-5016 CVE-2008-5017 CVE-2008-5018
CVE-2008-5021 CVE-2008-5022 CVE-2008-5024
CVE-2008-5500 CVE-2008-5501 CVE-2008-5502
CVE-2008-5503 CVE-2008-5506 CVE-2008-5507
CVE-2008-5508 CVE-2008-5510 CVE-2008-5511
CVE-2008-5512 CVE-2009-0040 CVE-2009-0771
CVE-2009-0772 CVE-2009-0773 CVE-2009-0774
CVE-2009-0776 CVE-2009-1571 CVE-2009-3555
CVE-2010-0159 CVE-2010-0173 CVE-2010-0174
CVE-2010-0175 CVE-2010-0176 CVE-2010-0182
CVE-2010-0654 CVE-2010-1121 CVE-2010-1196
CVE-2010-1199 CVE-2010-1200 CVE-2010-1201
CVE-2010-1202 CVE-2010-1203 CVE-2010-1205
CVE-2010-1211 CVE-2010-1212 CVE-2010-1213
CVE-2010-1585 CVE-2010-2752 CVE-2010-2753
CVE-2010-2754 CVE-2010-2760 CVE-2010-2762
CVE-2010-2764 CVE-2010-2765 CVE-2010-2766
CVE-2010-2767 CVE-2010-2768 CVE-2010-2769
CVE-2010-3166 CVE-2010-3167 CVE-2010-3168
CVE-2010-3169 CVE-2010-3170 CVE-2010-3173
CVE-2010-3174 CVE-2010-3175 CVE-2010-3176
CVE-2010-3178 CVE-2010-3179 CVE-2010-3180
CVE-2010-3182 CVE-2010-3183 CVE-2010-3765
CVE-2010-3768 CVE-2010-3769 CVE-2010-3776
CVE-2010-3777 CVE-2010-3778 CVE-2011-0053
CVE-2011-0061 CVE-2011-0062 CVE-2011-0069
CVE-2011-0070 CVE-2011-0072 CVE-2011-0074
CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081 CVE-2011-0083
CVE-2011-0084 CVE-2011-0085 CVE-2011-1187
CVE-2011-2362 CVE-2011-2363 CVE-2011-2364
CVE-2011-2365 CVE-2011-2371 CVE-2011-2372
CVE-2011-2373 CVE-2011-2374 CVE-2011-2376
CVE-2011-2377 CVE-2011-2985 CVE-2011-2986
CVE-2011-2987 CVE-2011-2988 CVE-2011-2989
CVE-2011-2991 CVE-2011-2992 CVE-2011-3000
CVE-2011-3001 CVE-2011-3005 CVE-2011-3026
CVE-2011-3062 CVE-2011-3101 CVE-2011-3232
CVE-2011-3648 CVE-2011-3650 CVE-2011-3651
CVE-2011-3652 CVE-2011-3654 CVE-2011-3655
CVE-2011-3658 CVE-2011-3659 CVE-2011-3660
CVE-2011-3661 CVE-2011-3663 CVE-2012-0441
CVE-2012-0442 CVE-2012-0443 CVE-2012-0444
CVE-2012-0445 CVE-2012-0446 CVE-2012-0447
CVE-2012-0449 CVE-2012-0451 CVE-2012-0452
CVE-2012-0455 CVE-2012-0456 CVE-2012-0457
CVE-2012-0458 CVE-2012-0459 CVE-2012-0460
CVE-2012-0461 CVE-2012-0462 CVE-2012-0463
CVE-2012-0464 CVE-2012-0467 CVE-2012-0468
CVE-2012-0469 CVE-2012-0470 CVE-2012-0471
CVE-2012-0472 CVE-2012-0473 CVE-2012-0474
CVE-2012-0475 CVE-2012-0477 CVE-2012-0478
CVE-2012-0479 CVE-2012-0759 CVE-2012-1937
CVE-2012-1938 CVE-2012-1940 CVE-2012-1941
CVE-2012-1944 CVE-2012-1945 CVE-2012-1946
CVE-2012-1947 CVE-2012-1948 CVE-2012-1949
CVE-2012-1951 CVE-2012-1952 CVE-2012-1953
CVE-2012-1954 CVE-2012-1955 CVE-2012-1956
CVE-2012-1957 CVE-2012-1958 CVE-2012-1959
CVE-2012-1960 CVE-2012-1961 CVE-2012-1962
CVE-2012-1963 CVE-2012-1967 CVE-2012-1970
CVE-2012-1972 CVE-2012-1973 CVE-2012-1974
CVE-2012-1975 CVE-2012-1976 CVE-2012-3956
CVE-2012-3957 CVE-2012-3958 CVE-2012-3959
CVE-2012-3960 CVE-2012-3961 CVE-2012-3962
CVE-2012-3963 CVE-2012-3964 CVE-2012-3966
CVE-2012-3967 CVE-2012-3968 CVE-2012-3969
CVE-2012-3970 CVE-2012-3971 CVE-2012-3972
CVE-2012-3975 CVE-2012-3978 CVE-2012-3980
CVE-2012-3982 CVE-2012-3983 CVE-2012-3984
CVE-2012-3985 CVE-2012-3986 CVE-2012-3988
CVE-2012-3989 CVE-2012-3990 CVE-2012-3991
CVE-2012-3992 CVE-2012-3993 CVE-2012-3994
CVE-2012-3995 CVE-2012-4179 CVE-2012-4180
CVE-2012-4181 CVE-2012-4182 CVE-2012-4183
CVE-2012-4184 CVE-2012-4185 CVE-2012-4186
CVE-2012-4187 CVE-2012-4188 CVE-2012-4191
CVE-2012-4192 CVE-2012-4193 CVE-2012-4194
CVE-2012-4195 CVE-2012-4196 CVE-2012-4201
CVE-2012-4202 CVE-2012-4204 CVE-2012-4205
CVE-2012-4207 CVE-2012-4208 CVE-2012-4209
CVE-2012-4212 CVE-2012-4213 CVE-2012-4214
CVE-2012-4215 CVE-2012-4216 CVE-2012-4217
CVE-2012-4218 CVE-2012-5829 CVE-2012-5830
CVE-2012-5833 CVE-2012-5835 CVE-2012-5836
CVE-2012-5837 CVE-2012-5838 CVE-2012-5839
CVE-2012-5840 CVE-2012-5841 CVE-2012-5842
CVE-2012-5843 CVE-2013-0743 CVE-2013-0744
CVE-2013-0745 CVE-2013-0746 CVE-2013-0747
CVE-2013-0748 CVE-2013-0749 CVE-2013-0750
CVE-2013-0752 CVE-2013-0753 CVE-2013-0754
CVE-2013-0755 CVE-2013-0756 CVE-2013-0757
CVE-2013-0758 CVE-2013-0760 CVE-2013-0761
CVE-2013-0762 CVE-2013-0763 CVE-2013-0764
CVE-2013-0766 CVE-2013-0767 CVE-2013-0768
CVE-2013-0769 CVE-2013-0770 CVE-2013-0771
CVE-2013-0773 CVE-2013-0774 CVE-2013-0775
CVE-2013-0776 CVE-2013-0780 CVE-2013-0782
CVE-2013-0783 CVE-2013-0787 CVE-2013-0788
CVE-2013-0789 CVE-2013-0793 CVE-2013-0795
CVE-2013-0796 CVE-2013-0800 CVE-2013-0801
CVE-2013-1669 CVE-2013-1670 CVE-2013-1674
CVE-2013-1675 CVE-2013-1676 CVE-2013-1677
CVE-2013-1678 CVE-2013-1679 CVE-2013-1680
CVE-2013-1681 CVE-2013-1682 CVE-2013-1684
CVE-2013-1685 CVE-2013-1686 CVE-2013-1687
CVE-2013-1690 CVE-2013-1692 CVE-2013-1693
CVE-2013-1694 CVE-2013-1697 CVE-2013-1701
CVE-2013-1709 CVE-2013-1710 CVE-2013-1713
CVE-2013-1714 CVE-2013-1717 CVE-2013-1718
CVE-2013-1719 CVE-2013-1720 CVE-2013-1722
CVE-2013-1723 CVE-2013-1724 CVE-2013-1725
CVE-2013-1728 CVE-2013-1730 CVE-2013-1732
CVE-2013-1735 CVE-2013-1736 CVE-2013-1737
CVE-2013-1738 CVE-2013-5590 CVE-2013-5591
CVE-2013-5592 CVE-2013-5593 CVE-2013-5595
CVE-2013-5596 CVE-2013-5597 CVE-2013-5599
CVE-2013-5600 CVE-2013-5601 CVE-2013-5602
CVE-2013-5603 CVE-2013-5604 CVE-2013-5609
CVE-2013-5610 CVE-2013-5611 CVE-2013-5612
CVE-2013-5613 CVE-2013-5614 CVE-2013-5615
CVE-2013-5616 CVE-2013-5618 CVE-2013-5619
CVE-2013-6629 CVE-2013-6630 CVE-2013-6671
CVE-2013-6672 CVE-2013-6673 CVE-2014-1477
CVE-2014-1478 CVE-2014-1479 CVE-2014-1480
CVE-2014-1481 CVE-2014-1482 CVE-2014-1483
CVE-2014-1484 CVE-2014-1485 CVE-2014-1486
CVE-2014-1487 CVE-2014-1488 CVE-2014-1489
CVE-2014-1490 CVE-2014-1491 CVE-2014-1492
CVE-2014-1493 CVE-2014-1494 CVE-2014-1497
CVE-2014-1498 CVE-2014-1499 CVE-2014-1500
CVE-2014-1502 CVE-2014-1504 CVE-2014-1505
CVE-2014-1508 CVE-2014-1509 CVE-2014-1510
CVE-2014-1511 CVE-2014-1512 CVE-2014-1513
CVE-2014-1514 CVE-2014-1518 CVE-2014-1519
CVE-2014-1522 CVE-2014-1523 CVE-2014-1524
CVE-2014-1525 CVE-2014-1526 CVE-2014-1528
CVE-2014-1529 CVE-2014-1530 CVE-2014-1531
CVE-2014-1532 CVE-2014-1533 CVE-2014-1534
CVE-2014-1536 CVE-2014-1537 CVE-2014-1538
CVE-2014-1539 CVE-2014-1540 CVE-2014-1541
CVE-2014-1542 CVE-2014-1543 CVE-2014-1544
CVE-2014-1545 CVE-2014-1547 CVE-2014-1548
CVE-2014-1549 CVE-2014-1550 CVE-2014-1552
CVE-2014-1553 CVE-2014-1555 CVE-2014-1556
CVE-2014-1557 CVE-2014-1558 CVE-2014-1559
CVE-2014-1560 CVE-2014-1561 CVE-2014-1562
CVE-2014-1563 CVE-2014-1564 CVE-2014-1565
CVE-2014-1567
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes 475 vulnerabilities is now available.
Description:
This patch contains security updates for
* mozilla-nss 3.16.4
- The following 1024-bit root CA certificate was restored to allow more
time to develop a better transition strategy for affected sites. It
was removed in NSS 3.16.3, but discussion in the
mozilla.dev.security.policy forum led to the decision to keep this
root included longer in order to give website administrators more time
to update their web servers.
- CN = GTE CyberTrust Global Root
* In NSS 3.16.3, the 1024-bit "Entrust.net Secure Server Certification
Authority" root CA certificate was removed. In NSS 3.16.4, a 2048-bit
intermediate CA certificate has been included, without explicit trust.
The intention is to mitigate the effects of the previous removal of
the 1024-bit Entrust.net root certificate, because many public
Internet sites still use the "USERTrust Legacy Secure Server CA"
intermediate certificate that is signed by the 1024-bit Entrust.net
root certificate. The inclusion of the intermediate certificate is a
temporary measure to allow those sites to function, by allowing them
to find a trust path to another 2048-bit root CA certificate. The
temporarily included intermediate certificate expires November 1, 2015.
