From sle-updates at lists.suse.com Mon Mar 5 18:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 02:08:15 +0100 (CET) Subject: SUSE-RU-2012:0321-1: Recommended update for sled-release Message-ID: <20120306010815.3C2E732188@maintenance.suse.de> SUSE Recommended Update: Recommended update for sled-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0321-1 Rating: low References: #748865 Affected Products: SLED 11 HP CNB Preload SP1 SLED 11 HP BNB Preload SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update prohibits the distribution upgrade to SLE11 SP2 for OEMs that are not ready for migration yet. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SLED 11 HP CNB Preload SP1: zypper in -t patch slehpcnbp1-sled-release-5877 - SLED 11 HP BNB Preload SP1: zypper in -t patch slehpbnbp1-sled-release-5878 To bring your system up-to-date, use "zypper patch". Package List: - SLED 11 HP CNB Preload SP1 (i586): sled-release-11.1-2.1 - SLED 11 HP BNB Preload SP1 (i586): sled-release-11.1-2.1 References: https://bugzilla.novell.com/748865 http://download.novell.com/patch/finder/?keywords=76b860d4ec76fb33e92014ec4456860b http://download.novell.com/patch/finder/?keywords=d450c1d6cdb3f4a94fa09b925c51adad From sle-updates at lists.suse.com Tue Mar 6 13:08:27 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 21:08:27 +0100 (CET) Subject: SUSE-SU-2012:0114-2: important: Security update for IBM Java 1.6.0 Message-ID: <20120306200827.9503132182@maintenance.suse.de> SUSE Security Update: Security update for IBM Java 1.6.0 ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0114-2 Rating: important References: #739248 Cross-References: CVE-2011-3389 CVE-2011-3516 CVE-2011-3521 CVE-2011-3544 CVE-2011-3545 CVE-2011-3546 CVE-2011-3547 CVE-2011-3548 CVE-2011-3549 CVE-2011-3550 CVE-2011-3551 CVE-2011-3552 CVE-2011-3553 CVE-2011-3554 CVE-2011-3556 CVE-2011-3557 CVE-2011-3560 CVE-2011-3561 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 FOR SP2 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Java 11 SP1 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: IBM Java 1.6.0 SR10 has been released fixing the following CVE's/security Issues: * CVE-2011-3389 * CVE-2011-3516 * CVE-2011-3521 * CVE-2011-3544 * CVE-2011-3545 * CVE-2011-3546 * CVE-2011-3547 * CVE-2011-3548 * CVE-2011-3549 * CVE-2011-3550 * CVE-2011-3551 * CVE-2011-3552 * CVE-2011-3553 * CVE-2011-3554 * CVE-2011-3556 * CVE-2011-3557 * CVE-2011-3560 * CVE-2011-3561 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2: zypper in -t patch sdksp1fsp2-java-1_6_0-ibm-5872 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-java-1_6_0-ibm-5872 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-java-1_6_0-ibm-5872 - SUSE Linux Enterprise Server 11 SP1 FOR SP2: zypper in -t patch slessp1fsp2-java-1_6_0-ibm-5872 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-java-1_6_0-ibm-5872 - SUSE Linux Enterprise Java 11 SP1: zypper in -t patch slejsp1-java-1_6_0-ibm-5872 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-devel-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 (i586 x86_64): java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-devel-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-plugin-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586): java-1_6_0-ibm-alsa-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586): java-1_6_0-ibm-alsa-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586): java-1_6_0-ibm-alsa-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Java 11 SP1 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-devel-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Java 11 SP1 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr10.0-0.3.1 - SUSE Linux Enterprise Java 11 SP1 (i586): java-1_6_0-ibm-alsa-1.6.0_sr10.0-0.3.1 References: http://support.novell.com/security/cve/CVE-2011-3389.html http://support.novell.com/security/cve/CVE-2011-3516.html http://support.novell.com/security/cve/CVE-2011-3521.html http://support.novell.com/security/cve/CVE-2011-3544.html http://support.novell.com/security/cve/CVE-2011-3545.html http://support.novell.com/security/cve/CVE-2011-3546.html http://support.novell.com/security/cve/CVE-2011-3547.html http://support.novell.com/security/cve/CVE-2011-3548.html http://support.novell.com/security/cve/CVE-2011-3549.html http://support.novell.com/security/cve/CVE-2011-3550.html http://support.novell.com/security/cve/CVE-2011-3551.html http://support.novell.com/security/cve/CVE-2011-3552.html http://support.novell.com/security/cve/CVE-2011-3553.html http://support.novell.com/security/cve/CVE-2011-3554.html http://support.novell.com/security/cve/CVE-2011-3556.html http://support.novell.com/security/cve/CVE-2011-3557.html http://support.novell.com/security/cve/CVE-2011-3560.html http://support.novell.com/security/cve/CVE-2011-3561.html https://bugzilla.novell.com/739248 http://download.novell.com/patch/finder/?keywords=150456135775777ea73371c1398a948f From sle-updates at lists.suse.com Tue Mar 6 13:08:42 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 21:08:42 +0100 (CET) Subject: SUSE-SU-2012:0323-1: important: Security update for Apache2 Message-ID: <20120306200842.4B4FD3217D@maintenance.suse.de> SUSE Security Update: Security update for Apache2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0323-1 Rating: important References: #736706 #738855 #741243 #743743 Cross-References: CVE-2007-6750 CVE-2012-0031 CVE-2012-0053 Affected Products: SUSE Linux Enterprise Server 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. Description: This update of apache fixes regressions and several security problems: * bnc#741243, CVE-2012-0031: Fixed a scoreboard corruption (shared mem segment) by child causes crash of privileged parent (invalid free()) during shutdown. * bnc#743743,CVE-2012-0053: Fixed an issue in error responses that could expose "httpOnly" cookies when no custom ErrorDocument is specified for status code 400". * bnc#736706, the SSL configuration template suggested weak ciphers * bnc#738855,CVE-2007-6750: The "mod_reqtimeout" module was backported from Apache 2.2.21 to help mitigate the "Slowloris" Denial of Service attack. You need to enable the "mod_reqtimeout" module in your existing apache configuration to make it effective, e.g. in the APACHE_MODULES line in /etc/sysconfig/apache2. Security Issue references: * CVE-2012-0031 * CVE-2012-0053 * CVE-2007-6750 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): apache2-2.2.3-16.44.1 apache2-devel-2.2.3-16.44.1 apache2-doc-2.2.3-16.44.1 apache2-example-pages-2.2.3-16.44.1 apache2-prefork-2.2.3-16.44.1 apache2-worker-2.2.3-16.44.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): apache2-2.2.3-16.44.1 apache2-devel-2.2.3-16.44.1 apache2-doc-2.2.3-16.44.1 apache2-example-pages-2.2.3-16.44.1 apache2-prefork-2.2.3-16.44.1 apache2-worker-2.2.3-16.44.1 References: http://support.novell.com/security/cve/CVE-2007-6750.html http://support.novell.com/security/cve/CVE-2012-0031.html http://support.novell.com/security/cve/CVE-2012-0053.html https://bugzilla.novell.com/736706 https://bugzilla.novell.com/738855 https://bugzilla.novell.com/741243 https://bugzilla.novell.com/743743 http://download.novell.com/patch/finder/?keywords=1e0c99b5795cd7497ef910246faba28d From sle-updates at lists.suse.com Tue Mar 6 14:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 22:08:21 +0100 (CET) Subject: SUSE-RU-2012:0324-1: Recommended update for sles-release Message-ID: <20120306210821.6D34732182@maintenance.suse.de> SUSE Recommended Update: Recommended update for sles-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0324-1 Rating: low References: #748864 Affected Products: SUSE Studio Standard Edition 1.2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update ensures that SUSE Lifecycle Management Server 1.2 stays on SUSE Linux Enterprise 11 Service Pack 1. Indications: Please install this update. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-sles-release-5899 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Standard Edition 1.2 (x86_64): sles-release-11.1-2.1 References: https://bugzilla.novell.com/748864 http://download.novell.com/patch/finder/?keywords=4f2c5b2c9a7c0dae621988b8090f3740 From sle-updates at lists.suse.com Tue Mar 6 14:08:32 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 22:08:32 +0100 (CET) Subject: SUSE-SU-2012:0325-1: important: Security update for puppet Message-ID: <20120306210833.0AC573217D@maintenance.suse.de> SUSE Security Update: Security update for puppet ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0325-1 Rating: important References: #747657 Cross-References: CVE-2012-1053 CVE-2012-1054 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 FOR SP2 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: This update of puppet fixes two vulnerabilities that could potentially be exploited by local attackers to escalate privileges due to improper privilege dropping and file handling issues (symlink flaws) in puppet (CVE-2012-1053, CVE-2012-1054). Security Issue references: * CVE-2012-1053 * CVE-2012-1054 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-puppet-5876 - SUSE Linux Enterprise Server 11 SP1 FOR SP2: zypper in -t patch slessp1fsp2-puppet-5876 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-puppet-5876 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2: zypper in -t patch sledsp1fsp2-puppet-5876 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-puppet-5876 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.6.12]: puppet-2.6.12-0.12.1 puppet-server-2.6.12-0.12.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.12]: puppet-2.6.12-0.12.1 puppet-server-2.6.12-0.12.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.12]: puppet-2.6.12-0.12.1 puppet-server-2.6.12-0.12.1 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (i586 x86_64) [New Version: 2.6.12]: puppet-2.6.12-0.12.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.12]: puppet-2.6.12-0.12.1 References: http://support.novell.com/security/cve/CVE-2012-1053.html http://support.novell.com/security/cve/CVE-2012-1054.html https://bugzilla.novell.com/747657 http://download.novell.com/patch/finder/?keywords=810c76edc7112af5e466c9d5b28e5aa1 From sle-updates at lists.suse.com Tue Mar 6 15:08:23 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 23:08:23 +0100 (CET) Subject: SUSE-SU-2012:0326-1: important: Security update for libvorbis Message-ID: <20120306220823.969B83217A@maintenance.suse.de> SUSE Security Update: Security update for libvorbis ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0326-1 Rating: important References: #747912 Cross-References: CVE-2012-0444 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 FOR SP2 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Specially crafted Ogg files could cause a heap-based buffer overflow in the vorbis audio compression library that could potentially be exploited by attackers to cause a crash or execute arbitrary code (CVE-2012-0444). Security Issue reference: * CVE-2012-0444 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2: zypper in -t patch sdksp1fsp2-libvorbis-5851 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libvorbis-5851 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libvorbis-5851 - SUSE Linux Enterprise Server 11 SP1 FOR SP2: zypper in -t patch slessp1fsp2-libvorbis-5851 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libvorbis-5851 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2: zypper in -t patch sledsp1fsp2-libvorbis-5851 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libvorbis-5851 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 (i586 ia64 ppc64 s390x x86_64): libvorbis-devel-1.2.0-79.20.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libvorbis-devel-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libvorbis-1.2.0-79.20.1 libvorbis-doc-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libvorbis-32bit-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586 ia64 ppc64 s390x x86_64): libvorbis-1.2.0-79.20.1 libvorbis-doc-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (ppc64 s390x x86_64): libvorbis-32bit-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (ia64): libvorbis-x86-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libvorbis-1.2.0-79.20.1 libvorbis-doc-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libvorbis-32bit-1.2.0-79.20.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libvorbis-x86-1.2.0-79.20.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libvorbis-1.1.2-13.19.1 libvorbis-devel-1.1.2-13.19.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libvorbis-32bit-1.1.2-13.19.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libvorbis-x86-1.1.2-13.19.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libvorbis-64bit-1.1.2-13.19.1 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (i586 x86_64): libvorbis-1.2.0-79.20.1 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (x86_64): libvorbis-32bit-1.2.0-79.20.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libvorbis-1.2.0-79.20.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libvorbis-32bit-1.2.0-79.20.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libvorbis-1.1.2-13.19.1 libvorbis-devel-1.1.2-13.19.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libvorbis-32bit-1.1.2-13.19.1 References: http://support.novell.com/security/cve/CVE-2012-0444.html https://bugzilla.novell.com/747912 http://download.novell.com/patch/finder/?keywords=56f02ce23b1f6abe181f7e00c3bc1f23 http://download.novell.com/patch/finder/?keywords=dca0a520e9ca9f5bad17b1c77fc0f1a6 From sle-updates at lists.suse.com Tue Mar 6 15:08:36 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 6 Mar 2012 23:08:36 +0100 (CET) Subject: SUSE-RU-2012:0327-1: moderate: Recommended update for logrotate Message-ID: <20120306220836.8F8BF3217D@maintenance.suse.de> SUSE Recommended Update: Recommended update for logrotate ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0327-1 Rating: moderate References: #677335 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: In order to make logrotate more robust against manipulated log directories logrotate was changed to * add a "su" config option which makes logrotate run partially as the specified user * run external helpers like log file compressors as the user configured with the "su" option * issue a warning for log directories writable by non-root users * not follow symlinks when rotating logs Security Issue reference: * CVE-2011-1550 Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-logrotate-5745 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-logrotate-5745 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-logrotate-5745 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): logrotate-3.7.7-10.26.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): logrotate-3.7.7-10.26.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): logrotate-3.7.3-13.17.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): logrotate-3.7.7-10.26.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): logrotate-3.7.3-13.17.1 References: http://support.novell.com/security/cve/CVE-2011-1550.html https://bugzilla.novell.com/677335 http://download.novell.com/patch/finder/?keywords=887c4640300dc79be8b5abf4a6bbf908 http://download.novell.com/patch/finder/?keywords=cf05d445b026ba5a6dcd81b05e2fce50 From sle-updates at lists.suse.com Tue Mar 6 16:08:49 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 7 Mar 2012 00:08:49 +0100 (CET) Subject: SUSE-RU-2012:0328-1: Recommended update for EVMS Message-ID: <20120306230849.A8D8932182@maintenance.suse.de> SUSE Recommended Update: Recommended update for EVMS ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0328-1 Rating: low References: #739186 Affected Products: SUSE Linux Enterprise Server 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes an issue in EMVS where it is unable to allocate free space of a lvm2 region with the CLI (command line interface) (bnc#739186). Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): evms-2.5.5-24.80.1 evms-gui-2.5.5-24.80.1 evms-ha-2.5.5-24.80.