From sle-security-updates at lists.suse.com Thu Jan 10 13:04:26 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 10 Jan 2013 21:04:26 +0100 (CET) Subject: SUSE-SU-2013:0033-1: important: Security update for flash-player Message-ID: <20130110200426.D6E80321A8@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0033-1 Rating: important References: #797442 Cross-References: CVE-2013-0630 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: flash player has been updated to 11.2.202.261. More details can be found on https://www.adobe.com/support/security/bulletins/apsb13-01.h tml Security Issue reference: * CVE-2013-0630 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-flash-player-7213 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.261]: flash-player-11.2.202.261-0.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.261]: flash-player-11.2.202.261-0.5.1 References: http://support.novell.com/security/cve/CVE-2013-0630.html https://bugzilla.novell.com/797442 http://download.novell.com/patch/finder/?keywords=8177195047504934df723753177b611e http://download.novell.com/patch/finder/?keywords=9988abec827943cc9ae55660c2e3a91d From sle-security-updates at lists.suse.com Thu Jan 17 15:04:23 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 17 Jan 2013 23:04:23 +0100 (CET) Subject: SUSE-SU-2013:0044-1: important: Security update for Acrobat Reader Message-ID: <20130117220423.A3F73321D8@maintenance.suse.de> SUSE Security Update: Security update for Acrobat Reader ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0044-1 Rating: important References: #797529 Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602 CVE-2013-0603 CVE-2013-0604 CVE-2013-0605 CVE-2013-0606 CVE-2013-0607 CVE-2013-0608 CVE-2013-0609 CVE-2013-0610 CVE-2013-0611 CVE-2013-0612 CVE-2013-0613 CVE-2013-0614 CVE-2013-0615 CVE-2013-0616 CVE-2013-0617 CVE-2013-0618 CVE-2013-0619 CVE-2013-0620 CVE-2013-0621 CVE-2013-0622 CVE-2013-0623 CVE-2013-0624 CVE-2013-0626 CVE-2013-0627 Affected Products: SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. It includes two new package versions. Description: Acrobat Reader was updated to 9.5.3 to fix various bugs and security issues. More information can be found at http://www.adobe.com/support/security/bulletins/apsb13-02.ht ml The resolved security issues are CVE-2012-1530 , CVE-2013-0601 , CVE-2013-0602 , CVE-2013-0603 , CVE-2013-0604 , CVE-2013-0605 , CVE-2013-0606 , CVE-2013-0607 , CVE-2013-0608 , CVE-2013-0609 , CVE-2013-0610 , CVE-2013-0611 , CVE-2013-0612 , CVE-2013-0613 , CVE-2013-0614 , CVE-2013-0615 , CVE-2013-0616 , CVE-2013-0617 , CVE-2013-0618 , CVE-2013-0619 , CVE-2013-0620 , CVE-2013-0621 , CVE-2013-0622 , CVE-2013-0623 , CVE-2013-0624 , CVE-2013-0626 and CVE-2013-0627 . Indications: Everyone should install this update. Package List: - SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]: acroread-cmaps-9.4.6-0.6.59 acroread-fonts-ja-9.4.6-0.6.59 acroread-fonts-ko-9.4.6-0.6.59 acroread-fonts-zh_CN-9.4.6-0.6.59 acroread-fonts-zh_TW-9.4.6-0.6.59 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.3]: acroread-9.5.3-0.6.2 References: http://support.novell.com/security/cve/CVE-2012-1530.html http://support.novell.com/security/cve/CVE-2013-0601.html http://support.novell.com/security/cve/CVE-2013-0602.html http://support.novell.com/security/cve/CVE-2013-0603.html http://support.novell.com/security/cve/CVE-2013-0604.html http://support.novell.com/security/cve/CVE-2013-0605.html http://support.novell.com/security/cve/CVE-2013-0606.html http://support.novell.com/security/cve/CVE-2013-0607.html http://support.novell.com/security/cve/CVE-2013-0608.html http://support.novell.com/security/cve/CVE-2013-0609.html http://support.novell.com/security/cve/CVE-2013-0610.html http://support.novell.com/security/cve/CVE-2013-0611.html http://support.novell.com/security/cve/CVE-2013-0612.html http://support.novell.com/security/cve/CVE-2013-0613.html http://support.novell.com/security/cve/CVE-2013-0614.html http://support.novell.com/security/cve/CVE-2013-0615.html http://support.novell.com/security/cve/CVE-2013-0616.html http://support.novell.com/security/cve/CVE-2013-0617.html http://support.novell.com/security/cve/CVE-2013-0618.html http://support.novell.com/security/cve/CVE-2013-0619.html http://support.novell.com/security/cve/CVE-2013-0620.html http://support.novell.com/security/cve/CVE-2013-0621.html http://support.novell.com/security/cve/CVE-2013-0622.html http://support.novell.com/security/cve/CVE-2013-0623.html http://support.novell.com/security/cve/CVE-2013-0624.html http://support.novell.com/security/cve/CVE-2013-0626.html http://support.novell.com/security/cve/CVE-2013-0627.html https://bugzilla.novell.com/797529 http://download.novell.com/patch/finder/?keywords=439f017a53eac3afd9cf07feecd10c66 From sle-security-updates at lists.suse.com Thu Jan 17 16:05:08 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 18 Jan 2013 00:05:08 +0100 (CET) Subject: SUSE-SU-2013:0047-1: important: Security update for Acrobat Reader Message-ID: <20130117230508.77DBE321C0@maintenance.suse.de> SUSE Security Update: Security update for Acrobat Reader ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0047-1 Rating: important References: #791654 #797529 Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602 CVE-2013-0603 CVE-2013-0604 CVE-2013-0605 CVE-2013-0606 CVE-2013-0607 CVE-2013-0608 CVE-2013-0609 CVE-2013-0610 CVE-2013-0611 CVE-2013-0612 CVE-2013-0613 CVE-2013-0614 CVE-2013-0615 CVE-2013-0616 CVE-2013-0617 CVE-2013-0618 CVE-2013-0619 CVE-2013-0620 CVE-2013-0621 CVE-2013-0622 CVE-2013-0623 CVE-2013-0624 CVE-2013-0626 CVE-2013-0627 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. It includes one version update. Description: Acrobat Reader was updated to 9.5.3 to fix various bugs and security issues. More information can be found at http://www.adobe.com/support/security/bulletins/apsb13-02.ht ml The resolved security issues are CVE-2012-1530 , CVE-2013-0601 , CVE-2013-0602 , CVE-2013-0603 , CVE-2013-0604 , CVE-2013-0605 , CVE-2013-0606 , CVE-2013-0607 , CVE-2013-0608 , CVE-2013-0609 , CVE-2013-0610 , CVE-2013-0611 , CVE-2013-0612 , CVE-2013-0613 , CVE-2013-0614 , CVE-2013-0615 , CVE-2013-0616 , CVE-2013-0617 , CVE-2013-0618 , CVE-2013-0619 , CVE-2013-0620 , CVE-2013-0621 , CVE-2013-0622 , CVE-2013-0623 , CVE-2013-0624 , CVE-2013-0626 and CVE-2013-0627 . Indications: Everyone should install this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-acroread-7230 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (noarch): acroread-cmaps-9.4.6-0.4.2.4 acroread-fonts-ja-9.4.6-0.4.2.4 acroread-fonts-ko-9.4.6-0.4.2.4 