* Firefox 31.1esr Firefox is updated from 24esr to 31esr as maintenance
for version 24 stopped
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2014-82
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
MozillaFirefox-24.8.0-127.1
MozillaFirefox-branding-upstream-24.8.0-127.1
MozillaFirefox-buildsymbols-24.8.0-127.1
MozillaFirefox-debuginfo-24.8.0-127.1
MozillaFirefox-debugsource-24.8.0-127.1
MozillaFirefox-devel-24.8.0-127.1
MozillaFirefox-translations-common-24.8.0-127.1
MozillaFirefox-translations-other-24.8.0-127.1
libfreebl3-3.16.4-94.1
libfreebl3-debuginfo-3.16.4-94.1
libsoftokn3-3.16.4-94.1
libsoftokn3-debuginfo-3.16.4-94.1
mozilla-nss-3.16.4-94.1
mozilla-nss-certs-3.16.4-94.1
mozilla-nss-certs-debuginfo-3.16.4-94.1
mozilla-nss-debuginfo-3.16.4-94.1
mozilla-nss-debugsource-3.16.4-94.1
mozilla-nss-devel-3.16.4-94.1
mozilla-nss-sysinit-3.16.4-94.1
mozilla-nss-sysinit-debuginfo-3.16.4-94.1
mozilla-nss-tools-3.16.4-94.1
mozilla-nss-tools-debuginfo-3.16.4-94.1
- openSUSE 11.4 (x86_64):
libfreebl3-32bit-3.16.4-94.1
libfreebl3-debuginfo-32bit-3.16.4-94.1
libsoftokn3-32bit-3.16.4-94.1
libsoftokn3-debuginfo-32bit-3.16.4-94.1
mozilla-nss-32bit-3.16.4-94.1
mozilla-nss-certs-32bit-3.16.4-94.1
mozilla-nss-certs-debuginfo-32bit-3.16.4-94.1
mozilla-nss-debuginfo-32bit-3.16.4-94.1
mozilla-nss-sysinit-32bit-3.16.4-94.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.4-94.1
- openSUSE 11.4 (ia64):
libfreebl3-debuginfo-x86-3.16.4-94.1
libfreebl3-x86-3.16.4-94.1
libsoftokn3-debuginfo-x86-3.16.4-94.1
libsoftokn3-x86-3.16.4-94.1
mozilla-nss-certs-debuginfo-x86-3.16.4-94.1
mozilla-nss-certs-x86-3.16.4-94.1
mozilla-nss-debuginfo-x86-3.16.4-94.1
mozilla-nss-sysinit-debuginfo-x86-3.16.4-94.1
mozilla-nss-sysinit-x86-3.16.4-94.1
mozilla-nss-x86-3.16.4-94.1
References:
http://support.novell.com/security/cve/CVE-2007-3089.html
http://support.novell.com/security/cve/CVE-2007-3285.html
http://support.novell.com/security/cve/CVE-2007-3656.html
http://support.novell.com/security/cve/CVE-2007-3670.html
http://support.novell.com/security/cve/CVE-2007-3734.html
http://support.novell.com/security/cve/CVE-2007-3735.html
http://support.novell.com/security/cve/CVE-2007-3736.html
http://support.novell.com/security/cve/CVE-2007-3737.html
http://support.novell.com/security/cve/CVE-2007-3738.html
http://support.novell.com/security/cve/CVE-2008-0016.html
http://support.novell.com/security/cve/CVE-2008-1233.html
http://support.novell.com/security/cve/CVE-2008-1234.html
http://support.novell.com/security/cve/CVE-2008-1235.html
http://support.novell.com/security/cve/CVE-2008-1236.html
http://support.novell.com/security/cve/CVE-2008-1237.html
http://support.novell.com/security/cve/CVE-2008-3835.html
http://support.novell.com/security/cve/CVE-2008-4058.html
http://support.novell.com/security/cve/CVE-2008-4059.html
http://support.novell.com/security/cve/CVE-2008-4060.html
http://support.novell.com/security/cve/CVE-2008-4061.html
http://support.novell.com/security/cve/CVE-2008-4062.html
http://support.novell.com/security/cve/CVE-2008-4063.html
http://support.novell.com/security/cve/CVE-2008-4064.html
http://support.novell.com/security/cve/CVE-2008-4065.html
http://support.novell.com/security/cve/CVE-2008-4066.html
http://support.novell.com/security/cve/CVE-2008-4067.html
http://support.novell.com/security/cve/CVE-2008-4068.html
http://support.novell.com/security/cve/CVE-2008-4070.html
http://support.novell.com/security/cve/CVE-2008-5012.html
http://support.novell.com/security/cve/CVE-2008-5014.html
http://support.novell.com/security/cve/CVE-2008-5016.html
http://support.novell.com/security/cve/CVE-2008-5017.html
http://support.novell.com/security/cve/CVE-2008-5018.html
http://support.novell.com/security/cve/CVE-2008-5021.html
http://support.novell.com/security/cve/CVE-2008-5022.html
http://support.novell.com/security/cve/CVE-2008-5024.html
http://support.novell.com/security/cve/CVE-2008-5500.html
http://support.novell.com/security/cve/CVE-2008-5501.html
http://support.novell.com/security/cve/CVE-2008-5502.html
http://support.novell.com/security/cve/CVE-2008-5503.html
http://support.novell.com/security/cve/CVE-2008-5506.html
http://support.novell.com/security/cve/CVE-2008-5507.html
http://support.novell.com/security/cve/CVE-2008-5508.html
http://support.novell.com/security/cve/CVE-2008-5510.html
http://support.novell.com/security/cve/CVE-2008-5511.html
http://support.novell.com/security/cve/CVE-2008-5512.html
http://support.novell.com/security/cve/CVE-2009-0040.html
http://support.novell.com/security/cve/CVE-2009-0771.html
http://support.novell.com/security/cve/CVE-2009-0772.html
http://support.novell.com/security/cve/CVE-2009-0773.html
http://support.novell.com/security/cve/CVE-2009-0774.html
http://support.novell.com/security/cve/CVE-2009-0776.html
http://support.novell.com/security/cve/CVE-2009-1571.html
http://support.novell.com/security/cve/CVE-2009-3555.html
http://support.novell.com/security/cve/CVE-2010-0159.html
http://support.novell.com/security/cve/CVE-2010-0173.html
http://support.novell.com/security/cve/CVE-2010-0174.html
http://support.novell.com/security/cve/CVE-2010-0175.html
http://support.novell.com/security/cve/CVE-2010-0176.html
http://support.novell.com/security/cve/CVE-2010-0182.html
http://support.novell.com/security/cve/CVE-2010-0654.html
http://support.novell.com/security/cve/CVE-2010-1121.html
http://support.novell.com/security/cve/CVE-2010-1196.html
http://support.novell.com/security/cve/CVE-2010-1199.html
http://support.novell.com/security/cve/CVE-2010-1200.html
http://support.novell.com/security/cve/CVE-2010-1201.html
http://support.novell.com/security/cve/CVE-2010-1202.html
http://support.novell.com/security/cve/CVE-2010-1203.html
http://support.novell.com/security/cve/CVE-2010-1205.html
http://support.novell.com/security/cve/CVE-2010-1211.html
http://support.novell.com/security/cve/CVE-2010-1212.html
http://support.novell.com/security/cve/CVE-2010-1213.html
http://support.novell.com/security/cve/CVE-2010-1585.html
http://support.novell.com/security/cve/CVE-2010-2752.html
http://support.novell.com/security/cve/CVE-2010-2753.html
http://support.novell.com/security/cve/CVE-2010-2754.html
http://support.novell.com/security/cve/CVE-2010-2760.html
http://support.novell.com/security/cve/CVE-2010-2762.html
http://support.novell.com/security/cve/CVE-2010-2764.html
http://support.novell.com/security/cve/CVE-2010-2765.html
http://support.novell.com/security/cve/CVE-2010-2766.html
http://support.novell.com/security/cve/CVE-2010-2767.html
http://support.novell.com/security/cve/CVE-2010-2768.html
http://support.novell.com/security/cve/CVE-2010-2769.html
http://support.novell.com/security/cve/CVE-2010-3166.html
http://support.novell.com/security/cve/CVE-2010-3167.html
http://support.novell.com/security/cve/CVE-2010-3168.html
http://support.novell.com/security/cve/CVE-2010-3169.html
http://support.novell.com/security/cve/CVE-2010-3170.html
http://support.novell.com/security/cve/CVE-2010-3173.html
http://support.novell.com/security/cve/CVE-2010-3174.html
http://support.novell.com/security/cve/CVE-2010-3175.html
http://support.novell.com/security/cve/CVE-2010-3176.html
http://support.novell.com/security/cve/CVE-2010-3178.html
http://support.novell.com/security/cve/CVE-2010-3179.html
http://support.novell.com/security/cve/CVE-2010-3180.html
http://support.novell.com/security/cve/CVE-2010-3182.html
http://support.novell.com/security/cve/CVE-2010-3183.html
http://support.novell.com/security/cve/CVE-2010-3765.html
http://support.novell.com/security/cve/CVE-2010-3768.html
http://support.novell.com/security/cve/CVE-2010-3769.html
http://support.novell.com/security/cve/CVE-2010-3776.html
http://support.novell.com/security/cve/CVE-2010-3777.html
http://support.novell.com/security/cve/CVE-2010-3778.html
http://support.novell.com/security/cve/CVE-2011-0053.html
http://support.novell.com/security/cve/CVE-2011-0061.html
http://support.novell.com/security/cve/CVE-2011-0062.html
http://support.novell.com/security/cve/CVE-2011-0069.html
http://support.novell.com/security/cve/CVE-2011-0070.html
http://support.novell.com/security/cve/CVE-2011-0072.html
http://support.novell.com/security/cve/CVE-2011-0074.html
http://support.novell.com/security/cve/CVE-2011-0075.html
http://support.novell.com/security/cve/CVE-2011-0077.html
http://support.novell.com/security/cve/CVE-2011-0078.html
http://support.novell.com/security/cve/CVE-2011-0080.html
http://support.novell.com/security/cve/CVE-2011-0081.html
http://support.novell.com/security/cve/CVE-2011-0083.html
http://support.novell.com/security/cve/CVE-2011-0084.html
http://support.novell.com/security/cve/CVE-2011-0085.html
http://support.novell.com/security/cve/CVE-2011-1187.html
http://support.novell.com/security/cve/CVE-2011-2362.html
http://support.novell.com/security/cve/CVE-2011-2363.html
http://support.novell.com/security/cve/CVE-2011-2364.html
http://support.novell.com/security/cve/CVE-2011-2365.html
http://support.novell.com/security/cve/CVE-2011-2371.html
http://support.novell.com/security/cve/CVE-2011-2372.html
http://support.novell.com/security/cve/CVE-2011-2373.html
http://support.novell.com/security/cve/CVE-2011-2374.html
http://support.novell.com/security/cve/CVE-2011-2376.html
http://support.novell.com/security/cve/CVE-2011-2377.html
http://support.novell.com/security/cve/CVE-2011-2985.html
http://support.novell.com/security/cve/CVE-2011-2986.html
http://support.novell.com/security/cve/CVE-2011-2987.html
http://support.novell.com/security/cve/CVE-2011-2988.html
http://support.novell.com/security/cve/CVE-2011-2989.html
http://support.novell.com/security/cve/CVE-2011-2991.html
http://support.novell.com/security/cve/CVE-2011-2992.html
http://support.novell.com/security/cve/CVE-2011-3000.html
http://support.novell.com/security/cve/CVE-2011-3001.html
http://support.novell.com/security/cve/CVE-2011-3005.html
http://support.novell.com/security/cve/CVE-2011-3026.html
http://support.novell.com/security/cve/CVE-2011-3062.html
http://support.novell.com/security/cve/CVE-2011-3101.html
http://support.novell.com/security/cve/CVE-2011-3232.html
http://support.novell.com/security/cve/CVE-2011-3648.html
http://support.novell.com/security/cve/CVE-2011-3650.html
http://support.novell.com/security/cve/CVE-2011-3651.html
http://support.novell.com/security/cve/CVE-2011-3652.html
http://support.novell.com/security/cve/CVE-2011-3654.html
http://support.novell.com/security/cve/CVE-2011-3655.html
http://support.novell.com/security/cve/CVE-2011-3658.html
http://support.novell.com/security/cve/CVE-2011-3659.html
http://support.novell.com/security/cve/CVE-2011-3660.html
http://support.novell.com/security/cve/CVE-2011-3661.html
http://support.novell.com/security/cve/CVE-2011-3663.html
