From sle-updates at lists.suse.com Mon Jul 2 09:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 2 Jul 2012 17:08:32 +0200 (CEST) Subject: SUSE-SU-2012:0807-1: Security update for GnuTLS Message-ID: <20120702150832.D62E532849@maintenance.suse.de> SUSE Security Update: Security update for GnuTLS ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0807-1 Rating: low References: #739898 #753301 #754223 Cross-References: CVE-2012-0390 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update of GnuTLS fixes multiple vulnerabilities: * CVE-2012-1569: remote attackers could cause a denial of service (heap memory corruption and application crash) via an issue in the asn1_get_length_der() function * CVE-2012-1573: crafted GenericBlockCipher structures allow remote attackers to cause a denial of service (heap memory corruption and application crash) * CVE-2012-0390: A vulnerability in the DTLS implementation which could allow remote attackers to recover partial plaintext via a timing side-channel attack was fixed. Security Issue reference: * CVE-2012-0390 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): gnutls-1.2.10-13.30.1 gnutls-devel-1.2.10-13.30.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): gnutls-32bit-1.2.10-13.30.1 gnutls-devel-32bit-1.2.10-13.30.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): gnutls-x86-1.2.10-13.30.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): gnutls-64bit-1.2.10-13.30.1 gnutls-devel-64bit-1.2.10-13.30.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): gnutls-1.2.10-13.30.1 gnutls-devel-1.2.10-13.30.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): gnutls-32bit-1.2.10-13.30.1 gnutls-devel-32bit-1.2.10-13.30.1 References: http://support.novell.com/security/cve/CVE-2012-0390.html https://bugzilla.novell.com/739898 https://bugzilla.novell.com/753301 https://bugzilla.novell.com/754223 http://download.novell.com/patch/finder/?keywords=db5ce46e4686a3180984675829d5453e From sle-updates at lists.suse.com Mon Jul 2 09:08:35 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 2 Jul 2012 17:08:35 +0200 (CEST) Subject: SUSE-SU-2012:0808-1: Security update for socat Message-ID: <20120702150835.531813284A@maintenance.suse.de> SUSE Security Update: Security update for socat ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0808-1 Rating: low References: #627475 #759859 Cross-References: CVE-2010-2799 CVE-2012-0219 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update fixes two small security issues in socat: * Fixed a stack overflow in commandline parsing (bnc#627475 / CVE-2010-2799) Only exploitable if an attacker can control the commandline parameters. * Fixed heap overflow in READLINE output mode (bnc#759859 / CVE-2012-0219) Security Issue references: * CVE-2012-0219 * CVE-2010-2799 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-socat-6407 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-socat-6407 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-socat-6407 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-socat-6407 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-socat-6407 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): socat-1.7.0.0-1.16.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): socat-1.7.0.0-1.16.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): socat-1.7.0.0-1.16.1 - SUSE Linux Enterprise Server 10 SP4 (i586 x86_64): socat-1.7.0.0-1.10.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): socat-1.7.0.0-1.16.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): socat-1.7.0.0-1.16.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): socat-1.7.0.0-1.10.1 References: http://support.novell.com/security/cve/CVE-2010-2799.html http://support.novell.com/security/cve/CVE-2012-0219.html https://bugzilla.novell.com/627475 https://bugzilla.novell.com/759859 http://download.novell.com/patch/finder/?keywords=1247a92da8b58834174608c8159b5c1a http://download.novell.com/patch/finder/?keywords=26d6956b5e38b37b8fb00575dde970ba From sle-updates at lists.suse.com Mon Jul 2 21:08:19 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 3 Jul 2012 05:08:19 +0200 (CEST) Subject: SUSE-RU-2012:0810-1: important: Recommended update for yast2-core Message-ID: <20120703030819.78D533284A@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-core ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0810-1 Rating: important References: #763386 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update fixes parsing of configuration files with option values longer than 2048 characters. In some cases, this could cause SuSEFirewall2 configurations to become corrupted (bnc#763386). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-yast2-core-6447 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-yast2-core-6447 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-yast2-core-6447 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-yast2-core-6447 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.45]: yast2-core-devel-2.17.45-0.5.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 2.17.45]: yast2-core-2.17.45-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.45]: yast2-core-2.17.45-0.5.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2.17.45]: yast2-core-2.17.45-0.5.1 References: https://bugzilla.novell.com/763386 http://download.novell.com/patch/finder/?keywords=781454194a0101a61f157bd50c11286e From sle-updates at lists.suse.com Mon Jul 2 21:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 3 Jul 2012 05:08:21 +0200 (CEST) Subject: SUSE-RU-2012:0811-1: Recommended update for irqbalance Message-ID: <20120703030821.2AB043284B@maintenance.suse.de> SUSE Recommended Update: Recommended update for irqbalance ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0811-1 Rating: low References: #595084 #711778 #719668 #721924 Affected Products: SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that has four recommended fixes can now be installed. Description: This update to irqbalance fixes the following reports: * IRQBALANCE_BANNED_INTERRUPTS configuration option not working as documented (bnc#595084) * irqbalance did not distribute interrupts evenly across available CPUs (bnc#719668, bnc#711778) * irqbalance did not parse the CPU topology correctly (bnc#721924) Package List: - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): irqbalance-0.55-32.13.40 References: https://bugzilla.novell.com/595084 https://bugzilla.novell.com/711778 https://bugzilla.novell.com/719668 https://bugzilla.novell.com/721924 http://download.novell.com/patch/finder/?keywords=a678b53c347d0606fd5d5ca69ac102c2 From sle-updates at lists.suse.com Tue Jul 3 08:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 3 Jul 2012 16:08:21 +0200 (CEST) Subject: SUSE-SU-2012:0814-1: important: Security update for cobbler Message-ID: <20120703140821.B0A803284C@maintenance.suse.de> SUSE Security Update: Security update for cobbler ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0814-1 Rating: important References: #763610 Cross-References: CVE-2012-2395 Affected Products: SUSE Manager Client Tools for SLE 11 SP1 SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update of cobbler fixes a remote code execution flaw which could have been exploited through cobbler's XMLRPC API (CVE-2012-2395). Security Issue references: * CVE-2012-2395 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Client Tools for SLE 11 SP1: zypper in -t patch slesctsp1-cobbler-6378 - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-cobbler-6378 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Client Tools for SLE 11 SP1 (x86_64): koan-2.0.10-0.38.1 - SUSE Manager 1.2 for SLE 11 SP1 (x86_64): cobbler-2.0.10-0.38.1 References: http://support.novell.com/security/cve/CVE-2012-2395.html https://bugzilla.novell.com/763610 http://download.novell.com/patch/finder/?keywords=a80df9eb737ded8b7bd7a02f531b043b From sle-updates at lists.suse.com Tue Jul 3 10:08:24 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 3 Jul 2012 18:08:24 +0200 (CEST) Subject: SUSE-RU-2012:0810-2: important: Recommended update for yast2-core Message-ID: <20120703160824.5FFCC3284F@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-core ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0810-2 Rating: important References: #763386 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update fixes parsing of configuration files with option values longer than 2048 characters. In some cases, the reported issue could have caused SuSEFirewall2 configurations to become corrupted (bnc#763386). Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 2.13.49]: yast2-core-2.13.49-0.7.1 yast2-core-devel-2.13.49-0.7.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 2.13.49]: yast2-core-2.13.49-0.7.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 2.13.49]: yast2-core-devel-2.13.49-0.7.1 References: https://bugzilla.novell.com/763386 http://download.novell.com/patch/finder/?keywords=61f8522cda41cf0d53394a2833c09fdf From sle-updates at lists.suse.com Tue Jul 3 16:09:06 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 00:09:06 +0200 (CEST) Subject: SUSE-SU-2012:0817-1: moderate: Security update for hyper-v Message-ID: <20120703220906.F40C33284F@maintenance.suse.de> SUSE Security Update: Security update for hyper-v ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0817-1 Rating: moderate References: #761200 Cross-References: CVE-2012-2669 Affected Products: SUSE Linux Enterprise Server 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The Hyper-V userland daemon was updated to match the current kernel Hyper-V feature level. It brings key-value-pair storage that can be queried by the kernel via the netlink interface and can pass information out to the Hyper-V hypervisor. The netlink query code was adjusted to only allow the Linux kernel to access it via netlink messages (CVE-2012-2669). Security Issue reference: * CVE-2012-2669 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-hyper-v-6431 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): hyper-v-3-0.5.1 References: http://support.novell.com/security/cve/CVE-2012-2669.html https://bugzilla.novell.com/761200 http://download.novell.com/patch/finder/?keywords=e70f5ee49a7d2feb951ac6fe0ea3a0c3 From sle-updates at lists.suse.com Tue Jul 3 17:08:35 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 01:08:35 +0200 (CEST) Subject: SUSE-SU-2012:0818-1: Security update for GnuTLS Message-ID: <20120703230835.956ED3284F@maintenance.suse.de> SUSE Security Update: Security update for GnuTLS ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0818-1 Rating: low References: #739898 #753301 #754223 #754953 Cross-References: CVE-2012-0390 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise High Availability Extension 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that solves one vulnerability and has three fixes is now available. Description: This update of GnuTLS fixes multiple vulnerabilities: * CVE-2012-1569: remote attackers could cause a denial of service (heap memory corruption and application crash) via an issue in the asn1_get_length_der() function * CVE-2012-1573: crafted GenericBlockCipher structures allow remote attackers to cause a denial of service (heap memory corruption and application crash) * CVE-2012-0390: A vulnerability in the DTLS implementation which could allow remote attackers to recover partial plaintext via a timing side-channel attack was fixed. In addition, support for customizing the signing function was added. Security Issue references: * CVE-2012-0390 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-gnutls-6448 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-gnutls-6448 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-gnutls-6448 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-gnutls-6448 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-gnutls-6448 - SUSE Linux Enterprise High Availability Extension 11 SP1: zypper in -t patch sleshasp1-gnutls-6448 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-gnutls-6448 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-gnutls-6448 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libgnutls-devel-2.4.1-24.39.39.1 libgnutls-extra-devel-2.4.1-24.39.39.1 libgnutls-extra26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libgnutls-devel-2.4.1-24.39.39.1 libgnutls-extra-devel-2.4.1-24.39.39.1 libgnutls-extra26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): gnutls-2.4.1-24.39.39.1 libgnutls-extra26-2.4.1-24.39.39.1 libgnutls26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libgnutls26-32bit-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libgnutls26-x86-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): gnutls-2.4.1-24.39.39.1 libgnutls26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libgnutls26-32bit-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): gnutls-2.4.1-24.39.39.1 libgnutls-extra26-2.4.1-24.39.39.1 libgnutls26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libgnutls26-32bit-2.4.1-24.39.39.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libgnutls26-x86-2.4.1-24.39.39.1 - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64 s390x x86_64): libgnutls-extra26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): gnutls-2.4.1-24.39.39.1 libgnutls26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libgnutls26-32bit-2.4.1-24.39.39.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): gnutls-2.4.1-24.39.39.1 libgnutls26-2.4.1-24.39.39.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libgnutls26-32bit-2.4.1-24.39.39.1 References: http://support.novell.com/security/cve/CVE-2012-0390.html https://bugzilla.novell.com/739898 https://bugzilla.novell.com/753301 https://bugzilla.novell.com/754223 https://bugzilla.novell.com/754953 http://download.novell.com/patch/finder/?keywords=fd80f415721de0852c2a3ff1ffa6e262 From sle-updates at lists.suse.com Tue Jul 3 18:08:26 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 02:08:26 +0200 (CEST) Subject: SUSE-SU-2012:0819-1: moderate: Security update for SUSE Manager client tools Message-ID: <20120704000826.9B5053284A@maintenance.suse.de> SUSE Security Update: Security update for SUSE Manager client tools ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0819-1 Rating: moderate References: #764532 #766148 Cross-References: CVE-2012-2679 Affected Products: SUSE Manager Client Tools for SLE 11 SP1 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update fixes the following issue: * support new function signature for image deployment. * fixed insecure permissions used for /var/log/rhncfg-actions file Security Issue reference: * CVE-2012-2679 Indications: Everbody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Client Tools for SLE 11 SP1: zypper in -t patch slesctsp1-client-tools-201206-6443 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Client Tools for SLE 11 SP1 (noarch): rhn-virtualization-common-5.4.15-0.15.2 rhn-virtualization-host-5.4.15-0.15.2 rhncfg-5.9.33-0.20.1 rhncfg-actions-5.9.33-0.20.1 rhncfg-client-5.9.33-0.20.1 rhncfg-management-5.9.33-0.20.1 References: http://support.novell.com/security/cve/CVE-2012-2679.html https://bugzilla.novell.com/764532 https://bugzilla.novell.com/766148 http://download.novell.com/patch/finder/?keywords=809f7eda81dd96dabc16151753b8ab6d From sle-updates at lists.suse.com Tue Jul 3 18:08:28 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 02:08:28 +0200 (CEST) Subject: SUSE-SU-2012:0820-1: moderate: Security update for SUSE Manager client tools Message-ID: <20120704000828.9DEA23284A@maintenance.suse.de> SUSE Security Update: Security update for SUSE Manager client tools ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0820-1 Rating: moderate References: #766148 Cross-References: CVE-2012-2679 Affected Products: SLE CLIENT TOOLS 10 for x86_64 SLE CLIENT TOOLS 10 for s390x SLE CLIENT TOOLS 10 for ia64 SLE CLIENT TOOLS 10 for PPC SLE CLIENT TOOLS 10 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Client Tools for SUSE Manager fixes the following issue: * fixed insecure permissions used for /var/log/rhncfg-actions file Security Issue reference: * CVE-2012-2679 Package List: - SLE CLIENT TOOLS 10 for x86_64 (noarch): rhncfg-5.9.33-0.11.1 rhncfg-actions-5.9.33-0.11.1 rhncfg-client-5.9.33-0.11.1 rhncfg-management-5.9.33-0.11.1 - SLE CLIENT TOOLS 10 for s390x (noarch): rhncfg-5.9.33-0.11.1 rhncfg-actions-5.9.33-0.11.1 rhncfg-client-5.9.33-0.11.1 rhncfg-management-5.9.33-0.11.1 - SLE CLIENT TOOLS 10 for ia64 (noarch): rhncfg-5.9.33-0.11.1 rhncfg-actions-5.9.33-0.11.1 rhncfg-client-5.9.33-0.11.1 rhncfg-management-5.9.33-0.11.1 - SLE CLIENT TOOLS 10 for PPC (noarch): rhncfg-5.9.33-0.11.1 rhncfg-actions-5.9.33-0.11.1 rhncfg-client-5.9.33-0.11.1 rhncfg-management-5.9.33-0.11.1 - SLE CLIENT TOOLS 10 (noarch): rhncfg-5.9.33-0.11.1 rhncfg-actions-5.9.33-0.11.1 rhncfg-client-5.9.33-0.11.1 rhncfg-management-5.9.33-0.11.1 References: http://support.novell.com/security/cve/CVE-2012-2679.html https://bugzilla.novell.com/766148 http://download.novell.com/patch/finder/?keywords=312da6fd636d091671aa5a052e6d18bb From sle-updates at lists.suse.com Tue Jul 3 22:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 06:08:30 +0200 (CEST) Subject: SUSE-SU-2012:0821-1: moderate: Security update for SUSE Manager Message-ID: <20120704040830.BB7393284D@maintenance.suse.de> SUSE Security Update: Security update for SUSE Manager ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0821-1 Rating: moderate References: #753326 #760306 #760771 #761165 #763878 #763891 #764532 #764544 #765053 Cross-References: CVE-2012-0414 Affected Products: SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 8 fixes is now available. It includes one version update. Description: This update fixes the following issues: * new function signature for image deployment * ignore ip6addr if provided with hw_refresh from newer client versions * do not add a bootstrap repository on SLES 11-SP2 * escape image names to prevent XSS (CVE-2012-0414) * spacewalk-dobby now requires oracle-update * fix owner and permissions of /etc/rhn for spacewalk-dobby * make values in suseProductChannel unique before adding an unique index * added desktop file for susemanager_setup YaST module * add missing schema migration for rhnErrataBuglistTmp. * add option to migrate channels to RES subscriptions (bnc#765053) * fix schema upgrade * improved performance for repomd generation * fix ISE during registration because of duplicate ids * fix wrong transaction name in unsubscribe_channels * fix saving of SUSE Product names How to apply this update: 1. Log in as root user to the SUSE Manager server. 2. Stop the Spacewalk service: spacewalk-service stop If the SUSE Manager database is running on the same machine as the SUSE Manager server, this command also stops the SUSE Manager database instance. 3. Apply the patch using either zypper patch or YaST Online Update. 4. If the SUSE Manager database is running on the same machine as your SUSE Manager server, start the database instance with /etc/init.d/oracle-xe start or /etc/init.d/oracle start 5. Upgrade the database schema with spacewalk-schema-upgrade 6. Start the Spacewalk service: spacewalk-service start Security Issue reference: * CVE-2012-0414 Indications: Everbody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-spacewalk-backend-6445 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.2 for SLE 11 SP1 (x86_64): spacewalk-backend-1.2.74-0.58.1 spacewalk-backend-app-1.2.74-0.58.1 spacewalk-backend-applet-1.2.74-0.58.1 spacewalk-backend-config-files-1.2.74-0.58.1 spacewalk-backend-config-files-common-1.2.74-0.58.1 spacewalk-backend-config-files-tool-1.2.74-0.58.1 spacewalk-backend-iss-1.2.74-0.58.1 spacewalk-backend-iss-export-1.2.74-0.58.1 spacewalk-backend-libs-1.2.74-0.58.1 spacewalk-backend-package-push-server-1.2.74-0.58.1 spacewalk-backend-server-1.2.74-0.58.1 spacewalk-backend-sql-1.2.74-0.58.1 spacewalk-backend-sql-oracle-1.2.74-0.58.1 spacewalk-backend-tools-1.2.74-0.58.1 spacewalk-backend-xml-export-libs-1.2.74-0.58.1 spacewalk-backend-xmlrpc-1.2.74-0.58.1 spacewalk-backend-xp-1.2.74-0.58.1 susemanager-1.2.0-0.58.1 susemanager-tools-1.2.0-0.58.1 - SUSE Manager 1.2 for SLE 11 SP1 (noarch) [New Version: 1.2.75]: spacewalk-base-1.2.31-0.39.3 spacewalk-base-minimal-1.2.31-0.39.3 spacewalk-certs-tools-1.2.2-0.28.3 spacewalk-dobby-1.2.31-0.39.3 spacewalk-grail-1.2.31-0.39.3 spacewalk-html-1.2.31-0.39.3 spacewalk-java-1.2.115-0.60.1 spacewalk-java-config-1.2.115-0.60.1 spacewalk-java-lib-1.2.115-0.60.1 spacewalk-java-oracle-1.2.115-0.60.1 spacewalk-pxt-1.2.31-0.39.3 spacewalk-sniglets-1.2.31-0.39.3 spacewalk-taskomatic-1.2.115-0.60.1 susemanager-schema-1.2.75-0.5.1 References: http://support.novell.com/security/cve/CVE-2012-0414.html https://bugzilla.novell.com/753326 https://bugzilla.novell.com/760306 https://bugzilla.novell.com/760771 https://bugzilla.novell.com/761165 https://bugzilla.novell.com/763878 https://bugzilla.novell.com/763891 https://bugzilla.novell.com/764532 https://bugzilla.novell.com/764544 https://bugzilla.novell.com/765053 http://download.novell.com/patch/finder/?keywords=3fbb4edf5375671fbc21e432ba8996c4 From sle-updates at lists.suse.com Tue Jul 3 22:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 06:08:32 +0200 (CEST) Subject: SUSE-RU-2012:0822-1: moderate: Recommended update for SUSE Manager Proxy Message-ID: <20120704040832.ABA3A3284D@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager Proxy ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0822-1 Rating: moderate References: #759364 #760771 #764532 #765123 Affected Products: SUSE Manager Proxy 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that has four recommended fixes can now be installed. Description: This update fixes the following issues: * ignore ip6addr if provided with hw_refresh from newer client versions * do not add a bootstrap repository on SLES 11-SP2 * fix AttributeError when connecting to proxy server. * fix ISE during registration because of duplicate ids * fix wrong transaction name in unsubscribe_channels * fix saving of SUSE Product names How to apply this update: 1. Log in as root user to the SUSE Manager proxy. 2. Stop the proxy service: mgr-proxy stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: mgr-proxy start Indications: Everbody should update. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Proxy 1.2 for SLE 11 SP1: zypper in -t patch slemap12sp1-spacewalk-backend-6444 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Proxy 1.2 for SLE 11 SP1 (x86_64): spacewalk-backend-1.2.74-0.58.1 spacewalk-backend-libs-1.2.74-0.58.1 - SUSE Manager Proxy 1.2 for SLE 11 SP1 (noarch): spacewalk-certs-tools-1.2.2-0.28.3 spacewalk-proxy-broker-1.2.15-0.15.12 spacewalk-proxy-common-1.2.15-0.15.12 spacewalk-proxy-management-1.2.15-0.15.12 spacewalk-proxy-package-manager-1.2.15-0.15.12 spacewalk-proxy-redirect-1.2.15-0.15.12 References: https://bugzilla.novell.com/759364 https://bugzilla.novell.com/760771 https://bugzilla.novell.com/764532 https://bugzilla.novell.com/765123 http://download.novell.com/patch/finder/?keywords=40a0812251248f96630bac465b163031 From sle-updates at lists.suse.com Tue Jul 3 22:08:34 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 06:08:34 +0200 (CEST) Subject: SUSE-RU-2012:0823-1: Recommended update for glib2 Message-ID: <20120704040834.290793284F@maintenance.suse.de> SUSE Recommended Update: Recommended update for glib2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0823-1 Rating: low References: #744764 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update provides thread safety fixes for the boxed datatype (bnc#744764). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-glib2-6451 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-glib2-6451 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-glib2-6451 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-glib2-6451 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-glib2-6451 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-glib2-6451 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-glib2-6451 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): glib2-devel-2.22.5-0.4.3 libgio-fam-2.22.5-0.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): glib2-doc-2.22.5-0.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64): glib2-devel-32bit-2.22.5-0.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): glib2-devel-2.22.5-0.4.3 libgio-fam-2.22.5-0.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): glib2-doc-2.22.5-0.