acroread-fonts-zh_CN-9.4.6-0.4.2.4 acroread-fonts-zh_TW-9.4.6-0.4.2.4 - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]: acroread-9.5.3-0.2.1 References: http://support.novell.com/security/cve/CVE-2012-1530.html http://support.novell.com/security/cve/CVE-2013-0601.html http://support.novell.com/security/cve/CVE-2013-0602.html http://support.novell.com/security/cve/CVE-2013-0603.html http://support.novell.com/security/cve/CVE-2013-0604.html http://support.novell.com/security/cve/CVE-2013-0605.html http://support.novell.com/security/cve/CVE-2013-0606.html http://support.novell.com/security/cve/CVE-2013-0607.html http://support.novell.com/security/cve/CVE-2013-0608.html http://support.novell.com/security/cve/CVE-2013-0609.html http://support.novell.com/security/cve/CVE-2013-0610.html http://support.novell.com/security/cve/CVE-2013-0611.html http://support.novell.com/security/cve/CVE-2013-0612.html http://support.novell.com/security/cve/CVE-2013-0613.html http://support.novell.com/security/cve/CVE-2013-0614.html http://support.novell.com/security/cve/CVE-2013-0615.html http://support.novell.com/security/cve/CVE-2013-0616.html http://support.novell.com/security/cve/CVE-2013-0617.html http://support.novell.com/security/cve/CVE-2013-0618.html http://support.novell.com/security/cve/CVE-2013-0619.html http://support.novell.com/security/cve/CVE-2013-0620.html http://support.novell.com/security/cve/CVE-2013-0621.html http://support.novell.com/security/cve/CVE-2013-0622.html http://support.novell.com/security/cve/CVE-2013-0623.html http://support.novell.com/security/cve/CVE-2013-0624.html http://support.novell.com/security/cve/CVE-2013-0626.html http://support.novell.com/security/cve/CVE-2013-0627.html https://bugzilla.novell.com/791654 https://bugzilla.novell.com/797529 http://download.novell.com/patch/finder/?keywords=97f58b8e36c19fed220fe34974de6f21 From sle-security-updates at lists.suse.com Fri Jan 18 11:04:44 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 18 Jan 2013 19:04:44 +0100 (CET) Subject: SUSE-SU-2013:0048-1: important: Security update for MozillaFirefox Message-ID: <20130118180445.52801321AF@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0048-1 Rating: important References: #796895 Cross-References: CVE-2012-5829 CVE-2013-0743 CVE-2013-0744 CVE-2013-0745 CVE-2013-0746 CVE-2013-0747 CVE-2013-0748 CVE-2013-0749 CVE-2013-0750 CVE-2013-0751 CVE-2013-0752 CVE-2013-0753 CVE-2013-0754 CVE-2013-0755 CVE-2013-0756 CVE-2013-0757 CVE-2013-0758 CVE-2013-0759 CVE-2013-0760 CVE-2013-0761 CVE-2013-0762 CVE-2013-0763 CVE-2013-0764 CVE-2013-0766 CVE-2013-0767 CVE-2013-0768 CVE-2013-0769 CVE-2013-0770 CVE-2013-0771 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes 29 vulnerabilities is now available. It includes three new package versions. Description: Mozilla Firefox was updated to the 10.0.12ESR release. * MFSA 2013-01: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki Ishikawa reported memory safety problems and crashes that affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. ( CVE-2013-0769 ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported memory safety problems and crashes that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749 ) o Jesse Ruderman, Christian Holler, Julian Seward, and Scoobidiver reported memory safety problems and crashes that affect Firefox 17. (CVE-2013-0770 ) * MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free, out of bounds read, and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting three additional user-after-free and out of bounds read flaws introduced during Firefox development that were fixed before general release. The following issue was fixed in Firefox 18: o Global-buffer-overflow in CharDistributionAnalysis::HandleOneChar (CVE-2013-0760 ) The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR 10.0.12: o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762 ) o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766 ) o Out of bounds read in nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767 ) The following issues were fixed in Firefox 18 and ESR 17.0.1: o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761 ) o Heap-use-after-free in Mesa, triggerable by resizing a WebGL canvas (CVE-2013-0763 ) o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771 ) The following issue was fixed in Firefox 18 and in the earlier ESR 10.0.11 release: o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829 ) * MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer tool to discover a buffer overflow in Canvas when specific bad height and width values were given through HTML. This could lead to a potentially exploitable crash. (CVE-2013-0768 ) Miaubiz also found a potentially exploitable crash when 2D and 3D content was mixed which was introduced during Firefox development and fixed before general release. * MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in which the displayed URL values within the addressbar can be spoofed by a page during loading. This allows for phishing attacks where a malicious page can spoof the identify of another site. ( CVE-2013-0759 ) * MFSA 2013-05: Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered that the combination of large numbers of columns and column groups in a table could cause the array containing the columns during rendering to overwrite itself. This can lead to a user-after-free causing a potentially exploitable crash. ( CVE-2013-0744 ) * MFSA 2013-06: Mozilla developer Wesley Johnston reported that when there are two or more iframes on the same HTML page, an iframe is able to see the touch events and their targets that occur within the other iframes on the page. If the iframes are from the same origin, they can also access the properties and methods of the targets of other iframes but same-origin policy (SOP) restricts access across domains. This allows for information leakage and possibilities for cross-site scripting (XSS) if another vulnerability can be used to get around SOP restrictions. (CVE-2013-0751 ) * MFSA 2013-07: Mozilla community member Jerry Baker reported a crashing issue found through Thunderbird when downloading messages over a Secure Sockets Layer (SSL) connection. This was caused by a bug in the networking code assuming that secure connections were entirely handled on the socket transport thread when they can occur on a variety of threads. The resulting crash was potentially exploitable. (CVE-2013-0764 ) * MFSA 2013-08: Mozilla developer Olli Pettay discovered that the AutoWrapperChanger class fails to keep some javascript objects alive during garbage collection. This can lead to an exploitable