http://support.novell.com/security/cve/CVE-2012-0441.html
http://support.novell.com/security/cve/CVE-2012-0442.html
http://support.novell.com/security/cve/CVE-2012-0443.html
http://support.novell.com/security/cve/CVE-2012-0444.html
http://support.novell.com/security/cve/CVE-2012-0445.html
http://support.novell.com/security/cve/CVE-2012-0446.html
http://support.novell.com/security/cve/CVE-2012-0447.html
http://support.novell.com/security/cve/CVE-2012-0449.html
http://support.novell.com/security/cve/CVE-2012-0451.html
http://support.novell.com/security/cve/CVE-2012-0452.html
http://support.novell.com/security/cve/CVE-2012-0455.html
http://support.novell.com/security/cve/CVE-2012-0456.html
http://support.novell.com/security/cve/CVE-2012-0457.html
http://support.novell.com/security/cve/CVE-2012-0458.html
http://support.novell.com/security/cve/CVE-2012-0459.html
http://support.novell.com/security/cve/CVE-2012-0460.html
http://support.novell.com/security/cve/CVE-2012-0461.html
http://support.novell.com/security/cve/CVE-2012-0462.html
http://support.novell.com/security/cve/CVE-2012-0463.html
http://support.novell.com/security/cve/CVE-2012-0464.html
http://support.novell.com/security/cve/CVE-2012-0467.html
http://support.novell.com/security/cve/CVE-2012-0468.html
http://support.novell.com/security/cve/CVE-2012-0469.html
http://support.novell.com/security/cve/CVE-2012-0470.html
http://support.novell.com/security/cve/CVE-2012-0471.html
http://support.novell.com/security/cve/CVE-2012-0472.html
http://support.novell.com/security/cve/CVE-2012-0473.html
http://support.novell.com/security/cve/CVE-2012-0474.html
http://support.novell.com/security/cve/CVE-2012-0475.html
http://support.novell.com/security/cve/CVE-2012-0477.html
http://support.novell.com/security/cve/CVE-2012-0478.html
http://support.novell.com/security/cve/CVE-2012-0479.html
http://support.novell.com/security/cve/CVE-2012-0759.html
http://support.novell.com/security/cve/CVE-2012-1937.html
http://support.novell.com/security/cve/CVE-2012-1938.html
http://support.novell.com/security/cve/CVE-2012-1940.html
http://support.novell.com/security/cve/CVE-2012-1941.html
http://support.novell.com/security/cve/CVE-2012-1944.html
http://support.novell.com/security/cve/CVE-2012-1945.html
http://support.novell.com/security/cve/CVE-2012-1946.html
http://support.novell.com/security/cve/CVE-2012-1947.html
http://support.novell.com/security/cve/CVE-2012-1948.html
http://support.novell.com/security/cve/CVE-2012-1949.html
http://support.novell.com/security/cve/CVE-2012-1951.html
http://support.novell.com/security/cve/CVE-2012-1952.html
http://support.novell.com/security/cve/CVE-2012-1953.html
http://support.novell.com/security/cve/CVE-2012-1954.html
http://support.novell.com/security/cve/CVE-2012-1955.html
http://support.novell.com/security/cve/CVE-2012-1956.html
http://support.novell.com/security/cve/CVE-2012-1957.html
http://support.novell.com/security/cve/CVE-2012-1958.html
http://support.novell.com/security/cve/CVE-2012-1959.html
http://support.novell.com/security/cve/CVE-2012-1960.html
http://support.novell.com/security/cve/CVE-2012-1961.html
http://support.novell.com/security/cve/CVE-2012-1962.html
http://support.novell.com/security/cve/CVE-2012-1963.html
http://support.novell.com/security/cve/CVE-2012-1967.html
http://support.novell.com/security/cve/CVE-2012-1970.html
http://support.novell.com/security/cve/CVE-2012-1972.html
http://support.novell.com/security/cve/CVE-2012-1973.html
http://support.novell.com/security/cve/CVE-2012-1974.html
http://support.novell.com/security/cve/CVE-2012-1975.html
http://support.novell.com/security/cve/CVE-2012-1976.html
http://support.novell.com/security/cve/CVE-2012-3956.html
http://support.novell.com/security/cve/CVE-2012-3957.html
http://support.novell.com/security/cve/CVE-2012-3958.html
http://support.novell.com/security/cve/CVE-2012-3959.html
http://support.novell.com/security/cve/CVE-2012-3960.html
http://support.novell.com/security/cve/CVE-2012-3961.html
http://support.novell.com/security/cve/CVE-2012-3962.html
http://support.novell.com/security/cve/CVE-2012-3963.html
http://support.novell.com/security/cve/CVE-2012-3964.html
http://support.novell.com/security/cve/CVE-2012-3966.html
http://support.novell.com/security/cve/CVE-2012-3967.html
http://support.novell.com/security/cve/CVE-2012-3968.html
http://support.novell.com/security/cve/CVE-2012-3969.html
http://support.novell.com/security/cve/CVE-2012-3970.html
http://support.novell.com/security/cve/CVE-2012-3971.html
http://support.novell.com/security/cve/CVE-2012-3972.html
http://support.novell.com/security/cve/CVE-2012-3975.html
http://support.novell.com/security/cve/CVE-2012-3978.html
http://support.novell.com/security/cve/CVE-2012-3980.html
http://support.novell.com/security/cve/CVE-2012-3982.html
http://support.novell.com/security/cve/CVE-2012-3983.html
http://support.novell.com/security/cve/CVE-2012-3984.html
http://support.novell.com/security/cve/CVE-2012-3985.html
http://support.novell.com/security/cve/CVE-2012-3986.html
http://support.novell.com/security/cve/CVE-2012-3988.html
http://support.novell.com/security/cve/CVE-2012-3989.html
http://support.novell.com/security/cve/CVE-2012-3990.html
http://support.novell.com/security/cve/CVE-2012-3991.html
http://support.novell.com/security/cve/CVE-2012-3992.html
http://support.novell.com/security/cve/CVE-2012-3993.html
http://support.novell.com/security/cve/CVE-2012-3994.html
http://support.novell.com/security/cve/CVE-2012-3995.html
http://support.novell.com/security/cve/CVE-2012-4179.html
http://support.novell.com/security/cve/CVE-2012-4180.html
http://support.novell.com/security/cve/CVE-2012-4181.html
http://support.novell.com/security/cve/CVE-2012-4182.html
http://support.novell.com/security/cve/CVE-2012-4183.html
http://support.novell.com/security/cve/CVE-2012-4184.html
http://support.novell.com/security/cve/CVE-2012-4185.html
http://support.novell.com/security/cve/CVE-2012-4186.html
http://support.novell.com/security/cve/CVE-2012-4187.html
http://support.novell.com/security/cve/CVE-2012-4188.html
http://support.novell.com/security/cve/CVE-2012-4191.html
http://support.novell.com/security/cve/CVE-2012-4192.html
http://support.novell.com/security/cve/CVE-2012-4193.html
http://support.novell.com/security/cve/CVE-2012-4194.html
http://support.novell.com/security/cve/CVE-2012-4195.html
http://support.novell.com/security/cve/CVE-2012-4196.html
http://support.novell.com/security/cve/CVE-2012-4201.html
http://support.novell.com/security/cve/CVE-2012-4202.html
http://support.novell.com/security/cve/CVE-2012-4204.html
http://support.novell.com/security/cve/CVE-2012-4205.html
http://support.novell.com/security/cve/CVE-2012-4207.html
http://support.novell.com/security/cve/CVE-2012-4208.html
http://support.novell.com/security/cve/CVE-2012-4209.html
http://support.novell.com/security/cve/CVE-2012-4212.html
http://support.novell.com/security/cve/CVE-2012-4213.html
http://support.novell.com/security/cve/CVE-2012-4214.html
http://support.novell.com/security/cve/CVE-2012-4215.html
http://support.novell.com/security/cve/CVE-2012-4216.html
http://support.novell.com/security/cve/CVE-2012-4217.html
http://support.novell.com/security/cve/CVE-2012-4218.html
http://support.novell.com/security/cve/CVE-2012-5829.html
http://support.novell.com/security/cve/CVE-2012-5830.html
http://support.novell.com/security/cve/CVE-2012-5833.html
http://support.novell.com/security/cve/CVE-2012-5835.html
http://support.novell.com/security/cve/CVE-2012-5836.html
http://support.novell.com/security/cve/CVE-2012-5837.html
http://support.novell.com/security/cve/CVE-2012-5838.html
http://support.novell.com/security/cve/CVE-2012-5839.html
http://support.novell.com/security/cve/CVE-2012-5840.html
http://support.novell.com/security/cve/CVE-2012-5841.html
http://support.novell.com/security/cve/CVE-2012-5842.html
http://support.novell.com/security/cve/CVE-2012-5843.html
http://support.novell.com/security/cve/CVE-2013-0743.html
http://support.novell.com/security/cve/CVE-2013-0744.html
http://support.novell.com/security/cve/CVE-2013-0745.html
http://support.novell.com/security/cve/CVE-2013-0746.html
http://support.novell.com/security/cve/CVE-2013-0747.html
http://support.novell.com/security/cve/CVE-2013-0748.html
http://support.novell.com/security/cve/CVE-2013-0749.html
http://support.novell.com/security/cve/CVE-2013-0750.html
http://support.novell.com/security/cve/CVE-2013-0752.html
http://support.novell.com/security/cve/CVE-2013-0753.html
http://support.novell.com/security/cve/CVE-2013-0754.html
http://support.novell.com/security/cve/CVE-2013-0755.html
http://support.novell.com/security/cve/CVE-2013-0756.html
http://support.novell.com/security/cve/CVE-2013-0757.html
http://support.novell.com/security/cve/CVE-2013-0758.html
http://support.novell.com/security/cve/CVE-2013-0760.html
http://support.novell.com/security/cve/CVE-2013-0761.html
http://support.novell.com/security/cve/CVE-2013-0762.html
http://support.novell.com/security/cve/CVE-2013-0763.html
http://support.novell.com/security/cve/CVE-2013-0764.html
http://support.novell.com/security/cve/CVE-2013-0766.html
http://support.novell.com/security/cve/CVE-2013-0767.html
http://support.novell.com/security/cve/CVE-2013-0768.html
http://support.novell.com/security/cve/CVE-2013-0769.html
http://support.novell.com/security/cve/CVE-2013-0770.html
http://support.novell.com/security/cve/CVE-2013-0771.html
http://support.novell.com/security/cve/CVE-2013-0773.html
http://support.novell.com/security/cve/CVE-2013-0774.html
http://support.novell.com/security/cve/CVE-2013-0775.html
http://support.novell.com/security/cve/CVE-2013-0776.html
http://support.novell.com/security/cve/CVE-2013-0780.html
http://support.novell.com/security/cve/CVE-2013-0782.html
http://support.novell.com/security/cve/CVE-2013-0783.html
http://support.novell.com/security/cve/CVE-2013-0787.html
http://support.novell.com/security/cve/CVE-2013-0788.html
http://support.novell.com/security/cve/CVE-2013-0789.html
http://support.novell.com/security/cve/CVE-2013-0793.html
http://support.novell.com/security/cve/CVE-2013-0795.html
http://support.novell.com/security/cve/CVE-2013-0796.html
http://support.novell.com/security/cve/CVE-2013-0800.html
http://support.novell.com/security/cve/CVE-2013-0801.html
http://support.novell.com/security/cve/CVE-2013-1669.html
http://support.novell.com/security/cve/CVE-2013-1670.html
http://support.novell.com/security/cve/CVE-2013-1674.html
http://support.novell.com/security/cve/CVE-2013-1675.html
http://support.novell.com/security/cve/CVE-2013-1676.html
http://support.novell.com/security/cve/CVE-2013-1677.html
http://support.novell.com/security/cve/CVE-2013-1678.html
http://support.novell.com/security/cve/CVE-2013-1679.html
http://support.novell.com/security/cve/CVE-2013-1680.html