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): evms-2.5.5-24.80.1 evms-gui-2.5.5-24.80.1 evms-ha-2.5.5-24.80.1 References: https://bugzilla.novell.com/739186 http://download.novell.com/patch/finder/?keywords=e83b5d21cbd50ebafaa7c792f40e6807 From sle-updates at lists.suse.com Tue Mar 6 17:08:26 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 7 Mar 2012 01:08:26 +0100 (CET) Subject: SUSE-SU-2012:0329-1: moderate: Security update for ark Message-ID: <20120307000826.11DD63217D@maintenance.suse.de> SUSE Security Update: Security update for ark ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0329-1 Rating: moderate References: #708268 Cross-References: CVE-2011-2725 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 FOR SP2 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Ark was prone to a path traversal vulnerability allowing a maliciously-crafted zip file to allow for an arbitrary file to be displayed and, if the user has appropriate credentials, removed (CVE-2011-2725). Security Issue reference: * CVE-2011-2725 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-ark-5906 - SUSE Linux Enterprise Server 11 SP1 FOR SP2: zypper in -t patch slessp1fsp2-ark-5906 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-ark-5906 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2: zypper in -t patch sledsp1fsp2-ark-5906 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-ark-5906 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): ark-4.3.5-0.3.3 kcalc-4.3.5-0.3.3 kcharselect-4.3.5-0.3.3 kdessh-4.3.5-0.3.3 kdf-4.3.5-0.3.3 kfloppy-4.3.5-0.3.3 kgpg-4.3.5-0.3.3 ktimer-4.3.5-0.3.3 kwalletmanager-4.3.5-0.3.3 kwikdisk-4.3.5-0.3.3 okteta-4.3.5-0.3.3 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586 ia64 ppc64 s390x x86_64): ark-4.3.5-0.3.3 kcalc-4.3.5-0.3.3 kcharselect-4.3.5-0.3.3 kdessh-4.3.5-0.3.3 kdf-4.3.5-0.3.3 kfloppy-4.3.5-0.3.3 kgpg-4.3.5-0.3.3 ktimer-4.3.5-0.3.3 kwalletmanager-4.3.5-0.3.3 kwikdisk-4.3.5-0.3.3 okteta-4.3.5-0.3.3 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): ark-4.3.5-0.3.3 kcalc-4.3.5-0.3.3 kcharselect-4.3.5-0.3.3 kdessh-4.3.5-0.3.3 kdf-4.3.5-0.3.3 kfloppy-4.3.5-0.3.3 kgpg-4.3.5-0.3.3 ktimer-4.3.5-0.3.3 kwalletmanager-4.3.5-0.3.3 kwikdisk-4.3.5-0.3.3 okteta-4.3.5-0.3.3 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (i586 x86_64): ark-4.3.5-0.3.3 kcalc-4.3.5-0.3.3 kdessh-4.3.5-0.3.3 kdf-4.3.5-0.3.3 kfloppy-4.3.5-0.3.3 kgpg-4.3.5-0.3.3 kwalletmanager-4.3.5-0.3.3 kwikdisk-4.3.5-0.3.3 okteta-4.3.5-0.3.3 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): ark-4.3.5-0.3.3 kcalc-4.3.5-0.3.3 kdessh-4.3.5-0.3.3 kdf-4.3.5-0.3.3 kfloppy-4.3.5-0.3.3 kgpg-4.3.5-0.3.3 kwalletmanager-4.3.5-0.3.3 kwikdisk-4.3.5-0.3.3 okteta-4.3.5-0.3.3 References: http://support.novell.com/security/cve/CVE-2011-2725.html https://bugzilla.novell.com/708268 http://download.novell.com/patch/finder/?keywords=492e47f4d6e7ea245620d7b07b0c4d67 From sle-updates at lists.suse.com Wed Mar 7 11:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 7 Mar 2012 19:08:15 +0100 (CET) Subject: SUSE-SU-2012:0332-1: important: Security update for flash-player Message-ID: <20120307180815.3C9C032192@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0332-1 Rating: important References: #750614 Cross-References: CVE-2012-0768 CVE-2012-0769 Affected Products: SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: flash-player 11.1.102.63 fixes two security issues: * memory corruption vulnerability in Matrix3D could lead to code executionn (CVE-2012-0768) * integer errors that could lead to information disclosure (CVE-2012-0769) Security Issue references: * CVE-2012-0768 * CVE-2012-0769 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2: zypper in -t patch sledsp1fsp2-flash-player-5928 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-flash-player-5928 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (i586 x86_64) [New Version: 11.1.102.63]: flash-player-11.1.102.63-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 11.1.102.63]: flash-player-11.1.102.63-0.3.1 References: http://support.novell.com/security/cve/CVE-2012-0768.html http://support.novell.com/security/cve/CVE-2012-0769.html https://bugzilla.novell.com/750614 http://download.novell.com/patch/finder/?keywords=2cd17573d24f9a05b79c0d54923441f3 From sle-updates at lists.suse.com Thu Mar 8 08:08:22 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 8 Mar 2012 16:08:22 +0100 (CET) Subject: SUSE-RU-2012:0334-1: Recommended update for mvapich Message-ID: <20120308150822.B170832188@maintenance.suse.de> SUSE Recommended Update: Recommended update for mvapich ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0334-1 Rating: low References: #744998 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes missing configuration tagging for files in sysconfdir (bnc#744998). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-mvapich-5776 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 x86_64): mvapich-1.2.0-0.5.1 mvapich-devel-1.2.0-0.5.1 References: https://bugzilla.novell.com/744998 http://download.novell.com/patch/finder/?keywords=631dff4259d46dc6cf0ddf2e3c4257c6 From sle-updates at lists.suse.com Thu Mar 8 09:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 8 Mar 2012 17:08:17 +0100 (CET) Subject: SUSE-RU-2012:0335-1: Recommended update for quota Message-ID: <20120308160817.84A1932182@maintenance.suse.de> SUSE Recommended Update: Recommended update for quota ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0335-1 Rating: low References: #636551 #687699 #728626 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This update for quota fixes the following issues: * ignore comments in fstab (bnc#728626) * do not pass NULL pointer to XGETQSTAT (bnc#687699) * fixed --filesystem-list option on nfs mounts (bnc#636551) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-quota-5733 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-quota-5733 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-quota-5733 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): quota-3.16-50.34.1 quota-nfs-3.16-50.34.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): quota-3.16-50.34.1 quota-nfs-3.16-50.34.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): quota-3.16-50.34.1 References: https://bugzilla.novell.com/636551 https://bugzilla.novell.com/687699 https://bugzilla.novell.com/728626 http://download.novell.com/patch/finder/?keywords=d2d55bdacf55257f1afde310e3bc96e8 From sle-updates at lists.suse.com Thu Mar 8 09:08:22 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 8 Mar 2012 17:08:22 +0100 (CET) Subject: SUSE-SU-2012:0332-2: important: Security update for flash-player Message-ID: <20120308160822.EDD0732182@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0332-2 Rating: important References: #750614 Cross-References: CVE-2012-0768 CVE-2012-0769 Affected Products: SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: flash-player 11.1.102.63 fixes two security issues: * memory corruption vulnerability in Matrix3D could lead to code executionn (CVE-2012-0768) * integer errors that could lead to information disclosure (CVE-2012-0769) Security Issue references: * CVE-2012-0768 * CVE-2012-0769 Package List: - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 10.3.183.16]: flash-player-10.3.183.16-0.5.1 References: http://support.novell.com/security/cve/CVE-2012-0768.html http://support.novell.com/security/cve/CVE-2012-0769.html https://bugzilla.novell.com/750614 http://download.novell.com/patch/finder/?keywords=e55fbfc41d02cf21b84c2963260243e6 From sle-updates at lists.suse.com Thu Mar 8 11:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 8 Mar 2012 19:08:15 +0100 (CET) Subject: SUSE-SU-2012:0337-1: critical: Security update for Samba Message-ID: <20120308180815.B49C93218B@maintenance.suse.de> SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0337-1 Rating: critical References: #633729 #703655 #747934 Cross-References: CVE-2012-0870 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Server 10 SP3 LTSS SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update of Samba fixes a heap-based buffer overflow that could be exploited by remote, unauthenticated attackers to crash the smbd daemon or potentially execute arbitrary code via specially crafted SMB AndX request packets (CVE-2012-0870). Also fixed two non security bugs: * Fix to handle domain join using NetBIOS name; (bnc #633729). * Fixed the DFS referral response for msdfs root; (bnc#703655). Security Issue reference: * CVE-2012-0870 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): cifs-mount-3.0.36-0.13.18.1 ldapsmb-1.34b-25.13.18.1 libmsrpc-3.0.36-0.13.18.1 libmsrpc-devel-3.0.36-0.13.18.1 libsmbclient-3.0.36-0.13.18.1 libsmbclient-devel-3.0.36-0.13.18.1 samba-3.0.36-0.13.18.1 samba-client-3.0.36-0.13.18.1 samba-krb-printing-3.0.36-0.13.18.1 samba-python-3.0.36-0.13.18.1 samba-vscan-0.3.6b-43.13.18.1 samba-winbind-3.0.36-0.13.18.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libsmbclient-32bit-3.0.36-0.13.18.1 samba-32bit-3.0.36-0.13.18.1 samba-client-32bit-3.0.36-0.13.18.1 samba-winbind-32bit-3.0.36-0.13.18.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libsmbclient-x86-3.0.36-0.13.18.1 samba-client-x86-3.0.36-0.13.18.1 samba-winbind-x86-3.0.36-0.13.18.1 samba-x86-3.0.36-0.13.18.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libsmbclient-64bit-3.0.36-0.13.18.1 samba-64bit-3.0.36-0.13.18.1 samba-client-64bit-3.0.36-0.13.18.1 samba-winbind-64bit-3.0.36-0.13.18.