crash allowing for arbitrary code execution. (CVE-2013-0745 ) * MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a problem where jsval-returning quickstubs fail to wrap their return values, causing a compartment mismatch. This mismatch can cause garbage collection to occur incorrectly and lead to a potentially exploitable crash. (CVE-2013-0746 ) * MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported that events in the plugin handler can be manipulated by web content to bypass same-origin policy (SOP) restrictions. This can allow for clickjacking on malicious web pages. (CVE-2013-0747 ) * MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered that using the toString function of XBL objects can lead to inappropriate information leakage by revealing the address space layout instead of just the ID of the object. This layout information could potentially be used to bypass ASLR and other security protections. (CVE-2013-0748 ) * MFSA 2013-12: Security researcher pa_kt reported a flaw via TippingPoint's Zero Day Initiative that an integer overflow is possible when calculating the length for a Javascript string concatenation, which is then used for memory allocation. This results in a buffer overflow, leading to a potentially exploitable memory corruption. (CVE-2013-0750 ) * MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that when using an XBL file containing multiple XML bindings with SVG content, a memory corruption can occur. In concern with remote XUL, this can lead to an exploitable crash. (CVE-2013-0752 ) * MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is possible to change the prototype of an object and bypass Chrome Object Wrappers (COW) to gain access to chrome privileged functions. This could allow for arbitrary code execution. (CVE-2013-0757 ) * MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is possible to open a chrome privileged web page through plugin objects through interaction with SVG elements. This could allow for arbitrary code execution. (CVE-2013-0758 ) * MFSA 2013-16: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer by the exposing of serializeToStream to web content. This can lead to arbitrary code execution when exploited. (CVE-2013-0753 ) * MFSA 2013-17: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free within the ListenerManager when garbage collection is forced after data in listener objects have been allocated in some circumstances. This results in a use-after-free which can lead to arbitrary code execution. (CVE-2013-0754 ) * MFSA 2013-18: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free using the domDoc pointer within Vibrate library. This can lead to arbitrary code execution when exploited. (CVE-2013-0755 ) * MFSA 2013-19: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a garbage collection flaw in Javascript Proxy objects. This can lead to a use-after-free leading to arbitrary code execution. (CVE-2013-0756 ) * MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a certificate authority in Mozilla's root program, had mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking the trust for these specific mis-issued certificates. (CVE-2013-0743 ) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-firefox-201301-7224 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-firefox-201301-7224 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-firefox-201301-7224 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-firefox-201301-7224 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-devel-4.9.4-0.3.1 mozilla-nss-devel-3.14.1-0.3.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 10.0.12,3.14.1 and 4.9.4]: MozillaFirefox-10.0.12-0.4.1 MozillaFirefox-translations-10.0.12-0.4.1 libfreebl3-3.14.1-0.3.1 mozilla-nspr-4.9.4-0.3.1 mozilla-nss-3.14.1-0.3.1 mozilla-nss-tools-3.14.1-0.3.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64) [New Version: 3.14.1 and 4.9.4]: libfreebl3-32bit-3.14.1-0.3.1 mozilla-nspr-32bit-4.9.4-0.3.1 mozilla-nss-32bit-3.14.1-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 10.0.12,3.14.1 and 4.9.4]: MozillaFirefox-10.0.12-0.4.1 MozillaFirefox-translations-10.0.12-0.4.1 libfreebl3-3.14.1-0.3.1 mozilla-nspr-4.9.4-0.3.1 mozilla-nss-3.14.1-0.3.1 mozilla-nss-tools-3.14.1-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 3.14.1 and 4.9.4]: libfreebl3-32bit-3.14.1-0.3.1 mozilla-nspr-32bit-4.9.4-0.3.1 mozilla-nss-32bit-3.14.1-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 3.14.1 and 4.9.4]: libfreebl3-x86-3.14.1-0.3.1 mozilla-nspr-x86-4.9.4-0.3.1 mozilla-nss-x86-3.14.1-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 10.0.12,3.14.1 and 4.9.4]: MozillaFirefox-10.0.12-0.4.1 MozillaFirefox-translations-10.0.12-0.4.1 libfreebl3-3.14.1-0.3.1 mozilla-nspr-4.9.4-0.3.1 mozilla-nss-3.14.1-0.3.1 mozilla-nss-tools-3.14.1-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 3.14.1 and 4.9.4]: libfreebl3-32bit-3.14.1-0.3.1 mozilla-nspr-32bit-4.9.4-0.3.1 mozilla-nss-32bit-3.14.1-0.3.1 References: http://support.novell.com/security/cve/CVE-2012-5829.html http://support.novell.com/security/cve/CVE-2013-0743.html http://support.novell.com/security/cve/CVE-2013-0744.html http://support.novell.com/security/cve/CVE-2013-0745.html http://support.novell.com/security/cve/CVE-2013-0746.html http://support.novell.com/security/cve/CVE-2013-0747.html http://support.novell.com/security/cve/CVE-2013-0748.html http://support.novell.com/security/cve/CVE-2013-0749.html http://support.novell.com/security/cve/CVE-2013-0750.html http://support.novell.com/security/cve/CVE-2013-0751.html http://support.novell.com/security/cve/CVE-2013-0752.html http://support.novell.com/security/cve/CVE-2013-0753.html http://support.novell.com/security/cve/CVE-2013-0754.html http://support.novell.com/security/cve/CVE-2013-0755.html http://support.novell.com/security/cve/CVE-2013-0756.html http://support.novell.com/security/cve/CVE-2013-0757.html http://support.novell.com/security/cve/CVE-2013-0758.html http://support.novell.com/security/cve/CVE-2013-0759.html http://support.novell.com/security/cve/CVE-2013-0760.html http://support.novell.com/security/cve/CVE-2013-0761.html http://support.novell.com/security/cve/CVE-2013-0762.html http://support.novell.com/security/cve/CVE-2013-0763.html http://support.novell.com/security/cve/CVE-2013-0764.html http://support.novell.com/security/cve/CVE-2013-0766.html http://support.novell.com/security/cve/CVE-2013-0767.html http://support.novell.com/security/cve/CVE-2013-0768.html http://support.novell.com/security/cve/CVE-2013-0769.html http://support.novell.com/security/cve/CVE-2013-0770.html http://support.novell.com/security/cve/CVE-2013-0771.html