http://support.novell.com/security/cve/CVE-2013-1681.html
http://support.novell.com/security/cve/CVE-2013-1682.html
http://support.novell.com/security/cve/CVE-2013-1684.html
http://support.novell.com/security/cve/CVE-2013-1685.html
http://support.novell.com/security/cve/CVE-2013-1686.html
http://support.novell.com/security/cve/CVE-2013-1687.html
http://support.novell.com/security/cve/CVE-2013-1690.html
http://support.novell.com/security/cve/CVE-2013-1692.html
http://support.novell.com/security/cve/CVE-2013-1693.html
http://support.novell.com/security/cve/CVE-2013-1694.html
http://support.novell.com/security/cve/CVE-2013-1697.html
http://support.novell.com/security/cve/CVE-2013-1701.html
http://support.novell.com/security/cve/CVE-2013-1709.html
http://support.novell.com/security/cve/CVE-2013-1710.html
http://support.novell.com/security/cve/CVE-2013-1713.html
http://support.novell.com/security/cve/CVE-2013-1714.html
http://support.novell.com/security/cve/CVE-2013-1717.html
http://support.novell.com/security/cve/CVE-2013-1718.html
http://support.novell.com/security/cve/CVE-2013-1719.html
http://support.novell.com/security/cve/CVE-2013-1720.html
http://support.novell.com/security/cve/CVE-2013-1722.html
http://support.novell.com/security/cve/CVE-2013-1723.html
http://support.novell.com/security/cve/CVE-2013-1724.html
http://support.novell.com/security/cve/CVE-2013-1725.html
http://support.novell.com/security/cve/CVE-2013-1728.html
http://support.novell.com/security/cve/CVE-2013-1730.html
http://support.novell.com/security/cve/CVE-2013-1732.html
http://support.novell.com/security/cve/CVE-2013-1735.html
http://support.novell.com/security/cve/CVE-2013-1736.html
http://support.novell.com/security/cve/CVE-2013-1737.html
http://support.novell.com/security/cve/CVE-2013-1738.html
http://support.novell.com/security/cve/CVE-2013-5590.html
http://support.novell.com/security/cve/CVE-2013-5591.html
http://support.novell.com/security/cve/CVE-2013-5592.html
http://support.novell.com/security/cve/CVE-2013-5593.html
http://support.novell.com/security/cve/CVE-2013-5595.html
http://support.novell.com/security/cve/CVE-2013-5596.html
http://support.novell.com/security/cve/CVE-2013-5597.html
http://support.novell.com/security/cve/CVE-2013-5599.html
http://support.novell.com/security/cve/CVE-2013-5600.html
http://support.novell.com/security/cve/CVE-2013-5601.html
http://support.novell.com/security/cve/CVE-2013-5602.html
http://support.novell.com/security/cve/CVE-2013-5603.html
http://support.novell.com/security/cve/CVE-2013-5604.html
http://support.novell.com/security/cve/CVE-2013-5609.html
http://support.novell.com/security/cve/CVE-2013-5610.html
http://support.novell.com/security/cve/CVE-2013-5611.html
http://support.novell.com/security/cve/CVE-2013-5612.html
http://support.novell.com/security/cve/CVE-2013-5613.html
http://support.novell.com/security/cve/CVE-2013-5614.html
http://support.novell.com/security/cve/CVE-2013-5615.html
http://support.novell.com/security/cve/CVE-2013-5616.html
http://support.novell.com/security/cve/CVE-2013-5618.html
http://support.novell.com/security/cve/CVE-2013-5619.html
http://support.novell.com/security/cve/CVE-2013-6629.html
http://support.novell.com/security/cve/CVE-2013-6630.html
http://support.novell.com/security/cve/CVE-2013-6671.html
http://support.novell.com/security/cve/CVE-2013-6672.html
http://support.novell.com/security/cve/CVE-2013-6673.html
http://support.novell.com/security/cve/CVE-2014-1477.html
http://support.novell.com/security/cve/CVE-2014-1478.html
http://support.novell.com/security/cve/CVE-2014-1479.html
http://support.novell.com/security/cve/CVE-2014-1480.html
http://support.novell.com/security/cve/CVE-2014-1481.html
http://support.novell.com/security/cve/CVE-2014-1482.html
http://support.novell.com/security/cve/CVE-2014-1483.html
http://support.novell.com/security/cve/CVE-2014-1484.html
http://support.novell.com/security/cve/CVE-2014-1485.html
http://support.novell.com/security/cve/CVE-2014-1486.html
http://support.novell.com/security/cve/CVE-2014-1487.html
http://support.novell.com/security/cve/CVE-2014-1488.html
http://support.novell.com/security/cve/CVE-2014-1489.html
http://support.novell.com/security/cve/CVE-2014-1490.html
http://support.novell.com/security/cve/CVE-2014-1491.html
http://support.novell.com/security/cve/CVE-2014-1492.html
http://support.novell.com/security/cve/CVE-2014-1493.html
http://support.novell.com/security/cve/CVE-2014-1494.html
http://support.novell.com/security/cve/CVE-2014-1497.html
http://support.novell.com/security/cve/CVE-2014-1498.html
http://support.novell.com/security/cve/CVE-2014-1499.html
http://support.novell.com/security/cve/CVE-2014-1500.html
http://support.novell.com/security/cve/CVE-2014-1502.html
http://support.novell.com/security/cve/CVE-2014-1504.html
http://support.novell.com/security/cve/CVE-2014-1505.html
http://support.novell.com/security/cve/CVE-2014-1508.html
http://support.novell.com/security/cve/CVE-2014-1509.html
http://support.novell.com/security/cve/CVE-2014-1510.html
http://support.novell.com/security/cve/CVE-2014-1511.html
http://support.novell.com/security/cve/CVE-2014-1512.html
http://support.novell.com/security/cve/CVE-2014-1513.html
http://support.novell.com/security/cve/CVE-2014-1514.html
http://support.novell.com/security/cve/CVE-2014-1518.html
http://support.novell.com/security/cve/CVE-2014-1519.html
http://support.novell.com/security/cve/CVE-2014-1522.html
http://support.novell.com/security/cve/CVE-2014-1523.html
http://support.novell.com/security/cve/CVE-2014-1524.html
http://support.novell.com/security/cve/CVE-2014-1525.html
http://support.novell.com/security/cve/CVE-2014-1526.html
http://support.novell.com/security/cve/CVE-2014-1528.html
http://support.novell.com/security/cve/CVE-2014-1529.html
http://support.novell.com/security/cve/CVE-2014-1530.html
http://support.novell.com/security/cve/CVE-2014-1531.html
http://support.novell.com/security/cve/CVE-2014-1532.html
http://support.novell.com/security/cve/CVE-2014-1533.html
http://support.novell.com/security/cve/CVE-2014-1534.html
http://support.novell.com/security/cve/CVE-2014-1536.html
http://support.novell.com/security/cve/CVE-2014-1537.html
http://support.novell.com/security/cve/CVE-2014-1538.html
http://support.novell.com/security/cve/CVE-2014-1539.html
http://support.novell.com/security/cve/CVE-2014-1540.html
http://support.novell.com/security/cve/CVE-2014-1541.html
http://support.novell.com/security/cve/CVE-2014-1542.html
http://support.novell.com/security/cve/CVE-2014-1543.html
http://support.novell.com/security/cve/CVE-2014-1544.html
http://support.novell.com/security/cve/CVE-2014-1545.html
http://support.novell.com/security/cve/CVE-2014-1547.html
http://support.novell.com/security/cve/CVE-2014-1548.html
http://support.novell.com/security/cve/CVE-2014-1549.html
http://support.novell.com/security/cve/CVE-2014-1550.html
http://support.novell.com/security/cve/CVE-2014-1552.html
http://support.novell.com/security/cve/CVE-2014-1553.html
http://support.novell.com/security/cve/CVE-2014-1555.html
http://support.novell.com/security/cve/CVE-2014-1556.html
http://support.novell.com/security/cve/CVE-2014-1557.html
http://support.novell.com/security/cve/CVE-2014-1558.html
http://support.novell.com/security/cve/CVE-2014-1559.html
http://support.novell.com/security/cve/CVE-2014-1560.html
http://support.novell.com/security/cve/CVE-2014-1561.html
http://support.novell.com/security/cve/CVE-2014-1562.html
http://support.novell.com/security/cve/CVE-2014-1563.html
http://support.novell.com/security/cve/CVE-2014-1564.html
http://support.novell.com/security/cve/CVE-2014-1565.html
http://support.novell.com/security/cve/CVE-2014-1567.html
https://bugzilla.novell.com/104586
https://bugzilla.novell.com/354469
https://bugzilla.novell.com/385739
https://bugzilla.novell.com/390992
https://bugzilla.novell.com/417869
https://bugzilla.novell.com/41903
https://bugzilla.novell.com/429179
https://bugzilla.novell.com/439841
https://bugzilla.novell.com/441084
https://bugzilla.novell.com/455804
https://bugzilla.novell.com/484321
https://bugzilla.novell.com/503151
https://bugzilla.novell.com/518603
https://bugzilla.novell.com/527418
https://bugzilla.novell.com/528406
https://bugzilla.novell.com/529180
https://bugzilla.novell.com/542809
https://bugzilla.novell.com/559819
https://bugzilla.novell.com/576969
https://bugzilla.novell.com/582276
https://bugzilla.novell.com/586567
https://bugzilla.novell.com/593807
https://bugzilla.novell.com/603356
https://bugzilla.novell.com/622506
https://bugzilla.novell.com/637303
https://bugzilla.novell.com/642502
https://bugzilla.novell.com/645315
https://bugzilla.novell.com/649492
https://bugzilla.novell.com/657016
https://bugzilla.novell.com/664211
https://bugzilla.novell.com/667155
https://bugzilla.novell.com/689281
https://bugzilla.novell.com/701296
https://bugzilla.novell.com/712224
https://bugzilla.novell.com/714931
https://bugzilla.novell.com/720264
https://bugzilla.novell.com/726758
https://bugzilla.novell.com/728520
https://bugzilla.novell.com/732898
https://bugzilla.novell.com/733002
https://bugzilla.novell.com/737533
https://bugzilla.novell.com/744275
https://bugzilla.novell.com/746616
https://bugzilla.novell.com/747328
https://bugzilla.novell.com/749440
https://bugzilla.novell.com/750044
https://bugzilla.novell.com/755060
https://bugzilla.novell.com/758408
https://bugzilla.novell.com/765204
https://bugzilla.novell.com/771583
https://bugzilla.novell.com/777588
https://bugzilla.novell.com/783533
https://bugzilla.novell.com/786522
https://bugzilla.novell.com/790140
https://bugzilla.novell.com/796895
https://bugzilla.novell.com/804248
https://bugzilla.novell.com/808243
https://bugzilla.novell.com/813026
https://bugzilla.novell.com/819204
https://bugzilla.novell.com/825935
https://bugzilla.novell.com/833389
https://bugzilla.novell.com/840485
https://bugzilla.novell.com/847708
https://bugzilla.novell.com/854370
https://bugzilla.novell.com/861847
https://bugzilla.novell.com/868603
https://bugzilla.novell.com/875378
https://bugzilla.novell.com/876833
https://bugzilla.novell.com/881874
https://bugzilla.novell.com/887746
https://bugzilla.novell.com/894201
https://bugzilla.novell.com/894370
1
0
openSUSE-SU-2014:1099-1: moderate: MozillaFirefox to Firefox 32
by opensuse-security@opensuse.org 09 Sep '14
by opensuse-security@opensuse.org 09 Sep '14
09 Sep '14
openSUSE Security Update: MozillaFirefox to Firefox 32
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1099-1
Rating: moderate
References: #894201 #894370
Cross-References: CVE-2014-1553 CVE-2014-1562 CVE-2014-1563
CVE-2014-1564 CVE-2014-1565 CVE-2014-1567
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
Mozilla Firefox was updated to Firefox 32 fixing security issues and bugs.