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64): glib2-devel-32bit-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): glib2-2.22.5-0.4.3 glib2-doc-2.22.5-0.4.3 glib2-lang-2.22.5-0.4.3 libgio-2_0-0-2.22.5-0.4.3 libglib-2_0-0-2.22.5-0.4.3 libgmodule-2_0-0-2.22.5-0.4.3 libgobject-2_0-0-2.22.5-0.4.3 libgthread-2_0-0-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libgio-2_0-0-32bit-2.22.5-0.4.3 libglib-2_0-0-32bit-2.22.5-0.4.3 libgmodule-2_0-0-32bit-2.22.5-0.4.3 libgobject-2_0-0-32bit-2.22.5-0.4.3 libgthread-2_0-0-32bit-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP2 (ia64): libgio-2_0-0-x86-2.22.5-0.4.3 libglib-2_0-0-x86-2.22.5-0.4.3 libgmodule-2_0-0-x86-2.22.5-0.4.3 libgobject-2_0-0-x86-2.22.5-0.4.3 libgthread-2_0-0-x86-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): glib2-2.22.5-0.4.3 glib2-doc-2.22.5-0.4.3 glib2-lang-2.22.5-0.4.3 libgio-2_0-0-2.22.5-0.4.3 libglib-2_0-0-2.22.5-0.4.3 libgmodule-2_0-0-2.22.5-0.4.3 libgobject-2_0-0-2.22.5-0.4.3 libgthread-2_0-0-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libgio-2_0-0-32bit-2.22.5-0.4.3 libglib-2_0-0-32bit-2.22.5-0.4.3 libgmodule-2_0-0-32bit-2.22.5-0.4.3 libgobject-2_0-0-32bit-2.22.5-0.4.3 libgthread-2_0-0-32bit-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): glib2-2.22.5-0.4.3 glib2-doc-2.22.5-0.4.3 glib2-lang-2.22.5-0.4.3 libgio-2_0-0-2.22.5-0.4.3 libglib-2_0-0-2.22.5-0.4.3 libgmodule-2_0-0-2.22.5-0.4.3 libgobject-2_0-0-2.22.5-0.4.3 libgthread-2_0-0-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libgio-2_0-0-32bit-2.22.5-0.4.3 libglib-2_0-0-32bit-2.22.5-0.4.3 libgmodule-2_0-0-32bit-2.22.5-0.4.3 libgobject-2_0-0-32bit-2.22.5-0.4.3 libgthread-2_0-0-32bit-2.22.5-0.4.3 - SUSE Linux Enterprise Server 11 SP1 (ia64): libgio-2_0-0-x86-2.22.5-0.4.3 libglib-2_0-0-x86-2.22.5-0.4.3 libgmodule-2_0-0-x86-2.22.5-0.4.3 libgobject-2_0-0-x86-2.22.5-0.4.3 libgthread-2_0-0-x86-2.22.5-0.4.3 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): glib2-2.22.5-0.4.3 glib2-devel-2.22.5-0.4.3 glib2-lang-2.22.5-0.4.3 libgio-2_0-0-2.22.5-0.4.3 libgio-fam-2.22.5-0.4.3 libglib-2_0-0-2.22.5-0.4.3 libgmodule-2_0-0-2.22.5-0.4.3 libgobject-2_0-0-2.22.5-0.4.3 libgthread-2_0-0-2.22.5-0.4.3 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libgio-2_0-0-32bit-2.22.5-0.4.3 libglib-2_0-0-32bit-2.22.5-0.4.3 libgmodule-2_0-0-32bit-2.22.5-0.4.3 libgobject-2_0-0-32bit-2.22.5-0.4.3 libgthread-2_0-0-32bit-2.22.5-0.4.3 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): glib2-2.22.5-0.4.3 glib2-devel-2.22.5-0.4.3 glib2-lang-2.22.5-0.4.3 libgio-2_0-0-2.22.5-0.4.3 libgio-fam-2.22.5-0.4.3 libglib-2_0-0-2.22.5-0.4.3 libgmodule-2_0-0-2.22.5-0.4.3 libgobject-2_0-0-2.22.5-0.4.3 libgthread-2_0-0-2.22.5-0.4.3 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libgio-2_0-0-32bit-2.22.5-0.4.3 libglib-2_0-0-32bit-2.22.5-0.4.3 libgmodule-2_0-0-32bit-2.22.5-0.4.3 libgobject-2_0-0-32bit-2.22.5-0.4.3 libgthread-2_0-0-32bit-2.22.5-0.4.3 References: https://bugzilla.novell.com/744764 http://download.novell.com/patch/finder/?keywords=237027bc6b3a5b88c462b3f5f00a3036 From sle-updates at lists.suse.com Tue Jul 3 22:08:35 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 06:08:35 +0200 (CEST) Subject: SUSE-YU-2012:0824-1: YOU update for software update stack Message-ID: <20120704040835.A3E783284F@maintenance.suse.de> SUSE YOU Update: YOU update for software update stack ______________________________________________________________________________ Announcement ID: SUSE-YU-2012:0824-1 Rating: low References: #679322 #735016 #735841 #740764 #749418 #751221 #751976 #752497 #752500 #754286 #755815 #761985 #765164 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has 13 YOU fixes can now be installed. It includes two new package versions. Description: This update for the software update stack 2012/04 provides the following fixes: libzypp: * Show max support status if package is in multiple repos (bnc#735841) * Parse proxy user/pass from url (bnc#752497) * Add CMake option to disable libproxy usage and disable it on SLE. (bnc#752500) * Force libproxy into using "/etc/sysconfig/proxy" if it exists (bnc#679322) * Correctly use user:pass directly embedded in a proxy url (bnc#740764) * Don't cache defaultCandidate as it depends on solver::allowVendorChange flag (bnc#754286) * Cleanup orphaned media attach points (bnc#751221) * Always consider (block) devices passed as url option (bnc#755815) * Fix processing of weak locks (bnc#749418, bnc#765164) * Fix typos in zypp.conf (bnc#761985) zypper: * Fix eating terminal lines (bnc#735016) * Let zypper remove lock follow addlock with respect to args and behavior (bnc#751976) Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE YOU Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-softwaremgmt-201205-6408 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-softwaremgmt-201205-6408 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-softwaremgmt-201205-6408 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-softwaremgmt-201205-6408 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.12.3]: libzypp-devel-9.12.3-0.5.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 1.6.165 and 9.12.3]: libzypp-9.12.3-0.5.1 zypper-1.6.165-0.5.20 zypper-log-1.6.165-0.5.20 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.6.165 and 9.12.3]: libzypp-9.12.3-0.5.1 zypper-1.6.165-0.5.20 zypper-log-1.6.165-0.5.20 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 1.6.165 and 9.12.3]: libzypp-9.12.3-0.5.1 zypper-1.6.165-0.5.20 zypper-log-1.6.165-0.5.20 References: https://bugzilla.novell.com/679322 https://bugzilla.novell.com/735016 https://bugzilla.novell.com/735841 https://bugzilla.novell.com/740764 https://bugzilla.novell.com/749418 https://bugzilla.novell.com/751221 https://bugzilla.novell.com/751976 https://bugzilla.novell.com/752497 https://bugzilla.novell.com/752500 https://bugzilla.novell.com/754286 https://bugzilla.novell.com/755815 https://bugzilla.novell.com/761985 https://bugzilla.novell.com/765164 http://download.novell.com/patch/finder/?keywords=cc8a9a108be57863a1f4093388a48365 From sle-updates at lists.suse.com Tue Jul 3 22:08:37 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 06:08:37 +0200 (CEST) Subject: SUSE-RU-2012:0825-1: moderate: Recommended update for release-notes-susemanager Message-ID: <20120704040837.5E76D3284D@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-susemanager ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0825-1 Rating: moderate References: #760592 Affected Products: SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a formatting issue in the release notes of SUSE Manager Server 1.2 (bnc#760592). Indications: Everbody should update. Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-release-notes-susemanager-6442 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.2 for SLE 11 SP1 (x86_64): release-notes-susemanager-1.2.3-0.17.1 References: https://bugzilla.novell.com/760592 http://download.novell.com/patch/finder/?keywords=65872086dd60d25c9b45f7db94fa1317 From sle-updates at lists.suse.com Wed Jul 4 13:08:31 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 21:08:31 +0200 (CEST) Subject: SUSE-RU-2012:0836-1: Recommended update for compiz-manager Message-ID: <20120704190831.45E613284F@maintenance.suse.de> SUSE Recommended Update: Recommended update for compiz-manager ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0836-1 Rating: low References: #727323 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for compiz-manager adds Intel 810/815 chipsets to the list of devices that do not support OpenGL compositing, resolving the following report: * Machine hangs after logging in to desktop if Compiz is enabled (bnc#727323). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-compiz-manager-6262 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-compiz-manager-6262 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (noarch): compiz-manager-0.0.1_git080201-55.5.1 - SUSE Linux Enterprise Desktop 11 SP1 (noarch): compiz-manager-0.0.1_git080201-55.5.1 References: https://bugzilla.novell.com/727323 http://download.novell.com/patch/finder/?keywords=7d814c0ae8ccf7dba79de654f0cda000 From sle-updates at lists.suse.com Wed Jul 4 14:08:25 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 22:08:25 +0200 (CEST) Subject: SUSE-RU-2012:0837-1: Recommended update for yast2-ftp-server Message-ID: <20120704200825.486243284F@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-ftp-server ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0837-1 Rating: low References: #756612 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update fixes reading of the passive port range (bnc#756612). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-yast2-ftp-server-6473 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-yast2-ftp-server-6473 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-yast2-ftp-server-6473 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (noarch) [New Version: 2.17.8]: yast2-ftp-server-2.17.8-0.5.2 - SUSE Linux Enterprise Server 11 SP2 for VMware (noarch) [New Version: 2.17.8]: yast2-ftp-server-2.17.8-0.5.2 - SUSE Linux Enterprise Server 11 SP2 (noarch) [New Version: 2.17.8]: yast2-ftp-server-2.17.8-0.5.2 References: https://bugzilla.novell.com/756612 http://download.novell.com/patch/finder/?keywords=e9804fedc5e42624f07ed2f693464d43 From sle-updates at lists.suse.com Wed Jul 4 14:08:26 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 22:08:26 +0200 (CEST) Subject: SUSE-RU-2012:0838-1: Recommended update for yast2-ftp-server Message-ID: <20120704200826.E46F832844@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-ftp-server ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0838-1 Rating: low References: #660821 #756612 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. It includes one version update. Description: This update for yast2 ftp-server provides the following fixes: * fixed reading of PureFTPD passive port range (bnc#756612) * fixed command line interface - not polling UI while reading the settings (bnc#660821) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-yast2-ftp-server-6456 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-yast2-ftp-server-6456 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-yast2-ftp-server-6456 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (noarch) [New Version: 2.17.5.1]: yast2-ftp-server-2.17.5.1-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (noarch) [New Version: 2.17.5.1]: yast2-ftp-server-2.17.5.1-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (noarch) [New Version: 2.17.5.1]: yast2-ftp-server-2.17.5.1-0.3.1 References: https://bugzilla.novell.com/660821 https://bugzilla.novell.com/756612 http://download.novell.com/patch/finder/?keywords=beffeee45a4ab7461b591770fdb36fa8 From sle-updates at lists.suse.com Wed Jul 4 15:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 4 Jul 2012 23:08:30 +0200 (CEST) Subject: SUSE-RU-2012:0839-1: Recommended update for cluster-glue and SBD Message-ID: <20120704210830.3D85432850@maintenance.suse.de> SUSE Recommended Update: Recommended update for cluster-glue and SBD ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0839-1 Rating: low References: #738295 #753559 #761797 #762300 #767293 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP2 ______________________________________________________________________________ An update that has 5 recommended fixes can now be installed. It includes one version update. Description: This update to the STONITH Block Device (SBD) adds support for taking the quorum state and Pacemaker health into account when the majority of SBD devices is unreachable. This allows clusters running SBD to survive transient faults in the storage layer as long as the cluster partition remains quorate and the node is in a healthy state. This new feature is activated using the "-P" flag in /etc/sysconfig/sbd; please see the sbd man page for further details. IO to the devices is now fully asynchronous, and enforces its own timeouts and retries. Previously, IO processes could get stuck on certain multipath issues, and SBD had to wait until the SCSI IO timed out. This allows SBD's watchdog and msgwait timeouts to be reduced and thus results in faster fail-overs in the cluster. The restart logic of IO processes has been improved and clarified in the man page. It is now possible to specify a different watchdog timeout for the crashdump support, so that crashdumps do not get interrupted by the watchdog triggering. Missing devices no longer fail the list or dump commands. sbd is now provided as a separate RPM from cluster-glue; both are automatically installed by this update. Please refer to the changelog for further details. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-cluster-glue-sbd-6438 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.0.9.1]: cluster-glue-1.0.9.1-0.36.1 libglue-devel-1.0.9.1-0.36.1 libglue2-1.0.9.1-0.36.1 sbd-1.0-0.5.6 References: https://bugzilla.novell.com/738295 https://bugzilla.novell.com/753559 https://bugzilla.novell.com/761797 https://bugzilla.novell.com/762300 https://bugzilla.novell.com/767293 http://download.novell.com/patch/finder/?keywords=3abae703e3caa9c58bc38f6d04a2387b From sle-updates at lists.suse.com Wed Jul 4 19:08:29 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 5 Jul 2012 03:08:29 +0200 (CEST) Subject: SUSE-SU-2012:0840-1: important: Security update for PHP5 Message-ID: <20120705010829.5A3563284F@maintenance.suse.de> SUSE Security Update: Security update for PHP5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0840-1 Rating: important References: #761631 #763814 #766798 Cross-References: CVE-2012-2143 CVE-2012-2335 CVE-2012-2336 CVE-2012-2386 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: PHP5 was updated with incremental fixes to the previous update. * CVE-2012-2335: Additional unsafe cgi wrapper scripts are also fixed now. * CVE-2012-2336: Even more commandline option handling is filtered, which could lead to crashes of the php interpreter. * CVE-2012-2386: heap based buffer overflow in php's phar extension * CVE-2012-2143: The crypt() implementation ignored wide characters, leading to shorter effective password lengths. Note: With this update applied affected passwords will no longer work and need to be set again. Security Issue references: * CVE-2012-2335 * CVE-2012-2336 * CVE-2012-2386 * CVE-2012-2143 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-apache2-mod_php53-6440 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-apache2-mod_php53-6440 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-apache2-mod_php53-6440 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.8-0.33.2 php53-imap-5.3.8-0.33.2 php53-posix-5.3.8-0.33.2 php53-readline-5.3.8-0.33.2 php53-sockets-5.3.8-0.33.2 php53-sqlite-5.3.8-0.33.2 php53-tidy-5.3.8-0.33.2 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): apache2-mod_php53-5.3.8-0.33.2 php53-5.3.8-0.33.2 php53-bcmath-5.3.8-0.33.2 php53-bz2-5.3.8-0.33.2 php53-calendar-5.3.8-0.33.2 php53-ctype-5.3.8-0.33.2 php53-curl-5.3.8-0.33.2 php53-dba-5.3.8-0.33.2 php53-dom-5.3.8-0.33.2 php53-exif-5.3.8-0.33.2 php53-fastcgi-5.3.8-0.33.2 php53-fileinfo-5.3.8-0.33.2 php53-ftp-5.3.8-0.33.2 php53-gd-5.3.8-0.33.2 php53-gettext-5.3.8-0.33.2 php53-gmp-5.3.8-0.33.2 php53-iconv-5.3.8-0.33.2 php53-intl-5.3.8-0.33.2 php53-json-5.3.8-0.33.2 php53-ldap-5.3.8-0.33.2 php53-mbstring-5.3.8-0.33.2 php53-mcrypt-5.3.8-0.33.2 php53-mysql-5.3.8-0.33.2 php53-odbc-5.3.8-0.33.2 php53-openssl-5.3.8-0.33.2 php53-pcntl-5.3.8-0.33.2 php53-pdo-5.3.8-0.33.2 php53-pear-5.3.8-0.33.2 php53-pgsql-5.3.8-0.33.2 php53-pspell-5.3.8-0.33.2 php53-shmop-5.3.8-0.33.2 php53-snmp-5.3.8-0.33.2 php53-soap-5.3.8-0.33.2 php53-suhosin-5.3.8-0.33.2 php53-sysvmsg-5.3.8-0.33.2 php53-sysvsem-5.3.8-0.33.2 php53-sysvshm-5.3.8-0.33.2 php53-tokenizer-5.3.8-0.33.2 php53-wddx-5.3.8-0.33.2 php53-xmlreader-5.3.8-0.33.2 php53-xmlrpc-5.3.8-0.33.2 php53-xmlwriter-5.3.8-0.33.2 php53-xsl-5.3.8-0.33.2 php53-zip-5.3.8-0.33.2 php53-zlib-5.3.8-0.33.2 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.8-0.33.2 php53-5.3.8-0.33.2 php53-bcmath-5.3.8-0.33.2 php53-bz2-5.3.8-0.33.2 php53-calendar-5.3.8-0.33.2 php53-ctype-5.3.8-0.33.2 php53-curl-5.3.8-0.33.2 php53-dba-5.3.8-0.33.2 php53-dom-5.3.8-0.33.2 php53-exif-5.3.8-0.33.2 php53-fastcgi-5.3.8-0.33.2 php53-fileinfo-5.3.8-0.33.2 php53-ftp-5.3.8-0.33.2 php53-gd-5.3.8-0.33.2 php53-gettext-5.3.8-0.33.2 php53-gmp-5.3.8-0.33.2 php53-iconv-5.3.8-0.33.2 php53-intl-5.3.8-0.33.2 php53-json-5.3.8-0.33.2 php53-ldap-5.3.8-0.33.2 php53-mbstring-5.3.8-0.33.2 php53-mcrypt-5.3.8-0.33.2 php53-mysql-5.3.8-0.33.2 php53-odbc-5.3.8-0.33.2 php53-openssl-5.3.8-0.33.2 php53-pcntl-5.3.8-0.33.2 php53-pdo-5.3.8-0.33.2 php53-pear-5.3.8-0.33.2 php53-pgsql-5.3.8-0.33.2 php53-pspell-5.3.8-0.33.2 php53-shmop-5.3.8-0.33.2 php53-snmp-5.3.8-0.33.2 php53-soap-5.3.8-0.33.2 php53-suhosin-5.3.8-0.33.2 php53-sysvmsg-5.3.8-0.33.2 php53-sysvsem-5.3.8-0.33.2 php53-sysvshm-5.3.8-0.33.2 php53-tokenizer-5.3.8-0.33.2 php53-wddx-5.3.8-0.33.2 php53-xmlreader-5.3.8-0.33.2 php53-xmlrpc-5.3.8-0.33.2 php53-xmlwriter-5.3.8-0.33.2 php53-xsl-5.3.8-0.33.2 php53-zip-5.3.8-0.33.2 php53-zlib-5.3.8-0.33.2 References: http://support.novell.com/security/cve/CVE-2012-2143.html http://support.novell.com/security/cve/CVE-2012-2335.html http://support.novell.com/security/cve/CVE-2012-2336.html http://support.novell.com/security/cve/CVE-2012-2386.html https://bugzilla.novell.com/761631 https://bugzilla.novell.com/763814 https://bugzilla.novell.com/766798 http://download.novell.com/patch/finder/?keywords=493f50e026887ac9d2afb3216db47373 From sle-updates at lists.suse.com Thu Jul 5 10:08:33 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 5 Jul 2012 18:08:33 +0200 (CEST) Subject: SUSE-SU-2012:0841-1: moderate: Security update for gdk-pixbuf Message-ID: <20120705160833.A601432852@maintenance.suse.de> SUSE Security Update: Security update for gdk-pixbuf ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0841-1 Rating: moderate References: #702028 #709852 #762735 Cross-References: CVE-2011-2485 CVE-2011-2897 CVE-2012-2370 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update of gdk-pixbuf fixes multiple buffer overflows that could have caused a crash or potentially have allowed heap corruptions (CVE-2011-2485, CVE-2012-2370, CVE-2011-2897). Security Issue references: * CVE-2011-2485 * CVE-2012-2370 * CVE-2011-2897 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-gdk-pixbuf-6367 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-gdk-pixbuf-6367 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-gdk-pixbuf-6367 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-gdk-pixbuf-6367 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): gdk-pixbuf-0.22.0-294.26.1 gdk-pixbuf-devel-0.22.0-294.26.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): gdk-pixbuf-32bit-0.22.0-294.26.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): gdk-pixbuf-0.22.0-294.26.1 gdk-pixbuf-devel-0.22.0-294.26.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64): gdk-pixbuf-32bit-0.22.0-294.26.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): gdk-pixbuf-0.22.0-93.9.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): gdk-pixbuf-32bit-0.22.0-93.9.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): gdk-pixbuf-x86-0.22.0-93.9.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): gdk-pixbuf-64bit-0.22.0-93.9.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): gdk-pixbuf-0.22.0-294.26.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): gdk-pixbuf-32bit-0.22.0-294.26.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): gdk-pixbuf-0.22.0-294.26.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): gdk-pixbuf-32bit-0.22.0-294.26.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): gdk-pixbuf-0.22.0-93.9.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): gdk-pixbuf-32bit-0.22.0-93.9.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): gdk-pixbuf-devel-0.22.0-93.9.1 References: http://support.novell.com/security/cve/CVE-2011-2485.html http://support.novell.com/security/cve/CVE-2011-2897.html http://support.novell.com/security/cve/CVE-2012-2370.html https://bugzilla.novell.com/702028 https://bugzilla.novell.com/709852 https://bugzilla.novell.com/762735 http://download.novell.com/patch/finder/?keywords=0c456ea3e51de636ed5cb4e0f16503d3 http://download.novell.com/patch/finder/?keywords=1e4fac303fda249f28a90f89a7455837 From sle-updates at lists.suse.com Thu Jul 5 11:08:36 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 5 Jul 2012 19:08:36 +0200 (CEST) Subject: SUSE-YU-2012:0842-1: YOU update for libzypp Message-ID: <20120705170836.CA08432850@maintenance.suse.de> SUSE YOU Update: YOU update for libzypp ______________________________________________________________________________ Announcement ID: SUSE-YU-2012:0842-1 Rating: low References: #614646 #687530 #745404 #748144 #749418 #751976 #761985 #765164 #765267 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has 9 YOU fixes can now be installed. It includes two new package versions. Description: This update for the software update stack 2012/04 provides the following fixes: libzypp: * Set CURLOPT_PROXYAUTH to enable NTLM authentication (fate#305546) * Fix processing of weak locks (bnc#749418, bnc#765164) * Fix typos in zypp.conf (bnc#761985) * allow libcurl to take proxy from environment iff proxy is not configured or disallowed (bnc#745404) zypper: * zypper.conf parsing fixes (bnc#765267) * Fix augeas lense enforcing a non empty anonymous section (bnc#748144) * At least warn if config file can not be parsed * Fix zypp.conf lens (bnc#687530) * Eat trailing whitespace in zypper.conf (bnc#687530) * Fix zypp.conf lense to ignore commented option values * fix crashing zypper when there are double config entrys in zypper.conf (bnc#614646) * Let zypper remove lock follow addlock with respect to args and behavior (bnc#751976) Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE YOU Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-softwaremgmt-201206-6482 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-softwaremgmt-201206-6482 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-softwaremgmt-201206-6482 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-softwaremgmt-201206-6482 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 6.37.9]: libzypp-devel-6.37.9-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 1.3.20 and 6.37.9]: libzypp-6.37.9-0.3.1 zypper-1.3.20-0.3.6 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.3.20 and 6.37.9]: libzypp-6.37.9-0.3.1 zypper-1.3.20-0.3.6 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 1.3.20 and 6.37.9]: libzypp-6.37.9-0.3.1 zypper-1.3.20-0.3.6 References: https://bugzilla.novell.com/614646 https://bugzilla.novell.com/687530 https://bugzilla.novell.com/745404 https://bugzilla.novell.com/748144 https://bugzilla.novell.com/749418 https://bugzilla.novell.com/751976 https://bugzilla.novell.com/761985 https://bugzilla.novell.com/765164 https://bugzilla.novell.com/765267 http://download.novell.com/patch/finder/?keywords=cfc651f824c35074ff135deb05566130 From sle-updates at lists.suse.com Thu Jul 5 11:08:38 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 5 Jul 2012 19:08:38 +0200 (CEST) Subject: SUSE-SU-2012:0843-1: moderate: Security update for rubygem-mail-2_3 Message-ID: <20120705170838.EE0AE32850@maintenance.suse.de> SUSE Security Update: Security update for rubygem-mail-2_3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0843-1 Rating: moderate References: #759092 Cross-References: CVE-2012-2139 CVE-2012-2140 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update of rubygem-mail fixes two security issues: * CVE-2012-2139: A file system traversal in file_delivery method. * CVE-2012-2140: Arbitrary command execution when using exim or sendmail from the commandline. Security Issue references: * CVE-2012-2139 * CVE-2012-2140 Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-rubygem-mail-2_3-6393 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): rubygem-mail-2_3-2.3.0-0.10.1 References: http://support.novell.com/security/cve/CVE-2012-2139.html http://support.novell.com/security/cve/CVE-2012-2140.html https://bugzilla.novell.com/759092 http://download.novell.com/patch/finder/?keywords=a16c99a5d3c0b2249debbfddc8663032 From sle-updates at lists.suse.com Thu Jul 5 13:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 5 Jul 2012 21:08:30 +0200 (CEST) Subject: SUSE-SU-2012:0844-1: moderate: Security update for gtk2 Message-ID: <20120705190830.EEAAC3284D@maintenance.suse.de> SUSE Security Update: Security update for gtk2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0844-1 Rating: moderate References: #702028 #762735 Cross-References: CVE-2011-2485 CVE-2012-2370 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The following issue has been fixed: * Specially crafted GIF and XBM files could have crashed gtk2 (CVE-2012-2370,CVE-2011-2485). Security Issue references: * CVE-2012-2370 * CVE-2011-2485 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-gtk2-6390 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-gtk2-6389 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-gtk2-6390 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-gtk2-6390 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-gtk2-6389 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-gtk2-6389 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-gtk2-6390 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-gtk2-6389 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): gtk2-devel-2.18.9-0.23.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64): gtk2-devel-32bit-2.18.9-0.23.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): gtk2-devel-2.18.9-0.20.18.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64): gtk2-devel-32bit-2.18.9-0.20.18.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): gtk2-2.18.9-0.23.1 gtk2-doc-2.18.9-0.23.1 gtk2-lang-2.18.9-0.23.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): gtk2-32bit-2.18.9-0.23.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): gtk2-2.18.9-0.23.1 gtk2-doc-2.18.9-0.23.1 gtk2-lang-2.18.9-0.23.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): gtk2-32bit-2.18.9-0.23.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): gtk2-x86-2.18.9-0.23.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): gtk2-2.18.9-0.20.18.1 gtk2-doc-2.18.9-0.20.18.1 gtk2-lang-2.18.9-0.20.18.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): gtk2-32bit-2.18.9-0.20.18.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): gtk2-2.18.9-0.20.18.1 gtk2-doc-2.18.9-0.20.18.1 gtk2-lang-2.18.9-0.20.18.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): gtk2-32bit-2.18.9-0.20.18.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): gtk2-x86-2.18.9-0.20.18.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): gtk2-2.8.11-0.29.2 gtk2-devel-2.8.11-0.29.2 gtk2-doc-2.8.11-0.29.2 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): gtk2-32bit-2.8.11-0.29.2 - SUSE Linux Enterprise Server 10 SP4 (ia64): gtk2-x86-2.8.11-0.29.2 - SUSE Linux Enterprise Server 10 SP4 (ppc): gtk2-64bit-2.8.11-0.29.2 gtk2-devel-64bit-2.8.11-0.29.2 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): gtk2-2.18.9-0.23.1 gtk2-devel-2.18.9-0.23.1 gtk2-lang-2.18.9-0.23.