https://bugzilla.novell.com/796895 http://download.novell.com/patch/finder/?keywords=9589e71e3266116ae59aa9d6e45add05 From sle-security-updates at lists.suse.com Fri Jan 18 12:04:33 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 18 Jan 2013 20:04:33 +0100 (CET) Subject: SUSE-SU-2013:0049-1: important: Security update for MozillaFirefox Message-ID: <20130118190433.BDA6D321E6@maintenance.suse.de> SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0049-1 Rating: important References: #796628 #796895 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that contains security fixes can now be installed. It includes two new package versions. Description: Mozilla Firefox was updated to the 10.0.12ESR release. * MFSA 2013-01: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki Ishikawa reported memory safety problems and crashes that affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. ( CVE-2013-0769 ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported memory safety problems and crashes that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749 ) o Jesse Ruderman, Christian Holler, Julian Seward, and Scoobidiver reported memory safety problems and crashes that affect Firefox 17. (CVE-2013-0770 ) * MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free, out of bounds read, and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting three additional user-after-free and out of bounds read flaws introduced during Firefox development that were fixed before general release. The following issue was fixed in Firefox 18: o Global-buffer-overflow in CharDistributionAnalysis::HandleOneChar (CVE-2013-0760 ) The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR 10.0.12: o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762 ) o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766 ) o Out of bounds read in nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767 ) The following issues were fixed in Firefox 18 and ESR 17.0.1: o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761 ) o Heap-use-after-free in Mesa, triggerable by resizing a WebGL canvas (CVE-2013-0763 ) o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771 ) The following issue was fixed in Firefox 18 and in the earlier ESR 10.0.11 release: o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829 ) * MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer tool to discover a buffer overflow in Canvas when specific bad height and width values were given through HTML. This could lead to a potentially exploitable crash. (CVE-2013-0768 ) Miaubiz also found a potentially exploitable crash when 2D and 3D content was mixed which was introduced during Firefox development and fixed before general release. * MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in which the displayed URL values within the addressbar can be spoofed by a page during loading. This allows for phishing attacks where a malicious page can spoof the identify of another site. ( CVE-2013-0759 ) * MFSA 2013-05: Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG discovered that the combination of large numbers of columns and column groups in a table could cause the array containing the columns during rendering to overwrite itself. This can lead to a user-after-free causing a potentially exploitable crash. ( CVE-2013-0744 ) * MFSA 2013-06: Mozilla developer Wesley Johnston reported that when there are two or more iframes on the same HTML page, an iframe is able to see the touch events and their targets that occur within the other iframes on the page. If the iframes are from the same origin, they can also access the properties and methods of the targets of other iframes but same-origin policy (SOP) restricts access across domains. This allows for information leakage and possibilities for cross-site scripting (XSS) if another vulnerability can be used to get around SOP restrictions. (CVE-2013-0751 ) * MFSA 2013-07: Mozilla community member Jerry Baker reported a crashing issue found through Thunderbird when downloading messages over a Secure Sockets Layer (SSL) connection. This was caused by a bug in the networking code assuming that secure connections were entirely handled on the socket transport thread when they can occur on a variety of threads. The resulting crash was potentially exploitable. (CVE-2013-0764 ) * MFSA 2013-08: Mozilla developer Olli Pettay discovered that the AutoWrapperChanger class fails to keep some javascript objects alive during garbage collection. This can lead to an exploitable crash allowing for arbitrary code execution. (CVE-2013-0745 ) * MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a problem where jsval-returning quickstubs fail to wrap their return values, causing a compartment mismatch. This mismatch can cause garbage collection to occur incorrectly and lead to a potentially exploitable crash. (CVE-2013-0746 ) * MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported that events in the plugin handler can be manipulated by web content to bypass same-origin policy (SOP) restrictions. This can allow for clickjacking on malicious web pages. (CVE-2013-0747 ) * MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered that using the toString function of XBL objects can lead to inappropriate information leakage by revealing the address space layout instead of just the ID of the object. This layout information could potentially be used to bypass ASLR and other security protections. (CVE-2013-0748 ) * MFSA 2013-12: Security researcher pa_kt reported a flaw via TippingPoint's Zero Day Initiative that an integer overflow is possible when calculating the length for a Javascript string concatenation, which is then used for memory allocation. This results in a buffer overflow, leading to a potentially exploitable memory corruption. (CVE-2013-0750 ) * MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that when using an XBL file containing multiple XML bindings with SVG content, a memory corruption can occur. In concern with remote XUL, this can lead to an exploitable crash. (CVE-2013-0752 ) * MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is possible to change the prototype of an object and bypass Chrome Object Wrappers (COW) to gain access to chrome privileged functions. This could allow for arbitrary code execution. (CVE-2013-0757 ) * MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is possible to open a chrome privileged web page through plugin objects through interaction with SVG elements. This could allow for arbitrary code execution. (CVE-2013-0758 ) * MFSA 2013-16: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer by the exposing of serializeToStream to web content. This can lead to arbitrary code execution when exploited. (CVE-2013-0753 ) * MFSA 2013-17: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free within the ListenerManager when garbage collection is forced after data in listener objects have been allocated in some circumstances. This results in a use-after-free which can lead to arbitrary code execution. (CVE-2013-0754 ) * MFSA 2013-18: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a use-after-free using the domDoc pointer within Vibrate library. This can lead to arbitrary code execution when exploited. (CVE-2013-0755 ) * MFSA 2013-19: Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a garbage collection flaw in Javascript Proxy objects. This can lead to a use-after-free leading to arbitrary code execution. (CVE-2013-0756 ) * MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a certificate authority in Mozilla's root program, had mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking the trust for these specific mis-issued certificates. (CVE-2013-0743 ) Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-4.9.4-0.6.1 mozilla-nspr-devel-4.9.4-0.6.1 mozilla-nss-3.14.1-0.6.1 mozilla-nss-devel-3.14.1-0.6.1 mozilla-nss-tools-3.14.1-0.6.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x): MozillaFirefox-10.0.12-0.6.1 MozillaFirefox-translations-10.0.12-0.6.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-32bit-4.9.4-0.6.1 mozilla-nss-32bit-3.14.1-0.6.1 - SUSE Linux Enterprise Server 10 SP4 (ia64) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-x86-4.9.4-0.6.1 mozilla-nss-x86-3.14.1-0.6.1 - SUSE Linux Enterprise Server 10 SP4 (ppc) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-64bit-4.9.4-0.6.1 mozilla-nss-64bit-3.14.1-0.6.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-4.9.4-0.6.1 mozilla-nspr-devel-4.9.4-0.6.1 mozilla-nss-3.14.1-0.6.1 mozilla-nss-devel-3.14.1-0.6.1 mozilla-nss-tools-3.14.1-0.6.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64) [New Version: 3.14.1 and 4.9.4]: mozilla-nspr-32bit-4.9.4-0.6.1 mozilla-nss-32bit-3.14.1-0.6.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586): MozillaFirefox-10.0.12-0.6.1 MozillaFirefox-translations-10.0.12-0.6.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 3.14.1]: mozilla-nss-tools-3.14.1-0.6.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x): MozillaFirefox-branding-upstream-10.0.12-0.6.1 References: https://bugzilla.novell.com/796628 https://bugzilla.novell.com/796895 http://download.novell.com/patch/finder/?keywords=dbe0a7820fa20c51a9e400f8a2814641 From sle-security-updates at lists.suse.com Mon Jan 21 10:04:29 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 21 Jan 2013 18:04:29 +0100 (CET) Subject: SUSE-SU-2013:0051-1: moderate: Security update for icu Message-ID: <20130121170429.9F175321E7@maintenance.suse.de> SUSE Security Update: Security update for icu ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0051-1 Rating: moderate References: #657910 #736146 Cross-References: CVE-2011-4599 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update is rereleased because some architectures were missed on the first try. It fixes the following security issues: * Specially crafted strings could cause a buffer overflow in icu ( CVE-2011-4599 ) * An integer overflow in the getSymbol() function could crash applications using icu (CVE-2010-4409 ) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-icu-7204 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-icu-7204 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-icu-7204 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-icu-7204 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libicu-devel-4.0-7.26.15 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libicu-devel-32bit-4.0-7.26.15 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): icu-4.0-7.26.15 - SUSE Linux Enterprise Software Development Kit 11 SP2 (x86_64): libicu-32bit-4.0-7.26.15 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libicu-4.0-7.26.15 libicu-doc-4.0-7.26.15 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libicu-32bit-4.0-7.26.15 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libicu-4.0-7.26.15 libicu-doc-4.0-7.26.15 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libicu-32bit-4.0-7.26.15 - SUSE Linux Enterprise Server 11 SP2 (ia64): libicu-x86-4.0-7.26.15 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): icu-4.0-7.26.15 libicu-4.0-7.26.15 References: http://support.novell.com/security/cve/CVE-2011-4599.html https://bugzilla.novell.com/657910 https://bugzilla.novell.com/736146 http://download.novell.com/patch/finder/?keywords=6d89f4b06ab2a4a8bb3c7b664635b47d From sle-security-updates at lists.suse.com Tue Jan 22 21:04:17 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 23 Jan 2013 05:04:17 +0100 (CET) Subject: SUSE-SU-2013:0053-1: important: Security update for WebYaST Message-ID: <20130123040417.61F14321E9@maintenance.suse.de> SUSE Security Update: Security update for WebYaST ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0053-1 Rating: important References: #792712 Cross-References: CVE-2012-0435 Affected Products: WebYaST 1.2 SUSE Studio Standard Edition 1.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: The hosts list used by WebYaST for connecting to it's back end part was modifiable allowing to point to a malicious website which then could access all values sent by WebYaST. The /host configuration path was removed to fix this issue. Security Issue reference: * CVE-2012-0435 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-webyast-base-ui-7236 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-webyast-base-ui-7236 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (noarch) [New Version: 0.2.63]: webyast-base-ui-0.2.63-0.6.1 webyast-base-ui-branding-default-0.2.63-0.6.1 webyast-base-ui-testsuite-0.2.63-0.6.1 - SUSE Studio Standard Edition 1.2 (noarch) [New Version: 0.2.63]: webyast-base-ui-0.2.63-0.6.1 References: http://support.novell.com/security/cve/CVE-2012-0435.html https://bugzilla.novell.com/792712 http://download.novell.com/patch/finder/?keywords=7c947289145036c838e04ef674b59d7b From sle-security-updates at lists.suse.com Wed Jan 23 12:04:38 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 23 Jan 2013 20:04:38 +0100 (CET) Subject: SUSE-SU-2013:0190-1: important: Security update for pcp Message-ID: <20130123190438.648B4321CE@maintenance.suse.de> SUSE Security Update: Security update for pcp ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0190-1 Rating: important References: #732763 #775009 #775010 #775011 #775013 #782967 Cross-References: CVE-2012-3418 CVE-2012-3419 CVE-2012-3420 CVE-2012-3421 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves four vulnerabilities and has two fixes is now available. It includes two new package versions. Description: pcp was updated to version 3.6.10 which fixes security issues and also brings a lot of new features. * Update to pcp-3.6.10. o Transition daemons to run under an unprivileged account. o Fixes for security advisory CVE-2012-5530: tmpfile flaws; (bnc#782967). o Fix pcp(1) command short-form pmlogger reporting. o Fix pmdalogger error handling for directory files. o Fix pmstat handling of odd corner case in CPU metrics. o Correct the python ctype used for pmAtomValue 32bit ints. o Add missing RPM spec dependency for python-ctypes. o Corrections to pmdamysql metrics units. o Add pmdamysql slave status metrics. o Improve pmcollectl error messages. o Parameterize pmcollectl CPU counts in interrupt subsys. o Fix generic RPM packaging for powerpc builds. o Fix python API use of reentrant libpcp string routines. o Python code backporting for RHEL5 in qa and pmcollectl. o Fix edge cases in capturing interrupt error counts. * Update to pcp-3.6.9. o Python wrapper for the pmimport API o Make sar2pcp work with the sysstat versions from RHEL5, RHEL6, and all recent Fedora versions (which is almost all current versions of sysstat verified). o Added a number of additional metrics into the importer for people starting to use it to analyse sar data from real customer incidents. o Rework use of C99 "restrict" keyword in pmdalogger (Debian bug: 689552) o Alot of work on the PCP QA suite, special thanks to Tomas Dohnalek for all his efforts there. o Win32 build updates o Add "raw" disk active metrics so that existing tools like iostat can be emulated o Allow sar2pcp to accept XML input directly (.xml suffix), allowing it to not have to run on the same platform as the sadc/sadf that originally generated it. o Add PMI error codes into the PCP::LogImport perl module. o Fix a typo in pmiUnits man page synopsis section o Resolve pmdalinux ordering issue in NUMA/CPU indom setup (Redhat bug: 858384) o Remove unused pmcollectl imports (Redhat bug: 863210) o Allow event traces to be used in libpcp interpolate mode * Update to pcp-3.6.8. o Corrects the disk/partition identification for the MMC driver, which makes disk indom handling correct on the Raspberry Pi (http://www.raspberrypi.org/) o Several minor/basic fixes for pmdaoracle. o Improve pmcollectl compatibility. o Make a few clarifications to pmcollectl.1. o Improve python API test coverage. o Numerous updates to the test suite in general. o Allow pmda Install scripts to specify own dso name again. o Reconcile spec file differences between PCP flavours. o Fix handling of multiple contexts with a remote namespace. o Core socket interface abstractions to support NSS (later). o Fix man page SYNOPSIS section for pmUnpackEventRecords. o Add --disable-shared build option for static builds. * Update to pcp-3.6.6. o Added the python PMAPI bindings and an initial python client in pmcollectl. Separate, new package exists for python libs for those platforms that split out packages (rpm, deb). o Added a pcp-testsuite package for those platforms that might want this (rpm, deb again, mainly) o Re-introduced the pcp/qa subdirectory in pcp and deprecated the external pcpqa git tree. o Fix potential buffer overflow in pmlogger host name handling. o Reworked the configure --prefix handling to be more like the rest of the open source world. o Ensure the __pmDecodeText ident parameter is always set Resolves Red Hat bugzilla bug #841306. Security Issue references: * CVE-2012-3418 * CVE-2012-3419 * CVE-2012-3420 * CVE-2012-3421 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-libpcp3-7221 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-libpcp3-7221 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-libpcp3-7221 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-libpcp3-7221 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.6.10]: libpcp3-3.6.10-0.3.1 pcp-3.6.10-0.3.1 pcp-devel-3.6.10-0.3.1 pcp-import-iostat2pcp-3.6.10-0.3.1 pcp-import-mrtg2pcp-3.6.10-0.3.1 pcp-import-sar2pcp-3.6.10-0.3.1 pcp-import-sheet2pcp-3.6.10-0.3.1 perl-PCP-LogImport-3.6.10-0.3.1 perl-PCP-LogSummary-3.6.10-0.3.1 perl-PCP-MMV-3.6.10-0.3.1 perl-PCP-PMDA-3.6.10-0.3.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 2013.1.7]: permissions-2013.1.7-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2013.1.7]: permissions-2013.1.7-0.3.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 2013.1.7 and 3.6.10]: libpcp3-3.6.10-0.5.1 pcp-3.6.10-0.5.1 pcp-import-iostat2pcp-3.6.10-0.5.1 pcp-import-mrtg2pcp-3.6.10-0.5.1 pcp-import-sar2pcp-3.6.10-0.5.1 pcp-import-sheet2pcp-3.6.10-0.5.1 perl-PCP-LogImport-3.6.10-0.5.1 perl-PCP-LogSummary-3.6.10-0.5.1 perl-PCP-MMV-3.6.10-0.5.1 perl-PCP-PMDA-3.6.10-0.5.1 permissions-2013.1.7-0.5.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2013.1.7]: permissions-2013.1.7-0.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 2013.1.7]: permissions-2013.1.7-0.5.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 3.6.10]: libpcp3-3.6.10-0.5.1 pcp-3.6.10-0.5.1 pcp-devel-3.6.10-0.5.1 pcp-import-iostat2pcp-3.6.10-0.5.1 pcp-import-mrtg2pcp-3.6.10-0.5.1 pcp-import-sar2pcp-3.6.10-0.5.1 pcp-import-sheet2pcp-3.6.10-0.5.1 perl-PCP-LogImport-3.6.10-0.5.1 perl-PCP-LogSummary-3.6.10-0.5.1 perl-PCP-MMV-3.6.10-0.5.1 perl-PCP-PMDA-3.6.10-0.5.1 References: http://support.novell.com/security/cve/CVE-2012-3418.html http://support.novell.com/security/cve/CVE-2012-3419.html http://support.novell.com/security/cve/CVE-2012-3420.html http://support.novell.com/security/cve/CVE-2012-3421.html https://bugzilla.novell.com/732763 https://bugzilla.novell.com/775009 https://bugzilla.novell.com/775010 https://bugzilla.novell.com/775011 https://bugzilla.novell.com/775013 https://bugzilla.novell.com/782967 http://download.novell.com/patch/finder/?keywords=51012200090dff3a8a3a0cbcae5a4be2 http://download.novell.com/patch/finder/?keywords=86d59a2714828a99a56a3fdba3660c73 From sle-security-updates at lists.suse.com Thu Jan 24 15:04:15 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 24 Jan 2013 23:04:15 +0100 (CET) Subject: SUSE-SU-2013:0194-1: moderate: Security update for hawk Message-ID: <20130124220415.5838C321E7@maintenance.suse.de> SUSE Security Update: Security update for hawk ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0194-1 Rating: moderate References: #765097 #766791 #775649 #775653 Cross-References: CVE-2012-3464 CVE-2012-3465 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP2 