Security issues fixed: MFSA 2014-72 / CVE-2014-1567: Security researcher
regenrecht reported, via TippingPoint's Zero Day Initiative, a
use-after-free during text layout when interacting with the setting of
text direction. This results in a use-after-free which can lead to
arbitrary code execution.
MFSA 2014-70 / CVE-2014-1565: Security researcher Holger Fuhrmannek
discovered an out-of-bounds read during the creation of an audio timeline
in Web Audio. This results in a crash and could allow for the reading of
random memory values.
MFSA 2014-69 / CVE-2014-1564: Google security researcher Michal Zalewski
discovered that when a malformated GIF image is rendered in certain
circumstances, memory is not properly initialized before use. The
resulting image then uses this memory during rendering. This could allow
for the a script in web content to access this unitialized memory using
the <canvas> feature.
MFSA 2014-68 / CVE-2014-1563: Security researcher Abhishek Arya (Inferno)
of the Google Chrome Security Team used the Address Sanitizer tool to
discover a use-after-free during cycle collection. This was found in
interactions with the SVG content through the document object model (DOM)
with animating SVG content. This leads to a potentially exploitable crash.
MFSA 2014-67: Mozilla developers and community identified and fixed
several memory safety bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these bugs showed evidence of memory
corruption under certain circumstances, and we presume that with enough
effort at least some of these could be exploited to run arbitrary code.
Jan de Mooij reported a memory safety problem that affects Firefox ESR
24.7, ESR 31 and Firefox 31. (CVE-2014-1562)
Christian Holler, Jan de Mooij, Karl Tomlinson, Randell Jesup, Gary Kwong,
Jesse Ruderman, and JW Wang reported memory safety problems and crashes
that affect Firefox ESR 31 and Firefox 31. (CVE-2014-1553)
Gary Kwong, Christian Holler, and David Weir reported memory safety
problems and crashes that affect Firefox 31. (CVE-2014-1554)
Mozilla NSS was updated to 3.16.4: Notable Changes:
* The following 1024-bit root CA certificate was restored to allow more
time to develop a better transition strategy for affected sites. It was
removed in NSS 3.16.3, but discussion in the mozilla.dev.security.policy
forum led to the decision to keep this root included longer in order to
give website administrators more time to update their web servers.
- CN = GTE CyberTrust Global Root
* In NSS 3.16.3, the 1024-bit "Entrust.net Secure Server Certification
Authority" root CA certificate was removed. In NSS 3.16.4, a 2048-bit
intermediate CA certificate has been included, without explicit trust.
The intention is to mitigate the effects of the previous removal of the
1024-bit Entrust.net root certificate, because many public Internet
sites still use the "USERTrust Legacy Secure Server CA" intermediate
certificate that is signed by the 1024-bit Entrust.net root certificate.
The inclusion of the intermediate certificate is a temporary measure to
allow those sites to function, by allowing them to find a trust path to
another 2048-bit root CA certificate. The temporarily included
intermediate certificate expires November 1, 2015.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-530
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-530
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
MozillaFirefox-31.1.0-42.1
MozillaFirefox-branding-upstream-31.1.0-42.1
MozillaFirefox-buildsymbols-31.1.0-42.1
MozillaFirefox-debuginfo-31.1.0-42.1
MozillaFirefox-debugsource-31.1.0-42.1
MozillaFirefox-devel-31.1.0-42.1
MozillaFirefox-translations-common-31.1.0-42.1
MozillaFirefox-translations-other-31.1.0-42.1
libfreebl3-3.16.4-35.1
libfreebl3-debuginfo-3.16.4-35.1
libsoftokn3-3.16.4-35.1
libsoftokn3-debuginfo-3.16.4-35.1
mozilla-nss-3.16.4-35.1
mozilla-nss-certs-3.16.4-35.1
mozilla-nss-certs-debuginfo-3.16.4-35.1
mozilla-nss-debuginfo-3.16.4-35.1
mozilla-nss-debugsource-3.16.4-35.1
mozilla-nss-devel-3.16.4-35.1
mozilla-nss-sysinit-3.16.4-35.1
mozilla-nss-sysinit-debuginfo-3.16.4-35.1
mozilla-nss-tools-3.16.4-35.1
mozilla-nss-tools-debuginfo-3.16.4-35.1
- openSUSE 13.1 (x86_64):
libfreebl3-32bit-3.16.4-35.1
libfreebl3-debuginfo-32bit-3.16.4-35.1
libsoftokn3-32bit-3.16.4-35.1
libsoftokn3-debuginfo-32bit-3.16.4-35.1
mozilla-nss-32bit-3.16.4-35.1
mozilla-nss-certs-32bit-3.16.4-35.1
mozilla-nss-certs-debuginfo-32bit-3.16.4-35.1
mozilla-nss-debuginfo-32bit-3.16.4-35.1
mozilla-nss-sysinit-32bit-3.16.4-35.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.4-35.1
- openSUSE 12.3 (i586 x86_64):
MozillaFirefox-31.1.0-1.86.1
MozillaFirefox-branding-upstream-31.1.0-1.86.1
MozillaFirefox-buildsymbols-31.1.0-1.86.1
MozillaFirefox-debuginfo-31.1.0-1.86.1
MozillaFirefox-debugsource-31.1.0-1.86.1
MozillaFirefox-devel-31.1.0-1.86.1
MozillaFirefox-translations-common-31.1.0-1.86.1
MozillaFirefox-translations-other-31.1.0-1.86.1
libfreebl3-3.16.4-1.51.1
libfreebl3-debuginfo-3.16.4-1.51.1
libsoftokn3-3.16.4-1.51.1
libsoftokn3-debuginfo-3.16.4-1.51.1
mozilla-nss-3.16.4-1.51.1
mozilla-nss-certs-3.16.4-1.51.1
mozilla-nss-certs-debuginfo-3.16.4-1.51.1
mozilla-nss-debuginfo-3.16.4-1.51.1
mozilla-nss-debugsource-3.16.4-1.51.1
mozilla-nss-devel-3.16.4-1.51.1
mozilla-nss-sysinit-3.16.4-1.51.1
mozilla-nss-sysinit-debuginfo-3.16.4-1.51.1
mozilla-nss-tools-3.16.4-1.51.1
mozilla-nss-tools-debuginfo-3.16.4-1.51.1
- openSUSE 12.3 (x86_64):
libfreebl3-32bit-3.16.4-1.51.1
libfreebl3-debuginfo-32bit-3.16.4-1.51.1
libsoftokn3-32bit-3.16.4-1.51.1
libsoftokn3-debuginfo-32bit-3.16.4-1.51.1
mozilla-nss-32bit-3.16.4-1.51.1
mozilla-nss-certs-32bit-3.16.4-1.51.1
mozilla-nss-certs-debuginfo-32bit-3.16.4-1.51.1
mozilla-nss-debuginfo-32bit-3.16.4-1.51.1
mozilla-nss-sysinit-32bit-3.16.4-1.51.1
mozilla-nss-sysinit-debuginfo-32bit-3.16.4-1.51.1
References:
http://support.novell.com/security/cve/CVE-2014-1553.html
http://support.novell.com/security/cve/CVE-2014-1562.html
http://support.novell.com/security/cve/CVE-2014-1563.html
http://support.novell.com/security/cve/CVE-2014-1564.html
http://support.novell.com/security/cve/CVE-2014-1565.html
http://support.novell.com/security/cve/CVE-2014-1567.html
https://bugzilla.novell.com/894201
https://bugzilla.novell.com/894370
1
0
openSUSE-SU-2014:1098-1: important: MozillaThunderbird: Update to 31.1 release
by opensuse-security@opensuse.org 09 Sep '14
by opensuse-security@opensuse.org 09 Sep '14
09 Sep '14
openSUSE Security Update: MozillaThunderbird: Update to 31.1 release
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1098-1
Rating: important
References: #894370
Cross-References: CVE-2014-1553 CVE-2014-1562 CVE-2014-1563
CVE-2014-1564 CVE-2014-1565 CVE-2014-1567
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
MozillaThunderbird was updated to Thunderbird 31.1.0 (bnc#894370), fixinfg
security issues:
* MFSA 2014-67/CVE-2014-1553/CVE-2014-1562 Miscellaneous memory safety
hazards
* MFSA 2014-68/CVE-2014-1563 (bmo#1018524) Use-after-free during DOM
interactions with SVG
* MFSA 2014-69/CVE-2014-1564 (bmo#1045977) Uninitialized memory use
during GIF rendering
* MFSA 2014-70/CVE-2014-1565 (bmo#1047831) Out-of-bounds read in Web
Audio audio timeline
* MFSA 2014-72/CVE-2014-1567 (bmo#1037641) Use-after-free setting text
directionality
- update to Thunderbird 31.0
* based on Gecko 31
* Autocompleting email addresses now matches against any part of the
name or email
* Composing a mail to a newsgroup will now autocomplete newsgroup names
* Insecure NTLM (pre-NTLMv2) authentication disabled
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-531
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-531
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
MozillaThunderbird-31.1.0-70.31.1
MozillaThunderbird-buildsymbols-31.1.0-70.31.1
MozillaThunderbird-debuginfo-31.1.0-70.31.1
MozillaThunderbird-debugsource-31.1.0-70.31.1
MozillaThunderbird-devel-31.1.0-70.31.1
MozillaThunderbird-translations-common-31.1.0-70.31.1
MozillaThunderbird-translations-other-31.1.0-70.31.1
- openSUSE 12.3 (i586 x86_64):
MozillaThunderbird-31.1.0-61.59.1
MozillaThunderbird-buildsymbols-31.1.0-61.59.1
MozillaThunderbird-debuginfo-31.1.0-61.59.1
MozillaThunderbird-debugsource-31.1.0-61.59.1
MozillaThunderbird-devel-31.1.0-61.59.1
MozillaThunderbird-translations-common-31.1.0-61.59.1
MozillaThunderbird-translations-other-31.1.0-61.59.1
References:
http://support.novell.com/security/cve/CVE-2014-1553.html
http://support.novell.com/security/cve/CVE-2014-1562.html
http://support.novell.com/security/cve/CVE-2014-1563.html
http://support.novell.com/security/cve/CVE-2014-1564.html
http://support.novell.com/security/cve/CVE-2014-1565.html
http://support.novell.com/security/cve/CVE-2014-1567.html
https://bugzilla.novell.com/894370
1
0
openSUSE-RU-2014:1097-1: GNOME Stack update to version 3.10.3/4
by maintenance@opensuse.org 09 Sep '14
by maintenance@opensuse.org 09 Sep '14
09 Sep '14
openSUSE Recommended Update: GNOME Stack update to version 3.10.3/4
______________________________________________________________________________
Announcement ID: openSUSE-RU-2014:1097-1
Rating: low
References: #832386 #839089 #842730 #849913 #852362 #861076
#861365 #869685 #871232 #888442 #888787 #893775
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that has 12 recommended fixes can now be
installed.