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): gtk2-32bit-2.18.9-0.23.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): gtk2-2.18.9-0.20.18.1 gtk2-devel-2.18.9-0.20.18.1 gtk2-lang-2.18.9-0.20.18.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): gtk2-32bit-2.18.9-0.20.18.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): gtk2-2.8.11-0.29.2 gtk2-devel-2.8.11-0.29.2 gtk2-doc-2.8.11-0.29.2 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): gtk2-32bit-2.8.11-0.29.2 References: http://support.novell.com/security/cve/CVE-2011-2485.html http://support.novell.com/security/cve/CVE-2012-2370.html https://bugzilla.novell.com/702028 https://bugzilla.novell.com/762735 http://download.novell.com/patch/finder/?keywords=20aead63ed168564e4a716a942666e5e http://download.novell.com/patch/finder/?keywords=9b8763dd2b5961b26badcb967643b9ba http://download.novell.com/patch/finder/?keywords=d761cd6e1a31389dc3a2d6c8c56cdbd3 From sle-updates at lists.suse.com Fri Jul 6 11:08:36 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 6 Jul 2012 19:08:36 +0200 (CEST) Subject: SUSE-RU-2012:0846-1: Recommended update for rsync Message-ID: <20120706170836.42A1C32852@maintenance.suse.de> SUSE Recommended Update: Recommended update for rsync ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0846-1 Rating: low References: #753035 #766313 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This collective update for rsync provides the following fixes: * Fix crash on Z_BUF_ERROR in see_deflate_token (bnc#753035) * call localtime() once before chroot to initialize time zone (bnc#766313) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-rsync-6479 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-rsync-6479 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-rsync-6479 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-rsync-6479 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-rsync-6479 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): rsync-3.0.4-2.40.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): rsync-3.0.4-2.40.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): rsync-3.0.4-2.40.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): rsync-3.0.4-2.40.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): rsync-3.0.4-2.40.1 References: https://bugzilla.novell.com/753035 https://bugzilla.novell.com/766313 http://download.novell.com/patch/finder/?keywords=12d5879c7f3c3928d5fa5e416b960deb From sle-updates at lists.suse.com Fri Jul 6 11:08:38 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 6 Jul 2012 19:08:38 +0200 (CEST) Subject: SUSE-RU-2012:0847-1: Recommended update for rsync Message-ID: <20120706170838.4806832851@maintenance.suse.de> SUSE Recommended Update: Recommended update for rsync ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0847-1 Rating: low References: #753035 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a crash on Z_BUF_ERROR in see_deflate_token (bnc#753035). Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): rsync-2.6.8-36.28.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): rsync-2.6.8-36.28.1 References: https://bugzilla.novell.com/753035 http://download.novell.com/patch/finder/?keywords=e986f34d6778f67cbc85101b50b6deaa From sle-updates at lists.suse.com Fri Jul 6 13:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 6 Jul 2012 21:08:32 +0200 (CEST) Subject: SUSE-RU-2012:0848-1: Recommended update for pam_mount Message-ID: <20120706190832.BFE8332851@maintenance.suse.de> SUSE Recommended Update: Recommended update for pam_mount ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0848-1 Rating: low References: #754097 #763147 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update to pam_mount resolves the following issues: * pam_mount may fail to mount a volume if the mount point does not exist. * sudo may terminate with a segmentation fault when pam_mount is enabled. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-pam_mount-6391 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-pam_mount-6391 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-pam_mount-6391 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-pam_mount-6391 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-pam_mount-6391 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): pam_mount-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): pam_mount-32bit-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): pam_mount-x86-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): pam_mount-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): pam_mount-32bit-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): pam_mount-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): pam_mount-32bit-0.47-13.16.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): pam_mount-x86-0.47-13.16.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): pam_mount-0.47-13.16.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): pam_mount-32bit-0.47-13.16.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): pam_mount-0.47-13.16.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): pam_mount-32bit-0.47-13.16.1 References: https://bugzilla.novell.com/754097 https://bugzilla.novell.com/763147 http://download.novell.com/patch/finder/?keywords=e41074784a8957bf9c0d0e93ead61e8b From sle-updates at lists.suse.com Fri Jul 6 13:08:34 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 6 Jul 2012 21:08:34 +0200 (CEST) Subject: SUSE-RU-2012:0849-1: moderate: Recommended update for udev Message-ID: <20120706190834.A4BFE3284D@maintenance.suse.de> SUSE Recommended Update: Recommended update for udev ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0849-1 Rating: moderate References: #746346 #746390 #746993 #747505 #754910 #760948 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has 6 recommended fixes can now be installed. Description: This collective update for udev provides the following fixes: * 747505: usb_modeswitch and udev conflicts and prevents UMTS-Stick from working * 754910: device names in /dev/disk/by-id have changed format * 746346: high CPU consumption due to kernel events (xdr) (performance) * 746390: fix deadlock that could make udev freeze for several minutes during boot * 746993: handle software FCoE correctly * 760948: fix by-path symbolic links in cciss controllers In addition, the system ramdisk will now be regenerated after the package update. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-libgudev-1_0-0-6353 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-libgudev-1_0-0-6353 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-libgudev-1_0-0-6353 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-libgudev-1_0-0-6353 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libgudev-1_0-devel-147-0.61.1 libudev-devel-147-0.61.1 libudev0-147-0.61.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libgudev-1_0-0-147-0.61.1 libudev0-147-0.61.1 udev-147-0.61.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libgudev-1_0-0-32bit-147-0.61.1 libudev0-32bit-147-0.61.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libgudev-1_0-0-147-0.61.1 libudev0-147-0.61.1 udev-147-0.61.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libgudev-1_0-0-32bit-147-0.61.1 libudev0-32bit-147-0.61.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libgudev-1_0-0-x86-147-0.61.1 libudev0-x86-147-0.61.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libgudev-1_0-0-147-0.61.1 libudev0-147-0.61.1 udev-147-0.61.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libgudev-1_0-0-32bit-147-0.61.1 libudev0-32bit-147-0.61.1 References: https://bugzilla.novell.com/746346 https://bugzilla.novell.com/746390 https://bugzilla.novell.com/746993 https://bugzilla.novell.com/747505 https://bugzilla.novell.com/754910 https://bugzilla.novell.com/760948 http://download.novell.com/patch/finder/?keywords=03fe7308f8c5df7a1dcf4f9036872052 From sle-updates at lists.suse.com Mon Jul 9 08:08:22 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 9 Jul 2012 16:08:22 +0200 (CEST) Subject: SUSE-SU-2012:0852-1: Security update for rubygem-rack-cache Message-ID: <20120709140822.7FC2D32854@maintenance.suse.de> SUSE Security Update: Security update for rubygem-rack-cache ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0852-1 Rating: low References: #763650 Cross-References: CVE-2012-2671 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The following issue has been fixed: * rack-cache caches potentially sensitive response headers such as Set-Cookie (CVE-2012-2671) Security Issue reference: * CVE-2012-2671 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-rubygem-rack-cache-1_1-6406 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): rubygem-rack-cache-1_1-1.1-0.8.2 References: http://support.novell.com/security/cve/CVE-2012-2671.html https://bugzilla.novell.com/763650 http://download.novell.com/patch/finder/?keywords=05ea73e0d791a3fd5d9f41d53dfaf359 From sle-updates at lists.suse.com Tue Jul 10 10:08:33 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 10 Jul 2012 18:08:33 +0200 (CEST) Subject: SUSE-RU-2012:0855-1: Recommended update for apache2-mod_apparmor Message-ID: <20120710160833.CFB6B32855@maintenance.suse.de> SUSE Recommended Update: Recommended update for apache2-mod_apparmor ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0855-1 Rating: low References: #763579 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: The Apache2 apparmor module was broken after the update to SLES11 SP2. Apache failed to start with a message like this: # ./apache2 start Starting httpd2 (prefork) httpd2-prefork: Syntax error on line 116 of /etc/apache2/httpd.conf: Syntax error on line 28 of /etc/apache2/sysconfig.d/loadmodule.conf: Can't locate API module structure `apparmor_module' in file /usr/lib/apache2/mod_apparmor.so: /usr/lib/apache2/mod_apparmor.so: undefined symbol: apparmor_module The command line was: /usr/sbin/httpd2-prefork -f /etc/apache2/httpd.conf -DSSL failed This update fixes the issue. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-apache2-mod_apparmor-6504 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-apache2-mod_apparmor-6504 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-apache2-mod_apparmor-6504 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-apache2-mod_apparmor-6504 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libapparmor-devel-2.5.1.r1445-55.59.1 tomcat_apparmor-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): apache2-mod_apparmor-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): apache2-mod_apparmor-2.5.1.r1445-55.59.1 apparmor-docs-2.5.1.r1445-55.59.1 apparmor-parser-2.5.1.r1445-55.59.1 apparmor-utils-2.5.1.r1445-55.59.1 libapparmor1-2.5.1.r1445-55.59.1 pam_apparmor-2.5.1.r1445-55.59.1 perl-apparmor-2.5.1.r1445-55.59.1 tomcat_apparmor-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libapparmor1-32bit-2.5.1.r1445-55.59.1 pam_apparmor-32bit-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): apache2-mod_apparmor-2.5.1.r1445-55.59.1 apparmor-docs-2.5.1.r1445-55.59.1 apparmor-parser-2.5.1.r1445-55.59.1 apparmor-utils-2.5.1.r1445-55.59.1 libapparmor1-2.5.1.r1445-55.59.1 pam_apparmor-2.5.1.r1445-55.59.1 perl-apparmor-2.5.1.r1445-55.59.1 tomcat_apparmor-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libapparmor1-32bit-2.5.1.r1445-55.59.1 pam_apparmor-32bit-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libapparmor1-x86-2.5.1.r1445-55.59.1 pam_apparmor-x86-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): apparmor-docs-2.5.1.r1445-55.59.1 apparmor-parser-2.5.1.r1445-55.59.1 apparmor-utils-2.5.1.r1445-55.59.1 libapparmor1-2.5.1.r1445-55.59.1 pam_apparmor-2.5.1.r1445-55.59.1 perl-apparmor-2.5.1.r1445-55.59.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libapparmor1-32bit-2.5.1.r1445-55.59.1 pam_apparmor-32bit-2.5.1.r1445-55.59.1 References: https://bugzilla.novell.com/763579 http://download.novell.com/patch/finder/?keywords=b140da8e01302d6f5635ddd869a7d952 From sle-updates at lists.suse.com Tue Jul 10 12:08:26 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 10 Jul 2012 20:08:26 +0200 (CEST) Subject: SUSE-RU-2012:0810-3: important: Recommended update for yast2-core Message-ID: <20120710180826.BC1BB32853@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-core ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0810-3 Rating: important References: #763386 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update fixes parsing of configuration files with option values longer than 2048 characters. In some cases, this could cause SuSEFirewall2 configurations to become corrupted (bnc#763386). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-yast2-core-6500 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-yast2-core-6500 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-yast2-core-6500 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-yast2-core-6500 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.35.4]: yast2-core-devel-2.17.35.4-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.17.35.4]: yast2-core-2.17.35.4-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.35.4]: yast2-core-2.17.35.4-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.17.35.4]: yast2-core-2.17.35.4-0.3.1 References: https://bugzilla.novell.com/763386 http://download.novell.com/patch/finder/?keywords=0ef7da08ab6b42b6d9813f6a825e5ac6 From sle-updates at lists.suse.com Tue Jul 10 12:08:28 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 10 Jul 2012 20:08:28 +0200 (CEST) Subject: SUSE-RU-2012:0856-1: Recommended update for yast2-packager Message-ID: <20120710180828.E7B0932853@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-packager ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0856-1 Rating: low References: #758637 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update for yast2-packager resolves the following issue: * Product packages were installed after reboot during installation, this could have caused a download error for remote repositories. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-yast2-packager-6288 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-yast2-packager-6288 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-yast2-packager-6288 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.17.78.4]: yast2-packager-2.17.78.4-0.4.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.78.4]: yast2-packager-2.17.78.4-0.4.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.17.78.4]: yast2-packager-2.17.78.4-0.4.1 References: https://bugzilla.novell.com/758637 http://download.novell.com/patch/finder/?keywords=1010adcb61a20fb50d60088fafbbb3df From sle-updates at lists.suse.com Tue Jul 10 12:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 10 Jul 2012 20:08:30 +0200 (CEST) Subject: SUSE-RU-2012:0857-1: Recommended update for xorg-x11-server Message-ID: <20120710180830.9AC4332849@maintenance.suse.de> SUSE Recommended Update: Recommended update for xorg-x11-server ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0857-1 Rating: low References: #743810 #744625 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This collective update to xorg-x11-server resolves the following issues: * Applications that render 3D graphics might hang when executed on remote hosts that have different endianness (bnc#744625) * Xnest might terminate with an unexpected error when handling pixmaps with size zero (bnc#743810). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-xorg-x11-Xvnc-6499 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-xorg-x11-Xvnc-6499 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-xorg-x11-Xvnc-6499 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-xorg-x11-Xvnc-6499 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): xorg-x11-server-sdk-7.4-27.66.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): xorg-x11-Xvnc-7.4-27.66.1 xorg-x11-server-7.4-27.66.1 xorg-x11-server-extra-7.4-27.66.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): xorg-x11-Xvnc-7.4-27.66.1 xorg-x11-server-7.4-27.66.1 xorg-x11-server-extra-7.4-27.66.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): xorg-x11-Xvnc-7.4-27.66.1 xorg-x11-server-7.4-27.66.1 xorg-x11-server-extra-7.4-27.66.1 References: https://bugzilla.novell.com/743810 https://bugzilla.novell.com/744625 http://download.novell.com/patch/finder/?keywords=5dcc95d4d3d16435290ce63001c28a25 From sle-updates at lists.suse.com Tue Jul 10 14:08:31 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 10 Jul 2012 22:08:31 +0200 (CEST) Subject: SUSE-SU-2012:0858-1: moderate: Security update for clamav Message-ID: <20120710200831.7377432853@maintenance.suse.de> SUSE Security Update: Security update for clamav ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0858-1 Rating: moderate References: #753610 #753611 #753613 #767574 Cross-References: CVE-2012-1457 CVE-2012-1458 CVE-2012-1459 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. It includes one version update. Description: The following issue has been fixed: * Viruses contained in specially crafted tar or CHM files could have evaded detection by clamav (CVE-2012-1457, CVE-2012-1458, CVE-2012-1459). Security Issue references: * CVE-2012-1457 * CVE-2012-1458 * CVE-2012-1459 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-clamav-6474 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-clamav-6474 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-clamav-6474 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-clamav-6474 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-clamav-6474 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.2.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.2.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.2.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.5.2 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.2.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.2.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.5.2 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 0.97.5]: clamav-0.97.5-0.5.2 References: http://support.novell.com/security/cve/CVE-2012-1457.html http://support.novell.com/security/cve/CVE-2012-1458.html http://support.novell.com/security/cve/CVE-2012-1459.html https://bugzilla.novell.com/753610 https://bugzilla.novell.com/753611 https://bugzilla.novell.com/753613 https://bugzilla.novell.com/767574 http://download.novell.com/patch/finder/?keywords=081f4d44356f37d28fa582731745c3e7 http://download.novell.com/patch/finder/?keywords=9915239be72cdac5c91614a1c9bc684f From sle-updates at lists.suse.com Tue Jul 10 16:09:00 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 11 Jul 2012 00:09:00 +0200 (CEST) Subject: SUSE-RU-2012:0857-2: Recommended update for xorg-x11-server Message-ID: <20120710220900.761D332853@maintenance.suse.de> SUSE Recommended Update: Recommended update for xorg-x11-server ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0857-2 Rating: low References: #743810 #744625 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This collective update to xorg-x11-server resolves the following issues: * Applications that render 3D graphics might hang when executed on remote hosts that have different endianness (bnc#744625) * Xnest might terminate with an unexpected error when handling pixmaps with size zero (bnc#743810). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-xorg-x11-Xvnc-6496 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-xorg-x11-Xvnc-6496 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-xorg-x11-Xvnc-6496 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-xorg-x11-Xvnc-6496 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): xorg-x11-server-sdk-7.4-27.40.62.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): xorg-x11-Xvnc-7.4-27.40.62.1 xorg-x11-server-7.4-27.40.62.1 xorg-x11-server-extra-7.4-27.40.62.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): xorg-x11-Xvnc-7.4-27.40.62.1 xorg-x11-server-7.4-27.40.62.1 xorg-x11-server-extra-7.4-27.40.62.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): xorg-x11-Xvnc-7.4-27.40.62.1 xorg-x11-server-7.4-27.40.62.1 xorg-x11-server-extra-7.4-27.40.62.1 References: https://bugzilla.novell.com/743810 https://bugzilla.novell.com/744625 http://download.novell.com/patch/finder/?keywords=82291f3be91d40019abe223d3c00dfb8 From sle-updates at lists.suse.com Tue Jul 10 16:09:02 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 11 Jul 2012 00:09:02 +0200 (CEST) Subject: SUSE-RU-2012:0859-1: Recommended update for python-httplib2 Message-ID: <20120710220902.3FE0532856@maintenance.suse.de> SUSE Recommended Update: Recommended update for python-httplib2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0859-1 Rating: low References: #761162 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update for python-httplib2 improves SSL certificate checking, HTTP CONNECT Proxy handling, App Engine support and more robust HTTP header handling (Cache-Control, Vary and Unicode). This update also changes the module to use the system-wide certificates instead of a local copy of Mozilla NSS certificates (bnc#761162). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-python-httplib2-6516 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-python-httplib2-6516 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.7.4]: python-httplib2-0.7.4-0.5.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.7.4]: python-httplib2-0.7.4-0.5.1 References: https://bugzilla.novell.com/761162 http://download.novell.com/patch/finder/?keywords=a750ecce1c1beec9cda1e313580240f2 From sle-updates at lists.suse.com Wed Jul 11 22:08:28 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 12 Jul 2012 06:08:28 +0200 (CEST) Subject: SUSE-RU-2012:0867-1: important: Recommended update for zmd Message-ID: <20120712040828.A2B6332856@maintenance.suse.de> SUSE Recommended Update: Recommended update for zmd ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0867-1 Rating: important References: #719869 #751782 #754502 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This update to zmd resolves the following issues: * A problem in the logrotate configuration file could prevent logs from being rotated (bnc#719869) * Invalid or password protected certificate files could make zmd unresponsive (bnc#751782, bnc#754502). Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): zmd-7.3.0.0-0.20.1 zmd-devel-7.3.0.0-0.20.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): zmd-7.3.0.0-0.20.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): zmd-devel-7.3.0.0-0.20.1 References: https://bugzilla.novell.com/719869 https://bugzilla.novell.com/751782 https://bugzilla.novell.com/754502 http://download.novell.com/patch/finder/?keywords=079e4c634565b55af23b5887ed7955c0 From sle-updates at lists.suse.com Thu Jul 12 14:08:23 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 12 Jul 2012 22:08:23 +0200 (CEST) Subject: SUSE-SU-2012:0869-1: moderate: Security update for python-crypto Message-ID: <20120712200823.A643A32858@maintenance.suse.de> SUSE Security Update: Security update for python-crypto ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0869-1 Rating: moderate References: #764127 Cross-References: CVE-2012-2417 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: python-crypto did not use the full key space when generating ElGamal secret keys which made it easier for attackers to brute force the key (CVE-2012-2417). This has been fixed. Security Issue references: * CVE-2012-2417 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-python-crypto-6478 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-python-crypto-6478 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): python-crypto-2.0.1-28.20.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): python-crypto-2.0.1-28.20.1 References: http://support.novell.com/security/cve/CVE-2012-2417.html https://bugzilla.novell.com/764127 http://download.novell.com/patch/finder/?keywords=5a078bb3da298725ac28d4596f68efdb From sle-updates at lists.suse.com Thu Jul 12 15:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 12 Jul 2012 23:08:32 +0200 (CEST) Subject: SUSE-SU-2012:0870-1: moderate: Security update for libsoup Message-ID: <20120712210832.EF1A432856@maintenance.suse.de> SUSE Security Update: Security update for libsoup ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0870-1 Rating: moderate References: #758431 Cross-References: CVE-2012-2132 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: libsoup without ca path added, accepted all SSL certificats as trusted. This has been fixed. CVE-2012-2132 has been assigned to this issue. Security Issue reference: * CVE-2012-2132 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-libsoup-6520 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-libsoup-6520 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-libsoup-6520 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-libsoup-6520 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libsoup-devel-2.32.2-4.11.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libsoup-devel-32bit-2.32.2-4.11.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libsoup-2_4-1-2.32.2-4.11.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libsoup-2_4-1-32bit-2.32.2-4.11.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libsoup-2_4-1-2.32.2-4.11.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libsoup-2_4-1-32bit-2.32.2-4.11.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libsoup-2_4-1-x86-2.32.2-4.11.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libsoup-2_4-1-2.32.2-4.11.