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): cifs-mount-3.0.36-0.13.18.1 ldapsmb-1.34b-25.13.18.1 libmsrpc-3.0.36-0.13.18.1 libmsrpc-devel-3.0.36-0.13.18.1 libsmbclient-3.0.36-0.13.18.1 libsmbclient-devel-3.0.36-0.13.18.1 samba-3.0.36-0.13.18.1 samba-client-3.0.36-0.13.18.1 samba-krb-printing-3.0.36-0.13.18.1 samba-python-3.0.36-0.13.18.1 samba-vscan-0.3.6b-43.13.18.1 samba-winbind-3.0.36-0.13.18.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64): libsmbclient-32bit-3.0.36-0.13.18.1 samba-32bit-3.0.36-0.13.18.1 samba-client-32bit-3.0.36-0.13.18.1 samba-winbind-32bit-3.0.36-0.13.18.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): cifs-mount-3.0.36-0.13.18.1 ldapsmb-1.34b-25.13.18.1 libsmbclient-3.0.36-0.13.18.1 libsmbclient-devel-3.0.36-0.13.18.1 samba-3.0.36-0.13.18.1 samba-client-3.0.36-0.13.18.1 samba-krb-printing-3.0.36-0.13.18.1 samba-vscan-0.3.6b-43.13.18.1 samba-winbind-3.0.36-0.13.18.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libsmbclient-32bit-3.0.36-0.13.18.1 samba-32bit-3.0.36-0.13.18.1 samba-client-32bit-3.0.36-0.13.18.1 samba-winbind-32bit-3.0.36-0.13.18.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): libmsrpc-3.0.36-0.13.18.1 libmsrpc-devel-3.0.36-0.13.18.1 libsmbclient-devel-3.0.36-0.13.18.1 libsmbsharemodes-3.0.36-0.13.18.1 libsmbsharemodes-devel-3.0.36-0.13.18.1 samba-python-3.0.36-0.13.18.1 References: http://support.novell.com/security/cve/CVE-2012-0870.html https://bugzilla.novell.com/633729 https://bugzilla.novell.com/703655 https://bugzilla.novell.com/747934 http://download.novell.com/patch/finder/?keywords=547e3b7057adb631e1439605662293be http://download.novell.com/patch/finder/?keywords=7da8ca4f10f91e5bf4d12b67b2bd7522 From sle-updates at lists.suse.com Thu Mar 8 11:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 8 Mar 2012 19:08:21 +0100 (CET) Subject: SUSE-SU-2012:0338-1: critical: Security update for Samba Message-ID: <20120308180822.0536032188@maintenance.suse.de> SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0338-1 Rating: critical References: #747934 Cross-References: CVE-2012-0870 Affected Products: SUSE CORE 9 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update of Samba fixes a heap-based buffer overflow that could be exploited by remote, unauthenticated attackers to crash the smbd daemon or potentially execute arbitrary code via specially crafted SMB AndX request packets (CVE-2012-0870). Security Issue reference: * CVE-2012-0870 Package List: - SUSE CORE 9 (i586 s390 s390x x86_64): libsmbclient-3.0.26a-0.21 libsmbclient-devel-3.0.26a-0.21 samba-3.0.26a-0.21 samba-client-3.0.26a-0.21 samba-doc-3.0.26a-0.21 samba-pdb-3.0.26a-0.21 samba-python-3.0.26a-0.21 samba-vscan-0.3.6b-0.49 samba-winbind-3.0.26a-0.21 - SUSE CORE 9 (x86_64): libsmbclient-32bit-9-201202240204 samba-32bit-9-201202240204 samba-client-32bit-9-201202240204 samba-winbind-32bit-9-201202240204 - SUSE CORE 9 (s390x): libsmbclient-32bit-9-201202240207 samba-32bit-9-201202240207 samba-client-32bit-9-201202240207 samba-winbind-32bit-9-201202240207 References: http://support.novell.com/security/cve/CVE-2012-0870.html https://bugzilla.novell.com/747934 http://download.novell.com/patch/finder/?keywords=77fff45aa383e336358627a07aac4417 From sle-updates at lists.suse.com Thu Mar 8 21:08:40 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 9 Mar 2012 05:08:40 +0100 (CET) Subject: SUSE-RU-2012:0340-1: Recommended update for r8169-kmp Message-ID: <20120309040840.9CC9732188@maintenance.suse.de> SUSE Recommended Update: Recommended update for r8169-kmp ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0340-1 Rating: low References: #736134 Affected Products: SLED 11 HP CNB Preload SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update adds new realtek r8169 kernel modules packages that fix a HP preload problem. Issue fixed: * bnc#736134, Fate#313186 - Unit hang up at OOBE last step on HP 1C12 Butternut Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SLED 11 HP CNB Preload SP1: zypper in -t patch slehpcnbp1-r8169-kmp-default-5818 To bring your system up-to-date, use "zypper patch". Package List: - SLED 11 HP CNB Preload SP1 (noarch): realtek-firmware-1.0-0.3.1 - SLED 11 HP CNB Preload SP1 (i586): r8169-kmp-default-2.3LK_NAPI_2.6.32.54_0.3-0.3.1 r8169-kmp-pae-2.3LK_NAPI_2.6.32.54_0.3-0.3.1 sled11-branding-hp-cnb-SBSO-0.9-0.16.16.1 References: https://bugzilla.novell.com/736134 http://download.novell.com/patch/finder/?keywords=4b259612c411dd3ea880d8209b611d19 From sle-updates at lists.suse.com Fri Mar 9 00:08:18 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 9 Mar 2012 08:08:18 +0100 (CET) Subject: SUSE-RU-2012:0341-1: important: Recommended update for timezone Message-ID: <20120309070818.4D68F32189@maintenance.suse.de> SUSE Recommended Update: Recommended update for timezone ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0341-1 Rating: important References: #748550 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 FOR SP2 SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides 2012b which provides the following important changes: * Cuba has delayed the start of DST by 3 weeks (now starts April 1 rather than March 11) * Chile 2011/2012 and 2012/2013 summer time date adjustments. * Falkland Islands onto permanent summer time (we're assuming for the foreseeable future, though 2012 is all we're fairly certain of.) * Armenia has abolished Summer Time. * Tokelau jumped the International Date Line back last December (just the same as their near neighbour, Samoa). * America/Creston is a new zone for a small area of British Columbia * There will be a leap second at 2012-06-30 23:59:60 UTC. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2: zypper in -t patch sdksp1fsp2-timezone-2012b-5933 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-timezone-2012b-5933 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-timezone-2012b-5933 - SUSE Linux Enterprise Server 11 SP1 FOR SP2: zypper in -t patch slessp1fsp2-timezone-2012b-5933 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-timezone-2012b-5933 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2: zypper in -t patch sledsp1fsp2-timezone-2012b-5933 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-timezone-2012b-5933 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 FOR SP2 (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Software Development Kit 11 SP1 (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2012b]: timezone-2012b-0.3.2 - SUSE Linux Enterprise Server 11 SP1 for VMware (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2012b]: timezone-2012b-0.3.2 - SUSE Linux Enterprise Server 11 SP1 FOR SP2 (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2012b]: timezone-2012b-0.3.2 - SUSE Linux Enterprise Server 11 SP1 (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 2012b]: timezone-2012b-0.5.1 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (i586 x86_64) [New Version: 2012b]: timezone-2012b-0.3.2 - SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2012b]: timezone-2012b-0.3.2 - SUSE Linux Enterprise Desktop 11 SP1 (noarch) [New Version: 2012b]: timezone-java-2012b-0.3.2 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 2012b]: timezone-2012b-0.5.1 References: https://bugzilla.novell.com/748550 http://download.novell.com/patch/finder/?keywords=851162ea1c53a59f053e197bde5ca618 http://download.novell.com/patch/finder/?keywords=a3a3ed2cf5e338ebb8936a9fd5479e71 From sle-updates at lists.suse.com Fri Mar 9 09:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 9 Mar 2012 17:08:14 +0100 (CET) Subject: SUSE-SU-2012:0348-1: critical: Security update for Samba Message-ID: <20120309160814.0BC76321AB@maintenance.suse.de> SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0348-1 Rating: critical References: #550002 #561894 #577868 #592198 #599873 #605935 #611927 #613459 #637218 #652620 #670431 #705241 #708503 #747934 Cross-References: CVE-2012-0870 Affected Products: SUSE Linux Enterprise Server 10 SP2 ______________________________________________________________________________ An update that solves one vulnerability and has 13 fixes is now available. It includes one version update. Description: This Samba file server update fixes various security issues: * CVE-2012-0870: A heap-based buffer overflow that could be exploited by remote, unauthenticated attackers to crash the smbd daemon or potentially execute arbitrary code via specially crafted SMB