Description:
This update provides the latest version of the GNOME Stack:
- various bugfixes and improvements
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-532
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
NetworkManager-0.9.8.8-10.1
NetworkManager-debuginfo-0.9.8.8-10.1
NetworkManager-debugsource-0.9.8.8-10.1
NetworkManager-devel-0.9.8.8-10.1
accountsservice-0.6.35-2.16.1
accountsservice-debuginfo-0.6.35-2.16.1
accountsservice-debugsource-0.6.35-2.16.1
accountsservice-devel-0.6.35-2.16.1
brasero-3.10.0-3.6.3
brasero-debuginfo-3.10.0-3.6.3
brasero-debugsource-3.10.0-3.6.3
brasero-devel-3.10.0-3.6.3
brasero-nautilus-3.10.0-3.6.3
brasero-nautilus-debuginfo-3.10.0-3.6.3
empathy-3.10.3-42.2
empathy-debuginfo-3.10.3-42.2
empathy-debugsource-3.10.3-42.2
epiphany-3.10.3-39.4
epiphany-debuginfo-3.10.3-39.4
epiphany-debugsource-3.10.3-39.4
evince-3.10.3-60.2
evince-debuginfo-3.10.3-60.2
evince-debugsource-3.10.3-60.2
evince-devel-3.10.3-60.2
evolution-3.10.4-24.1
evolution-data-server-3.10.4-38.1
evolution-data-server-debuginfo-3.10.4-38.1
evolution-data-server-debugsource-3.10.4-38.1
evolution-data-server-devel-3.10.4-38.1
evolution-data-server-doc-3.10.4-38.1
evolution-debuginfo-3.10.4-24.1
evolution-debugsource-3.10.4-24.1
evolution-devel-3.10.4-24.1
evolution-ews-3.10.4-36.1
evolution-ews-debuginfo-3.10.4-36.1
evolution-ews-debugsource-3.10.4-36.1
evolution-ews-devel-3.10.4-36.1
file-roller-3.10.2.1-22.2
file-roller-debuginfo-3.10.2.1-22.2
file-roller-debugsource-3.10.2.1-22.2
geary-0.6.1-3.6.2
geary-debuginfo-0.6.1-3.6.2
geary-debugsource-0.6.1-3.6.2
gedit-3.10.4-23.2
gedit-debuginfo-3.10.4-23.2
gedit-debugsource-3.10.4-23.2
gedit-devel-3.10.4-23.2
gedit-plugin-zeitgeist-3.10.4-23.2
gedit-plugin-zeitgeist-debuginfo-3.10.4-23.2
gedit-plugins-3.10.1-6.4
gedit-plugins-debuginfo-3.10.1-6.4
gedit-plugins-debugsource-3.10.1-6.4
ghex-3.10.1-6.3
ghex-debuginfo-3.10.1-6.3
ghex-debugsource-3.10.1-6.3
ghex-devel-3.10.1-6.3
glade-catalog-evolution-3.10.4-24.1
glade-catalog-evolution-debuginfo-3.10.4-24.1
gnome-chess-3.10.3-14.3
gnome-chess-debuginfo-3.10.3-14.3
gnome-chess-debugsource-3.10.3-14.3
gnome-control-center-3.10.3-18.2
gnome-control-center-color-3.10.3-18.2
gnome-control-center-debuginfo-3.10.3-18.2
gnome-control-center-debugsource-3.10.3-18.2
gnome-control-center-devel-3.10.3-18.2
gnome-control-center-user-faces-3.10.3-18.2
gnome-documents-3.10.2-15.1
gnome-documents-debuginfo-3.10.2-15.1
gnome-documents-debugsource-3.10.2-15.1
gnome-music-3.10.4-6.2
gnome-music-debuginfo-3.10.4-6.2
gnome-music-debugsource-3.10.4-6.2
gnome-online-accounts-3.10.5-14.7
gnome-online-accounts-debuginfo-3.10.5-14.7
gnome-online-accounts-debugsource-3.10.5-14.7
gnome-online-accounts-devel-3.10.5-14.7
gnome-online-miners-3.10.3-7.1
gnome-online-miners-debuginfo-3.10.3-7.1
gnome-online-miners-debugsource-3.10.3-7.1
gnome-packagekit-3.10.1-7.3
gnome-packagekit-debuginfo-3.10.1-7.3
gnome-packagekit-debugsource-3.10.1-7.3
gnome-packagekit-extras-3.10.1-7.3
gnome-packagekit-extras-debuginfo-3.10.1-7.3
gnome-robots-3.10.2-6.3
gnome-robots-debuginfo-3.10.2-6.3
gnome-robots-debugsource-3.10.2-6.3
gnome-screenshot-3.10.1-6.3
gnome-screenshot-debuginfo-3.10.1-6.3
gnome-screenshot-debugsource-3.10.1-6.3
gnome-settings-daemon-3.10.3-20.2
gnome-settings-daemon-debuginfo-3.10.3-20.2
gnome-settings-daemon-debugsource-3.10.3-20.2
gnome-settings-daemon-devel-3.10.3-20.2
gnome-shell-3.10.4-22.1
gnome-shell-browser-plugin-3.10.4-22.1
gnome-shell-browser-plugin-debuginfo-3.10.4-22.1
gnome-shell-debuginfo-3.10.4-22.1
gnome-shell-debugsource-3.10.4-22.1
gnome-shell-devel-3.10.4-22.1
gnome-shell-search-provider-documents-3.10.2-15.1
gnome-shell-search-provider-gnote-3.10.3-6.2
gnome-shell-search-provider-seahorse-3.10.2-10.1
gnome-sudoku-3.10.3-14.1
gnome-user-share-3.10.2-14.3
gnome-user-share-debuginfo-3.10.2-14.3
gnome-user-share-debugsource-3.10.2-14.3
gnote-3.10.3-6.2
gnote-debuginfo-3.10.3-6.2
gnote-debugsource-3.10.3-6.2
gthumb-3.2.7-7.4
gthumb-debuginfo-3.2.7-7.4
gthumb-debugsource-3.2.7-7.4
gthumb-devel-3.2.7-7.4
gtk2-debugsource-2.24.23-7.1
gtk2-devel-2.24.23-7.1
gtk2-devel-debuginfo-2.24.23-7.1
gtk2-engine-clearlooks-2.20.2-16.6.3
gtk2-engine-clearlooks-debuginfo-2.20.2-16.6.3
gtk2-engine-crux-2.20.2-16.6.3
gtk2-engine-crux-debuginfo-2.20.2-16.6.3
gtk2-engine-glide-2.20.2-16.6.3
gtk2-engine-glide-debuginfo-2.20.2-16.6.3
gtk2-engine-hcengine-2.20.2-16.6.3
gtk2-engine-hcengine-debuginfo-2.20.2-16.6.3
gtk2-engine-industrial-2.20.2-16.6.3
gtk2-engine-industrial-debuginfo-2.20.2-16.6.3
gtk2-engine-mist-2.20.2-16.6.3
gtk2-engine-mist-debuginfo-2.20.2-16.6.3
gtk2-engine-redmond95-2.20.2-16.6.3
gtk2-engine-redmond95-debuginfo-2.20.2-16.6.3
gtk2-engine-thinice-2.20.2-16.6.3
gtk2-engine-thinice-debuginfo-2.20.2-16.6.3
gtk2-engines-2.20.2-16.6.3
gtk2-engines-debugsource-2.20.2-16.6.3
gtk2-engines-devel-2.20.2-16.6.3
gtk2-immodule-amharic-2.24.23-7.1
gtk2-immodule-amharic-debuginfo-2.24.23-7.1
gtk2-immodule-inuktitut-2.24.23-7.1
gtk2-immodule-inuktitut-debuginfo-2.24.23-7.1
gtk2-immodule-multipress-2.24.23-7.1
gtk2-immodule-multipress-debuginfo-2.24.23-7.1
gtk2-immodule-thai-2.24.23-7.1
gtk2-immodule-thai-debuginfo-2.24.23-7.1
gtk2-immodule-vietnamese-2.24.23-7.1
gtk2-immodule-vietnamese-debuginfo-2.24.23-7.1
gtk2-immodule-xim-2.24.23-7.1
gtk2-immodule-xim-debuginfo-2.24.23-7.1
gtk2-immodules-tigrigna-2.24.23-7.1
gtk2-immodules-tigrigna-debuginfo-2.24.23-7.1
gtk2-tools-2.24.23-7.1
gtk2-tools-debuginfo-2.24.23-7.1
gtk3-debugsource-3.10.9-18.1
gtk3-devel-3.10.9-18.1
gtk3-devel-debuginfo-3.10.9-18.1
gtk3-immodule-amharic-3.10.9-18.1
gtk3-immodule-amharic-debuginfo-3.10.9-18.1
gtk3-immodule-inuktitut-3.10.9-18.1
gtk3-immodule-inuktitut-debuginfo-3.10.9-18.1
gtk3-immodule-multipress-3.10.9-18.1
gtk3-immodule-multipress-debuginfo-3.10.9-18.1
gtk3-immodule-thai-3.10.9-18.1
gtk3-immodule-thai-debuginfo-3.10.9-18.1
gtk3-immodule-vietnamese-3.10.9-18.1
gtk3-immodule-vietnamese-debuginfo-3.10.9-18.1
gtk3-immodule-xim-3.10.9-18.1
gtk3-immodule-xim-debuginfo-3.10.9-18.1
gtk3-immodules-tigrigna-3.10.9-18.1
gtk3-immodules-tigrigna-debuginfo-3.10.9-18.1
gtk3-tools-3.10.9-18.1
gtk3-tools-debuginfo-3.10.9-18.1
gvfs-1.18.3-15.1
gvfs-backend-afc-1.18.3-15.1
gvfs-backend-afc-debuginfo-1.18.3-15.1
gvfs-backends-1.18.3-15.1
gvfs-backends-debuginfo-1.18.3-15.1
gvfs-debuginfo-1.18.3-15.1
gvfs-debugsource-1.18.3-15.1
gvfs-devel-1.18.3-15.1
gvfs-fuse-1.18.3-15.1
gvfs-fuse-debuginfo-1.18.3-15.1
libaccountsservice0-0.6.35-2.16.1
libaccountsservice0-debuginfo-0.6.35-2.16.1
libbrasero-burn3-1-3.10.0-3.6.3
libbrasero-burn3-1-debuginfo-3.10.0-3.6.3
libbrasero-media3-1-3.10.0-3.6.3
libbrasero-media3-1-debuginfo-3.10.0-3.6.3
libbrasero-utils3-1-3.10.0-3.6.3
libbrasero-utils3-1-debuginfo-3.10.0-3.6.3
libcamel-1_2-45-3.10.4-38.1
libcamel-1_2-45-debuginfo-3.10.4-38.1
libebackend-1_2-7-3.10.4-38.1
libebackend-1_2-7-debuginfo-3.10.4-38.1
libebook-1_2-14-3.10.4-38.1
libebook-1_2-14-debuginfo-3.10.4-38.1
libebook-contacts-1_2-0-3.10.4-38.1
libebook-contacts-1_2-0-debuginfo-3.10.4-38.1
libecal-1_2-16-3.10.4-38.1
libecal-1_2-16-debuginfo-3.10.4-38.1
libedata-book-1_2-20-3.10.4-38.1
libedata-book-1_2-20-debuginfo-3.10.4-38.1
libedata-cal-1_2-23-3.10.4-38.1
libedata-cal-1_2-23-debuginfo-3.10.4-38.1
libedataserver-1_2-18-3.10.4-38.1
libedataserver-1_2-18-debuginfo-3.10.4-38.1
libeews-1_2-0-3.10.4-36.1
libeews-1_2-0-debuginfo-3.10.4-36.1
libevdocument3-4-3.10.3-60.2
libevdocument3-4-debuginfo-3.10.3-60.2
libevview3-3-3.10.3-60.2
libevview3-3-debuginfo-3.10.3-60.2
libewsutils0-3.10.4-36.1
libewsutils0-debuginfo-3.10.4-36.1
libgoa-1_0-0-3.10.5-14.7
libgoa-1_0-0-debuginfo-3.10.5-14.7
libgoa-backend-1_0-1-3.10.5-14.7
libgoa-backend-1_0-1-debuginfo-3.10.5-14.7
libgtk-2_0-0-2.24.23-7.1
libgtk-2_0-0-debuginfo-2.24.23-7.1
libgtk-3-0-3.10.9-18.1
libgtk-3-0-debuginfo-3.10.9-18.1
libgtkhex-3-0-3.10.1-6.3
libgtkhex-3-0-debuginfo-3.10.1-6.3
libgvfscommon0-1.18.3-15.1
libgvfscommon0-debuginfo-1.18.3-15.1
libgweather-3-6-3.10.2-6.1
libgweather-3-6-debuginfo-3.10.2-6.1
libgweather-debugsource-3.10.2-6.1
libgweather-devel-3.10.2-6.1
libjavascriptcoregtk-1_0-0-2.2.7-10.1
libjavascriptcoregtk-1_0-0-debuginfo-2.2.7-10.1
libjavascriptcoregtk-3_0-0-2.2.7-10.1