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libsoup-2_4-1-32bit-2.32.2-4.11.1 References: http://support.novell.com/security/cve/CVE-2012-2132.html https://bugzilla.novell.com/758431 http://download.novell.com/patch/finder/?keywords=625e36b09557835cd71a8041f2d28e18 From sle-updates at lists.suse.com Thu Jul 12 21:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 13 Jul 2012 05:08:21 +0200 (CEST) Subject: SUSE-RU-2012:0871-1: Recommended update for iscsitarget Message-ID: <20120713030821.CFDA832857@maintenance.suse.de> SUSE Recommended Update: Recommended update for iscsitarget ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0871-1 Rating: low References: #752009 #769378 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update to iscsitarget provides improved support for iSCSI persistent reservation of type 7 (Write Exclusive, All Registrants) and type 8 (Exclusive Access, All Registrants). In particular, the changes are: * Fix output of "read full status" with respect to reservations * Add support for "all registrants" type persistent reservations Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-iscsitarget-6503 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-iscsitarget-6503 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-iscsitarget-6503 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): iscsitarget-1.4.20-0.19.1 iscsitarget-kmp-default-1.4.20_3.0.34_0.7-0.19.1 iscsitarget-kmp-trace-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586): iscsitarget-kmp-pae-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): iscsitarget-1.4.20-0.19.1 iscsitarget-kmp-default-1.4.20_3.0.34_0.7-0.19.1 iscsitarget-kmp-trace-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): iscsitarget-kmp-xen-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64): iscsitarget-kmp-ppc64-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Server 11 SP2 (i586): iscsitarget-kmp-pae-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): iscsitarget-1.4.20-0.19.1 iscsitarget-kmp-default-1.4.20_3.0.34_0.7-0.19.1 iscsitarget-kmp-trace-1.4.20_3.0.34_0.7-0.19.1 iscsitarget-kmp-xen-1.4.20_3.0.34_0.7-0.19.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586): iscsitarget-kmp-pae-1.4.20_3.0.34_0.7-0.19.1 References: https://bugzilla.novell.com/752009 https://bugzilla.novell.com/769378 http://download.novell.com/patch/finder/?keywords=7349477adf376769f216c5ac8430fa90 From sle-updates at lists.suse.com Thu Jul 12 21:08:23 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 13 Jul 2012 05:08:23 +0200 (CEST) Subject: SUSE-OU-2012:0872-1: Optional update for compat-wireless Message-ID: <20120713030823.53BD032857@maintenance.suse.de> SUSE Optional Update: Optional update for compat-wireless ______________________________________________________________________________ Announcement ID: SUSE-OU-2012:0872-1 Rating: low References: #730249 #752918 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has two optional fixes can now be installed. Description: Provides the updated WiFi drivers for supporting the new Intel and Atheros chips. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-compat-wireless-6506 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): compat-wireless-kmp-default-3.2.5_3.0.34_0.7-0.21.24 compat-wireless-kmp-trace-3.2.5_3.0.34_0.7-0.21.24 compat-wireless-kmp-xen-3.2.5_3.0.34_0.7-0.21.24 - SUSE Linux Enterprise Desktop 11 SP2 (noarch): kernel-firmware-20110923-0.13.3 - SUSE Linux Enterprise Desktop 11 SP2 (i586): compat-wireless-kmp-pae-3.2.5_3.0.34_0.7-0.21.24 References: https://bugzilla.novell.com/730249 https://bugzilla.novell.com/752918 http://download.novell.com/patch/finder/?keywords=d38081a063240301386e42599fb16b79 From sle-updates at lists.suse.com Fri Jul 13 10:08:39 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 13 Jul 2012 18:08:39 +0200 (CEST) Subject: SUSE-RU-2012:0873-1: important: Recommended update for supportutils Message-ID: <20120713160839.800C332880@maintenance.suse.de> SUSE Recommended Update: Recommended update for supportutils ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0873-1 Rating: important References: #710066 #710484 #712874 #718091 #727546 #738110 #738472 #738475 #743084 #743454 #756890 #765150 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that has 12 recommended fixes can now be installed. Description: This collective update provides the newest version of supportutils, which contains the following tools used for troubleshooting : supportconfig, chkbin, schealth, getappcore, analyzevmcore. The fixes in detail are: * fixed multiple Novell DNS configuration files (bnc#765150) * fixed HA error when cibadmin -Q doesn't connect * fixed ldapsearch search on non-default port (bnc#756890) * added systool base output to sysfs.txt * analyzevmcore files included in crash.txt * /etc/services included in network.txt * added analyzevmcore * added getappcore * changed to systool for sysfs.txt * added local binary list (bnc#743084) * added curl check for update registrations * fixed conf file execution in plugins directory (bnc#743454) * added a supportconfig summary in summary.xml * added /etc/init.d/halt.local to boot.txt * added fslist_ufiles_info (bnc#738475) * fixed fslist_info order (bnc#738472) * added kdump rpm check for sles11sp1 (bnc#738110) * added plugin-icommand to scplugin.rc for internal bash commands * added /proc/sys to proc.txt * removed extra bridge command * the -v for rpm validation now works on all versions * added netstat check for port 6901 to novell-dfs.txt (bnc#712874) * added rpm packages to samba.txt list (bnc#727546) * added sbd HAE information to ha.txt (bnc#710484) * added KVM information to SLE11GA * added LANG for consistent output (bnc#718091) * improved novell-dfs.txt (bnc#712874) * added /var/log/xdm.errors to x.txt (bnc#710066) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-supportutils-6484 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-supportutils-6484 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-supportutils-6484 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-supportutils-6484 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-supportutils-6484 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (noarch): supportutils-1.20-0.28.61.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (noarch): supportutils-1.20-0.28.61.1 - SUSE Linux Enterprise Server 11 SP1 (noarch): supportutils-1.20-0.28.61.1 - SUSE Linux Enterprise Server 10 SP4 (noarch): supportutils-1.20-0.12.1 - SUSE Linux Enterprise Desktop 11 SP2 (noarch): supportutils-1.20-0.28.61.1 - SUSE Linux Enterprise Desktop 11 SP1 (noarch): supportutils-1.20-0.28.61.1 - SUSE Linux Enterprise Desktop 10 SP4 (noarch): supportutils-1.20-0.12.1 References: https://bugzilla.novell.com/710066 https://bugzilla.novell.com/710484 https://bugzilla.novell.com/712874 https://bugzilla.novell.com/718091 https://bugzilla.novell.com/727546 https://bugzilla.novell.com/738110 https://bugzilla.novell.com/738472 https://bugzilla.novell.com/738475 https://bugzilla.novell.com/743084 https://bugzilla.novell.com/743454 https://bugzilla.novell.com/756890 https://bugzilla.novell.com/765150 http://download.novell.com/patch/finder/?keywords=2e225361201795203e86f8bdde1619bd http://download.novell.com/patch/finder/?keywords=5135e602d4d2c8fffa2dfb35dd606d52 From sle-updates at lists.suse.com Fri Jul 13 13:08:39 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 13 Jul 2012 21:08:39 +0200 (CEST) Subject: SUSE-SU-2012:0741-6: important: Security update for bind Message-ID: <20120713190839.33E4D3287F@maintenance.suse.de> SUSE Security Update: Security update for bind ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0741-6 Rating: important References: #765315 Cross-References: CVE-2012-1667 Affected Products: SUSE CORE 9 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The following issue has been fixed: * Records with zero length rdata field could have crashed named or disclose portions of memory to clients (CVE-2012-1667). Security Issue reference: * CVE-2012-1667 Package List: - SUSE CORE 9 (i586 s390 s390x x86_64): bind-9.3.4-4.16 bind-devel-9.3.4-4.16 bind-utils-9.3.4-4.16 - SUSE CORE 9 (x86_64): bind-utils-32bit-9-201207061338 - SUSE CORE 9 (s390x): bind-utils-32bit-9-201207061342 References: http://support.novell.com/security/cve/CVE-2012-1667.html https://bugzilla.novell.com/765315 http://download.novell.com/patch/finder/?keywords=2f883f124c996f4e73d94255fee4adfc From sle-updates at lists.suse.com Fri Jul 13 16:09:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 14 Jul 2012 00:09:15 +0200 (CEST) Subject: SUSE-RU-2012:0874-1: Recommended update for python-ethtool Message-ID: <20120713220915.490253287E@maintenance.suse.de> SUSE Recommended Update: Recommended update for python-ethtool ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0874-1 Rating: low References: #770389 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update for python-ethtool provides several stability bugfixes and support for IPv6 device information. Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-python-ethtool-6515 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-python-ethtool-6515 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-python-ethtool-6515 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): python-ethtool-0.7-0.13.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.7]: python-ethtool-0.7-0.13.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.7]: python-ethtool-0.7-0.13.1 References: https://bugzilla.novell.com/770389 http://download.novell.com/patch/finder/?keywords=d36d1fce0d4da7358264af86d3800b40 From sle-updates at lists.suse.com Fri Jul 13 19:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 14 Jul 2012 03:08:32 +0200 (CEST) Subject: SUSE-RU-2012:0875-1: Recommended update for Postfix Message-ID: <20120714010832.4E0E43287F@maintenance.suse.de> SUSE Recommended Update: Recommended update for Postfix ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0875-1 Rating: low References: #751994 #765690 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update fixes Postfix not rebuilding the database mappings upon reload or restart (bnc#765690). In addition, the documentation for the removal of the SuSEconfig postfix module was added (bnc#751994). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-postfix-6441 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-postfix-6441 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-postfix-6441 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-postfix-6441 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): postfix-devel-2.5.13-0.19.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): postfix-2.5.13-0.19.1 postfix-doc-2.5.13-0.19.1 postfix-mysql-2.5.13-0.19.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): postfix-2.5.13-0.19.1 postfix-doc-2.5.13-0.19.1 postfix-mysql-2.5.13-0.19.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): postfix-2.5.13-0.19.1 References: https://bugzilla.novell.com/751994 https://bugzilla.novell.com/765690 http://download.novell.com/patch/finder/?keywords=fc4b5133470076ce0c515af093fe5d15 From sle-updates at lists.suse.com Mon Jul 16 11:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 16 Jul 2012 19:08:32 +0200 (CEST) Subject: SUSE-SU-2012:0880-1: moderate: Security update for RPM Message-ID: <20120716170832.DC3BF32880@maintenance.suse.de> SUSE Security Update: Security update for RPM ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0880-1 Rating: moderate References: #747225 #754281 #754284 #754285 Cross-References: CVE-2012-0060 CVE-2012-0061 CVE-2012-0815 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. Description: Multiple security vulnerabilities were reported in RPM which could have been exploited via specially crafted RPM files to cause a denial of service (application crash) or potentially allow attackers to execute arbitrary code. Additionally, a non-security issue was fixed that could cause a division by zero in cycles calculation under rare circumstances. Security Issue references: * CVE-2012-0815 * CVE-2012-0060 * CVE-2012-0061 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586): popt-1.7-271.46.16 popt-devel-1.7-271.46.16 rpm-4.4.2-43.46.16 rpm-devel-4.4.2-43.46.16 rpm-python-4.4.2-43.46.16 - SUSE Linux Enterprise Desktop 10 SP4 (i586): popt-1.7-271.46.16 popt-devel-1.7-271.46.16 rpm-4.4.2-43.46.16 rpm-devel-4.4.2-43.46.16 rpm-python-4.4.2-43.46.16 - SLE SDK 10 SP4 (i586): rpm-devel-4.4.2-43.46.16 References: http://support.novell.com/security/cve/CVE-2012-0060.html http://support.novell.com/security/cve/CVE-2012-0061.html http://support.novell.com/security/cve/CVE-2012-0815.html https://bugzilla.novell.com/747225 https://bugzilla.novell.com/754281 https://bugzilla.novell.com/754284 https://bugzilla.novell.com/754285 http://download.novell.com/patch/finder/?keywords=3437ad480e640b7bf5a09b96d1218988 From sle-updates at lists.suse.com Mon Jul 16 11:08:34 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 16 Jul 2012 19:08:34 +0200 (CEST) Subject: SUSE-SU-2012:0881-1: important: Security update for java-1_4_2-ibm-sap Message-ID: <20120716170834.838823287E@maintenance.suse.de> SUSE Security Update: Security update for java-1_4_2-ibm-sap ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0881-1 Rating: important References: #768611 Affected Products: SUSE Linux Enterprise for SAP Applications 11 SP1 SUSE Linux Enterprise Java 11 SP1 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: IBM Java 1.4.2 SR13 FP12 has been released which fixes various bugs and security issues. For more information see http://www.ibm.com/developerworks/java/jdk/alerts/ CVEs addressed: CVE-2011-3563 CVE-2012-0499 CVE-2012-0502 CVE-2012-0503 CVE-2012-0505 CVE-2012-0506 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise for SAP Applications 11 SP1: zypper in -t patch slesapp1-java-1_4_2-ibm-sap-6476 - SUSE Linux Enterprise Java 11 SP1: zypper in -t patch slejsp1-java-1_4_2-ibm-sap-6476 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise for SAP Applications 11 SP1 (x86_64): java-1_4_2-ibm-sap-1.4.2_sr13.12-0.3.1 java-1_4_2-ibm-sap-devel-1.4.2_sr13.12-0.3.1 - SUSE Linux Enterprise Java 11 SP1 (x86_64): java-1_4_2-ibm-sap-1.4.2_sr13.12-0.3.1 java-1_4_2-ibm-sap-devel-1.4.2_sr13.12-0.3.1 References: https://bugzilla.novell.com/768611 http://download.novell.com/patch/finder/?keywords=94625ebb99bafb508860512c2f55fd02 From sle-updates at lists.suse.com Mon Jul 16 11:08:36 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 16 Jul 2012 19:08:36 +0200 (CEST) Subject: SUSE-SU-2012:0882-1: moderate: Security update for boost Message-ID: <20120716170836.339073287E@maintenance.suse.de> SUSE Security Update: Security update for boost ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0882-1 Rating: moderate References: #765443 #767949 Cross-References: CVE-2012-2677 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: Two problems have been fixed in the boost library: * boost::pool's ordered_malloc could have overflowed when calculating the allocation size (CVE-2012-2677). * fully qualify the the boost::date_time::dst_adjustment_offsets (non security). Security Issue reference: * CVE-2012-2677 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-boost-6507 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-boost-6507 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-boost-6507 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-boost-6507 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-boost-6507 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-boost-6507 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-boost-6507 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): boost-devel-1.36.0-12.3.1 boost-doc-1.36.0-12.3.1 libboost_date_time1_36_0-1.36.0-12.3.1 libboost_filesystem1_36_0-1.36.0-12.3.1 libboost_graph1_36_0-1.36.0-12.3.1 libboost_iostreams1_36_0-1.36.0-12.3.1 libboost_math1_36_0-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_python1_36_0-1.36.0-12.3.1 libboost_serialization1_36_0-1.36.0-12.3.1 libboost_system1_36_0-1.36.0-12.3.1 libboost_test1_36_0-1.36.0-12.3.1 libboost_thread1_36_0-1.36.0-12.3.1 libboost_wave1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 x86_64): libboost_mpi1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): libboost_regex1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64): boost-devel-32bit-1.36.0-12.3.1 libboost_date_time1_36_0-32bit-1.36.0-12.3.1 libboost_filesystem1_36_0-32bit-1.36.0-12.3.1 libboost_graph1_36_0-32bit-1.36.0-12.3.1 libboost_iostreams1_36_0-32bit-1.36.0-12.3.1 libboost_math1_36_0-32bit-1.36.0-12.3.1 libboost_program_options1_36_0-32bit-1.36.0-12.3.1 libboost_python1_36_0-32bit-1.36.0-12.3.1 libboost_regex1_36_0-32bit-1.36.0-12.3.1 libboost_serialization1_36_0-32bit-1.36.0-12.3.1 libboost_signals1_36_0-32bit-1.36.0-12.3.1 libboost_system1_36_0-32bit-1.36.0-12.3.1 libboost_test1_36_0-32bit-1.36.0-12.3.1 libboost_thread1_36_0-32bit-1.36.0-12.3.1 libboost_wave1_36_0-32bit-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): boost-devel-1.36.0-12.3.1 boost-doc-1.36.0-12.3.1 libboost_date_time1_36_0-1.36.0-12.3.1 libboost_filesystem1_36_0-1.36.0-12.3.1 libboost_graph1_36_0-1.36.0-12.3.1 libboost_iostreams1_36_0-1.36.0-12.3.1 libboost_math1_36_0-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_python1_36_0-1.36.0-12.3.1 libboost_serialization1_36_0-1.36.0-12.3.1 libboost_system1_36_0-1.36.0-12.3.1 libboost_test1_36_0-1.36.0-12.3.1 libboost_thread1_36_0-1.36.0-12.3.1 libboost_wave1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ppc64 x86_64): libboost_mpi1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): libboost_regex1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64): boost-devel-32bit-1.36.0-12.3.1 libboost_date_time1_36_0-32bit-1.36.0-12.3.1 libboost_filesystem1_36_0-32bit-1.36.0-12.3.1 libboost_graph1_36_0-32bit-1.36.0-12.3.1 libboost_iostreams1_36_0-32bit-1.36.0-12.3.1 libboost_math1_36_0-32bit-1.36.0-12.3.1 libboost_program_options1_36_0-32bit-1.36.0-12.3.1 libboost_python1_36_0-32bit-1.36.0-12.3.1 libboost_regex1_36_0-32bit-1.36.0-12.3.1 libboost_serialization1_36_0-32bit-1.36.0-12.3.1 libboost_signals1_36_0-32bit-1.36.0-12.3.1 libboost_system1_36_0-32bit-1.36.0-12.3.1 libboost_test1_36_0-32bit-1.36.0-12.3.1 libboost_thread1_36_0-32bit-1.36.0-12.3.1 libboost_wave1_36_0-32bit-1.36.0-12.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): boost-license-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_regex1_36_0-1.36.0-12.3.1 libboost_signals1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): boost-license-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_regex1_36_0-1.36.0-12.3.1 libboost_signals1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): boost-license-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_regex1_36_0-1.36.0-12.3.1 libboost_signals1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): boost-1.33.1-17.15.1 boost-devel-1.33.1-17.15.1 boost-doc-1.33.1-17.15.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): boost-32bit-1.33.1-17.15.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): boost-64bit-1.33.1-17.15.1 boost-devel-64bit-1.33.1-17.15.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): boost-license-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_signals1_36_0-1.36.0-12.3.1 libboost_thread1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): boost-license-1.36.0-12.3.1 libboost_program_options1_36_0-1.36.0-12.3.1 libboost_signals1_36_0-1.36.0-12.3.1 libboost_thread1_36_0-1.36.0-12.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): boost-1.33.1-17.15.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): boost-32bit-1.33.1-17.15.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): boost-devel-1.33.1-17.15.1 boost-doc-1.33.1-17.15.1 - SLE SDK 10 SP4 (ppc): boost-devel-64bit-1.33.1-17.15.1 References: http://support.novell.com/security/cve/CVE-2012-2677.html https://bugzilla.novell.com/765443 https://bugzilla.novell.com/767949 http://download.novell.com/patch/finder/?keywords=31b79b5c0768465a390c98f00f43531b http://download.novell.com/patch/finder/?keywords=f7640e04677ae81b96d69003957f49c4 From sle-updates at lists.suse.com Tue Jul 17 15:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 17 Jul 2012 23:08:32 +0200 (CEST) Subject: SUSE-SU-2012:0885-1: moderate: Security update for libopenssl Message-ID: <20120717210832.153A032880@maintenance.suse.de> SUSE Security Update: Security update for libopenssl ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0885-1 Rating: moderate References: #767256 #768097 Cross-References: CVE-2011-5095 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. It includes one version update. Description: This update adds libopenssl0_9_8-hmac packages, that, when installed, will enforce FIPS 140-2 self-test being run upon first use of the library. If FIPS mode is enforced, these new packages are required in order to enable FIPS mode successfully. The update also imposes limits on the parameters of a Diffie-Hellman key exchange to prevent man-in-the-middle (MITM) attacks in FIPS mode (CVE-2011-5095). Security reference: * CVE-2011-5095 Indications: Every FIPS user should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libopenssl-devel-6521 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libopenssl-devel-6521 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libopenssl-devel-6521 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libopenssl-devel-6521 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libopenssl-devel-6521 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libopenssl-devel-6521 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libopenssl-devel-6521 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]: libopenssl-devel-0.9.8j-0.44.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]: libopenssl-devel-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-0.9.8j-0.44.1 libopenssl0_9_8-hmac-0.9.8j-0.44.1 openssl-0.9.8j-0.44.1 openssl-doc-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-32bit-0.9.8j-0.44.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 0.9.8j]: libopenssl0_9_8-hmac-x86-0.9.8j-0.44.1 libopenssl0_9_8-x86-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-0.9.8j-0.44.1 libopenssl0_9_8-hmac-0.9.8j-0.44.1 openssl-0.9.8j-0.44.1 openssl-doc-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-32bit-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-0.9.8j-0.44.1 libopenssl0_9_8-hmac-0.9.8j-0.44.1 openssl-0.9.8j-0.44.1 openssl-doc-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-32bit-0.9.8j-0.44.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.44.1 - SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 0.9.8j]: libopenssl0_9_8-hmac-x86-0.9.8j-0.44.1 libopenssl0_9_8-x86-0.9.8j-0.44.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-0.9.8j-0.44.1 openssl-0.9.8j-0.44.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-32bit-0.9.8j-0.44.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-0.9.8j-0.44.1 openssl-0.9.8j-0.44.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 0.9.8j]: libopenssl0_9_8-32bit-0.9.8j-0.44.1 References: http://support.novell.com/security/cve/CVE-2011-5095.html https://bugzilla.novell.com/767256 https://bugzilla.novell.com/768097 http://download.novell.com/patch/finder/?keywords=cd76f7d085cbf1216d964bfe19854d7f From sle-updates at lists.suse.com Wed Jul 18 14:08:31 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 18 Jul 2012 22:08:31 +0200 (CEST) Subject: SUSE-SU-2012:0887-1: moderate: Security update for net-snmp Message-ID: <20120718200831.306DC32880@maintenance.suse.de> SUSE Security Update: Security update for net-snmp ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0887-1 Rating: moderate References: #759352 #762433 Cross-References: CVE-2012-2141 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update to net-snmp resolves the following issues: * Specially crafted SNMP GET requests could cause a denial of service (application crash) via a heap-based out-out-bounds read flaw which could be exploited remotely (CVE-2012-2141). * After rotating the net-snmp log file, use "try-restart" to restart the daemon. Reloading with a SIGHUP signal may trigger crashes when dynamic modules (dlmod) are in use (bnc#762433). Security Issue reference: * CVE-2012-2141 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): net-snmp-5.3.0.1-25.43.1 net-snmp-devel-5.3.0.1-25.43.1 perl-SNMP-5.3.0.1-25.43.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): net-snmp-32bit-5.3.0.1-25.43.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): net-snmp-x86-5.3.0.1-25.43.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): net-snmp-64bit-5.3.0.1-25.43.1 net-snmp-devel-64bit-5.3.0.1-25.43.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): net-snmp-5.3.0.1-25.43.1 net-snmp-devel-5.3.0.1-25.43.1 perl-SNMP-5.3.0.1-25.43.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): net-snmp-32bit-5.3.0.1-25.43.