AndX request packets. * CVE-2011-2694: A cross site scripting problem in SWAT was fixed. * CVE-2011-0719: Fixed a possible denial of service caused by memory corruption. * CVE-2010-3069: Fix buffer overflow in sid_parse() to correctly check the input lengths when reading a binary representation of a Windows Security ID (SID). * CVE-2010-2063: Addressed possible buffer overrun in chain_reply code of pre-3.4 versions. * CVE-2010-1642: An uninitialized variable read could have caused an smbd crash. * CVE-2010-0787: Take extra care that a mount point of mount.cifs isn't changed during mount; Also the following bugs have been fixed: * Add Provides samba-client-gplv2 and samba-doc-gplv2 to pre-3.2 versions; (bnc#652620). * Initialize workgroup of nmblookup as empty string. * Fix trusts with Windows 2008R2 DCs; (bnc#613459); (bnc#599873); (bnc#592198); (bso#6697). * Document "wide links" defaults to "no" in the smb.conf man page for versions pre-3.4.6; (bnc#577868). * Allow forced pw change even with min pw age; (bnc#561894). Security Issue reference: * CVE-2012-0870 Package List: - SUSE Linux Enterprise Server 10 SP2 (i586 s390x x86_64) [New Version: 3.0.32]: cifs-mount-3.0.32-0.20.1 libmsrpc-3.0.32-0.20.1 libmsrpc-devel-3.0.32-0.20.1 libsmbclient-3.0.32-0.20.1 libsmbclient-devel-3.0.32-0.20.1 samba-3.0.32-0.20.1 samba-client-3.0.32-0.20.1 samba-krb-printing-3.0.32-0.20.1 samba-python-3.0.32-0.20.1 samba-vscan-0.3.6b-42.85.20.1 samba-winbind-3.0.32-0.20.1 - SUSE Linux Enterprise Server 10 SP2 (s390x x86_64) [New Version: 3.0.32]: libsmbclient-32bit-3.0.32-0.20.1 samba-32bit-3.0.32-0.20.1 samba-client-32bit-3.0.32-0.20.1 samba-winbind-32bit-3.0.32-0.20.1 - SUSE Linux Enterprise Server 10 SP2 (noarch) [New Version: 3.0.32]: samba-doc-3.0.32-0.20.1 References: http://support.novell.com/security/cve/CVE-2012-0870.html https://bugzilla.novell.com/550002 https://bugzilla.novell.com/561894 https://bugzilla.novell.com/577868 https://bugzilla.novell.com/592198 https://bugzilla.novell.com/599873 https://bugzilla.novell.com/605935 https://bugzilla.novell.com/611927 https://bugzilla.novell.com/613459 https://bugzilla.novell.com/637218 https://bugzilla.novell.com/652620 https://bugzilla.novell.com/670431 https://bugzilla.novell.com/705241 https://bugzilla.novell.com/708503 https://bugzilla.novell.com/747934 http://download.novell.com/patch/finder/?keywords=7647f10c23183441620c089dfae68cd9 From sle-updates at lists.suse.com Mon Mar 12 16:15:50 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 12 Mar 2012 23:15:50 +0100 (CET) Subject: SUSE-RU-2012:0355-1: Recommended update for augeas Message-ID: <20120312221550.8579332189@maintenance.suse.de> SUSE Recommended Update: Recommended update for augeas ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0355-1 Rating: low References: #729491 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update allows the augeas library and tools to configure various files in /etc/sysconfig present in SUSE systems. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1fsp2-augeas-5911 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-augeas-5911 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1fsp2-augeas-5911 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-augeas-5911 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-augeas-5911 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1fsp2-augeas-5911 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-augeas-5911 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): augeas-devel-0.8.1-7.12.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): augeas-devel-0.8.1-7.12.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.8.1]: augeas-0.8.1-7.12.1 augeas-lenses-0.8.1-7.12.1 libaugeas0-0.8.1-7.12.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 0.8.1]: augeas-0.8.1-7.12.1 augeas-lenses-0.8.1-7.12.1 libaugeas0-0.8.1-7.12.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.8.1]: augeas-0.8.1-7.12.1 augeas-lenses-0.8.1-7.12.1 libaugeas0-0.8.1-7.12.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.8.1]: libaugeas0-0.8.1-7.12.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.8.1]: libaugeas0-0.8.1-7.12.1 References: https://bugzilla.novell.com/729491 http://download.novell.com/patch/finder/?keywords=e57812ecedc0ad50d99a6fe5efca7835 From sle-updates at lists.suse.com Mon Mar 12 22:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 13 Mar 2012 05:08:21 +0100 (CET) Subject: SUSE-RU-2012:0356-1: moderate: Recommended update for SUSE Manager Proxy 1.2 Message-ID: <20120313040821.C2FD53218E@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager Proxy 1.2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0356-1 Rating: moderate References: #742473 #742924 #743955 #744263 Affected Products: SUSE Manager Proxy 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that has four recommended fixes can now be installed. Description: This update for the SUSE Manager Proxy 1.2 fixes the following issues: * Fix permissions of NOCpulse.ini * Fix some branding issues * Enforce removal of zmd stack to support OES management * Enable option FollowSymLinks required by bootstrap repositories * Prevent SUSE Manager Proxy 1.2 updates to SLES 11 SP2 How to apply this update: 1. Log in as root user to the SUSE Manager proxy. 2. Stop the proxy service: mgr-proxy stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: mgr-proxy start Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Proxy 1.2 for SLE 11 SP1: zypper in -t patch slemap12sp1-suse-manager-proxy-201203-5936 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Proxy 1.2 for SLE 11 SP1 (x86_64): suse-manager-proxy-release-1.2-1.2 - SUSE Manager Proxy 1.2 for SLE 11 SP1 (noarch): SputLite-client-0.48.12-0.10.1 SputLite-server-0.48.12-0.10.1 nocpulse-common-2.1.19-0.10.2 perl-NOCpulse-Probe-1.184.5-0.11.2 spacewalk-certs-tools-1.2.2-0.26.2 spacewalk-proxy-broker-1.2.15-0.11.2 spacewalk-proxy-common-1.2.15-0.11.2 spacewalk-proxy-installer-1.2.3-0.20.2 spacewalk-proxy-management-1.2.15-0.11.2 spacewalk-proxy-package-manager-1.2.15-0.11.2 spacewalk-proxy-redirect-1.2.15-0.11.2 References: https://bugzilla.novell.com/742473 https://bugzilla.novell.com/742924 https://bugzilla.novell.com/743955 https://bugzilla.novell.com/744263 http://download.novell.com/patch/finder/?keywords=ea614de562a2f46a4e3238b6decb9a78 From sle-updates at lists.suse.com Tue Mar 13 17:08:28 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 14 Mar 2012 00:08:28 +0100 (CET) Subject: SUSE-RU-2012:0363-1: moderate: Recommended update for mdadm Message-ID: <20120313230828.562373219F@maintenance.suse.de> SUSE Recommended Update: Recommended update for mdadm ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0363-1 Rating: moderate References: #737303 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: Fix mkinitrd-setup.sh: add missing assignment which causes containers that are used twice to be listed twice (bnc#737303) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-mdadm-5905 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-mdadm-5905 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-mdadm-5905 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): mdadm-3.2.2-0.33.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): mdadm-3.2.2-0.33.