libjavascriptcoregtk-3_0-0-debuginfo-2.2.7-10.1
libmutter0-3.10.4-26.1
libmutter0-debuginfo-3.10.4-26.1
libnm-glib-vpn1-0.9.8.8-10.1
libnm-glib-vpn1-debuginfo-0.9.8.8-10.1
libnm-glib4-0.9.8.8-10.1
libnm-glib4-debuginfo-0.9.8.8-10.1
libnm-util2-0.9.8.8-10.1
libnm-util2-debuginfo-0.9.8.8-10.1
libtelepathy-glib0-0.22.1-6.1
libtelepathy-glib0-debuginfo-0.22.1-6.1
libtotem-plparser-mini18-3.10.1-10.1
libtotem-plparser-mini18-debuginfo-3.10.1-10.1
libtotem-plparser18-3.10.1-10.1
libtotem-plparser18-debuginfo-3.10.1-10.1
libwebkit2gtk-3_0-25-2.2.7-10.1
libwebkit2gtk-3_0-25-debuginfo-2.2.7-10.1
libwebkitgtk-1_0-0-2.2.7-10.1
libwebkitgtk-1_0-0-debuginfo-2.2.7-10.1
libwebkitgtk-3_0-0-2.2.7-10.1
libwebkitgtk-3_0-0-debuginfo-2.2.7-10.1
libwebkitgtk-devel-2.2.7-10.1
libwebkitgtk3-devel-2.2.7-10.1
libyelp0-3.10.2-6.1
libyelp0-debuginfo-3.10.2-6.1
mutter-3.10.4-26.1
mutter-data-3.10.4-26.1
mutter-debuginfo-3.10.4-26.1
mutter-debugsource-3.10.4-26.1
mutter-devel-3.10.4-26.1
nautilus-evince-3.10.3-60.2
nautilus-evince-debuginfo-3.10.3-60.2
nautilus-file-roller-3.10.2.1-22.2
nautilus-file-roller-debuginfo-3.10.2.1-22.2
orca-3.10.3-14.1
python3-gedit-3.10.4-23.2
seahorse-3.10.2-10.1
seahorse-debuginfo-3.10.2-10.1
seahorse-debugsource-3.10.2-10.1
system-config-printer-1.4.4-2.10.1
system-config-printer-debugsource-1.4.4-2.10.1
telepathy-gabble-0.18.2-2.6.2
telepathy-gabble-debuginfo-0.18.2-2.6.2
telepathy-gabble-debugsource-0.18.2-2.6.2
telepathy-gabble-xmpp-console-0.18.2-2.6.2
telepathy-gabble-xmpp-console-debuginfo-0.18.2-2.6.2
telepathy-glib-debugsource-0.22.1-6.1
telepathy-glib-devel-0.22.1-6.1
telepathy-glib-doc-0.22.1-6.1
telepathy-mission-control-plugin-goa-3.10.3-42.2
telepathy-mission-control-plugin-goa-debuginfo-3.10.3-42.2
totem-pl-parser-3.10.1-10.1
totem-pl-parser-debuginfo-3.10.1-10.1
totem-pl-parser-debugsource-3.10.1-10.1
totem-pl-parser-devel-3.10.1-10.1
typelib-1_0-AccountsService-1_0-0.6.35-2.16.1
typelib-1_0-BraseroBurn-3_2_0-3.10.0-3.6.3
typelib-1_0-BraseroMedia-3_2_0-3.10.0-3.6.3
typelib-1_0-EBook-1_2-3.10.4-38.1
typelib-1_0-EBookContacts-1_2-3.10.4-38.1
typelib-1_0-EDataServer-1_2-3.10.4-38.1
typelib-1_0-EvinceDocument-3_0-3.10.3-60.2
typelib-1_0-EvinceView-3_0-3.10.3-60.2
typelib-1_0-GWeather-3_0-3.10.2-6.1
typelib-1_0-Goa-1_0-3.10.5-14.7
typelib-1_0-Gtk-2_0-2.24.23-7.1
typelib-1_0-Gtk-3_0-3.10.9-18.1
typelib-1_0-JavaScriptCore-1_0-2.2.7-10.1
typelib-1_0-JavaScriptCore-3_0-2.2.7-10.1
typelib-1_0-Meta-3_0-3.10.4-26.1
typelib-1_0-NMClient-1_0-0.9.8.8-10.1
typelib-1_0-NetworkManager-1_0-0.9.8.8-10.1
typelib-1_0-TelepathyGlib-0_12-0.22.1-6.1
typelib-1_0-TotemPlParser-1_0-3.10.1-10.1
typelib-1_0-WebKit-1_0-2.2.7-10.1
typelib-1_0-WebKit-3_0-2.2.7-10.1
typelib-1_0-WebKit2-3_0-2.2.7-10.1
udev-configure-printer-1.4.4-2.10.1
udev-configure-printer-debuginfo-1.4.4-2.10.1
webkit-jsc-1-2.2.7-10.1
webkit-jsc-1-debuginfo-2.2.7-10.1
webkit-jsc-3-2.2.7-10.1
webkit-jsc-3-debuginfo-2.2.7-10.1
webkit2gtk-3_0-injected-bundles-2.2.7-10.1
webkit2gtk-3_0-injected-bundles-debuginfo-2.2.7-10.1
yelp-3.10.2-6.1
yelp-debuginfo-3.10.2-6.1
yelp-debugsource-3.10.2-6.1
yelp-devel-3.10.2-6.1
- openSUSE 13.1 (x86_64):
NetworkManager-devel-32bit-0.9.8.8-10.1
gtk2-devel-32bit-2.24.23-7.1
gtk2-devel-debuginfo-32bit-2.24.23-7.1
gtk2-engine-clearlooks-32bit-2.20.2-16.6.3
gtk2-engine-clearlooks-debuginfo-32bit-2.20.2-16.6.3
gtk2-engine-crux-32bit-2.20.2-16.6.3
gtk2-engine-crux-debuginfo-32bit-2.20.2-16.6.3
gtk2-engine-glide-32bit-2.20.2-16.6.3
gtk2-engine-glide-debuginfo-32bit-2.20.2-16.6.3
gtk2-engine-industrial-32bit-2.20.2-16.6.3
gtk2-engine-industrial-debuginfo-32bit-2.20.2-16.6.3
gtk2-engine-mist-32bit-2.20.2-16.6.3
gtk2-engine-mist-debuginfo-32bit-2.20.2-16.6.3
gtk2-engine-redmond95-32bit-2.20.2-16.6.3
gtk2-engine-redmond95-debuginfo-32bit-2.20.2-16.6.3
gtk2-engine-thinice-32bit-2.20.2-16.6.3
gtk2-engine-thinice-debuginfo-32bit-2.20.2-16.6.3
gtk2-immodule-amharic-32bit-2.24.23-7.1
gtk2-immodule-amharic-debuginfo-32bit-2.24.23-7.1
gtk2-immodule-inuktitut-32bit-2.24.23-7.1
gtk2-immodule-inuktitut-debuginfo-32bit-2.24.23-7.1
gtk2-immodule-multipress-32bit-2.24.23-7.1
gtk2-immodule-multipress-debuginfo-32bit-2.24.23-7.1
gtk2-immodule-thai-32bit-2.24.23-7.1
gtk2-immodule-thai-debuginfo-32bit-2.24.23-7.1
gtk2-immodule-vietnamese-32bit-2.24.23-7.1
gtk2-immodule-vietnamese-debuginfo-32bit-2.24.23-7.1
gtk2-immodule-xim-32bit-2.24.23-7.1
gtk2-immodule-xim-debuginfo-32bit-2.24.23-7.1
gtk2-immodules-tigrigna-32bit-2.24.23-7.1
gtk2-immodules-tigrigna-debuginfo-32bit-2.24.23-7.1
gtk2-tools-32bit-2.24.23-7.1
gtk2-tools-debuginfo-32bit-2.24.23-7.1
gtk3-devel-32bit-3.10.9-18.1
gtk3-devel-debuginfo-32bit-3.10.9-18.1
gtk3-immodule-amharic-32bit-3.10.9-18.1
gtk3-immodule-amharic-debuginfo-32bit-3.10.9-18.1
gtk3-immodule-inuktitut-32bit-3.10.9-18.1
gtk3-immodule-inuktitut-debuginfo-32bit-3.10.9-18.1
gtk3-immodule-multipress-32bit-3.10.9-18.1
gtk3-immodule-multipress-debuginfo-32bit-3.10.9-18.1
gtk3-immodule-thai-32bit-3.10.9-18.1
gtk3-immodule-thai-debuginfo-32bit-3.10.9-18.1
gtk3-immodule-vietnamese-32bit-3.10.9-18.1
gtk3-immodule-vietnamese-debuginfo-32bit-3.10.9-18.1
gtk3-immodule-xim-32bit-3.10.9-18.1
gtk3-immodule-xim-debuginfo-32bit-3.10.9-18.1
gtk3-immodules-tigrigna-32bit-3.10.9-18.1
gtk3-immodules-tigrigna-debuginfo-32bit-3.10.9-18.1
gtk3-tools-32bit-3.10.9-18.1
gtk3-tools-debuginfo-32bit-3.10.9-18.1
gvfs-32bit-1.18.3-15.1
gvfs-debuginfo-32bit-1.18.3-15.1
libcamel-1_2-45-32bit-3.10.4-38.1
libcamel-1_2-45-debuginfo-32bit-3.10.4-38.1
libebackend-1_2-7-32bit-3.10.4-38.1
libebackend-1_2-7-debuginfo-32bit-3.10.4-38.1
libebook-1_2-14-32bit-3.10.4-38.1
libebook-1_2-14-debuginfo-32bit-3.10.4-38.1
libebook-contacts-1_2-0-32bit-3.10.4-38.1
libebook-contacts-1_2-0-debuginfo-32bit-3.10.4-38.1
libecal-1_2-16-32bit-3.10.4-38.1
libecal-1_2-16-debuginfo-32bit-3.10.4-38.1
libedata-book-1_2-20-32bit-3.10.4-38.1
libedata-book-1_2-20-debuginfo-32bit-3.10.4-38.1
libedata-cal-1_2-23-32bit-3.10.4-38.1
libedata-cal-1_2-23-debuginfo-32bit-3.10.4-38.1
libedataserver-1_2-18-32bit-3.10.4-38.1
libedataserver-1_2-18-debuginfo-32bit-3.10.4-38.1
libgoa-1_0-0-32bit-3.10.5-14.7
libgoa-1_0-0-debuginfo-32bit-3.10.5-14.7
libgoa-backend-1_0-1-32bit-3.10.5-14.7
libgoa-backend-1_0-1-debuginfo-32bit-3.10.5-14.7
libgtk-2_0-0-32bit-2.24.23-7.1
libgtk-2_0-0-debuginfo-32bit-2.24.23-7.1
libgtk-3-0-32bit-3.10.9-18.1
libgtk-3-0-debuginfo-32bit-3.10.9-18.1
libgvfscommon0-32bit-1.18.3-15.1
libgvfscommon0-debuginfo-32bit-1.18.3-15.1
libgweather-3-6-32bit-3.10.2-6.1
libgweather-3-6-debuginfo-32bit-3.10.2-6.1
libjavascriptcoregtk-1_0-0-32bit-2.2.7-10.1
libjavascriptcoregtk-1_0-0-debuginfo-32bit-2.2.7-10.1
libjavascriptcoregtk-3_0-0-32bit-2.2.7-10.1
libjavascriptcoregtk-3_0-0-debuginfo-32bit-2.2.7-10.1
libnm-glib-vpn1-32bit-0.9.8.8-10.1
libnm-glib-vpn1-debuginfo-32bit-0.9.8.8-10.1
libnm-glib4-32bit-0.9.8.8-10.1
libnm-glib4-debuginfo-32bit-0.9.8.8-10.1
libnm-util2-32bit-0.9.8.8-10.1
libnm-util2-debuginfo-32bit-0.9.8.8-10.1
libtelepathy-glib0-32bit-0.22.1-6.1
libtelepathy-glib0-debuginfo-32bit-0.22.1-6.1
libwebkitgtk-1_0-0-32bit-2.2.7-10.1
libwebkitgtk-1_0-0-debuginfo-32bit-2.2.7-10.1
libwebkitgtk-3_0-0-32bit-2.2.7-10.1
libwebkitgtk-3_0-0-debuginfo-32bit-2.2.7-10.1
- openSUSE 13.1 (noarch):
NetworkManager-lang-0.9.8.8-10.1
accountsservice-lang-0.6.35-2.16.1
brasero-lang-3.10.0-3.6.3
empathy-lang-3.10.3-42.2
epiphany-branding-upstream-3.10.3-39.4
epiphany-lang-3.10.3-39.4
evince-lang-3.10.3-60.2
evolution-data-server-lang-3.10.4-38.1
evolution-ews-lang-3.10.4-36.1
evolution-lang-3.10.4-24.1
file-roller-lang-3.10.2.1-22.2
geary-lang-0.6.1-3.6.2
gedit-lang-3.10.4-23.2
gedit-plugins-lang-3.10.1-6.4
ghex-lang-3.10.1-6.3
gnome-chess-lang-3.10.3-14.3
gnome-control-center-lang-3.10.3-18.2
gnome-devel-docs-3.10.3-14.1
gnome-devel-docs-lang-3.10.3-14.1
gnome-documents-lang-3.10.2-15.1
gnome-music-lang-3.10.4-6.2
gnome-online-accounts-lang-3.10.5-14.7
gnome-packagekit-lang-3.10.1-7.3
gnome-robots-lang-3.10.2-6.3
gnome-screenshot-lang-3.10.1-6.3
gnome-settings-daemon-lang-3.10.3-20.2
gnome-shell-lang-3.10.4-22.1
gnome-sudoku-lang-3.10.3-14.1
gnome-user-docs-3.10.3-14.1
gnome-user-docs-lang-3.10.3-14.1
gnome-user-share-lang-3.10.2-14.3
gnote-lang-3.10.3-6.2
gthumb-lang-3.2.7-7.4