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): net-snmp-devel-5.3.0.1-25.43.1 - SLE SDK 10 SP4 (ppc): net-snmp-devel-64bit-5.3.0.1-25.43.1 References: http://support.novell.com/security/cve/CVE-2012-2141.html https://bugzilla.novell.com/759352 https://bugzilla.novell.com/762433 http://download.novell.com/patch/finder/?keywords=48b04a33674cd4129a7b5210a9eb8985 From sle-updates at lists.suse.com Wed Jul 18 15:08:50 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 18 Jul 2012 23:08:50 +0200 (CEST) Subject: SUSE-SU-2012:0888-1: moderate: Security update for net-snmp Message-ID: <20120718210850.67EEA32880@maintenance.suse.de> SUSE Security Update: Security update for net-snmp ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0888-1 Rating: moderate References: #670789 #759352 #762433 #762887 Cross-References: CVE-2012-2141 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that solves one vulnerability and has three fixes is now available. Description: This update to net-snmp resolves the following issues: * Specially crafted SNMP GET requests could cause a denial of service (application crash) via a heap-based out-out-bounds read flaw which could be exploited remotely (CVE-2012-2141). * The snmpd agent should read shared memory information from /proc/meminfo when running on Linux Kernel 2.6 or newer (bnc#762887). * The snmpd agent could crash when an AgentX sub-agent disconnects in the middle of a request (bnc#670789). * After rotating the net-snmp log file, use "try-restart" to restart the daemon. Reloading with a SIGHUP signal may trigger crashes when dynamic modules (dlmod) are in use (bnc#762433). Security Issue reference: * CVE-2012-2141 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libsnmp15-6517 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libsnmp15-6517 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libsnmp15-6517 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libsnmp15-6517 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libsnmp15-6517 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libsnmp15-6517 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libsnmp15-6517 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): net-snmp-devel-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64): net-snmp-devel-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): net-snmp-devel-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64): net-snmp-devel-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libsnmp15-5.4.2.1-8.12.10.1 net-snmp-5.4.2.1-8.12.10.1 perl-SNMP-5.4.2.1-8.12.10.1 snmp-mibs-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libsnmp15-x86-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libsnmp15-5.4.2.1-8.12.10.1 net-snmp-5.4.2.1-8.12.10.1 perl-SNMP-5.4.2.1-8.12.10.1 snmp-mibs-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libsnmp15-5.4.2.1-8.12.10.1 net-snmp-5.4.2.1-8.12.10.1 perl-SNMP-5.4.2.1-8.12.10.1 snmp-mibs-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libsnmp15-x86-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libsnmp15-5.4.2.1-8.12.10.1 net-snmp-5.4.2.1-8.12.10.1 perl-SNMP-5.4.2.1-8.12.10.1 snmp-mibs-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libsnmp15-5.4.2.1-8.12.10.1 net-snmp-5.4.2.1-8.12.10.1 perl-SNMP-5.4.2.1-8.12.10.1 snmp-mibs-5.4.2.1-8.12.10.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libsnmp15-32bit-5.4.2.1-8.12.10.1 References: http://support.novell.com/security/cve/CVE-2012-2141.html https://bugzilla.novell.com/670789 https://bugzilla.novell.com/759352 https://bugzilla.novell.com/762433 https://bugzilla.novell.com/762887 http://download.novell.com/patch/finder/?keywords=59f077255350ef94a864a7c48ecca695 From sle-updates at lists.suse.com Wed Jul 18 16:09:01 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 19 Jul 2012 00:09:01 +0200 (CEST) Subject: SUSE-SU-2012:0889-1: Security update for zypper Message-ID: <20120718220901.49CF632880@maintenance.suse.de> SUSE Security Update: Security update for zypper ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0889-1 Rating: low References: #770630 Cross-References: CVE-2012-0420 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes two new package versions. Description: The following issue has been fixed: * The zypper setuid wrapper linked against libzypp. This is not needed and added unnecessary attack vectors. CVE-2012-0420 has been assigned to this issue. Security Issue reference: * CVE-2012-0420 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-zypper-6528 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-zypper-6528 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-zypper-6527 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-zypper-6527 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-zypper-6528 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-zypper-6527 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 1.6.166]: zypper-1.6.166-0.5.1 zypper-log-1.6.166-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.6.166]: zypper-1.6.166-0.5.1 zypper-log-1.6.166-0.5.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 1.3.21]: zypper-1.3.21-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.3.21]: zypper-1.3.21-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 1.6.166]: zypper-1.6.166-0.5.1 zypper-log-1.6.166-0.5.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 1.3.21]: zypper-1.3.21-0.3.1 References: http://support.novell.com/security/cve/CVE-2012-0420.html https://bugzilla.novell.com/770630 http://download.novell.com/patch/finder/?keywords=21b0014e7ebe0f97d850cca8d0be6bd5 http://download.novell.com/patch/finder/?keywords=857c5c5bf8d9a57d64e50045ec7ef20d From sle-updates at lists.suse.com Wed Jul 18 17:08:41 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 19 Jul 2012 01:08:41 +0200 (CEST) Subject: SUSE-SU-2012:0890-1: important: Security update for pidgin, finch and libpurple Message-ID: <20120718230842.03DE73287E@maintenance.suse.de> SUSE Security Update: Security update for pidgin, finch and libpurple ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0890-1 Rating: important References: #770304 Cross-References: CVE-2012-3374 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update of pidgin fixes a stack-based buffer overflow in the MXit protocol which could have potentially been exploited by remote attackers to execute arbitrary code in the context of the user running pidgin (CVE-2012-3374). Security Issue reference: * CVE-2012-3374 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-finch-6534 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-finch-6534 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-finch-6534 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-finch-6534 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): finch-2.6.6-0.17.1 finch-devel-2.6.6-0.17.1 libpurple-2.6.6-0.17.1 libpurple-devel-2.6.6-0.17.1 libpurple-lang-2.6.6-0.17.1 pidgin-2.6.6-0.17.1 pidgin-devel-2.6.6-0.17.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): finch-2.6.6-0.17.1 finch-devel-2.6.6-0.17.1 libpurple-2.6.6-0.17.1 libpurple-devel-2.6.6-0.17.1 libpurple-lang-2.6.6-0.17.1 pidgin-2.6.6-0.17.1 pidgin-devel-2.6.6-0.17.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): finch-2.6.6-0.17.1 libpurple-2.6.6-0.17.1 libpurple-lang-2.6.6-0.17.1 libpurple-meanwhile-2.6.6-0.17.1 libpurple-tcl-2.6.6-0.17.1 pidgin-2.6.6-0.17.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): finch-2.6.6-0.17.1 libpurple-2.6.6-0.17.1 libpurple-lang-2.6.6-0.17.1 libpurple-meanwhile-2.6.6-0.17.1 libpurple-tcl-2.6.6-0.17.1 pidgin-2.6.6-0.17.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): finch-2.6.6-0.18.1 libpurple-2.6.6-0.18.1 pidgin-2.6.6-0.18.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): finch-2.6.6-0.18.1 finch-devel-2.6.6-0.18.1 libpurple-2.6.6-0.18.1 libpurple-devel-2.6.6-0.18.1 pidgin-2.6.6-0.18.1 pidgin-devel-2.6.6-0.18.1 References: http://support.novell.com/security/cve/CVE-2012-3374.html https://bugzilla.novell.com/770304 http://download.novell.com/patch/finder/?keywords=6cdbffccfb7e818b850e497dc8f94724 http://download.novell.com/patch/finder/?keywords=a738afec13eba5d4d2ab0d2b9a6f3416 From sle-updates at lists.suse.com Thu Jul 19 11:08:35 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 19 Jul 2012 19:08:35 +0200 (CEST) Subject: SUSE-RU-2012:0892-1: Recommended update for realtek-r8192se Message-ID: <20120719170835.694FE32885@maintenance.suse.de> SUSE Recommended Update: Recommended update for realtek-r8192se ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0892-1 Rating: low References: #716874 Affected Products: SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: The device driver for Realtek RTL819x WiFi cards has been updated to version 2.6.0019.1207.2010, which brings improvements and fixes one issue: * WiFi cannot be enabled by hot-key after shutdown with disabled state (bnc#716874). Indications: Users of the realtek-r8192se driver should update. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-realtek-r8192se_pci-6265 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.0019.1207.2010]: realtek-r8192se_pci-2.6.0019.1207.2010-0.3.1 realtek-r8192se_pci-kmp-default-2.6.0019.1207.2010_2.6.32.59_0.3-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586): realtek-r8192se_pci-kmp-pae-2.6.0019.1207.2010_2.6.32.59_0.3-0.3.1 References: https://bugzilla.novell.com/716874 http://download.novell.com/patch/finder/?keywords=6f004284d84e50b3336a69e8e8bf7753 From sle-updates at lists.suse.com Thu Jul 19 14:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 19 Jul 2012 22:08:30 +0200 (CEST) Subject: SUSE-RU-2012:0893-1: Recommended update for autofs5 Message-ID: <20120719200830.B4CC232887@maintenance.suse.de> SUSE Recommended Update: Recommended update for autofs5 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0893-1 Rating: low References: #733479 #748588 #752044 #753693 #754507 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that has 5 recommended fixes can now be installed. It includes one version update. Description: This collective update to AutoFS5 resolves the following issues: * Map options specified in auto.master were not being passed to included maps (bnc#753693) * Automount might terminate with a segmentation fault if the SEARCH_BASE option is defined in /etc/sysconfig/autofs (bnc#752044) * Automount might terminate with a segmentation fault on startup while trying to reconnect to an unavailable NFS mount point (bnc#748588) * When more than one server is configured in the LDAP client library and AutoFS is configured to use GSSAPI, the Automounter might fail to initialize the SASL client (bnc#754507) * Automount might hang if restarted when one of its managed volumes is busy and can't be unmounted (bnc#733479). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-autofs-6529 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-autofs-6529 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-autofs-6529 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-autofs-6529 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-autofs-6529 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.0.5]: autofs-5.0.5-11.25.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 5.0.5]: autofs-5.0.5-11.25.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 5.0.5]: autofs-5.0.5-11.25.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): autofs5-5.0.5-0.18.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 5.0.5]: autofs-5.0.5-11.25.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 5.0.5]: autofs-5.0.5-11.25.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): autofs5-5.0.5-0.18.1 References: https://bugzilla.novell.com/733479 https://bugzilla.novell.com/748588 https://bugzilla.novell.com/752044 https://bugzilla.novell.com/753693 https://bugzilla.novell.com/754507 http://download.novell.com/patch/finder/?keywords=c273de783008797ecc55cf76fb07ec30 http://download.novell.com/patch/finder/?keywords=c5b753a327833806efcbcb60432a41f9 From sle-updates at lists.suse.com Thu Jul 19 14:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 19 Jul 2012 22:08:32 +0200 (CEST) Subject: SUSE-SU-2012:0894-1: important: Security update for libtiff Message-ID: <20120719200832.985D632885@maintenance.suse.de> SUSE Security Update: Security update for libtiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0894-1 Rating: important References: #767852 #767854 Cross-References: CVE-2012-2088 CVE-2012-2113 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The following issue has been fixed: * Specially crafted tiff files could have caused overflows in libtiff (CVE-2012-2088, CVE-2012-2113). Security Issue references: * CVE-2012-2088 * CVE-2012-2113 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libtiff-devel-6475 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libtiff-devel-6475 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libtiff-devel-6475 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libtiff-devel-6475 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libtiff-devel-6475 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libtiff-devel-6475 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libtiff-devel-6475 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.146.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.146.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.146.1 tiff-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libtiff3-x86-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libtiff3-3.8.2-141.146.1 tiff-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libtiff3-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.146.1 tiff-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libtiff3-x86-3.8.2-141.146.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-3.8.2-5.28.1 libtiff-devel-3.8.2-5.28.1 tiff-3.8.2-5.28.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libtiff-32bit-3.8.2-5.28.1 libtiff-devel-32bit-3.8.2-5.28.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libtiff-x86-3.8.2-5.28.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libtiff-64bit-3.8.2-5.28.1 libtiff-devel-64bit-3.8.2-5.28.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libtiff3-3.8.2-141.146.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libtiff3-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libtiff3-3.8.2-141.146.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libtiff3-32bit-3.8.2-141.146.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libtiff-3.8.2-5.28.1 libtiff-devel-3.8.2-5.28.1 tiff-3.8.2-5.28.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libtiff-32bit-3.8.2-5.28.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-devel-3.8.2-5.28.1 - SLE SDK 10 SP4 (s390x x86_64): libtiff-devel-32bit-3.8.2-5.28.1 - SLE SDK 10 SP4 (ppc): libtiff-devel-64bit-3.8.2-5.28.1 References: http://support.novell.com/security/cve/CVE-2012-2088.html http://support.novell.com/security/cve/CVE-2012-2113.html https://bugzilla.novell.com/767852 https://bugzilla.novell.com/767854 http://download.novell.com/patch/finder/?keywords=bb00258755d4c0881387cfdfcb958733 http://download.novell.com/patch/finder/?keywords=eb87a9a1df36e6f2c25af8a7fd0d5d74 From sle-updates at lists.suse.com Fri Jul 20 17:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 21 Jul 2012 01:08:16 +0200 (CEST) Subject: SUSE-SU-2012:0895-1: important: Security update for Mozilla Firefox Message-ID: <20120720230816.B3FAB32883@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0895-1 Rating: important References: #712248 #771583 Cross-References: CVE-2012-1948 CVE-2012-1949 CVE-2012-1950 CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 CVE-2012-1955 CVE-2012-1957 CVE-2012-1958 CVE-2012-1959 CVE-2012-1961 CVE-2012-1962 CVE-2012-1963 CVE-2012-1964 CVE-2012-1965 CVE-2012-1966 CVE-2012-1967 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. It includes one version update. Description: MozillaFirefox have been updated to the 10.0.6ESR security release fixing various bugs and several security issues, some critical. The ollowing security issues have been fixed: * MFSA 2012-42: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * CVE-2012-1948: Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey reported memory safety problems and crashes that affect Firefox ESR 10 and Firefox 13. * MFSA 2012-43 / CVE-2012-1950: Security researcher Mario Gomes andresearch firm Code Audit Labs reported a mechanism to short-circuit page loads through drag and drop to the addressbar by canceling the page load. This causes the address of the previously site entered to be displayed in the addressbar instead of the currently loaded page. This could lead to potential phishing attacks on users. * MFSA 2012-44 Google security researcher Abhishek Arya used the Address Sanitizer tool to uncover four issues: two use-after-free problems, one out of bounds read bug, and a bad cast. The first use-afte.r-free problem is caused when an array of nsSMILTimeValueSpec objects is destroyed but attempts are made to call into objects in this array later. The second use-after-free problem is in nsDocument::AdoptNode when it adopts into an empty document and then adopts into another document, emptying the first one. The heap buffer overflow is in ElementAnimations when data is read off of end of an array and then pointers are dereferenced. The bad cast happens when nsTableFrame::InsertFrames is called with frames in aFrameList that are a mix of row group frames and column group frames. AppendFrames is not able to handle this mix. All four of these issues are potentially exploitable. o CVE-2012-1951: Heap-use-after-free in nsSMILTimeValueSpec::IsEventBased o CVE-2012-1954: Heap-use-after-free in nsDocument::AdoptNode o CVE-2012-1953: Out of bounds read in ElementAnimations::EnsureStyleRuleFor o CVE-2012-1952: Bad cast in nsTableFrame::InsertFrames * MFSA 2012-45 / CVE-2012-1955: Security researcher Mariusz Mlynski reported an issue with spoofing of the location property. In this issue, calls to history.forward and history.back are used to navigate to a site while displaying the previous site in the addressbar but changing the baseURI to the newer site. This can be used for phishing by allowing the user input form or other data on the newer, attacking, site while appearing to be on the older, displayed site. * MFSA 2012-46 / CVE-2012-1966: Mozilla security researcher moz_bug_r_a4 reported a cross-site scripting (XSS) attack through the context menu using a data: URL. In this issue, context menu functionality ("View Image", "Show only this frame", and "View background image") are disallowed in a javascript: URL but allowed in a data: URL, allowing for XSS. This can lead to arbitrary code execution. * MFSA 2012-47 / CVE-2012-1957: Security researcher Mario Heiderich reported that javascript could be executed in the HTML feed-view using tag within the RSS . This problem is due to tags not being filtered out during parsing and can lead to a potential cross-site scripting (XSS) attack. The flaw existed in a parser utility class and could affect other parts of the browser or add-ons which rely on that class to sanitize untrusted input. * MFSA 2012-48 / CVE-2012-1958: Security researcher Arthur Gerkis used the Address Sanitizer tool to find a use-after-free in nsGlobalWindow::PageHidden when mFocusedContent is released and oldFocusedContent is used afterwards. This use-after-free could possibly allow for remote code execution. * MFSA 2012-49 / CVE-2012-1959: Mozilla developer Bobby Holley found that same-compartment security wrappers (SCSW) can be bypassed by passing them to another compartment. Cross-compartment wrappers often do not go through SCSW, but have a filtering policy built into them. When an object is wrapped cross-compartment, the SCSW is stripped off and, when the object is read read back, it is not known that SCSW was previously present, resulting in a bypassing of SCSW. This could result in untrusted content having access to the XBL that implements browser functionality. * MFSA 2012-50 / CVE-2012-1960: Google developer Tony Payne reported an out of bounds (OOB) read in QCMS, Mozilla's color management library. With a carefully crafted color profile portions of a user's memory could be incorporated into a transformed image and possibly deciphered. * MFSA 2012-51 / CVE-2012-1961: Bugzilla developer Frederic Buclin reported that the "X-Frame-Options header is ignored when the value is duplicated, for example X-Frame-Options: SAMEORIGIN, SAMEORIGIN. This duplication occurs for unknown reasons on some websites and when it occurs results in Mozilla browsers not being protected against possible clickjacking attacks on those pages. * MFSA 2012-52 / CVE-2012-1962: Security researcher Bill Keese reported a memory corruption. This is caused by JSDependentString::undepend changing a dependent string into a fixed string when there are additional dependent strings relying on the same base. When the undepend occurs during conversion, the base data is freed, leaving other dependent strings with dangling pointers. This can lead to a potentially exploitable crash. * MFSA 2012-53 / CVE-2012-1963: Security researcher Karthikeyan Bhargavan of Prosecco at INRIA reported Content Security Policy (CSP) 1.0 implementation errors. CSP violation reports generated by Firefox and sent to the "report-uri" location include sensitive data within the "blocked-uri" parameter. These include fragment components and query strings even if the "blocked-uri" parameter has a different origin than the protected resource. This can be used to retrieve a user's OAuth 2.0 access tokens and OpenID credentials by malicious sites. * MFSA 2012-54 / CVE-2012-1964: Security Researcher Matt McCutchen reported that a clickjacking attack using the certificate warning page. A man-in-the-middle (MITM) attacker can use an iframe to display its own certificate error warning page (about:certerror) with the "Add Exception" button of a real warning page from a malicious site. This can mislead users to adding a certificate exception for a different site than the perceived one. This can lead to compromised communications with the user perceived site through the MITM attack once the certificate exception has been added. * MFSA 2012-55 / CVE-2012-1965: Security researchers Mario Gomes and Soroush Dalili reported that since Mozilla allows the pseudo-protocol feed: to prefix any valid URL, it is possible to construct feed:javascript: URLs that will execute scripts in some contexts. On some sites it may be possible to use this to evade output filtering that would otherwise strip javascript: URLs and thus contribute to cross-site scripting (XSS) problems on these sites. * MFSA 2012-56 / CVE-2012-1967: Mozilla security researcher moz_bug_r_a4 reported a arbitrary code execution attack using a javascript: URL. The Gecko engine features a JavaScript sandbox utility that allows the browser or add-ons to safely execute script in the context of a web page. In certain cases, javascript: URLs are executed in such a sandbox with insufficient context that can allow those scripts to escape from the sandbox and run with elevated privilege. This can lead to arbitrary code execution. Security Issue references: * CVE-2012-1967 * CVE-2012-1948 * CVE-2012-1949 * CVE-2012-1951 * CVE-2012-1952 * CVE-2012-1953 * CVE-2012-1954 * CVE-2012-1966 * CVE-2012-1958 * CVE-2012-1959 * CVE-2012-1962 * CVE-2012-1950 * CVE-2012-1955 * CVE-2012-1957 * CVE-2012-1961 * CVE-2012-1963 * CVE-2012-1964 * CVE-2012-1965 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): firefox3-gtk2-2.10.6-0.12.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x) [New Version: 7]: MozillaFirefox-10.0.6-0.6.1 MozillaFirefox-branding-SLED-7-0.8.25 MozillaFirefox-translations-10.0.6-0.6.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): firefox3-gtk2-32bit-2.10.6-0.12.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): firefox3-gtk2-2.10.6-0.12.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): firefox3-gtk2-32bit-2.10.6-0.12.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 7]: MozillaFirefox-10.0.6-0.6.1 MozillaFirefox-branding-SLED-7-0.8.25 MozillaFirefox-translations-10.0.6-0.6.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): firefox3-gtk2-devel-2.10.6-0.12.1 firefox3-gtk2-doc-2.10.6-0.12.