openSUSE Security Update: libwebkit security update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0458-1 Rating: moderate References: #622994 Cross-References: CVE-2010-1386 CVE-2010-1392 CVE-2010-1405 CVE-2010-1407 CVE-2010-1416 CVE-2010-1417 CVE-2010-1418 CVE-2010-1421 CVE-2010-1422 CVE-2010-1501 CVE-2010-1664 CVE-2010-1665 CVE-2010-1758 CVE-2010-1759 CVE-2010-1760 CVE-2010-1761 CVE-2010-1762 CVE-2010-1767 CVE-2010-1770 CVE-2010-1771 CVE-2010-1772 CVE-2010-1773 CVE-2010-1774 Affected Products: openSUSE 11.3 ______________________________________________________________________________ An update that fixes 24 vulnerabilities is now available. It includes one version update. Description: The libwebkit browser engine version 1.2.3 fixes several security relevant bugs (CVE-2010-1386, CVE-2010-1392, CVE-2010-1405, CVE-2010-1407, CVE-2010-1416, CVE-2010-1417, CVE-2010-1665, CVE-2010-1418, CVE-2010-1421, CVE-2010-1422, CVE-2010-1501, CVE-2010-1767, CVE-2010-1664, CVE-2010-1758, CVE-2010-1759, CVE-2010-1760, CVE-2010-1761, CVE-2010-1762, CVE-2010-1770, CVE-2010-1771, CVE-2010-1772, CVE-2010-1773, CVE-2010-1774) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch libwebkit-2806 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 x86_64) [New Version: 1.2.3]: libwebkit-1_0-2-1.2.3-0.1.1 libwebkit-devel-1.2.3-0.1.1 webkit-jsc-1.2.3-0.1.1 - openSUSE 11.3 (x86_64) [New Version: 1.2.3]: libwebkit-1_0-2-32bit-1.2.3-0.1.1 - openSUSE 11.3 (noarch) [New Version: 1.2.3]: libwebkit-lang-1.2.3-0.1.1 - openSUSE 11.3 (src) [New Version: 1.2.3]: libwebkit-1.2.3-0.1.1 References: http://support.novell.com/security/cve/.html http://support.novell.com/security/cve/CVE-2010-1386.html http://support.novell.com/security/cve/CVE-2010-1392.html http://support.novell.com/security/cve/CVE-2010-1405.html http://support.novell.com/security/cve/CVE-2010-1407.html http://support.novell.com/security/cve/CVE-2010-1416.html http://support.novell.com/security/cve/CVE-2010-1417.html http://support.novell.com/security/cve/CVE-2010-1418.html http://support.novell.com/security/cve/CVE-2010-1421.html http://support.novell.com/security/cve/CVE-2010-1422.html http://support.novell.com/security/cve/CVE-2010-1501.html http://support.novell.com/security/cve/CVE-2010-1664.html http://support.novell.com/security/cve/CVE-2010-1665.html http://support.novell.com/security/cve/CVE-2010-1758.html http://support.novell.com/security/cve/CVE-2010-1759.html http://support.novell.com/security/cve/CVE-2010-1760.html http://support.novell.com/security/cve/CVE-2010-1761.html http://support.novell.com/security/cve/CVE-2010-1762.html http://support.novell.com/security/cve/CVE-2010-1767.html http://support.novell.com/security/cve/CVE-2010-1770.html http://support.novell.com/security/cve/CVE-2010-1771.html http://support.novell.com/security/cve/CVE-2010-1772.html http://support.novell.com/security/cve/CVE-2010-1773.html http://support.novell.com/security/cve/CVE-2010-1774.html https://bugzilla.novell.com/622994