gtk2-branding-SLED-13.1-6.3
gtk2-branding-openSUSE-13.1-6.3
gtk2-branding-upstream-2.24.23-7.1
gtk2-data-2.24.23-7.1
gtk2-lang-2.24.23-7.1
gtk2-theme-clearlooks-2.20.2-16.6.3
gtk2-theme-crux-2.20.2-16.6.3
gtk2-theme-industrial-2.20.2-16.6.3
gtk2-theme-mist-2.20.2-16.6.3
gtk2-theme-redmond95-2.20.2-16.6.3
gtk2-theme-thinice-2.20.2-16.6.3
gtk3-branding-SLED-13.1-2.14.3
gtk3-branding-openSUSE-13.1-2.14.3
gtk3-branding-upstream-3.10.9-18.1
gtk3-data-3.10.9-18.1
gtk3-lang-3.10.9-18.1
gvfs-lang-1.18.3-15.1
libgweather-data-3.10.2-6.1
libgweather-lang-3.10.2-6.1
libwebkitgtk2-lang-2.2.7-10.1
libwebkitgtk3-lang-2.2.7-10.1
mutter-lang-3.10.4-26.1
orca-lang-3.10.3-14.1
python-cupshelpers-1.4.4-2.10.1
seahorse-lang-3.10.2-10.1
system-config-printer-applet-1.4.4-2.10.1
system-config-printer-common-1.4.4-2.10.1
system-config-printer-common-lang-1.4.4-2.10.1
system-config-printer-dbus-service-1.4.4-2.10.1
totem-pl-parser-lang-3.10.1-10.1
yelp-lang-3.10.2-6.1
References:
https://bugzilla.novell.com/832386
https://bugzilla.novell.com/839089
https://bugzilla.novell.com/842730
https://bugzilla.novell.com/849913
https://bugzilla.novell.com/852362
https://bugzilla.novell.com/861076
https://bugzilla.novell.com/861365
https://bugzilla.novell.com/869685
https://bugzilla.novell.com/871232
https://bugzilla.novell.com/888442
https://bugzilla.novell.com/888787
https://bugzilla.novell.com/893775
1
0
openSUSE-SU-2014:1096-1: moderate: enigmail: security fix
by opensuse-security@opensuse.org 08 Sep '14
by opensuse-security@opensuse.org 08 Sep '14
08 Sep '14
openSUSE Security Update: enigmail: security fix
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1096-1
Rating: moderate
References: #893330
Cross-References: CVE-2014-5369
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
enigmail was updated to version 1.7.2 (bnc#893330)
* bugfix release which contains several bugfixes including mail with only
Bcc recipients sent in plain text (CVE-2014-5369)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-529
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-529
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
enigmail-1.7.2-6.1
enigmail-debuginfo-1.7.2-6.1
enigmail-debugsource-1.7.2-6.1
- openSUSE 12.3 (i586 x86_64):
enigmail-1.7.2-6.1
enigmail-debuginfo-1.7.2-6.1
enigmail-debugsource-1.7.2-6.1
References:
http://support.novell.com/security/cve/CVE-2014-5369.html
https://bugzilla.novell.com/893330
1
0
openSUSE-RU-2014:1095-1: rsyslog: Stop syslog socket to avoid process keep running after package uninstall
by maintenance@opensuse.org 08 Sep '14
by maintenance@opensuse.org 08 Sep '14
08 Sep '14
openSUSE Recommended Update: rsyslog: Stop syslog socket to avoid process keep running after package uninstall
______________________________________________________________________________
Announcement ID: openSUSE-RU-2014:1095-1
Rating: low
References: #840815
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update fixes the following issues with rsyslog:
- bnc#840815: Stop syslog.socket in %preun to avoid the daemon we
uninstall gets started by a log message due to dependencies
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-528
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-528
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
rsyslog-7.4.7-2.12.1
rsyslog-debuginfo-7.4.7-2.12.1
rsyslog-debugsource-7.4.7-2.12.1
rsyslog-diag-tools-7.4.7-2.12.1
rsyslog-diag-tools-debuginfo-7.4.7-2.12.1
rsyslog-doc-7.4.7-2.12.1
rsyslog-module-dbi-7.4.7-2.12.1
rsyslog-module-dbi-debuginfo-7.4.7-2.12.1
rsyslog-module-elasticsearch-7.4.7-2.12.1
rsyslog-module-elasticsearch-debuginfo-7.4.7-2.12.1
rsyslog-module-gcrypt-7.4.7-2.12.1
rsyslog-module-gcrypt-debuginfo-7.4.7-2.12.1
rsyslog-module-gssapi-7.4.7-2.12.1
rsyslog-module-gssapi-debuginfo-7.4.7-2.12.1
rsyslog-module-gtls-7.4.7-2.12.1
rsyslog-module-gtls-debuginfo-7.4.7-2.12.1
rsyslog-module-guardtime-7.4.7-2.12.1
rsyslog-module-guardtime-debuginfo-7.4.7-2.12.1
rsyslog-module-mmnormalize-7.4.7-2.12.1
rsyslog-module-mmnormalize-debuginfo-7.4.7-2.12.1
rsyslog-module-mysql-7.4.7-2.12.1
rsyslog-module-mysql-debuginfo-7.4.7-2.12.1
rsyslog-module-pgsql-7.4.7-2.12.1
rsyslog-module-pgsql-debuginfo-7.4.7-2.12.1
rsyslog-module-relp-7.4.7-2.12.1
rsyslog-module-relp-debuginfo-7.4.7-2.12.1
rsyslog-module-snmp-7.4.7-2.12.1
rsyslog-module-snmp-debuginfo-7.4.7-2.12.1
rsyslog-module-udpspoof-7.4.7-2.12.1
rsyslog-module-udpspoof-debuginfo-7.4.7-2.12.1
- openSUSE 12.3 (i586 x86_64):
rsyslog-7.2.7-2.9.1
rsyslog-debuginfo-7.2.7-2.9.1
rsyslog-debugsource-7.2.7-2.9.1
rsyslog-diag-tools-7.2.7-2.9.1
rsyslog-diag-tools-debuginfo-7.2.7-2.9.1
rsyslog-doc-7.2.7-2.9.1
rsyslog-module-dbi-7.2.7-2.9.1
rsyslog-module-dbi-debuginfo-7.2.7-2.9.1
rsyslog-module-elasticsearch-7.2.7-2.9.1
rsyslog-module-elasticsearch-debuginfo-7.2.7-2.9.1
rsyslog-module-gssapi-7.2.7-2.9.1
rsyslog-module-gssapi-debuginfo-7.2.7-2.9.1
rsyslog-module-gtls-7.2.7-2.9.1
rsyslog-module-gtls-debuginfo-7.2.7-2.9.1
rsyslog-module-mmnormalize-7.2.7-2.9.1
rsyslog-module-mmnormalize-debuginfo-7.2.7-2.9.1
rsyslog-module-mysql-7.2.7-2.9.1
rsyslog-module-mysql-debuginfo-7.2.7-2.9.1
rsyslog-module-pgsql-7.2.7-2.9.1
rsyslog-module-pgsql-debuginfo-7.2.7-2.9.1
rsyslog-module-relp-7.2.7-2.9.1
rsyslog-module-relp-debuginfo-7.2.7-2.9.1
rsyslog-module-snmp-7.2.7-2.9.1
rsyslog-module-snmp-debuginfo-7.2.7-2.9.1
rsyslog-module-udpspoof-7.2.7-2.9.1
rsyslog-module-udpspoof-debuginfo-7.2.7-2.9.1
References:
https://bugzilla.novell.com/840815
1
0
openSUSE-RU-2014:1094-1: p11-kit: apply patches to avoid errors from certificates with invalid public key
by maintenance@opensuse.org 08 Sep '14
by maintenance@opensuse.org 08 Sep '14
08 Sep '14
openSUSE Recommended Update: p11-kit: apply patches to avoid errors from certificates with invalid public key
______________________________________________________________________________
Announcement ID: openSUSE-RU-2014:1094-1
Rating: low
References: #890908
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update fixes the following issues with p11-kit:
- fdo#82328/bnc#890908: applied patches to avoid errors from
certificates with invalid public key
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-527
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libp11-kit0-0.20.1-2.4.1
libp11-kit0-debuginfo-0.20.1-2.4.1
p11-kit-0.20.1-2.4.1
p11-kit-debuginfo-0.20.1-2.4.1
p11-kit-debugsource-0.20.1-2.4.1
p11-kit-devel-0.20.1-2.4.1
p11-kit-nss-trust-0.20.1-2.4.1
p11-kit-tools-0.20.1-2.4.1
p11-kit-tools-debuginfo-0.20.1-2.4.1
- openSUSE 13.1 (x86_64):
libp11-kit0-32bit-0.20.1-2.4.1
libp11-kit0-debuginfo-32bit-0.20.1-2.4.1
p11-kit-32bit-0.20.1-2.4.1
p11-kit-debuginfo-32bit-0.20.1-2.4.1
References:
https://bugzilla.novell.com/890908
1
0
04 Sep '14
openSUSE Recommended Update: mcelog: Fix typo in spec-file
______________________________________________________________________________
Announcement ID: openSUSE-RU-2014:1090-1
Rating: low
References:
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update fixes the following issues with mcelog:
- Fixes typo in spec-file
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-526
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-526
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
mcelog-1.0pre3.6e4e2a000124-19.4.1
mcelog-debuginfo-1.0pre3.6e4e2a000124-19.4.1
mcelog-debugsource-1.0pre3.6e4e2a000124-19.4.1
- openSUSE 12.3 (i586 x86_64):
mcelog-1.0pre3.6e4e2a000124-16.5.1
mcelog-debuginfo-1.0pre3.6e4e2a000124-16.5.1
mcelog-debugsource-1.0pre3.6e4e2a000124-16.5.1
References:
1
0
03 Sep '14
openSUSE Security Update: update for enigmail
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1086-1
Rating: moderate
References:
Cross-References: CVE-2014-5369
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
update to version 1.7.2
* bugfix release which contains several bugfixes including mail with only
Bcc recipients sent in plain text unexpectedly (CVE-2014-5369)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2014-81
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
enigmail-1.7.2-9.1
enigmail-debuginfo-1.7.2-9.1
enigmail-debugsource-1.7.2-9.1
References:
http://support.novell.com/security/cve/CVE-2014-5369.html
1
0