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x): MozillaFirefox-branding-upstream-10.0.6-0.6.1 References: http://support.novell.com/security/cve/CVE-2012-1948.html http://support.novell.com/security/cve/CVE-2012-1949.html http://support.novell.com/security/cve/CVE-2012-1950.html http://support.novell.com/security/cve/CVE-2012-1951.html http://support.novell.com/security/cve/CVE-2012-1952.html http://support.novell.com/security/cve/CVE-2012-1953.html http://support.novell.com/security/cve/CVE-2012-1954.html http://support.novell.com/security/cve/CVE-2012-1955.html http://support.novell.com/security/cve/CVE-2012-1957.html http://support.novell.com/security/cve/CVE-2012-1958.html http://support.novell.com/security/cve/CVE-2012-1959.html http://support.novell.com/security/cve/CVE-2012-1961.html http://support.novell.com/security/cve/CVE-2012-1962.html http://support.novell.com/security/cve/CVE-2012-1963.html http://support.novell.com/security/cve/CVE-2012-1964.html http://support.novell.com/security/cve/CVE-2012-1965.html http://support.novell.com/security/cve/CVE-2012-1966.html http://support.novell.com/security/cve/CVE-2012-1967.html https://bugzilla.novell.com/712248 https://bugzilla.novell.com/771583 http://download.novell.com/patch/finder/?keywords=96da6f10cbe978aeccb3ac8d9d6b7ef8 From sle-updates at lists.suse.com Fri Jul 20 19:08:20 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 21 Jul 2012 03:08:20 +0200 (CEST) Subject: SUSE-SU-2012:0896-1: important: Security update for Mozilla Firefox Message-ID: <20120721010820.A1DBD32889@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0896-1 Rating: important References: #771583 Cross-References: CVE-2012-1948 CVE-2012-1949 CVE-2012-1950 CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 CVE-2012-1955 CVE-2012-1957 CVE-2012-1958 CVE-2012-1959 CVE-2012-1961 CVE-2012-1962 CVE-2012-1963 CVE-2012-1964 CVE-2012-1965 CVE-2012-1966 CVE-2012-1967 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. It includes two new package versions. Description: MozillaFirefox has been updated to the 10.0.6ESR security release fixing various bugs and several security issues, some critical. The following security issues have been fixed: * MFSA 2012-42: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. * CVE-2012-1948: Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey reported memory safety problems and crashes that affect Firefox ESR 10 and Firefox 13. * MFSA 2012-43 / CVE-2012-1950: Security researcher Mario Gomes andresearch firm Code Audit Labs reported a mechanism to short-circuit page loads through drag and drop to the addressbar by canceling the page load. This causes the address of the previously site entered to be displayed in the addressbar instead of the currently loaded page. This could lead to potential phishing attacks on users. * MFSA 2012-44 Google security researcher Abhishek Arya used the Address Sanitizer tool to uncover four issues: two use-after-free problems, one out of bounds read bug, and a bad cast. The first use-afte.r-free problem is caused when an array of nsSMILTimeValueSpec objects is destroyed but attempts are made to call into objects in this array later. The second use-after-free problem is in nsDocument::AdoptNode when it adopts into an empty document and then adopts into another document, emptying the first one. The heap buffer overflow is in ElementAnimations when data is read off of end of an array and then pointers are dereferenced. The bad cast happens when nsTableFrame::InsertFrames is called with frames in aFrameList that are a mix of row group frames and column group frames. AppendFrames is not able to handle this mix. All four of these issues are potentially exploitable. o CVE-2012-1951: Heap-use-after-free in nsSMILTimeValueSpec::IsEventBased o CVE-2012-1954: Heap-use-after-free in nsDocument::AdoptNode o CVE-2012-1953: Out of bounds read in ElementAnimations::EnsureStyleRuleFor o CVE-2012-1952: Bad cast in nsTableFrame::InsertFrames * MFSA 2012-45 / CVE-2012-1955: Security researcher Mariusz Mlynski reported an issue with spoofing of the location property. In this issue, calls to history.forward and history.back are used to navigate to a site while displaying the previous site in the addressbar but changing the baseURI to the newer site. This can be used for phishing by allowing the user input form or other data on the newer, attacking, site while appearing to be on the older, displayed site. * MFSA 2012-46 / CVE-2012-1966: Mozilla security researcher moz_bug_r_a4 reported a cross-site scripting (XSS) attack through the context menu using a data: URL. In this issue, context menu functionality ("View Image", "Show only this frame", and "View background image") are disallowed in a javascript: URL but allowed in a data: URL, allowing for XSS. This can lead to arbitrary code execution. * MFSA 2012-47 / CVE-2012-1957: Security researcher Mario Heiderich reported that javascript could be executed in the HTML feed-view using tag within the RSS . This problem is due to tags not being filtered out during parsing and can lead to a potential cross-site scripting (XSS) attack. The flaw existed in a parser utility class and could affect other parts of the browser or add-ons which rely on that class to sanitize untrusted input. * MFSA 2012-48 / CVE-2012-1958: Security researcher Arthur Gerkis used the Address Sanitizer tool to find a use-after-free in nsGlobalWindow::PageHidden when mFocusedContent is released and oldFocusedContent is used afterwards. This use-after-free could possibly allow for remote code execution. * MFSA 2012-49 / CVE-2012-1959: Mozilla developer Bobby Holley found that same-compartment security wrappers (SCSW) can be bypassed by passing them to another compartment. Cross-compartment wrappers often do not go through SCSW, but have a filtering policy built into them. When an object is wrapped cross-compartment, the SCSW is stripped off and, when the object is read read back, it is not known that SCSW was previously present, resulting in a bypassing of SCSW. This could result in untrusted content having access to the XBL that implements browser functionality. * MFSA 2012-50 / CVE-2012-1960: Google developer Tony Payne reported an out of bounds (OOB) read in QCMS, Mozilla's color management library. With a carefully crafted color profile portions of a user's memory could be incorporated into a transformed image and possibly deciphered. * MFSA 2012-51 / CVE-2012-1961: Bugzilla developer Frederic Buclin reported that the "X-Frame-Options header is ignored when the value is duplicated, for example X-Frame-Options: SAMEORIGIN, SAMEORIGIN. This duplication occurs for unknown reasons on some websites and when it occurs results in Mozilla browsers not being protected against possible clickjacking attacks on those pages. * MFSA 2012-52 / CVE-2012-1962: Security researcher Bill Keese reported a memory corruption. This is caused by JSDependentString::undepend changing a dependent string into a fixed string when there are additional dependent strings relying on the same base. When the undepend occurs during conversion, the base data is freed, leaving other dependent strings with dangling pointers. This can lead to a potentially exploitable crash. * MFSA 2012-53 / CVE-2012-1963: Security researcher Karthikeyan Bhargavan of Prosecco at INRIA reported Content Security Policy (CSP) 1.0 implementation errors. CSP violation reports generated by Firefox and sent to the "report-uri" location include sensitive data within the "blocked-uri" parameter. These include fragment components and query strings even if the "blocked-uri" parameter has a different origin than the protected resource. This can be used to retrieve a user's OAuth 2.0 access tokens and OpenID credentials by malicious sites. * MFSA 2012-54 / CVE-2012-1964: Security Researcher Matt McCutchen reported that a clickjacking attack using the certificate warning page. A man-in-the-middle (MITM) attacker can use an iframe to display its own certificate error warning page (about:certerror) with the "Add Exception" button of a real warning page from a malicious site. This can mislead users to adding a certificate exception for a different site than the perceived one. This can lead to compromised communications with the user perceived site through the MITM attack once the certificate exception has been added. * MFSA 2012-55 / CVE-2012-1965: Security researchers Mario Gomes and Soroush Dalili reported that since Mozilla allows the pseudo-protocol feed: to prefix any valid URL, it is possible to construct feed:javascript: URLs that will execute scripts in some contexts. On some sites it may be possible to use this to evade output filtering that would otherwise strip javascript: URLs and thus contribute to cross-site scripting (XSS) problems on these sites. * MFSA 2012-56 / CVE-2012-1967: Mozilla security researcher moz_bug_r_a4 reported a arbitrary code execution attack using a javascript: URL. The Gecko engine features a JavaScript sandbox utility that allows the browser or add-ons to safely execute script in the context of a web page. In certain cases, javascript: URLs are executed in such a sandbox with insufficient context that can allow those scripts to escape from the sandbox and run with elevated privilege. This can lead to arbitrary code execution. Security Issue references: * CVE-2012-1967 * CVE-2012-1948 * CVE-2012-1949 * CVE-2012-1951 * CVE-2012-1952 * CVE-2012-1953 * CVE-2012-1954 * CVE-2012-1966 * CVE-2012-1958 * CVE-2012-1959 * CVE-2012-1962 * CVE-2012-1950 * CVE-2012-1955 * CVE-2012-1957 * CVE-2012-1961 * CVE-2012-1963 * CVE-2012-1964 * CVE-2012-1965 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-firefox-201207-6574 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-firefox-201207-6574 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-firefox-201207-6574 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-firefox-201207-6574 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-firefox-201207-6574 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 10.0.6 and 7]: MozillaFirefox-10.0.6-0.4.1 MozillaFirefox-branding-SLED-7-0.6.7.70 MozillaFirefox-translations-10.0.6-0.4.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 10.0.6]: MozillaFirefox-10.0.6-0.4.1 MozillaFirefox-translations-10.0.6-0.4.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 10.0.6 and 7]: MozillaFirefox-10.0.6-0.4.1 MozillaFirefox-branding-SLED-7-0.6.7.70 MozillaFirefox-translations-10.0.6-0.4.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 10.0.6 and 7]: MozillaFirefox-10.0.6-0.4.1 MozillaFirefox-branding-SLED-7-0.6.7.70 MozillaFirefox-translations-10.0.6-0.4.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 10.0.6 and 7]: MozillaFirefox-10.0.6-0.4.1 MozillaFirefox-branding-SLED-7-0.6.7.70 MozillaFirefox-translations-10.0.6-0.4.1 References: http://support.novell.com/security/cve/CVE-2012-1948.html http://support.novell.com/security/cve/CVE-2012-1949.html http://support.novell.com/security/cve/CVE-2012-1950.html http://support.novell.com/security/cve/CVE-2012-1951.html http://support.novell.com/security/cve/CVE-2012-1952.html http://support.novell.com/security/cve/CVE-2012-1953.html http://support.novell.com/security/cve/CVE-2012-1954.html http://support.novell.com/security/cve/CVE-2012-1955.html http://support.novell.com/security/cve/CVE-2012-1957.html http://support.novell.com/security/cve/CVE-2012-1958.html http://support.novell.com/security/cve/CVE-2012-1959.html http://support.novell.com/security/cve/CVE-2012-1961.html http://support.novell.com/security/cve/CVE-2012-1962.html http://support.novell.com/security/cve/CVE-2012-1963.html http://support.novell.com/security/cve/CVE-2012-1964.html http://support.novell.com/security/cve/CVE-2012-1965.html http://support.novell.com/security/cve/CVE-2012-1966.html http://support.novell.com/security/cve/CVE-2012-1967.html https://bugzilla.novell.com/771583 http://download.novell.com/patch/finder/?keywords=0b1471bd5af6e54566551a32a23095d3 From sle-updates at lists.suse.com Mon Jul 23 11:08:38 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 23 Jul 2012 19:08:38 +0200 (CEST) Subject: SUSE-SU-2012:0901-1: Security update for libxslt Message-ID: <20120723170838.E3B0732888@maintenance.suse.de> SUSE Security Update: Security update for libxslt ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0901-1 Rating: low References: #769182 Cross-References: CVE-2012-2825 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The following issue has been fixed: * Specially crafted XSL documents could have crashed libxslt (CVE-2012-2825) Security Issue reference: * CVE-2012-2825 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libxslt-6491 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libxslt-6491 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libxslt-6491 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libxslt-6491 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libxslt-6491 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libxslt-6491 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libxslt-6491 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libxslt-devel-1.1.24-19.19.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libxslt-devel-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libxslt-devel-1.1.24-19.19.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64): libxslt-devel-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libxslt-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libxslt-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libxslt-x86-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libxslt-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libxslt-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libxslt-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libxslt-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libxslt-x86-1.1.24-19.19.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libxslt-1.1.15-15.18.4 libxslt-devel-1.1.15-15.18.4 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libxslt-32bit-1.1.15-15.18.4 libxslt-devel-32bit-1.1.15-15.18.4 - SUSE Linux Enterprise Server 10 SP4 (ia64): libxslt-x86-1.1.15-15.18.4 - SUSE Linux Enterprise Server 10 SP4 (ppc): libxslt-64bit-1.1.15-15.18.4 libxslt-devel-64bit-1.1.15-15.18.4 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libxslt-1.1.24-19.19.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libxslt-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libxslt-1.1.24-19.19.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libxslt-32bit-1.1.24-19.19.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libxslt-1.1.15-15.18.4 libxslt-devel-1.1.15-15.18.4 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libxslt-32bit-1.1.15-15.18.4 libxslt-devel-32bit-1.1.15-15.18.4 References: http://support.novell.com/security/cve/CVE-2012-2825.html https://bugzilla.novell.com/769182 http://download.novell.com/patch/finder/?keywords=295ca8af6e771f001479c62f203d3b4e http://download.novell.com/patch/finder/?keywords=bfb749443a7fe15c20cde485a0b1485b From sle-updates at lists.suse.com Mon Jul 23 11:08:41 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 23 Jul 2012 19:08:41 +0200 (CEST) Subject: SUSE-SU-2012:0902-1: important: Security update for libexif Message-ID: <20120723170841.9615532884@maintenance.suse.de> SUSE Security Update: Security update for libexif ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0902-1 Rating: important References: #771229 Cross-References: CVE-2012-2812 CVE-2012-2814 CVE-2012-2836 CVE-2012-2837 CVE-2012-2841 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: Various overflows and other security related bugs in libexif were found by the Google Security team and fixed by the libexif developers. Security Issue references: * CVE-2012-2812 * CVE-2012-2814 * CVE-2012-2836 * CVE-2012-2837 * CVE-2012-2841 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libexif-0.6.13-20.14.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libexif-32bit-0.6.13-20.14.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libexif-x86-0.6.13-20.14.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libexif-64bit-0.6.13-20.14.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libexif-0.6.13-20.14.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libexif-32bit-0.6.13-20.14.1 References: http://support.novell.com/security/cve/CVE-2012-2812.html http://support.novell.com/security/cve/CVE-2012-2814.html http://support.novell.com/security/cve/CVE-2012-2836.html http://support.novell.com/security/cve/CVE-2012-2837.html http://support.novell.com/security/cve/CVE-2012-2841.html https://bugzilla.novell.com/771229 http://download.novell.com/patch/finder/?keywords=9eed174e86533459e960c872be45c510 From sle-updates at lists.suse.com Mon Jul 23 11:08:43 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 23 Jul 2012 19:08:43 +0200 (CEST) Subject: SUSE-SU-2012:0903-1: important: Security update for libexif Message-ID: <20120723170843.546B632889@maintenance.suse.de> SUSE Security Update: Security update for libexif ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0903-1 Rating: important References: #771229 Cross-References: CVE-2012-2812 CVE-2012-2813 CVE-2012-2814 CVE-2012-2836 CVE-2012-2837 CVE-2012-2840 CVE-2012-2841 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: Various overflows and other security related bugs in libexif were found by the Google Security team and fixed by the libexif developers. Security Issue references: * CVE-2012-2812 * CVE-2012-2813 * CVE-2012-2814 * CVE-2012-2836 * CVE-2012-2837 * CVE-2012-2840 * CVE-2012-2841 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libexif-6568 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libexif-6568 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libexif-6568 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libexif-6568 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libexif-6568 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libexif-6568 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libexif-6568 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libexif-devel-0.6.17-2.14.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libexif-devel-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libexif-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libexif-32bit-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libexif-x86-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libexif-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libexif-32bit-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libexif-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libexif-32bit-0.6.17-2.14.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libexif-x86-0.6.17-2.14.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libexif-0.6.17-2.14.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libexif-32bit-0.6.17-2.14.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libexif-0.6.17-2.14.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libexif-32bit-0.6.17-2.14.1 References: http://support.novell.com/security/cve/CVE-2012-2812.html http://support.novell.com/security/cve/CVE-2012-2813.html http://support.novell.com/security/cve/CVE-2012-2814.html http://support.novell.com/security/cve/CVE-2012-2836.html http://support.novell.com/security/cve/CVE-2012-2837.html http://support.novell.com/security/cve/CVE-2012-2840.html http://support.novell.com/security/cve/CVE-2012-2841.html https://bugzilla.novell.com/771229 http://download.novell.com/patch/finder/?keywords=795efea468ff4df45b9a7a62eb66f947 From sle-updates at lists.suse.com Mon Jul 23 16:08:31 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 24 Jul 2012 00:08:31 +0200 (CEST) Subject: SUSE-SU-2012:0904-1: moderate: Security update for Linux kernel Message-ID: <20120723220832.086EB3288A@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0904-1 Rating: moderate References: #630970 #661605 #720374 #729247 #734300 #752858 #754085 #754428 #755513 #755537 #755546 #756050 #758013 #758058 #758104 #758260 #759545 #760902 #760974 #761414 #761988 #763194 #763656 #763830 #764098 #764150 #764500 #765022 #765102 #765320 #765548 #767684 #768632 #769210 #769685 #769777 #769784 #769896 Cross-References: CVE-2012-2123 CVE-2012-2136 CVE-2012-2319 CVE-2012-2383 CVE-2012-2384 CVE-2012-2390 CVE-2012-2663 CVE-2012-3375 CVE-2012-3400 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise High Availability Extension 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 9 vulnerabilities and has 29 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 SP1 kernel have been updated to fix various bugs and security issues. The following security issues have been fixed: * CVE-2012-3400: Several buffer overread and overwrite errors in the UDF logical volume descriptor code were fixed that might have allowed local attackers able to mount UDF volumes to crash the kernel or potentially gain privileges. * CVE-2012-3375: A local denial of service in the last epoll fix was fixed. * CVE-2012-2384: A integer overflow in i915_gem_do_execbuffer() was fixed that might be used by local attackers to crash the kernel or potentially execute code. * CVE-2012-2383: A integer overflow in i915_gem_execbuffer2() was fixed that might be used by local attackers to crash the kernel or potentially execute code. * CVE-2012-2390: Memiory leaks in the hugetlbfs map reservation code were fixed that could be used by local attackers to exhaust machine memory. * CVE-2012-2123: The filesystem cabability handling was not fully correct, allowing local users to bypass fscaps related restrictions to disable e.g. address space randomization. * CVE-2012-2136: Validation of data_len before allocating fragments of skbs was fixed that might have allowed a heap overflow. * CVE-2012-2319: Fixed potential buffer overflows in the hfsplus filesystem, which might be exploited by local attackers able to mount such filesystems. Several leapsecond related bug fixes have been created: * hrtimer: provide clock_was_set_delayed() (bnc#768632). * time: Fix leapsecond triggered hrtimer/futex load spike issue (bnc#768632). * ntp: fix leap second hrtimer deadlock (bnc#768632). * ntp: avoid printk under xtime_lock (bnc#767684). The following non-security issues have been fixed: * tcp: drop SYN+FIN messages to avoid memory leaks (bnc#765102) * be2net: Fix EEH error reset before a flash dump completes (bnc#755546). * REVERT svcrpc: destroy server sockets all at once (bnc#769210). * sched: Make sure to not re-read variables after validation (bnc#769685). * audit: Do not send uninitialized data for AUDIT_TTY_GET (bnc#755513). * dlm: do not depend on sctp (bnc#729247, bnc#763656). * RPC: killing RPC tasks races fixed (bnc#765548). * vlan/core: Fix memory leak/corruption on VLAN GRO_DROP (bnc#758058). * CPU hotplug, cpusets, suspend/resume: Do not modify cpusets during suspend/resume (bnc#752858). * ioat2: kill pending flag (bnc#765022). * Fix massive driver induced spin_lock_bh() contention. * ipmi: Fix IPMI errors due to timing problems (bnc#761988). * xen: fix VM_FOREIGN users after c/s 878:eba6fe6d8d53 (bnc#760974). * xen: gntdev: fix multi-page slot allocation (bnc#760974). * rpm/kernel-binary.spec.in: Own the right -kdump initrd (bnc#764500) * kernel: pfault task state race (bnc#764098,LTC#81724). * xfrm: take net hdr len into account for esp payload size calculation (bnc#759545). * bonding: do not dereference null pointer to device of VLAN 0 (bnc#763830). * cifs: fix oops while traversing open file list (try #4) (bnc#756050). * nfsd: fix BUG at fs/nfsd/nfsfh.h:199 on unlink (bnc#769777). * nfs: Ensure we never try to mount an NFS auto-mount dir (bnc748601). * patches.suse/cgroup-disable-memcg-when-low-lowmem.patch: fix typo: use if defined(CONFIG_) rather than if CONFIG_ * patches.suse/pagecache-limit-fix-shmem-deadlock.patch: Fixed the GFP_NOWAIT is zero and not suitable for tests bug (bnc#755537) * sys_poll: fix incorrect type for timeout parameter (bnc#754428). * scsi_transport_fc: fix blocked bsg request when fc object deleted (bnc#761414, bnc#734300). * ehea: fix allmulticast support (bnc#758013). * scsi: Silence unnecessary warnings about ioctl to partition (bnc#758104). * sched/x86: Fix overflow in cyc2ns_offset (bnc#630970, bnc#661605). * sched/rt: Do not throttle when PI boosting (bnc#754085). * sched/rt: Keep period timer ticking when rt throttling is active (bnc#754085). * sched,rt: fix isolated CPUs leaving root_task_group indefinitely throttled (bnc#754085). Security Issue references: * CVE-2012-2123 * CVE-2012-2136 * CVE-2012-2383 * CVE-2012-2384 * CVE-2012-2390 * CVE-2012-2663 * CVE-2012-3400 * CVE-2012-3375 * CVE-2012-2319 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-kernel-6547 slessp1-kernel-6548 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-kernel-6547 slessp1-kernel-6548 slessp1-kernel-6549 slessp1-kernel-6550 slessp1-kernel-6556 - SUSE Linux Enterprise High Availability Extension 11 SP1: zypper in -t patch sleshasp1-kernel-6547 sleshasp1-kernel-6548 sleshasp1-kernel-6549 sleshasp1-kernel-6550 sleshasp1-kernel-6556 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-kernel-6547 sledsp1-kernel-6548 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.6.32.59]: btrfs-kmp-default-0_2.6.32.59_0.7-0.3.107 ext4dev-kmp-default-0_2.6.32.59_0.7-7.9.74 ext4dev-kmp-trace-0_2.6.32.59_0.7-7.9.74 hyper-v-kmp-default-0_2.6.32.59_0.7-0.18.20 hyper-v-kmp-trace-0_2.6.32.59_0.7-0.18.20 kernel-default-2.6.32.59-0.7.1 kernel-default-base-2.6.32.59-0.7.1 kernel-default-devel-2.6.32.59-0.7.1 kernel-source-2.6.32.59-0.7.1 kernel-syms-2.6.32.59-0.7.1 kernel-trace-2.6.32.59-0.7.1 kernel-trace-base-2.6.32.59-0.7.1 kernel-trace-devel-2.6.32.59-0.7.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586) [New Version: 2.6.32.59]: btrfs-kmp-pae-0_2.6.32.59_0.7-0.3.107 ext4dev-kmp-pae-0_2.6.32.59_0.7-7.9.74 hyper-v-kmp-pae-0_2.6.32.59_0.7-0.18.20 kernel-pae-2.6.32.59-0.7.1 kernel-pae-base-2.6.32.59-0.7.1 kernel-pae-devel-2.6.32.59-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.32.59]: btrfs-kmp-default-0_2.6.32.59_0.7-0.3.107 ext4dev-kmp-default-0_2.6.32.59_0.7-7.9.74 ext4dev-kmp-trace-0_2.6.32.59_0.7-7.9.74 kernel-default-2.6.32.59-0.7.1 kernel-default-base-2.6.32.59-0.7.1 kernel-default-devel-2.6.32.59-0.7.1 kernel-source-2.6.32.59-0.7.1 kernel-syms-2.6.32.59-0.7.1 kernel-trace-2.6.32.59-0.7.1 kernel-trace-base-2.6.32.59-0.7.1 kernel-trace-devel-2.6.32.59-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 2.6.32.59]: btrfs-kmp-xen-0_2.6.32.59_0.7-0.3.107 ext4dev-kmp-xen-0_2.6.32.59_0.7-7.9.74 hyper-v-kmp-default-0_2.6.32.59_0.7-0.18.20 hyper-v-kmp-trace-0_2.6.32.59_0.7-0.18.20 kernel-ec2-2.6.32.59-0.7.1 kernel-ec2-base-2.6.32.59-0.7.1 kernel-ec2-devel-2.6.32.59-0.7.1 kernel-xen-2.6.32.59-0.7.1 kernel-xen-base-2.6.32.59-0.7.1 kernel-xen-devel-2.6.32.59-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (s390x) [New Version: 2.6.32.59]: kernel-default-man-2.6.32.59-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64) [New Version: 2.6.32.59]: ext4dev-kmp-ppc64-0_2.6.32.59_0.7-7.9.74 kernel-ppc64-2.6.32.59-0.7.1 kernel-ppc64-base-2.6.32.59-0.7.1 kernel-ppc64-devel-2.6.32.59-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (i586) [New Version: 2.6.32.59]: btrfs-kmp-pae-0_2.6.32.59_0.7-0.3.107 ext4dev-kmp-pae-0_2.6.32.59_0.7-7.9.74 hyper-v-kmp-pae-0_2.6.32.59_0.7-0.18.20 kernel-pae-2.6.32.59-0.7.1 kernel-pae-base-2.6.32.59-0.7.1 kernel-pae-devel-2.6.32.59-0.7.1 - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_2.6.32.59_0.7-2.5.60 cluster-network-kmp-trace-1.4_2.6.32.59_0.7-2.5.60 gfs2-kmp-default-2_2.6.32.59_0.7-0.2.106 gfs2-kmp-trace-2_2.6.32.59_0.7-0.2.106 ocfs2-kmp-default-1.6_2.6.32.59_0.7-0.4.2.60 ocfs2-kmp-trace-1.6_2.6.32.59_0.7-0.4.2.60 - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 x86_64): cluster-network-kmp-xen-1.4_2.6.32.59_0.7-2.5.60 gfs2-kmp-xen-2_2.6.32.59_0.7-0.2.106 ocfs2-kmp-xen-1.6_2.6.32.59_0.7-0.4.2.60 - SUSE Linux Enterprise High Availability Extension 11 SP1 (ppc64): cluster-network-kmp-ppc64-1.4_2.6.32.59_0.7-2.5.60 gfs2-kmp-ppc64-2_2.6.32.59_0.7-0.2.106 ocfs2-kmp-ppc64-1.6_2.6.32.59_0.7-0.4.2.60 - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586): cluster-network-kmp-pae-1.4_2.6.32.59_0.7-2.5.60 gfs2-kmp-pae-2_2.6.32.59_0.7-0.2.106 ocfs2-kmp-pae-1.6_2.6.32.59_0.7-0.4.2.60 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.32.59]: btrfs-kmp-default-0_2.6.32.59_0.7-0.3.107 btrfs-kmp-xen-0_2.6.32.59_0.7-0.3.107 hyper-v-kmp-default-0_2.6.32.59_0.7-0.18.20 kernel-default-2.6.32.59-0.7.1 kernel-default-base-2.6.32.59-0.7.1 kernel-default-devel-2.6.32.59-0.7.1 kernel-default-extra-2.6.32.59-0.7.1 kernel-desktop-devel-2.6.32.59-0.7.1 kernel-source-2.6.32.59-0.7.1 kernel-syms-2.6.32.59-0.7.1 kernel-trace-devel-2.6.32.59-0.7.1 kernel-xen-2.6.32.59-0.7.1 kernel-xen-base-2.6.32.59-0.7.1 kernel-xen-devel-2.6.32.59-0.7.1 kernel-xen-extra-2.6.32.59-0.7.