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): mdadm-3.2.2-0.33.1 References: https://bugzilla.novell.com/737303 http://download.novell.com/patch/finder/?keywords=213c43a187c92fa363bd15a451f95473 From sle-updates at lists.suse.com Tue Mar 13 17:08:31 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 14 Mar 2012 00:08:31 +0100 (CET) Subject: SUSE-SU-2012:0364-1: important: Security update for Real Time Linux Kernel Message-ID: <20120313230831.B1C7E3219E@maintenance.suse.de> SUSE Security Update: Security update for Real Time Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0364-1 Rating: important References: #590980 #591293 #651219 #653260 #698450 #699709 #707096 #707288 #708877 #711203 #711539 #712366 #714001 #716901 #722406 #726788 #732021 #734056 #745881 Cross-References: CVE-2010-3873 CVE-2011-1576 CVE-2011-1577 CVE-2011-1833 CVE-2011-2203 CVE-2011-2918 CVE-2011-2928 CVE-2011-3191 CVE-2011-3353 CVE-2011-4081 CVE-2011-4110 CVE-2011-4326 Affected Products: SUSE Linux Enterprise Real Time 11 SP1 ______________________________________________________________________________ An update that solves 12 vulnerabilities and has 7 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise Server 11 SP1 Realtime kernel was updated to 2.6.33.20 to fix various bugs and security issues. The following security issues have been fixed: * CVE-2011-4110: KEYS: Fix a NULL pointer deref in the user-defined key type, which allowed local attackers to Oops the kernel. * CVE-2011-4081: Avoid potential NULL pointer deref in ghash, which allowed local attackers to Oops the kernel. * CVE-2010-3873: When using X.25 communication a malicious sender could corrupt data structures, causing crashes or potential code execution. Please note that X.25 needs to be setup to make this effective, which these days is usually not the case. * CVE-2011-2203: A NULL ptr dereference on mounting corrupt hfs filesystems was fixed which could be used by local attackers to crash the kernel. * CVE-2011-3191: A malicious CIFS server could cause a integer overflow on the local machine on directory index operations, in turn causing memory corruption. * CVE-2011-3353: In the fuse filesystem, FUSE_NOTIFY_INVAL_ENTRY did not check the length of the write so the message processing could overrun and result in a BUG_ON() in fuse_copy_fill(). This flaw could be used by local users able to mount FUSE filesystems to crash the system. * CVE-2011-4326: A bug was found in the way headroom check was performed in udp6_ufo_fragment() function. A remote attacker could use this flaw to crash the system. * CVE-2011-1576: The Generic Receive Offload (GRO) implementation in the Linux kernel allowed remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478. * CVE-2011-1833: Added a kernel option to ensure ecryptfs is mounting only on paths belonging to the current ui, which would have allowed local attackers to potentially gain privileges via symlink attacks. * CVE-2011-2918: In the perf framework software event overflows could deadlock or delete an uninitialized timer. Included in Linux 2.6.32.19 stable update: * CVE-2011-2928: The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel did not validate the length attribute of long symlinks, which allowed local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem. * CVE-2011-3353: In the fuse filesystem, FUSE_NOTIFY_INVAL_ENTRY did not check the length of the write so the message processing could overrun and result in a BUG_ON() in fuse_copy_fill(). This flaw could be used by local users able to mount FUSE filesystems to crash the system. * CVE-2011-1577: The Linux kernel automatically evaluated partition tables of storage devices. The code for evaluating EFI GUID partitions (in fs/partitions/efi.c) contained a bug that causes a kernel oops on certain corrupted GUID partition tables, which might be used by local attackers to crash the kernel or potentially execute code. The following non security bugs have been fixed: * Fix DL980G7 numa enumeration problem. HP bios SRAT table contains more entries (256) than SLERT NR_CPUS (128). Pull in mainline fixes to always parse the entire table, regardless of configured NR_CPUS. * x86, acpi: Parse all SRAT cpu entries even above the cpu number limitation (bnc#745881). * x86, ia64, acpi: Clean up x86-ism in drivers/acpi/numa.c (bnc#745881). * rt, timerfd: fix timerfd_settime() livelock. * Fix build failure on 12.1 systems. CONFIG_BUILD_DOCSRC builds Documentation/video4linux but without reference to local includes, thus build only succeeds on older SUSE releases where linux-glibc-devel provides (obsolete) videodev.h. Add upstream patch which drops support for v4lgrab.c which is safe as sample executable is not packaged in any released rpm. * Add missing references symset for the rt flavor (bnc#722406#c69). * Pick up SP1 82576 ET2 Quad Port driver addon. Pick up I350 as well, since it's just recognition of a follow-on part for 82580. * igb: Add support for 82576 ET2 Quad Port Server Adapter (bnc#591293, bnc#722406). * igb: add support for Intel I350 Gigabit Network Connection (bnc#590980). * Fix regression introduced by backport of mainline commit 43fa5460 * sched/rt: Migrate equal priority tasks to available CPUs. * sched: fix broken SCHED_RESET_ON_FORK handling (bnc#708877). * sched: Fix rt_rq runtime leakage bug (bnc#707096). Security Issue references: * CVE-2011-4110 * CVE-2011-4081 * CVE-2010-3873 * CVE-2011-2203 * CVE-2011-3191 * CVE-2011-3353 * CVE-2011-4326 * CVE-2011-1576 * CVE-2011-1833 * CVE-2011-2918 * CVE-2011-2928 * CVE-2011-3353 * CVE-2011-1577 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time 11 SP1: zypper in -t patch slertesp1-kernel-5802 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time 11 SP1 (x86_64) [New Version: 2.6.33.20]: brocade-bna-kmp-rt-2.1.0.0_2.6.33.20_rt31_0.3-0.2.34 cluster-network-kmp-rt-1.4_2.6.33.20_rt31_0.3-2.5.28 cluster-network-kmp-rt_trace-1.4_2.6.33.20_rt31_0.3-2.5.28 drbd-kmp-rt-8.3.11_2.6.33.20_rt31_0.3-0.3.28 drbd-kmp-rt_trace-8.3.11_2.6.33.20_rt31_0.3-0.3.28 iscsitarget-kmp-rt-1.4.19_2.6.33.20_rt31_0.3-0.9.11.2 kernel-rt-2.6.33.20-0.3.1 kernel-rt-base-2.6.33.20-0.3.1 kernel-rt-devel-2.6.33.20-0.3.1 kernel-rt_trace-2.6.33.20-0.3.1 kernel-rt_trace-base-2.6.33.20-0.3.1 kernel-rt_trace-devel-2.6.33.20-0.3.1 kernel-source-rt-2.6.33.20-0.3.1 kernel-syms-rt-2.6.33.20-0.3.1 ocfs2-kmp-rt-1.6_2.6.33.20_rt31_0.3-0.4.2.28 ocfs2-kmp-rt_trace-1.6_2.6.33.20_rt31_0.3-0.4.2.28 ofed-kmp-rt-1.5.2_2.6.33.20_rt31_0.3-0.9.13.15 References: http://support.novell.com/security/cve/CVE-2010-3873.html http://support.novell.com/security/cve/CVE-2011-1576.html http://support.novell.com/security/cve/CVE-2011-1577.html http://support.novell.com/security/cve/CVE-2011-1833.html http://support.novell.com/security/cve/CVE-2011-2203.html http://support.novell.com/security/cve/CVE-2011-2918.html http://support.novell.com/security/cve/CVE-2011-2928.html http://support.novell.com/security/cve/CVE-2011-3191.html http://support.novell.com/security/cve/CVE-2011-3353.html http://support.novell.com/security/cve/CVE-2011-4081.html http://support.novell.com/security/cve/CVE-2011-4110.html http://support.novell.com/security/cve/CVE-2011-4326.html https://bugzilla.novell.com/590980 https://bugzilla.novell.com/591293 https://bugzilla.novell.com/651219 https://bugzilla.novell.com/653260 https://bugzilla.novell.com/698450 https://bugzilla.novell.com/699709 https://bugzilla.novell.com/707096 https://bugzilla.novell.com/707288 https://bugzilla.novell.com/708877 https://bugzilla.novell.com/711203 https://bugzilla.novell.com/711539 https://bugzilla.novell.com/712366 https://bugzilla.novell.com/714001 https://bugzilla.novell.com/716901 https://bugzilla.novell.com/722406 https://bugzilla.novell.com/726788 https://bugzilla.novell.com/732021 https://bugzilla.novell.com/734056 https://bugzilla.novell.com/745881 http://download.novell.com/patch/finder/?keywords=2e813f9c7b45c2dd561fb51cf3245000 From sle-updates at lists.suse.com Tue Mar 13 18:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 14 Mar 2012 01:08:17 +0100 (CET) Subject: SUSE-RU-2012:0365-1: moderate: Recommended update for SUSE Manager Message-ID: <20120314000817.A03463217D@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0365-1 Rating: moderate References: #719605 #722036 #722047 #733327 #736850 #741247 #742924 #742939 #743430 #743955 #744263 #744983 #745544 #746718 #747982 #748562 #748715 #749525 Affected Products: SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that has 18 recommended fixes can now be installed. It includes one version update. Description: This update fixes the following issues: * Enable SUSE Linux Enterprise Server and High Availability 11 SP2 channels * Enable SUSE Linux Enterprise Deskop 11 SP2 channels * Fix packaging issues in auditlog-keeper * Fix permissions of NOCpulse.ini * Fix permissions of /etc/rhn * Fix some branding issues * Enforce removal of zmd stack to support OES management * Added cracklib check to DB password dialog * Prevent SUSE Manager Server 1.2 updates to SLES 11 SP2 * Avoid cobbler exception during startup * Documentation update * Show legal note in the footer of all login pages * show eula in copyright page according to the installed product * create /srv/tftpboot if it does not exist * Fix a bug with cloning patches How to apply this update: 1. Log in as root user to the SUSE Manager server. 2. Stop the Spacewalk service: spacewalk-service stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: spacewalk-service start Indications: Everbody should update. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-suse-manager-201203-5951 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.2 for SLE 11 SP1 (x86_64): perl-Filesys-Df-0.92-5.4.1 spacewalk-backend-1.2.74-0.48.4 spacewalk-backend-app-1.2.74-0.48.4 spacewalk-backend-applet-1.2.74-0.48.4 spacewalk-backend-config-files-1.2.74-0.48.4 spacewalk-backend-config-files-common-1.2.74-0.48.4 spacewalk-backend-config-files-tool-1.2.74-0.48.4 spacewalk-backend-iss-1.2.74-0.48.4 spacewalk-backend-iss-export-1.2.74-0.48.4 spacewalk-backend-libs-1.2.74-0.48.4 spacewalk-backend-package-push-server-1.2.74-0.48.4 spacewalk-backend-server-1.2.74-0.48.4 spacewalk-backend-sql-1.2.74-0.48.4 spacewalk-backend-sql-oracle-1.2.74-0.48.4 spacewalk-backend-tools-1.2.74-0.48.4 spacewalk-backend-xml-export-libs-1.2.74-0.48.4 spacewalk-backend-xmlrpc-1.2.74-0.48.4 spacewalk-backend-xp-1.2.74-0.48.4 spacewalk-branding-1.2.2-0.20.2 suse-manager-server-release-1.2-1.2 susemanager-1.2.0-0.54.1 susemanager-tools-1.2.0-0.54.1 - SUSE Manager 1.2 for SLE 11 SP1 (noarch) [New Version: 0.2]: SputLite-client-0.48.12-0.10.1 SputLite-server-0.48.12-0.10.1 auditlog-keeper-0.2-0.6.2 nocpulse-common-2.1.19-0.10.2 osa-dispatcher-5.9.44-0.14.1 perl-NOCpulse-Probe-1.184.5-0.11.2 perl-NOCpulse-Probe-Oracle-1.184.5-0.11.2 sm-ncc-sync-data-1.2.0-0.36.2 spacewalk-admin-1.2.7-0.8.2 spacewalk-base-1.2.31-0.35.1 spacewalk-base-minimal-1.2.31-0.35.1 spacewalk-certs-tools-1.2.2-0.26.2 spacewalk-config-1.2.7-0.15.1 spacewalk-dobby-1.2.31-0.35.1 spacewalk-grail-1.2.31-0.35.1 spacewalk-html-1.2.31-0.35.1 spacewalk-java-1.2.115-0.54.2 spacewalk-java-config-1.2.115-0.54.2 spacewalk-java-lib-1.2.115-0.54.2 spacewalk-java-oracle-1.2.115-0.54.2 spacewalk-pxt-1.2.31-0.35.1 spacewalk-search-1.2.4-0.8.2 spacewalk-setup-1.2.16-0.24.2 spacewalk-sniglets-1.2.31-0.35.1 spacewalk-taskomatic-1.2.115-0.54.2 susemanager-client-config_en-pdf-1.2-0.42.2 susemanager-install_en-pdf-1.2-0.42.2 susemanager-jsp_en-1.2-0.36.4 susemanager-manuals_en-1.2-0.42.2 susemanager-proxy-quick_en-pdf-1.2-0.42.2 susemanager-quick_en-pdf-1.2-0.42.2 susemanager-reference_en-pdf-1.2-0.42.2 References: https://bugzilla.novell.com/719605 https://bugzilla.novell.com/722036 https://bugzilla.novell.com/722047 https://bugzilla.novell.com/733327 https://bugzilla.novell.com/736850 https://bugzilla.novell.com/741247 https://bugzilla.novell.com/742924 https://bugzilla.novell.com/742939 https://bugzilla.novell.com/743430 https://bugzilla.novell.com/743955 https://bugzilla.novell.com/744263 https://bugzilla.novell.com/744983 https://bugzilla.novell.com/745544 https://bugzilla.novell.com/746718 https://bugzilla.novell.com/747982 https://bugzilla.novell.com/748562 https://bugzilla.novell.com/748715 https://bugzilla.novell.com/749525 http://download.novell.com/patch/finder/?keywords=9a7a0b1d065900057bc1ddc53b8b9bdb From sle-updates at lists.suse.com Tue Mar 13 20:08:23 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 14 Mar 2012 03:08:23 +0100 (CET) Subject: SUSE-SU-2012:0366-1: moderate: Security update for rubygem-actionpack Message-ID: <20120314020823.04BB83219B@maintenance.suse.de> SUSE Security Update: Security update for rubygem-actionpack ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0366-1 Rating: moderate References: #668817 #712057 #712058 #712060 #712062 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: Ruby on Rails 2.1 received some security fixes. The following security issues have been fixed: rubygem-actionpack-2_1: * properly encode special html chars from strings with malformed unicode CVE-2011-2932 * properly encode \r\n in the content-type header CVE-2011-3186 * properly strip tags from strings with specially crafted values CVE-2011-2931 * XSS Risk with mail_to (CVE-2011-0446) * CSRF Vulnerability in protect_from_forgery: (CVE-2011-0447) rubygem-activerecord-2_1: * fix vulnerability in the quote_table_name method which could allow malicious users to inject arbitrary SQL into a query (CVE-2011-2930) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1fsp2-rubygem-actionpack-2_1-5875 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-rubygem-actionpack-2_1-5875 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): rubygem-actionpack-2_1-2.1.2-1.12.2 rubygem-activerecord-2_1-2.1.2-1.4.5 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): rubygem-actionpack-2_1-2.1.2-1.12.2 rubygem-activerecord-2_1-2.1.2-1.4.5 References: https://bugzilla.novell.com/668817 https://bugzilla.novell.com/712057 https://bugzilla.novell.com/712058 https://bugzilla.novell.com/712060 https://bugzilla.novell.com/712062 http://download.novell.com/patch/finder/?keywords=d47da4fd99cc8c7e9247d0c8c2fe1323 From sle-updates at lists.suse.com Tue Mar 13 21:08:12 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 14 Mar 2012 04:08:12 +0100 (CET) Subject: SUSE-RU-2012:0367-1: Recommended update for sled-release Message-ID: <20120314030812.4133E3219F@maintenance.suse.de> SUSE Recommended Update: Recommended update for sled-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0367-1 Rating: low References: #751548 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This updated product definition adds proper migration obsoletes for the Intel HD2000_3000 Add-On Product. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-sles-release-5961 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-sled-release-5960 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): sles-release-11.2-1.513 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): sled-release-11.2-1.513 References: https://bugzilla.novell.com/751548 http://download.novell.com/patch/finder/?keywords=785056e05ec307bf7ccde378c321427d http://download.novell.com/patch/finder/?keywords=de40a898b52de976b96b0f8ba46dd6f7 From sle-updates at lists.suse.com Tue Mar 13 22:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 14 Mar 2012 05:08:14 +0100 (CET) Subject: SUSE-RU-2012:0368-1: Recommended update for dhcp Message-ID: <20120314040814.942173219E@maintenance.suse.de> SUSE Recommended Update: Recommended update for dhcp ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0368-1 Rating: low References: #739696 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes the following issue for dhcp: * 739696: dhcp-client lease parsing problems Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-dhcp-5720 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-dhcp-5720 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-dhcp-5720 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-dhcp-5720 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): dhcp-devel-3.1.3.ESV-0.15.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): dhcp-3.1.3.ESV-0.15.1 dhcp-client-3.1.3.ESV-0.15.1 dhcp-relay-3.1.3.ESV-0.15.1 dhcp-server-3.1.3.ESV-0.15.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): dhcp-3.1.3.ESV-0.15.1 dhcp-client-3.1.3.ESV-0.15.1 dhcp-relay-3.1.3.ESV-0.15.1 dhcp-server-3.1.3.ESV-0.15.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): dhcp-3.1.3.ESV-0.15.1 dhcp-client-3.1.3.ESV-0.15.1 References: https://bugzilla.novell.com/739696 http://download.novell.com/patch/finder/?keywords=efc9b3833e82ab735fd88c422edd5e8e From sle-updates at lists.suse.com Fri Mar 16 05:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 16 Mar 2012 12:08:15 +0100 (CET) Subject: SUSE-RU-2012:0372-1: important: Recommended update for OpenSSH Message-ID: <20120316110815.CA6A932199@maintenance.suse.de> SUSE Recommended Update: Recommended update for OpenSSH ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0372-1 Rating: important References: #749147 Affected Products: SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a path error in the ssh-askpass wrapper (bnc#749147) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1fsp2-openssh-5912 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-openssh-5912 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-openssh-5912 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1fsp2-openssh-5912 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-openssh-5912 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): openssh-5.1p1-41.53.1 openssh-askpass-5.1p1-41.53.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): openssh-5.1p1-41.53.1 openssh-askpass-5.1p1-41.53.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): openssh-5.1p1-41.53.1 openssh-askpass-5.1p1-41.53.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): openssh-5.1p1-41.53.1 openssh-askpass-5.1p1-41.53.