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. It includes one version update. Description: hawk has been rebuilt to include updated ruby gems that contain fixes for security issues. rubygem-activesupport-2_3 has been updated to fix the following security issue: * This update also the HTML escaping code in Ruby on Rails. CVE-2012-3464 has been assigned to this issue. rubygem-actionpack-2_3 has been updated to fix the following security issues: * CVE-2012-3465: Malformed HTML is not correctly handled when validating with the strip_tags helper which could result in Cross-site Scripting issues. * CVE-2012-2694, CVE-2012-2660: Unsafe query generation was possible using NULL queries. The included GEM archive package was also adjusted to contain the security fixes available in the unpacked ruby tree. Security Issue references: * CVE-2012-3464 * CVE-2012-3465 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-hawk-7078 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.5.2]: hawk-0.5.2-0.38.16 hawk-templates-0.5.2-0.38.16 References: http://support.novell.com/security/cve/CVE-2012-3464.html http://support.novell.com/security/cve/CVE-2012-3465.html https://bugzilla.novell.com/765097 https://bugzilla.novell.com/766791 https://bugzilla.novell.com/775649 https://bugzilla.novell.com/775653 http://download.novell.com/patch/finder/?keywords=6a53a5d8c6e366542686771cc89925c3 From sle-security-updates at lists.suse.com Thu Jan 24 17:04:31 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 25 Jan 2013 01:04:31 +0100 (CET) Subject: SUSE-SU-2013:0195-1: moderate: Security update for freetype2 Message-ID: <20130125000432.2C096321D8@maintenance.suse.de> SUSE Security Update: Security update for freetype2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0195-1 Rating: moderate References: #795826 Cross-References: CVE-2012-5668 CVE-2012-5669 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update fixes: * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668 and CVE-2012-5669) As well as the following non-security bugs: * [bdf] Savannah bug #37905. o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero in case of allocation error; this value gets used in a loop in * [bdf] Fix Savannah bug #37906. o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size for checking `glyph_enc'. Security Issue references: * CVE-2012-5668 * CVE-2012-5669 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-freetype2-7232 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-freetype2-7232 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-freetype2-7232 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-freetype2-7232 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): freetype2-devel-2.3.7-25.32.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): freetype2-devel-32bit-2.3.7-25.32.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): freetype2-2.3.7-25.32.1 ft2demos-2.3.7-25.32.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): freetype2-32bit-2.3.7-25.32.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): freetype2-2.3.7-25.32.1 ft2demos-2.3.7-25.32.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): freetype2-32bit-2.3.7-25.32.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): freetype2-x86-2.3.7-25.32.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): freetype2-2.3.7-25.32.1 freetype2-devel-2.3.7-25.32.1 ft2demos-2.3.7-25.32.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): freetype2-32bit-2.3.7-25.32.1 References: http://support.novell.com/security/cve/CVE-2012-5668.html http://support.novell.com/security/cve/CVE-2012-5669.html https://bugzilla.novell.com/795826 http://download.novell.com/patch/finder/?keywords=cdec3f55c43c965d2fec90d543cc6e2b From sle-security-updates at lists.suse.com Thu Jan 24 17:04:38 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 25 Jan 2013 01:04:38 +0100 (CET) Subject: SUSE-SU-2013:0196-1: moderate: Security update for freetype2 Message-ID: <20130125000438.5BDA2321E6@maintenance.suse.de> SUSE Security Update: Security update for freetype2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0196-1 Rating: moderate References: #795826 Cross-References: CVE-2012-5668 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes: * OOB access in bdf_free_font() (CVE-2012-5668) As well as non-security bugs: * [bdf] Savannah bug #37905. o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero in case of allocation error; this value gets used in a loop in Security Issue reference: * CVE-2012-5668 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): freetype2-2.1.10-18.31.1 freetype2-devel-2.1.10-18.31.1 ft2demos-2.1.10-19.31.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): freetype2-32bit-2.1.10-18.31.1 freetype2-devel-32bit-2.1.10-18.31.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): freetype2-x86-2.1.10-18.31.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): freetype2-64bit-2.1.10-18.31.1 freetype2-devel-64bit-2.1.10-18.31.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): freetype2-2.1.10-18.31.1 freetype2-devel-2.1.10-18.31.1 ft2demos-2.1.10-19.31.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): freetype2-32bit-2.1.10-18.31.1 freetype2-devel-32bit-2.1.10-18.31.1 References: http://support.novell.com/security/cve/CVE-2012-5668.html https://bugzilla.novell.com/795826 http://download.novell.com/patch/finder/?keywords=dae01abeb154b602c10bb1999a8eb916 From sle-security-updates at lists.suse.com Thu Jan 24 19:04:18 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 25 Jan 2013 03:04:18 +0100 (CET) Subject: SUSE-SU-2013:0198-1: moderate: Security update for libtiff Message-ID: <20130125020418.C8161321B7@maintenance.suse.de> SUSE Security Update: Security update for libtiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0198-1 Rating: moderate References: #781995 #787892 #788741 #791607 Cross-References: CVE-2012-4447 CVE-2012-4564 CVE-2012-5581 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. Description: Various memory corruption vulnerabilities have been fixed in libtiff. CVE-2012-4447, CVE-2012-4564 and CVE-2012-5581 have been assigned to these issues. Security Issue references: * CVE-2012-4447 * CVE-2012-4564 * CVE-2012-5581 Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-libtiff-devel-7216 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-libtiff-devel-7216 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-libtiff-devel-7216 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-libtiff-devel-7216 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.150.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.150.