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586) [New Version: 2.6.32.59]: btrfs-kmp-pae-0_2.6.32.59_0.7-0.3.107 hyper-v-kmp-pae-0_2.6.32.59_0.7-0.18.20 kernel-pae-2.6.32.59-0.7.1 kernel-pae-base-2.6.32.59-0.7.1 kernel-pae-devel-2.6.32.59-0.7.1 kernel-pae-extra-2.6.32.59-0.7.1 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-2.6.32.59-0.7.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-2.6.32.59-0.7.1 - SLE 11 SERVER Unsupported Extras (ppc64): kernel-ppc64-extra-2.6.32.59-0.7.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-2.6.32.59-0.7.1 References: http://support.novell.com/security/cve/CVE-2012-2123.html http://support.novell.com/security/cve/CVE-2012-2136.html http://support.novell.com/security/cve/CVE-2012-2319.html http://support.novell.com/security/cve/CVE-2012-2383.html http://support.novell.com/security/cve/CVE-2012-2384.html http://support.novell.com/security/cve/CVE-2012-2390.html http://support.novell.com/security/cve/CVE-2012-2663.html http://support.novell.com/security/cve/CVE-2012-3375.html http://support.novell.com/security/cve/CVE-2012-3400.html https://bugzilla.novell.com/630970 https://bugzilla.novell.com/661605 https://bugzilla.novell.com/720374 https://bugzilla.novell.com/729247 https://bugzilla.novell.com/734300 https://bugzilla.novell.com/752858 https://bugzilla.novell.com/754085 https://bugzilla.novell.com/754428 https://bugzilla.novell.com/755513 https://bugzilla.novell.com/755537 https://bugzilla.novell.com/755546 https://bugzilla.novell.com/756050 https://bugzilla.novell.com/758013 https://bugzilla.novell.com/758058 https://bugzilla.novell.com/758104 https://bugzilla.novell.com/758260 https://bugzilla.novell.com/759545 https://bugzilla.novell.com/760902 https://bugzilla.novell.com/760974 https://bugzilla.novell.com/761414 https://bugzilla.novell.com/761988 https://bugzilla.novell.com/763194 https://bugzilla.novell.com/763656 https://bugzilla.novell.com/763830 https://bugzilla.novell.com/764098 https://bugzilla.novell.com/764150 https://bugzilla.novell.com/764500 https://bugzilla.novell.com/765022 https://bugzilla.novell.com/765102 https://bugzilla.novell.com/765320 https://bugzilla.novell.com/765548 https://bugzilla.novell.com/767684 https://bugzilla.novell.com/768632 https://bugzilla.novell.com/769210 https://bugzilla.novell.com/769685 https://bugzilla.novell.com/769777 https://bugzilla.novell.com/769784 https://bugzilla.novell.com/769896 http://download.novell.com/patch/finder/?keywords=06fda69d421dc021aa1af6db3dbbfe00 http://download.novell.com/patch/finder/?keywords=175c75ce63a62eca1f569471fb682a0d http://download.novell.com/patch/finder/?keywords=229c8046cc2d922862a076dcade035ee http://download.novell.com/patch/finder/?keywords=2bf30579d340919def37b6c31f52d5cc http://download.novell.com/patch/finder/?keywords=30e20c3438f64370257cb21aa8034b43 http://download.novell.com/patch/finder/?keywords=5399a2fd4163cc21db7ac98a1c252c2d http://download.novell.com/patch/finder/?keywords=7d95313094a63156fae454daf49c9590 http://download.novell.com/patch/finder/?keywords=95c9d9077bf68ea687769a36cfba8c10 http://download.novell.com/patch/finder/?keywords=aa8ba1a426ec842bf42ddf697706fb0a http://download.novell.com/patch/finder/?keywords=da9cb313bde70908a00e430c3f84de25 From sle-updates at lists.suse.com Tue Jul 24 20:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 25 Jul 2012 04:08:15 +0200 (CEST) Subject: SUSE-RU-2012:0912-1: Recommended update for YaST2 translations Message-ID: <20120725020815.DD25032887@maintenance.suse.de> SUSE Recommended Update: Recommended update for YaST2 translations ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0912-1 Rating: low References: #722462 #728639 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. It includes 17 new package versions. Description: This update provides updated translations for YaST. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-yast2-translation-201204-6131 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-yast2-translation-201204-6131 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-yast2-translation-201204-6131 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (noarch) [New Version: 2.17.15,2.17.17,2.17.31,2.17.33,2.17.34,2.17.37,2.17.38,2.17.43,2.17.44,2.17.46,2.17.48,2.17.49,2.17.50,2.17.51,2.17.52,2.17.53 and 2.17.9]: yast2-trans-ar-2.17.33-0.5.1 yast2-trans-cs-2.17.43-0.5.1 yast2-trans-da-2.17.34-0.5.1 yast2-trans-de-2.17.51-0.5.1 yast2-trans-el-2.17.17-0.5.1 yast2-trans-es-2.17.50-0.5.1 yast2-trans-fi-2.17.37-0.5.1 yast2-trans-fr-2.17.52-0.5.1 yast2-trans-hu-2.17.53-0.5.1 yast2-trans-it-2.17.53-0.5.1 yast2-trans-ja-2.17.44-0.5.1 yast2-trans-ko-2.17.50-0.5.1 yast2-trans-nb-2.17.31-0.5.1 yast2-trans-nl-2.17.48-0.5.1 yast2-trans-pl-2.17.46-0.5.1 yast2-trans-pt-2.17.9-0.5.1 yast2-trans-pt_BR-2.17.49-0.5.1 yast2-trans-ru-2.17.44-0.5.1 yast2-trans-sv-2.17.34-0.5.1 yast2-trans-tr-2.17.15-0.5.1 yast2-trans-zh_CN-2.17.38-0.5.1 yast2-trans-zh_TW-2.17.33-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (noarch) [New Version: 2.17.15,2.17.17,2.17.31,2.17.33,2.17.34,2.17.37,2.17.38,2.17.43,2.17.44,2.17.46,2.17.48,2.17.49,2.17.50,2.17.51,2.17.52,2.17.53 and 2.17.9]: yast2-trans-ar-2.17.33-0.5.1 yast2-trans-cs-2.17.43-0.5.1 yast2-trans-da-2.17.34-0.5.1 yast2-trans-de-2.17.51-0.5.1 yast2-trans-el-2.17.17-0.5.1 yast2-trans-es-2.17.50-0.5.1 yast2-trans-fi-2.17.37-0.5.1 yast2-trans-fr-2.17.52-0.5.1 yast2-trans-hu-2.17.53-0.5.1 yast2-trans-it-2.17.53-0.5.1 yast2-trans-ja-2.17.44-0.5.1 yast2-trans-ko-2.17.50-0.5.1 yast2-trans-nb-2.17.31-0.5.1 yast2-trans-nl-2.17.48-0.5.1 yast2-trans-pl-2.17.46-0.5.1 yast2-trans-pt-2.17.9-0.5.1 yast2-trans-pt_BR-2.17.49-0.5.1 yast2-trans-ru-2.17.44-0.5.1 yast2-trans-sv-2.17.34-0.5.1 yast2-trans-tr-2.17.15-0.5.1 yast2-trans-zh_CN-2.17.38-0.5.1 yast2-trans-zh_TW-2.17.33-0.5.1 - SUSE Linux Enterprise Desktop 11 SP2 (noarch) [New Version: 2.17.15,2.17.17,2.17.31,2.17.33,2.17.34,2.17.37,2.17.38,2.17.43,2.17.44,2.17.46,2.17.48,2.17.49,2.17.50,2.17.51,2.17.52,2.17.53 and 2.17.9]: yast2-trans-ar-2.17.33-0.5.1 yast2-trans-cs-2.17.43-0.5.1 yast2-trans-da-2.17.34-0.5.1 yast2-trans-de-2.17.51-0.5.1 yast2-trans-el-2.17.17-0.5.1 yast2-trans-es-2.17.50-0.5.1 yast2-trans-fi-2.17.37-0.5.1 yast2-trans-fr-2.17.52-0.5.1 yast2-trans-hu-2.17.53-0.5.1 yast2-trans-it-2.17.53-0.5.1 yast2-trans-ja-2.17.44-0.5.1 yast2-trans-ko-2.17.50-0.5.1 yast2-trans-nb-2.17.31-0.5.1 yast2-trans-nl-2.17.48-0.5.1 yast2-trans-pl-2.17.46-0.5.1 yast2-trans-pt-2.17.9-0.5.1 yast2-trans-pt_BR-2.17.49-0.5.1 yast2-trans-ru-2.17.44-0.5.1 yast2-trans-sv-2.17.34-0.5.1 yast2-trans-tr-2.17.15-0.5.1 yast2-trans-zh_CN-2.17.38-0.5.1 yast2-trans-zh_TW-2.17.33-0.5.1 References: https://bugzilla.novell.com/722462 https://bugzilla.novell.com/728639 http://download.novell.com/patch/finder/?keywords=368fcea3b697032e0b595fb56df44755 From sle-updates at lists.suse.com Tue Jul 24 21:08:18 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 25 Jul 2012 05:08:18 +0200 (CEST) Subject: SUSE-RU-2012:0913-1: Recommended update for snapper translations Message-ID: <20120725030818.C31F532176@maintenance.suse.de> SUSE Recommended Update: Recommended update for snapper translations ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0913-1 Rating: low References: #721352 #741214 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. It includes one version update. Description: This update provides translations for snapper (bnc#741214) and f-spot (bnc#721352). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-translation-update-6158 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-translation-update-6158 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-translation-update-6158 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (noarch) [New Version: 11.2]: translation-update-11.2-1.44.1 translation-update-ar-11.2-1.44.1 translation-update-cs-11.2-1.44.1 translation-update-da-11.2-1.44.1 translation-update-de-11.2-1.44.1 translation-update-es-11.2-1.44.1 translation-update-fi-11.2-1.44.1 translation-update-fr-11.2-1.44.1 translation-update-hu-11.2-1.44.1 translation-update-it-11.2-1.44.1 translation-update-ja-11.2-1.44.1 translation-update-ko-11.2-1.44.1 translation-update-nb-11.2-1.44.1 translation-update-nl-11.2-1.44.1 translation-update-pl-11.2-1.44.1 translation-update-pt-11.2-1.44.1 translation-update-pt_BR-11.2-1.44.1 translation-update-ru-11.2-1.44.1 translation-update-sv-11.2-1.44.1 translation-update-zh_CN-11.2-1.44.1 translation-update-zh_TW-11.2-1.44.1 - SUSE Linux Enterprise Server 11 SP2 (noarch) [New Version: 11.2]: translation-update-11.2-1.44.1 translation-update-ar-11.2-1.44.1 translation-update-cs-11.2-1.44.1 translation-update-da-11.2-1.44.1 translation-update-de-11.2-1.44.1 translation-update-es-11.2-1.44.1 translation-update-fi-11.2-1.44.1 translation-update-fr-11.2-1.44.1 translation-update-hu-11.2-1.44.1 translation-update-it-11.2-1.44.1 translation-update-ja-11.2-1.44.1 translation-update-ko-11.2-1.44.1 translation-update-nb-11.2-1.44.1 translation-update-nl-11.2-1.44.1 translation-update-pl-11.2-1.44.1 translation-update-pt-11.2-1.44.1 translation-update-pt_BR-11.2-1.44.1 translation-update-ru-11.2-1.44.1 translation-update-sv-11.2-1.44.1 translation-update-zh_CN-11.2-1.44.1 translation-update-zh_TW-11.2-1.44.1 - SUSE Linux Enterprise Desktop 11 SP2 (noarch) [New Version: 11.2]: translation-update-11.2-1.44.1 translation-update-ar-11.2-1.44.1 translation-update-cs-11.2-1.44.1 translation-update-da-11.2-1.44.1 translation-update-de-11.2-1.44.1 translation-update-es-11.2-1.44.1 translation-update-fi-11.2-1.44.1 translation-update-fr-11.2-1.44.1 translation-update-hu-11.2-1.44.1 translation-update-it-11.2-1.44.1 translation-update-ja-11.2-1.44.1 translation-update-ko-11.2-1.44.1 translation-update-nb-11.2-1.44.1 translation-update-nl-11.2-1.44.1 translation-update-pl-11.2-1.44.1 translation-update-pt-11.2-1.44.1 translation-update-pt_BR-11.2-1.44.1 translation-update-ru-11.2-1.44.1 translation-update-sv-11.2-1.44.1 translation-update-zh_CN-11.2-1.44.1 translation-update-zh_TW-11.2-1.44.1 References: https://bugzilla.novell.com/721352 https://bugzilla.novell.com/741214 http://download.novell.com/patch/finder/?keywords=ee307f933c99eb7441913361ead203bb From sle-updates at lists.suse.com Thu Jul 26 06:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 26 Jul 2012 14:08:30 +0200 (CEST) Subject: SUSE-RU-2012:0916-1: moderate: Recommended update for LibreOffice Message-ID: <20120726120830.1214132889@maintenance.suse.de> SUSE Recommended Update: Recommended update for LibreOffice ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0916-1 Rating: moderate References: #325936 #717947 #719997 #722644 #745873 #745930 #747461 #749960 #750255 #750258 #750838 #751028 #751077 #751573 #753458 #757118 #757419 #757609 #757651 #757840 #757844 #757885 #757905 #757910 #758575 #758883 #758914 #759178 #759212 #759982 #760029 #760294 #760764 #760997 #760999 #762542 #763168 #764005 #765942 #765998 #766477 #766481 #766487 #767452 #769162 #769593 #769793 #770013 Affected Products: SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has 47 fixes is now available. It includes one version update. Description: This update to LibreOffice 3.5.4.7 provides many stability fixes and corrections as well as the following noteworthy enhancements: General: * support Java 7 (1.7) * produce ODF 1.2 conforming documents by default * more secure encryption algorithm (AES-256) for password protection Core GUI changes: * better color picker * transparent object handles * better handle unused toolbar menus * move context-sensitive toolbars to the bottom * several GTK+ right-to-left interface glitches * menus list their entries in a natural sort order * "Link" checkbox in "Insert Movie and Sound" dialog * filter bundled, shared, and user extensions in the manager dialog Writer: * RTF import rewrite * new numbering types * grammar checking improvements * better page breaks indicators * TOC use hyperlinks by default * various DOCX import improvements * support comments DOCX export/import * label printing positioning (fdo#36874) * display bitmap image resolution in PPI * numbering in DOC, DOCX, and RTF import * better UI for Header and Footers handling * Basic Fonts (Western) option page removed * handling of tab stop behind the end margin * new typographic features by improved Graphite port * display non-printable characters on the end of line * modeless word count dialog; being updated when typing * corrected autotext "Formula numbering" for most locales Calc: * more new line ends * supports 10000 sheets * new multiline input bar * additional data point markers * updated line chart's smoothing * re-designed all range name dialogs * re-designed Autofilter popup window * improved performance of ODS/XLS/XLSX import * improved performance of many sheet operations * better handling DDE and external links failures * unlimited number of rules for conditional formatting * configurable initial number of sheets in new documents * "Protect Sheet" also from the context menu of the sheet tab * allow pasting a single cell range to multiple destination ranges * new Calc Functions: BITAND, BITOR, BITXOR BITRSHIFT, BITLSHIFT, SEC, CSC, SECH, and CSCH Impress: * elliptical arcs in path * better hidden slides PDF export * better Smart Art in PPTX import * MS Visio documents import/export * better handling of custom animation list * start Impress without the wizard by default * better custom shapes and their presets in PPTX import * support embedding palettes and other property list types Math: * new "does not exist" symbol * new symbols for Games theory * support math formulas in DOCX import/export Base: * lots fixes * integrated PostgreSQL native driver Basic IDE: * new menu item View->Goto Line * new menu item View->Line Numbers * dialog controls have a spinbutton Presenter console extension: * "Exchange Screen Images" button to work around problems with detecting projector and laptop screen Python scripting: * allow to initialize UNO structures by name instead of by position Localization: * update translations * better date handling Package List: - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 3.5.4.7]: libreoffice-3.5.4.7-0.7.1 libreoffice-af-3.5.4.7-0.7.1 libreoffice-ar-3.5.4.7-0.7.1 libreoffice-ca-3.5.4.7-0.7.1 libreoffice-cs-3.5.4.7-0.7.1 libreoffice-da-3.5.4.7-0.7.1 libreoffice-de-3.5.4.7-0.7.1 libreoffice-el-3.5.4.7-0.7.1 libreoffice-en-GB-3.5.4.7-0.7.1 libreoffice-es-3.5.4.7-0.7.1 libreoffice-fi-3.5.4.7-0.7.1 libreoffice-fr-3.5.4.7-0.7.1 libreoffice-galleries-3.5.4.7-0.7.1 libreoffice-gnome-3.5.4.7-0.7.1 libreoffice-gu-IN-3.5.4.7-0.7.1 libreoffice-hi-IN-3.5.4.7-0.7.1 libreoffice-hu-3.5.4.7-0.7.1 libreoffice-it-3.5.4.7-0.7.1 libreoffice-ja-3.5.4.7-0.7.1 libreoffice-kde-3.5.4.7-0.7.1 libreoffice-ko-3.5.4.7-0.7.1 libreoffice-mono-3.5.4.7-0.7.1 libreoffice-nb-3.5.4.7-0.7.1 libreoffice-nl-3.5.4.7-0.7.1 libreoffice-nn-3.5.4.7-0.7.1 libreoffice-pl-3.5.4.7-0.7.1 libreoffice-pt-BR-3.5.4.7-0.7.1 libreoffice-ru-3.5.4.7-0.7.1 libreoffice-sk-3.5.4.7-0.7.1 libreoffice-sv-3.5.4.7-0.7.1 libreoffice-xh-3.5.4.7-0.7.1 libreoffice-zh-CN-3.5.4.7-0.7.1 libreoffice-zh-TW-3.5.4.7-0.7.1 libreoffice-zu-3.5.4.7-0.7.1 - SLE SDK 10 SP4 (i586) [New Version: 3.5.4.7]: libreoffice-3.5.4.7-0.7.1 libreoffice-cs-3.5.4.7-0.7.1 libreoffice-de-3.5.4.7-0.7.1 libreoffice-es-3.5.4.7-0.7.1 libreoffice-fr-3.5.4.7-0.7.1 libreoffice-galleries-3.5.4.7-0.7.1 libreoffice-gnome-3.5.4.7-0.7.1 libreoffice-hu-3.5.4.7-0.7.1 libreoffice-it-3.5.4.7-0.7.1 libreoffice-ja-3.5.4.7-0.7.1 libreoffice-kde-3.5.4.7-0.7.1 libreoffice-mono-3.5.4.7-0.7.1 libreoffice-pl-3.5.4.7-0.7.1 libreoffice-pt-BR-3.5.4.7-0.7.1 libreoffice-sk-3.5.4.7-0.7.1 libreoffice-zh-CN-3.5.4.7-0.7.1 libreoffice-zh-TW-3.5.4.7-0.7.1 References: http://support.novell.com/security/cve/CVE-2012-2665.html https://bugzilla.novell.com/325936 https://bugzilla.novell.com/717947 https://bugzilla.novell.com/719997 https://bugzilla.novell.com/722644 https://bugzilla.novell.com/745873 https://bugzilla.novell.com/745930 https://bugzilla.novell.com/747461 https://bugzilla.novell.com/749960 https://bugzilla.novell.com/750255 https://bugzilla.novell.com/750258 https://bugzilla.novell.com/750838 https://bugzilla.novell.com/751028 https://bugzilla.novell.com/751077 https://bugzilla.novell.com/751573 https://bugzilla.novell.com/753458 https://bugzilla.novell.com/757118 https://bugzilla.novell.com/757419 https://bugzilla.novell.com/757609 https://bugzilla.novell.com/757651 https://bugzilla.novell.com/757840 https://bugzilla.novell.com/757844 https://bugzilla.novell.com/757885 https://bugzilla.novell.com/757905 https://bugzilla.novell.com/757910 https://bugzilla.novell.com/758575 https://bugzilla.novell.com/758883 https://bugzilla.novell.com/758914 https://bugzilla.novell.com/759178 https://bugzilla.novell.com/759212 https://bugzilla.novell.com/759982 https://bugzilla.novell.com/760029 https://bugzilla.novell.com/760294 https://bugzilla.novell.com/760764 https://bugzilla.novell.com/760997 https://bugzilla.novell.com/760999 https://bugzilla.novell.com/762542 https://bugzilla.novell.com/763168 https://bugzilla.novell.com/764005 https://bugzilla.novell.com/765942 https://bugzilla.novell.com/765998 https://bugzilla.novell.com/766477 https://bugzilla.novell.com/766481 https://bugzilla.novell.com/766487 https://bugzilla.novell.com/767452 https://bugzilla.novell.com/769162 https://bugzilla.novell.com/769593 https://bugzilla.novell.com/769793 https://bugzilla.novell.com/770013 http://download.novell.com/patch/finder/?keywords=959bec0aafc9124aee7f95faeb6d3285 From sle-updates at lists.suse.com Sun Jul 29 17:08:26 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 30 Jul 2012 01:08:26 +0200 (CEST) Subject: SUSE-SU-2012:0919-1: moderate: Security update for libtiff Message-ID: <20120729230826.E9D3832887@maintenance.suse.de> SUSE Security Update: Security update for libtiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0919-1 Rating: moderate References: #770816 Cross-References: CVE-2012-3401 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update of tiff fixes a heap-based buffer overflow that could have caused a crash or potentially allowed attackers to execute arbitrary code (CVE-2012-3401). Security Issue reference: * CVE-2012-3401 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libtiff-devel-6579 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libtiff-devel-6579 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libtiff-devel-6579 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libtiff-devel-6579 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libtiff-devel-6579 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libtiff-devel-6579 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libtiff-devel-6579 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.148.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.148.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.148.1 tiff-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libtiff3-x86-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libtiff3-3.8.2-141.148.1 tiff-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libtiff3-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.148.1 tiff-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libtiff3-x86-3.8.2-141.148.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-3.8.2-5.30.5 libtiff-devel-3.8.2-5.30.5 tiff-3.8.2-5.30.5 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libtiff-32bit-3.8.2-5.30.5 libtiff-devel-32bit-3.8.2-5.30.5 - SUSE Linux Enterprise Server 10 SP4 (ia64): libtiff-x86-3.8.2-5.30.5 - SUSE Linux Enterprise Server 10 SP4 (ppc): libtiff-64bit-3.8.2-5.30.5 libtiff-devel-64bit-3.8.2-5.30.5 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libtiff3-3.8.2-141.148.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libtiff3-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libtiff3-3.8.2-141.148.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libtiff3-32bit-3.8.2-141.148.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libtiff-3.8.2-5.30.5 libtiff-devel-3.8.2-5.30.5 tiff-3.8.2-5.30.5 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libtiff-32bit-3.8.2-5.30.5 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-devel-3.8.2-5.30.5 - SLE SDK 10 SP4 (s390x x86_64): libtiff-devel-32bit-3.8.2-5.30.5 - SLE SDK 10 SP4 (ppc): libtiff-devel-64bit-3.8.2-5.30.5 References: http://support.novell.com/security/cve/CVE-2012-3401.html https://bugzilla.novell.com/770816 http://download.novell.com/patch/finder/?keywords=a78f353752b21e600db9a8b58dd10c52 http://download.novell.com/patch/finder/?keywords=f8b83ed2a49634464cd29a53ef0fb20a From sle-updates at lists.suse.com Sun Jul 29 19:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 30 Jul 2012 03:08:17 +0200 (CEST) Subject: SUSE-RU-2012:0920-1: important: Recommended update for timezone Message-ID: <20120730010817.3FD8A32889@maintenance.suse.de> SUSE Recommended Update: Recommended update for timezone ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0920-1 Rating: important References: #771369 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides 2012d which includes the following important changes: * Morocco DST is interrupted during Ramadan 2012 (July 20th- August 19th) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-timezone-2012d-6589 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-timezone-2012d-6589 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-timezone-2012d-6589 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-timezone-2012d-6589 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-timezone-2012d-6589 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-timezone-2012d-6589 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-timezone-2012d-6589 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2012d]: timezone-2012d-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2012d]: timezone-2012d-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2012d]: timezone-2012d-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2012d]: timezone-2012d-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2012d]: timezone-2012d-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (noarch) [New Version: 2012d]: timezone-java-2012d-0.3.1 References: https://bugzilla.novell.com/771369 http://download.novell.com/patch/finder/?keywords=3c32d4cbd8fb6ed6342ae7861dd7f680 From sle-updates at lists.suse.com Sun Jul 29 20:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 30 Jul 2012 04:08:15 +0200 (CEST) Subject: SUSE-RU-2012:0921-1: moderate: Recommended update for LibreOffice Message-ID: <20120730020815.9412732889@maintenance.suse.de> SUSE Recommended Update: Recommended update for LibreOffice ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0921-1 Rating: moderate References: #325936 #551003 #652364 #693238 #703032 #706138 #714787 #717947 #719989 #719997 #745873 #745930 #747461 #747471 #749960 #750255 #750258 #750838 #751028 #751077 #751573 #753458 #757118 #757419 #757609 #757651 #757840 #757844 #757885 #757905 #757910 #758575 #758883 #758914 #759178 #759212 #759982 #760029 #760294 #760764 #760997 #760999 #762542 #763168 #764005 #765942 #765998 #766477 #766481 #766487 #767452 #769162 #769593 #769793 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has 54 recommended fixes can now be installed. It includes one version update. Description: This update to LibreOffice 3.5.4.7 provides many stability fixes and corrections as well as the following noteworthy enhancements: General: * support Java 7 (1.7) * produce ODF 1.2 conforming documents by default * more secure encryption algorithm (AES-256) for password protection Core GUI changes: * better color picker * transparent object handles * better handle unused toolbar menus * move context-sensitive toolbars to the bottom * several GTK+ right-to-left interface glitches * menus list their entries in a natural sort order * "Link" checkbox in "Insert Movie and Sound" dialog * filter bundled, shared, and user extensions in the manager dialog Writer: * RTF import rewrite * new numbering types * grammar checking improvements * better page breaks indicators * TOC use hyperlinks by default * various DOCX import improvements * support comments DOCX export/import * label printing positioning (fdo#36874) * display bitmap image resolution in PPI * numbering in DOC, DOCX, and RTF import * better UI for Header and Footers handling * Basic Fonts (Western) option page removed * handling of tab stop behind the end margin * new typographic features by improved Graphite port * display non-printable characters on the end of line * modeless word count dialog; being updated when typing * corrected autotext "Formula numbering" for most locales Calc: * more new line ends * supports 10000 sheets * new multiline input bar * additional data point markers * updated line chart's smoothing * re-designed all range name dialogs * re-designed Autofilter popup window * improved performance of ODS/XLS/XLSX import * improved performance of many sheet operations * better handling DDE and external links failures * unlimited number of rules for conditional formatting * configurable initial number of sheets in new documents * "Protect Sheet" also from the context menu of the sheet tab * allow pasting a single cell range to multiple destination ranges * new Calc Functions: BITAND, BITOR, BITXOR BITRSHIFT, BITLSHIFT, SEC, CSC, SECH, and CSCH Impress: * elliptical arcs in path * better hidden slides PDF export * better Smart Art in PPTX import * MS Visio documents import/export * better handling of custom animation list * start Impress without the wizard by default * better custom shapes and their presets in PPTX import * support embedding palettes and other property list types Math: * new "does not exist" symbol * new symbols for Games theory * support math formulas in DOCX import/export Base: * lots fixes * integrated PostgreSQL native driver Basic IDE: * new menu item View->Goto Line * new menu item View->Line Numbers * dialog controls have a spinbutton Presenter console extension: * "Exchange Screen Images" button to work around problems with detecting projector and laptop screen Python scripting: * allow to initialize UNO structures by name instead of by position Localization: * update translations * better date handling Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libreoffice-354-6558 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libreoffice-354-6558 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libreoffice-354-6558 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libreoffice-354-6558 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64) [New Version: 3.5.4.7]: libreoffice-3.5.4.7-0.3.1 libreoffice-base-3.5.4.7-0.3.1 libreoffice-base-drivers-postgresql-3.5.4.7-0.3.1 libreoffice-base-extensions-3.5.4.7-0.3.1 libreoffice-calc-3.5.4.7-0.3.1 libreoffice-calc-extensions-3.5.4.7-0.3.1 libreoffice-draw-3.5.4.7-0.3.1 libreoffice-draw-extensions-3.5.4.7-0.3.1 libreoffice-filters-optional-3.5.4.7-0.3.1 libreoffice-gnome-3.5.4.7-0.3.1 libreoffice-impress-3.5.4.7-0.3.1 libreoffice-impress-extensions-3.5.4.7-0.3.1 libreoffice-kde-3.5.4.7-0.3.1 libreoffice-kde4-3.5.4.7-0.3.1 libreoffice-l10n-prebuilt-3.5.4.7-0.3.1 libreoffice-mailmerge-3.5.4.7-0.3.1 libreoffice-math-3.5.4.7-0.3.1 libreoffice-mono-3.5.4.7-0.3.1 libreoffice-officebean-3.5.4.7-0.3.1 libreoffice-pyuno-3.5.4.7-0.3.1 libreoffice-sdk-3.5.4.7-0.3.1 libreoffice-writer-3.5.4.7-0.3.1 libreoffice-writer-extensions-3.5.4.7-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (noarch) [New Version: 3.5.4.7]: libreoffice-branding-upstream-3.5.4.7-0.3.1 libreoffice-help-cs-3.5.4.7-0.3.1 libreoffice-help-da-3.5.4.7-0.3.1 libreoffice-help-de-3.5.4.7-0.3.1 libreoffice-help-en-GB-3.5.4.7-0.3.1 libreoffice-help-en-US-3.5.4.7-0.3.1 libreoffice-help-es-3.5.4.7-0.3.1 libreoffice-help-fr-3.5.4.7-0.3.1 libreoffice-help-gu-IN-3.5.4.7-0.3.1 libreoffice-help-hi-IN-3.5.4.7-0.3.1 libreoffice-help-hu-3.5.4.7-0.3.1 libreoffice-help-it-3.5.4.7-0.3.1 libreoffice-help-ja-3.5.4.7-0.3.1 libreoffice-help-ko-3.5.4.7-0.3.1 libreoffice-help-nl-3.5.4.7-0.3.1 libreoffice-help-pl-3.5.4.7-0.3.1 libreoffice-help-pt-3.5.4.7-0.3.1 libreoffice-help-pt-BR-3.5.4.7-0.3.1 libreoffice-help-ru-3.5.4.7-0.3.1 libreoffice-help-sv-3.5.4.7-0.3.1 libreoffice-help-zh-CN-3.5.4.7-0.3.1 libreoffice-help-zh-TW-3.5.4.7-0.3.1 libreoffice-icon-themes-3.5.4.7-0.3.1 libreoffice-l10n-af-3.5.4.7-0.3.1 libreoffice-l10n-ar-3.5.4.7-0.3.1 libreoffice-l10n-ca-3.5.4.7-0.3.1 libreoffice-l10n-cs-3.5.4.7-0.3.1 libreoffice-l10n-da-3.5.4.7-0.3.1 libreoffice-l10n-de-3.5.4.7-0.3.1 libreoffice-l10n-el-3.5.4.7-0.3.1 libreoffice-l10n-en-GB-3.5.4.7-0.3.1 libreoffice-l10n-es-3.5.4.7-0.3.1 libreoffice-l10n-fi-3.5.4.7-0.3.1 libreoffice-l10n-fr-3.5.4.7-0.3.1 libreoffice-l10n-gu-IN-3.5.4.7-0.3.1 libreoffice-l10n-hi-IN-3.5.4.7-0.3.1 libreoffice-l10n-hu-3.5.4.7-0.3.1 libreoffice-l10n-it-3.5.4.7-0.3.1 libreoffice-l10n-ja-3.5.4.7-0.3.1 libreoffice-l10n-ko-3.5.4.7-0.3.1 libreoffice-l10n-nb-3.5.4.7-0.3.1 libreoffice-l10n-nl-3.5.4.7-0.3.1 libreoffice-l10n-nn-3.5.4.7-0.3.1 libreoffice-l10n-pl-3.5.4.7-0.3.1 libreoffice-l10n-pt-3.5.4.7-0.3.1 libreoffice-l10n-pt-BR-3.5.4.7-0.3.1 libreoffice-l10n-ru-3.5.4.7-0.3.1 libreoffice-l10n-sk-3.5.4.7-0.3.1 libreoffice-l10n-sv-3.5.4.7-0.3.1 libreoffice-l10n-xh-3.5.4.7-0.3.1 libreoffice-l10n-zh-CN-3.5.4.7-0.3.1 libreoffice-l10n-zh-TW-3.5.4.7-0.3.1 libreoffice-l10n-zu-3.5.4.7-0.3.1 libreoffice-languagetool-1.4-2.7.1 libreoffice-languagetool-de-1.4-2.7.1 libreoffice-languagetool-en-1.4-2.7.1 libreoffice-languagetool-es-1.4-2.7.1 libreoffice-languagetool-fr-1.4-2.7.1 libreoffice-languagetool-it-1.4-2.7.1 libreoffice-languagetool-nl-1.4-2.7.1 libreoffice-languagetool-pl-1.4-2.7.1 libreoffice-languagetool-sv-1.4-2.7.1 libreoffice-openclipart-3.5-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64) [New Version: 3.5.4.7]: libreoffice-3.5.4.7-0.3.1 libreoffice-base-3.5.4.7-0.3.1 libreoffice-base-drivers-postgresql-3.5.4.7-0.3.1 libreoffice-base-extensions-3.5.4.7-0.3.1 libreoffice-calc-3.5.4.7-0.3.1 libreoffice-calc-extensions-3.5.4.7-0.3.1 libreoffice-draw-3.5.4.7-0.3.1 libreoffice-draw-extensions-3.5.4.7-0.3.1 libreoffice-filters-optional-3.5.4.7-0.3.1 libreoffice-gnome-3.5.4.7-0.3.1 libreoffice-impress-3.5.4.7-0.3.1 libreoffice-impress-extensions-3.5.4.7-0.3.1 libreoffice-kde-3.5.4.7-0.3.1 libreoffice-kde4-3.5.4.7-0.3.1 libreoffice-l10n-prebuilt-3.5.4.7-0.3.1 libreoffice-mailmerge-3.5.4.7-0.3.1 libreoffice-math-3.5.4.7-0.3.1 libreoffice-mono-3.5.4.7-0.3.1 libreoffice-officebean-3.5.4.7-0.3.1 libreoffice-pyuno-3.5.4.7-0.3.1 libreoffice-sdk-3.5.4.7-0.3.1 libreoffice-writer-3.5.4.7-0.3.1 libreoffice-writer-extensions-3.5.4.7-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (noarch) [New Version: 3.5.4.7]: libreoffice-branding-upstream-3.5.4.7-0.3.1 libreoffice-help-cs-3.5.4.7-0.3.1 libreoffice-help-da-3.5.4.7-0.3.1 libreoffice-help-de-3.5.4.7-0.3.1 libreoffice-help-en-GB-3.5.4.7-0.3.1 libreoffice-help-en-US-3.5.4.7-0.3.1 libreoffice-help-es-3.5.4.7-0.3.1 libreoffice-help-fr-3.5.4.7-0.3.1 libreoffice-help-gu-IN-3.5.4.7-0.3.1 libreoffice-help-hi-IN-3.5.4.7-0.3.1 libreoffice-help-hu-3.5.4.7-0.3.1 libreoffice-help-it-3.5.4.7-0.3.1 libreoffice-help-ja-3.5.4.7-0.3.1 libreoffice-help-ko-3.5.4.7-0.3.1 libreoffice-help-nl-3.5.4.7-0.3.1 libreoffice-help-pl-3.5.4.7-0.3.1 libreoffice-help-pt-3.5.4.7-0.3.1 libreoffice-help-pt-BR-3.5.4.7-0.3.1 libreoffice-help-ru-3.5.4.7-0.3.1 libreoffice-help-sv-3.5.4.7-0.3.1 libreoffice-help-zh-CN-3.5.4.7-0.3.1 libreoffice-help-zh-TW-3.5.4.7-0.3.1 libreoffice-icon-themes-3.5.4.7-0.3.1 libreoffice-l10n-af-3.5.4.7-0.3.1 libreoffice-l10n-ar-3.5.4.7-0.3.1 libreoffice-l10n-ca-3.5.4.7-0.3.1 libreoffice-l10n-cs-3.5.4.7-0.3.1 libreoffice-l10n-da-3.5.4.7-0.3.1 libreoffice-l10n-de-3.5.4.7-0.3.1 libreoffice-l10n-el-3.5.4.7-0.3.1 libreoffice-l10n-en-GB-3.5.4.7-0.3.1 libreoffice-l10n-es-3.5.4.7-0.3.1 libreoffice-l10n-fi-3.5.4.7-0.3.1 libreoffice-l10n-fr-3.5.4.7-0.3.1 libreoffice-l10n-gu-IN-3.5.4.7-0.3.1 libreoffice-l10n-hi-IN-3.5.4.7-0.3.1 libreoffice-l10n-hu-3.5.4.7-0.3.1 libreoffice-l10n-it-3.5.4.7-0.3.1 libreoffice-l10n-ja-3.5.4.7-0.3.1 libreoffice-l10n-ko-3.5.4.7-0.3.1 libreoffice-l10n-nb-3.5.4.7-0.3.1 libreoffice-l10n-nl-3.5.4.7-0.3.1 libreoffice-l10n-nn-3.5.4.7-0.3.1 libreoffice-l10n-pl-3.5.4.7-0.3.1 libreoffice-l10n-pt-3.5.4.7-0.3.1 libreoffice-l10n-pt-BR-3.5.4.7-0.3.1 libreoffice-l10n-ru-3.5.4.7-0.3.1 libreoffice-l10n-sk-3.5.4.7-0.3.1 libreoffice-l10n-sv-3.5.4.7-0.3.1 libreoffice-l10n-xh-3.5.4.7-0.3.1 libreoffice-l10n-zh-CN-3.5.4.7-0.3.1 libreoffice-l10n-zh-TW-3.5.4.7-0.3.1 libreoffice-l10n-zu-3.5.4.7-0.3.1 libreoffice-languagetool-1.4-2.7.1 libreoffice-languagetool-de-1.4-2.7.1 libreoffice-languagetool-en-1.4-2.7.1 libreoffice-languagetool-es-1.4-2.7.1 libreoffice-languagetool-fr-1.4-2.7.1 libreoffice-languagetool-it-1.4-2.7.1 libreoffice-languagetool-nl-1.4-2.7.1 libreoffice-languagetool-pl-1.4-2.7.1 libreoffice-languagetool-sv-1.4-2.7.1 libreoffice-openclipart-3.5-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 3.5.4.7]: libreoffice-3.5.4.7-0.3.1 libreoffice-base-3.5.4.7-0.3.1 libreoffice-base-drivers-postgresql-3.5.4.7-0.3.1 libreoffice-base-extensions-3.5.4.7-0.3.1 libreoffice-calc-3.5.4.7-0.3.1 libreoffice-calc-extensions-3.5.4.7-0.3.1 libreoffice-draw-3.5.4.7-0.3.1 libreoffice-draw-extensions-3.5.4.7-0.3.1 libreoffice-filters-optional-3.5.4.7-0.3.1 libreoffice-gnome-3.5.4.7-0.3.1 libreoffice-impress-3.5.4.7-0.3.1 libreoffice-impress-extensions-3.5.4.7-0.3.1 libreoffice-kde-3.5.4.7-0.3.1 libreoffice-kde4-3.5.4.7-0.3.1 libreoffice-mailmerge-3.5.4.7-0.3.1 libreoffice-math-3.5.4.7-0.3.1 libreoffice-mono-3.5.4.7-0.3.1 libreoffice-officebean-3.5.4.7-0.3.1 libreoffice-pyuno-3.5.4.7-0.3.1 libreoffice-writer-3.5.4.7-0.3.1 libreoffice-writer-extensions-3.5.4.7-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (noarch) [New Version: 3.5.4.7]: libreoffice-help-cs-3.5.4.7-0.3.1 libreoffice-help-da-3.5.4.7-0.3.1 libreoffice-help-de-3.5.4.7-0.3.1 libreoffice-help-en-GB-3.5.4.7-0.3.1 libreoffice-help-en-US-3.5.4.7-0.3.1 libreoffice-help-es-3.5.4.7-0.3.1 libreoffice-help-fr-3.5.4.7-0.3.1 libreoffice-help-gu-IN-3.5.4.7-0.3.1 libreoffice-help-hi-IN-3.5.4.7-0.3.1 libreoffice-help-hu-3.5.4.7-0.3.1 libreoffice-help-it-3.5.4.7-0.3.1 libreoffice-help-ja-3.5.4.7-0.3.1 libreoffice-help-ko-3.5.4.7-0.3.1 libreoffice-help-nl-3.5.4.7-0.3.1 libreoffice-help-pl-3.5.4.7-0.3.1 libreoffice-help-pt-3.5.4.7-0.3.1 libreoffice-help-pt-BR-3.5.4.7-0.3.1 libreoffice-help-ru-3.5.4.7-0.3.1 libreoffice-help-sv-3.5.4.7-0.3.1 libreoffice-help-zh-CN-3.5.4.7-0.3.1 libreoffice-help-zh-TW-3.5.4.7-0.3.1 libreoffice-icon-themes-3.5.4.7-0.3.1 libreoffice-l10n-af-3.5.4.7-0.3.1 libreoffice-l10n-ar-3.5.4.7-0.3.1 libreoffice-l10n-ca-3.5.4.7-0.3.1 libreoffice-l10n-cs-3.5.4.7-0.3.1 libreoffice-l10n-da-3.5.4.7-0.3.1 libreoffice-l10n-de-3.5.4.7-0.3.1 libreoffice-l10n-en-GB-3.5.4.7-0.3.1 libreoffice-l10n-es-3.5.4.7-0.3.1 libreoffice-l10n-fi-3.5.4.7-0.3.1 libreoffice-l10n-fr-3.5.4.7-0.3.1 libreoffice-l10n-gu-IN-3.5.4.7-0.3.1 libreoffice-l10n-hi-IN-3.5.4.7-0.3.1 libreoffice-l10n-hu-3.5.4.7-0.3.1 libreoffice-l10n-it-3.5.4.7-0.3.1 libreoffice-l10n-ja-3.5.4.7-0.3.1 libreoffice-l10n-ko-3.5.4.7-0.3.1 libreoffice-l10n-nb-3.5.4.7-0.3.1 libreoffice-l10n-nl-3.5.4.7-0.3.1 libreoffice-l10n-nn-3.5.4.7-0.3.1 libreoffice-l10n-pl-3.5.4.7-0.3.1 libreoffice-l10n-pt-3.5.4.7-0.3.1 libreoffice-l10n-pt-BR-3.5.4.7-0.3.1 libreoffice-l10n-ru-3.5.4.7-0.3.1 libreoffice-l10n-sk-3.5.4.7-0.3.1 libreoffice-l10n-sv-3.5.4.7-0.3.1 libreoffice-l10n-xh-3.5.4.7-0.3.1 libreoffice-l10n-zh-CN-3.5.4.7-0.3.1 libreoffice-l10n-zh-TW-3.5.4.7-0.3.1 libreoffice-l10n-zu-3.5.4.7-0.3.1 libreoffice-languagetool-1.4-2.7.1 libreoffice-languagetool-de-1.4-2.7.1 libreoffice-languagetool-en-1.4-2.7.1 libreoffice-languagetool-es-1.4-2.7.1 libreoffice-languagetool-fr-1.4-2.7.1 libreoffice-languagetool-it-1.4-2.7.1 libreoffice-languagetool-nl-1.4-2.7.1 libreoffice-languagetool-pl-1.4-2.7.1 libreoffice-languagetool-sv-1.4-2.7.1 libreoffice-openclipart-3.5-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 3.5.4.7]: libreoffice-3.5.4.7-0.3.1 libreoffice-base-3.5.4.7-0.3.1 libreoffice-base-drivers-postgresql-3.5.4.7-0.3.1 libreoffice-base-extensions-3.5.4.7-0.3.1 libreoffice-calc-3.5.4.7-0.3.1 libreoffice-calc-extensions-3.5.4.7-0.3.1 libreoffice-draw-3.5.4.7-0.3.1 libreoffice-draw-extensions-3.5.4.7-0.3.1 libreoffice-filters-optional-3.5.4.7-0.3.1 libreoffice-gnome-3.5.4.7-0.3.1 libreoffice-impress-3.5.4.7-0.3.1 libreoffice-impress-extensions-3.5.4.7-0.3.1 libreoffice-kde-3.5.4.7-0.3.1 libreoffice-kde4-3.5.4.7-0.3.1 libreoffice-mailmerge-3.5.4.7-0.3.1 libreoffice-math-3.5.4.7-0.3.1 libreoffice-mono-3.5.4.7-0.3.1 libreoffice-officebean-3.5.4.7-0.3.1 libreoffice-pyuno-3.5.4.7-0.3.1 libreoffice-writer-3.5.4.7-0.3.1 libreoffice-writer-extensions-3.5.4.7-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (noarch) [New Version: 3.5.4.7]: libreoffice-help-cs-3.5.4.7-0.3.1 libreoffice-help-da-3.5.4.7-0.3.1 libreoffice-help-de-3.5.4.7-0.3.1 libreoffice-help-en-GB-3.5.4.7-0.3.1 libreoffice-help-en-US-3.5.4.7-0.3.1 libreoffice-help-es-3.5.4.7-0.3.1 libreoffice-help-fr-3.5.4.7-0.3.1 libreoffice-help-gu-IN-3.5.4.7-0.3.1 libreoffice-help-hi-IN-3.5.4.7-0.3.1 libreoffice-help-hu-3.5.4.7-0.3.1 libreoffice-help-it-3.5.4.7-0.3.1 libreoffice-help-ja-3.5.4.7-0.3.1 libreoffice-help-ko-3.5.4.7-0.3.1 libreoffice-help-nl-3.5.4.7-0.3.1 libreoffice-help-pl-3.5.4.7-0.3.1 libreoffice-help-pt-3.5.4.7-0.3.1 libreoffice-help-pt-BR-3.5.4.7-0.3.1 libreoffice-help-ru-3.5.4.7-0.3.1 libreoffice-help-sv-3.5.4.7-0.3.1 libreoffice-help-zh-CN-3.5.4.7-0.3.1 libreoffice-help-zh-TW-3.5.4.7-0.3.1 libreoffice-icon-themes-3.5.4.7-0.3.1 libreoffice-l10n-af-3.5.4.7-0.3.1 libreoffice-l10n-ar-3.5.4.7-0.3.1 libreoffice-l10n-ca-3.5.4.7-0.3.1 libreoffice-l10n-cs-3.5.4.7-0.3.1 libreoffice-l10n-da-3.5.4.7-0.3.1 libreoffice-l10n-de-3.5.4.7-0.3.1 libreoffice-l10n-en-GB-3.5.4.7-0.3.1 libreoffice-l10n-es-3.5.4.7-0.3.1 libreoffice-l10n-fi-3.5.4.7-0.3.1 libreoffice-l10n-fr-3.5.4.7-0.3.1 libreoffice-l10n-gu-IN-3.5.4.7-0.3.1 libreoffice-l10n-hi-IN-3.5.4.7-0.3.1 libreoffice-l10n-hu-3.5.4.7-0.3.1 libreoffice-l10n-it-3.5.4.7-0.3.1 libreoffice-l10n-ja-3.5.4.7-0.3.1 libreoffice-l10n-ko-3.5.4.7-0.3.1 libreoffice-l10n-nb-3.5.4.7-0.3.1 libreoffice-l10n-nl-3.5.4.7-0.3.1 libreoffice-l10n-nn-3.5.4.7-0.3.1 libreoffice-l10n-pl-3.5.4.7-0.3.1 libreoffice-l10n-pt-3.5.4.7-0.3.1 libreoffice-l10n-pt-BR-3.5.4.7-0.3.1 libreoffice-l10n-ru-3.5.4.7-0.3.1 libreoffice-l10n-sk-3.5.4.7-0.3.1 libreoffice-l10n-sv-3.5.4.7-0.3.1 libreoffice-l10n-xh-3.5.4.7-0.3.1 libreoffice-l10n-zh-CN-3.5.4.7-0.3.1 libreoffice-l10n-zh-TW-3.5.4.7-0.3.1 libreoffice-l10n-zu-3.5.4.7-0.3.1 libreoffice-languagetool-1.4-2.7.1 libreoffice-languagetool-de-1.4-2.7.1 libreoffice-languagetool-en-1.4-2.7.1 libreoffice-languagetool-es-1.4-2.7.1 libreoffice-languagetool-fr-1.4-2.7.1 libreoffice-languagetool-it-1.4-2.7.1 libreoffice-languagetool-nl-1.4-2.7.1 libreoffice-languagetool-pl-1.4-2.7.1 libreoffice-languagetool-sv-1.4-2.7.1 libreoffice-openclipart-3.5-0.3.1 References: https://bugzilla.novell.com/325936 https://bugzilla.novell.com/551003 https://bugzilla.novell.com/652364 https://bugzilla.novell.com/693238 https://bugzilla.novell.com/703032 https://bugzilla.novell.com/706138 https://bugzilla.novell.com/714787 https://bugzilla.novell.com/717947 https://bugzilla.novell.com/719989 https://bugzilla.novell.com/719997 https://bugzilla.novell.com/745873 https://bugzilla.novell.com/745930 https://bugzilla.novell.com/747461 https://bugzilla.novell.com/747471 https://bugzilla.novell.com/749960 https://bugzilla.novell.com/750255 https://bugzilla.novell.com/750258 https://bugzilla.novell.com/750838 https://bugzilla.novell.com/751028 https://bugzilla.novell.com/751077 https://bugzilla.novell.com/751573 https://bugzilla.novell.com/753458 https://bugzilla.novell.com/757118 https://bugzilla.novell.com/757419 https://bugzilla.novell.com/757609 https://bugzilla.novell.com/757651 https://bugzilla.novell.com/757840 https://bugzilla.novell.com/757844 https://bugzilla.novell.com/757885 https://bugzilla.novell.com/757905 https://bugzilla.novell.com/757910 https://bugzilla.novell.com/758575 https://bugzilla.novell.com/758883 https://bugzilla.novell.com/758914 https://bugzilla.novell.com/759178 https://bugzilla.novell.com/759212 https://bugzilla.novell.com/759982 https://bugzilla.novell.com/760029 https://bugzilla.novell.com/760294 https://bugzilla.novell.com/760764 https://bugzilla.novell.com/760997 https://bugzilla.novell.com/760999 https://bugzilla.novell.com/762542 https://bugzilla.novell.com/763168 https://bugzilla.novell.com/764005 https://bugzilla.novell.com/765942 https://bugzilla.novell.com/765998 https://bugzilla.novell.com/766477 https://bugzilla.novell.com/766481 https://bugzilla.novell.com/766487 https://bugzilla.novell.com/767452 https://bugzilla.novell.com/769162 https://bugzilla.novell.com/769593 https://bugzilla.novell.com/769793 http://download.novell.com/patch/finder/?keywords=f539d8f13a7456295f28f69441b3d9d0 From sle-updates at lists.suse.com Mon Jul 30 12:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 30 Jul 2012 20:08:30 +0200 (CEST) Subject: SUSE-RU-2012:0926-1: Recommended update for yast2-ncurses Message-ID: <20120730180830.1D81C3288A@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-ncurses ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0926-1 Rating: low References: #605113 #724119 #737752 #758230 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has four recommended fixes can now be installed. It includes two new package versions. Description: This update to yast2-ncurses and yast2-ncurses-pkg enhances the NCurses text widget to interpret HTML elements inside "pre" tags, resolving the following issues: * Incorrect RichText tags behavior in ncurses (bnc #724119) * Don't display HTML tags in package licenses (bnc #605113, bnc #737752) * Don't display HTML tags in the Runlevel Editor info popup (bnc #758230). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-yast2-ncurses-6250 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-yast2-ncurses-6250 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-yast2-ncurses-6250 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-yast2-ncurses-6250 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.21]: yast2-ncurses-devel-2.17.21-0.5.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 2.17.20 and 2.17.21]: yast2-ncurses-2.17.21-0.5.1 yast2-ncurses-pkg-2.17.20-0.5.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.20 and 2.17.21]: yast2-ncurses-2.17.21-0.5.1 yast2-ncurses-pkg-2.17.20-0.5.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2.17.20 and 2.17.21]: yast2-ncurses-2.17.21-0.5.1 yast2-ncurses-pkg-2.17.20-0.5.1 References: https://bugzilla.novell.com/605113 https://bugzilla.novell.com/724119 https://bugzilla.novell.com/737752 https://bugzilla.novell.com/758230 http://download.novell.com/patch/finder/?keywords=8c89f49ef19bd90a3b08c28157e687c3 From sle-updates at lists.suse.com Mon Jul 30 17:08:20 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 31 Jul 2012 01:08:20 +0200 (CEST) Subject: SUSE-RU-2012:0926-2: Recommended update for yast2-ncurses Message-ID: <20120730230820.EC41232883@maintenance.suse.de> SUSE Recommended Update: Recommended update for yast2-ncurses ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0926-2 Rating: low References: #605113 #724119 #737752 #758230 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Point of Service 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has four recommended fixes can now be installed. It includes two new package versions. Description: This update to yast2-ncurses and yast2-ncurses-pkg enhances the NCurses text widget to interpret HTML elements inside "pre" tags, resolving the following issues: * Incorrect RichText tags behavior in ncurses (bnc #724119) * Don't display HTML tags in package licenses (bnc #605113, bnc #737752) * Don't display HTML tags in the Runlevel Editor info popup (bnc #758230). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-yast2-ncurses-6249 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-yast2-ncurses-6249 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-yast2-ncurses-6249 - SUSE Linux Enterprise Point of Service 11 SP1: zypper in -t patch sleposp1-yast2-ncurses-6249 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-yast2-ncurses-6249 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.18.2]: yast2-ncurses-devel-2.17.18.2-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.17.17.2 and 2.17.18.2]: yast2-ncurses-2.17.18.2-0.3.1 yast2-ncurses-pkg-2.17.17.2-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.17.17.2 and 2.17.18.2]: yast2-ncurses-2.17.18.2-0.3.1 yast2-ncurses-pkg-2.17.17.2-0.3.1 - SUSE Linux Enterprise Point of Service 11 SP1 (x86_64): yast2-ncurses-2.17.18.2-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.17.17.2 and 2.17.18.2]: yast2-ncurses-2.17.18.2-0.3.1 yast2-ncurses-pkg-2.17.17.2-0.3.1 References: https://bugzilla.novell.com/605113 https://bugzilla.novell.com/724119 https://bugzilla.novell.com/737752 https://bugzilla.novell.com/758230 http://download.novell.com/patch/finder/?keywords=c8969d5408dbeaa105e7ee13a4350442 From sle-updates at lists.suse.com Tue Jul 31 07:08:35 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 31 Jul 2012 15:08:35 +0200 (CEST) Subject: SUSE-SU-2012:0927-1: important: Security update for xrdp Message-ID: <20120731130835.B539232137@maintenance.suse.de> SUSE Security Update: Security update for xrdp ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0927-1 Rating: important References: #764044 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: The XRDP service was changed so that the default crypto level in XRDP was changed from "low" to "high". This switches from using a 40 bit encryption to a 128 bit two-way encryption. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-xrdp-6511 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-xrdp-6511 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-xrdp-6511 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): xrdp-0.4.1-28.19.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): xrdp-0.4.1-28.19.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): xrdp-0.4.1-28.19.1 References: https://bugzilla.novell.com/764044 http://download.novell.com/patch/finder/?keywords=2ce52b092c823f641524602d7a1647b9 From sle-updates at lists.suse.com Tue Jul 31 08:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 31 Jul 2012 16:08:16 +0200 (CEST) Subject: SUSE-RU-2012:0920-2: important: Recommended update for timezone Message-ID: <20120731140816.729DD32126@maintenance.suse.de> SUSE Recommended Update: Recommended update for timezone ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0920-2 Rating: important References: #771369 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides 2012d which includes the following important changes: * Morocco DST is interrupted during Ramadan 2012 (July 20th- August 19th) Contraindications: Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x) [New Version: 2012d]: timezone-2012d-0.5.5 - SUSE Linux Enterprise Server 10 SP4 (x86_64) [New Version: 2012d]: timezone-2012d-0.5.6 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64) [New Version: 2012d]: timezone-2012d-0.5.6 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 2012d]: timezone-2012d-0.5.5 References: https://bugzilla.novell.com/771369 http://download.novell.com/patch/finder/?keywords=61d0cd38d58eac986900a05fc770e541 From sle-updates at lists.suse.com Tue Jul 31 10:08:22 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 31 Jul 2012 18:08:22 +0200 (CEST) Subject: SUSE-SU-2012:0928-1: moderate: Security update for Mono Message-ID: <20120731160822.519AC320F4@maintenance.suse.de> SUSE Security Update: Security update for Mono ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0928-1 Rating: moderate References: #769799 Cross-References: CVE-2012-3382 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Mono was updated to fix a cross site scripting attack in the System.Web class "forbidden extensions" filtering has been fixed. (CVE-2012-3382) Security Issue reference: * CVE-2012-3382 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-bytefx-data-mysql-6543 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-bytefx-data-mysql-6543 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-bytefx-data-mysql-6543 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-bytefx-data-mysql-6543 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): bytefx-data-mysql-2.6.7-0.9.1 mono-data-firebird-2.6.7-0.9.1 mono-data-oracle-2.6.7-0.9.1 mono-data-sybase-2.6.7-0.9.1 mono-devel-2.6.7-0.9.1 mono-extras-2.6.7-0.9.1 mono-jscript-2.6.7-0.9.1 mono-wcf-2.6.7-0.9.1 mono-winfxcore-2.6.7-0.9.1 monodoc-core-2.6.7-0.9.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64): mono-core-2.6.7-0.9.1 mono-data-2.6.7-0.9.1 mono-data-postgresql-2.6.7-0.9.1 mono-data-sqlite-2.6.7-0.9.1 mono-locale-extras-2.6.7-0.9.1 mono-nunit-2.6.7-0.9.1 mono-web-2.6.7-0.9.1 mono-winforms-2.6.7-0.9.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): mono-core-2.6.7-0.9.1 mono-data-2.6.7-0.9.1 mono-data-postgresql-2.6.7-0.9.1 mono-data-sqlite-2.6.7-0.9.1 mono-locale-extras-2.6.7-0.9.1 mono-nunit-2.6.7-0.9.1 mono-web-2.6.7-0.9.1 mono-winforms-2.6.7-0.9.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): mono-core-2.6.7-0.9.1 mono-data-2.6.7-0.9.1 mono-data-postgresql-2.6.7-0.9.1 mono-data-sqlite-2.6.7-0.9.1 mono-locale-extras-2.6.7-0.9.1 mono-nunit-2.6.7-0.9.1 mono-web-2.6.7-0.9.1 mono-winforms-2.6.7-0.9.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): bytefx-data-mysql-2.6.7-0.9.1 ibm-data-db2-2.6.7-0.9.1 mono-core-2.6.7-0.9.1 mono-data-2.6.7-0.9.1 mono-data-firebird-2.6.7-0.9.1 mono-data-oracle-2.6.7-0.9.1 mono-data-postgresql-2.6.7-0.9.1 mono-data-sqlite-2.6.7-0.9.1 mono-data-sybase-2.6.7-0.9.1 mono-devel-2.6.7-0.9.1 mono-extras-2.6.7-0.9.1 mono-jscript-2.6.7-0.9.1 mono-locale-extras-2.6.7-0.9.1 mono-nunit-2.6.7-0.9.1 mono-wcf-2.6.7-0.9.1 mono-web-2.6.7-0.9.1 mono-winforms-2.6.7-0.9.1 monodoc-core-2.6.7-0.9.1 References: http://support.novell.com/security/cve/CVE-2012-3382.html https://bugzilla.novell.com/769799 http://download.novell.com/patch/finder/?keywords=f371b5cb1313da6d56bf10e7e215fd1b From sle-updates at lists.suse.com Tue Jul 31 10:08:24 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 31 Jul 2012 18:08:24 +0200 (CEST) Subject: SUSE-RU-2012:0929-1: moderate: Recommended update for release-notes-slepos Message-ID: <20120731160824.0514332126@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-slepos ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0929-1 Rating: moderate References: #764650 Affected Products: SUSE Linux Enterprise Point of Service 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update provides the latest Release Notes for SUSE Linux Enterprise 11 SP2 Point of Service Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Point of Service 11 SP2: zypper in -t patch sleposp2-release-notes-slepos-6590 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Point of Service 11 SP2 (i586 x86_64): release-notes-slepos-11-1.18.1 References: https://bugzilla.novell.com/764650 http://download.novell.com/patch/finder/?keywords=6f6b23b835cd1466a246428b665e855e