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libtiff3-3.8.2-141.150.1 tiff-3.8.2-141.150.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libtiff3-32bit-3.8.2-141.150.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.150.1 tiff-3.8.2-141.150.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.150.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libtiff3-x86-3.8.2-141.150.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-3.8.2-5.32.1 libtiff-devel-3.8.2-5.32.1 tiff-3.8.2-5.32.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libtiff-32bit-3.8.2-5.32.1 libtiff-devel-32bit-3.8.2-5.32.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libtiff-x86-3.8.2-5.32.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libtiff-64bit-3.8.2-5.32.1 libtiff-devel-64bit-3.8.2-5.32.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libtiff3-3.8.2-141.150.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libtiff3-32bit-3.8.2-141.150.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libtiff-3.8.2-5.32.1 libtiff-devel-3.8.2-5.32.1 tiff-3.8.2-5.32.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libtiff-32bit-3.8.2-5.32.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-devel-3.8.2-5.32.1 - SLE SDK 10 SP4 (s390x x86_64): libtiff-devel-32bit-3.8.2-5.32.1 - SLE SDK 10 SP4 (ppc): libtiff-devel-64bit-3.8.2-5.32.1 References: http://support.novell.com/security/cve/CVE-2012-4447.html http://support.novell.com/security/cve/CVE-2012-4564.html http://support.novell.com/security/cve/CVE-2012-5581.html https://bugzilla.novell.com/781995 https://bugzilla.novell.com/787892 https://bugzilla.novell.com/788741 https://bugzilla.novell.com/791607 http://download.novell.com/patch/finder/?keywords=293aa3466520f4b2119523440d11f5c3 http://download.novell.com/patch/finder/?keywords=e82a9ac77700ce38cd74ae7a74f81150 From sle-security-updates at lists.suse.com Tue Jan 29 12:04:14 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 29 Jan 2013 20:04:14 +0100 (CET) Subject: SUSE-SU-2013:0208-1: moderate: Security update for rubygem-actionpack-2_3 Message-ID: <20130129190414.D7672321DE@maintenance.suse.de> SUSE Security Update: Security update for rubygem-actionpack-2_3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0208-1 Rating: moderate References: #765097 #766791 #775649 Cross-References: CVE-2012-3464 CVE-2012-3465 Affected Products: WebYaST 1.2 SUSE Studio Standard Edition 1.2 SUSE Studio Onsite 1.2 SUSE Studio Extension for System z 1.2 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Cloud 1.0 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. It includes one version update. Description: rubygem-actionpack-2_3 has been updated to fix the following security issues: * CVE-2012-3465: Malformed HTML is not correctly handled when validating with the strip_tags helper which could result in Cross-site Scripting issues. * CVE-2012-2694, CVE-2012-2660: Unsafe query generation was possible using NULL queries. The included GEM archive package was also adjusted to contain the security fixes available in the unpacked ruby tree. Security Issue references: * CVE-2012-3464 * CVE-2012-3465 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-rubygem-actionpack-2_3-7031 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-rubygem-actionpack-2_3-7031 - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-rubygem-actionpack-2_3-7031 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-rubygem-actionpack-2_3-7031 - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-rubygem-actionpack-2_3-7030 - SUSE Cloud 1.0: zypper in -t patch sleclo10sp2-rubygem-actionpack-2_3-7030 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.10.1 - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.10.1 - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.10.1 - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): rubygem-actionpack-2_3-2.3.14-0.14.1 - SUSE Cloud 1.0 (x86_64): rubygem-actionpack-2_3-2.3.14-0.14.1 References: http://support.novell.com/security/cve/CVE-2012-3464.html http://support.novell.com/security/cve/CVE-2012-3465.html https://bugzilla.novell.com/765097 https://bugzilla.novell.com/766791 https://bugzilla.novell.com/775649 http://download.novell.com/patch/finder/?keywords=5a3f50ddfe70ae71ea853e5983a4df46 http://download.novell.com/patch/finder/?keywords=725ed7b159ba8946d34409cfe8334492 From sle-security-updates at lists.suse.com Tue Jan 29 12:04:18 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 29 Jan 2013 20:04:18 +0100 (CET) Subject: SUSE-SU-2013:0209-1: moderate: Security update for rubygem-activesupport-2_3 Message-ID: <20130129190418.CF3523212B@maintenance.suse.de> SUSE Security Update: Security update for rubygem-activesupport-2_3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0209-1 Rating: moderate References: #775653 Cross-References: CVE-2012-3464 CVE-2012-3465 Affected Products: WebYaST 1.2 SUSE Studio Standard Edition 1.2 SUSE Studio Onsite 1.2 SUSE Studio Extension for System z 1.2 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Cloud 1.0 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: rubygem-activesupport-2_3 was updated to fix two HTML escaping issues that may be used by an attacker for a cross-site scripting (XSS) attack. ( CVE-2012-3464 , CVE-2012-3465 ) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-rubygem-activesupport-2_3-7027 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-rubygem-activesupport-2_3-7027 - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-rubygem-activesupport-2_3-7027 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-rubygem-activesupport-2_3-7027 - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-rubygem-activesupport-2_3-7026 - SUSE Cloud 1.0: zypper in -t patch sleclo10sp2-rubygem-activesupport-2_3-7026 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]: rubygem-activesupport-2_3-2.3.14-0.7.8.1 - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]: rubygem-activesupport-2_3-2.3.14-0.7.8.1 - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]: rubygem-activesupport-2_3-2.3.14-0.7.8.1 - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]: rubygem-activesupport-2_3-2.3.14-0.7.8.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): rubygem-activesupport-2_3-2.3.14-0.12.1 - SUSE Cloud 1.0 (x86_64): rubygem-activesupport-2_3-2.3.14-0.12.1 References: http://support.novell.com/security/cve/CVE-2012-3464.html http://support.novell.com/security/cve/CVE-2012-3465.html https://bugzilla.novell.com/775653 http://download.novell.com/patch/finder/?keywords=1a9549fb27d2cb9a3f9063bb57bd8e17 http://download.novell.com/patch/finder/?keywords=8a17ab0bfa3a8febd0270d50ec7deb00