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): openssh-5.1p1-41.53.1 openssh-askpass-5.1p1-41.53.1 References: https://bugzilla.novell.com/749147 http://download.novell.com/patch/finder/?keywords=55d7d980075f389a72ab95cdd9b8d9d6 From sle-updates at lists.suse.com Fri Mar 16 06:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 16 Mar 2012 13:08:21 +0100 (CET) Subject: SUSE-OU-2012:0373-1: Optional update for sle-11-SP2-WebYaST-release Message-ID: <20120316120821.86F0232199@maintenance.suse.de> SUSE Optional Update: Optional update for sle-11-SP2-WebYaST-release ______________________________________________________________________________ Announcement ID: SUSE-OU-2012:0373-1 Rating: low References: #751243 Affected Products: WebYaST 1.2 ______________________________________________________________________________ An update that has one optional fix can now be installed. Description: This update provides a proper product definition for WebYaST for SUSE Linux Enterprise Server 11 SP2. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-sle-11-SP2-WebYaST-release-5959 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64): sle-11-SP2-WebYaST-release-1.2-1.4 sle-11-SP2-WebYaST-release-cd-1.2-1.4 References: https://bugzilla.novell.com/751243 http://download.novell.com/patch/finder/?keywords=087f272ee17ab36c07cfc38717185381 From sle-updates at lists.suse.com Fri Mar 16 06:08:24 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 16 Mar 2012 13:08:24 +0100 (CET) Subject: SUSE-RU-2012:0375-1: moderate: Recommended update for wpa_supplicant Message-ID: <20120316120824.37BF33219B@maintenance.suse.de> SUSE Recommended Update: Recommended update for wpa_supplicant ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0375-1 Rating: moderate References: #750646 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: Fix a regression introduced by the wpa_supplicant update that may cause the supplicant fail to associate with a WPA-EAP access point. Indications: Everyone using WPA EAP should update. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-wpa_supplicant-5950 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-wpa_supplicant-5950 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-wpa_supplicant-5950 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): wpa_supplicant-0.7.1-6.11.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): wpa_supplicant-0.7.1-6.11.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): wpa_supplicant-0.7.1-6.11.1 References: https://bugzilla.novell.com/750646 http://download.novell.com/patch/finder/?keywords=e7002f6e2f1cd4c71a9d1f5636ca0abf From sle-updates at lists.suse.com Fri Mar 16 06:08:25 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 16 Mar 2012 13:08:25 +0100 (CET) Subject: SUSE-RU-2012:0376-1: Recommended update for audit Message-ID: <20120316120825.8FB5F3219E@maintenance.suse.de> SUSE Recommended Update: Recommended update for audit ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0376-1 Rating: low References: #738976 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a problem where auditd fails to start when tcp_listen_port is specified (auditd.conf). The processing of tcp_listen_port was incorrect causing bind syscalls to fail. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-audit-5853 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-audit-5837 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-audit-5853 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-audit-5853 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-audit-5837 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-audit-5837 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-audit-5853 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-audit-5837 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): audit-devel-1.7.7-5.23.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): audit-libs-python-1.7.7-6.23.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): audit-devel-1.7.7-5.18.6.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): audit-libs-python-1.7.7-6.2.6.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): audit-1.7.7-5.23.1 audit-audispd-plugins-1.7.7-6.23.1 audit-libs-1.7.7-5.23.1 audit-libs-python-1.7.7-6.23.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): audit-libs-32bit-1.7.7-5.23.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): audit-1.7.7-5.23.1 audit-audispd-plugins-1.7.7-6.23.1 audit-libs-1.7.7-5.23.1 audit-libs-python-1.7.7-6.23.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): audit-libs-32bit-1.7.7-5.23.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): audit-libs-x86-1.7.7-5.23.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): audit-1.7.7-5.18.6.1 audit-audispd-plugins-1.7.7-6.2.6.1 audit-libs-1.7.7-5.18.6.1 audit-libs-python-1.7.7-6.2.6.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): audit-libs-32bit-1.7.7-5.18.6.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): audit-1.7.7-5.18.6.1 audit-audispd-plugins-1.7.7-6.2.6.1 audit-libs-1.7.7-5.18.6.1 audit-libs-python-1.7.7-6.2.6.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): audit-libs-32bit-1.7.7-5.18.6.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): audit-libs-x86-1.7.7-5.18.6.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): audit-1.7.7-5.23.1 audit-libs-1.7.7-5.23.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): audit-libs-32bit-1.7.7-5.23.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): audit-1.7.7-5.18.6.1 audit-libs-1.7.7-5.18.6.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): audit-libs-32bit-1.7.7-5.18.6.1 References: https://bugzilla.novell.com/738976 http://download.novell.com/patch/finder/?keywords=36409c5bc912cb37eb5ee5c278cb45e9 http://download.novell.com/patch/finder/?keywords=5c66e30e067eb84d0487a32e0bdd08a8 From sle-updates at lists.suse.com Fri Mar 16 06:08:26 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 16 Mar 2012 13:08:26 +0100 (CET) Subject: SUSE-RU-2012:0377-1: Recommended update for nfs-client Message-ID: <20120316120826.D1CA73219B@maintenance.suse.de> SUSE Recommended Update: Recommended update for nfs-client ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0377-1 Rating: low References: #689622 #733761 #743292 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This update fixes the following issues for nfs-utils: * 743292: exportfs: /proc/fs/nfs/exports:1: unknown keyword "test-client-(rw" * 689622: Improvement: Add more configuration options to nfsserver init script & YaST * 733761: add nfsv4leasetime configuration as NFSV4LEASETIME in the sysconfig file Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-nfs-client-5814 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-nfs-client-5814 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-nfs-client-5814 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): nfs-client-1.2.1-2.20.1 nfs-doc-1.2.1-2.20.1 nfs-kernel-server-1.2.1-2.20.1 - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64): nfs-client-1.2.1-2.20.1 nfs-doc-1.2.1-2.20.1 nfs-kernel-server-1.2.1-2.20.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): nfs-client-1.2.1-2.20.1 nfs-kernel-server-1.2.1-2.20.1 References: https://bugzilla.novell.com/689622 https://bugzilla.novell.com/733761 https://bugzilla.novell.com/743292 http://download.novell.com/patch/finder/?keywords=dea9f09dfb579fc72dd9f4e569c6df59 From sle-updates at lists.suse.com Fri Mar 16 23:08:12 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 17 Mar 2012 06:08:12 +0100 (CET) Subject: SUSE-RU-2012:0378-1: Recommended update for collectd Message-ID: <20120317050812.0722632283@maintenance.suse.de> SUSE Recommended Update: Recommended update for collectd ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0378-1 Rating: low References: #725803 Affected Products: WebYaST 1.2 SUSE Studio Standard Edition 1.2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update provides a rebuild of collect 4.9.4 with matching release numbers. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-collectd-5979 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-collectd-5979 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64): collectd-4.9.4-0.15.1 libcollectdclient-devel-4.9.4-0.15.1 libcollectdclient0-4.9.4-0.15.1 - SUSE Studio Standard Edition 1.2 (x86_64): collectd-4.9.4-0.15.1 libcollectdclient0-4.9.4-0.15.1 References: https://bugzilla.novell.com/725803 http://download.novell.com/patch/finder/?keywords=15c23ab80656cd5e0e5a5fa6a24475d0 From sle-updates at lists.suse.com Sat Mar 17 00:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 17 Mar 2012 07:08:14 +0100 (CET) Subject: SUSE-RU-2012:0379-1: Recommended update for sg3_utils Message-ID: <20120317060814.274DD32284@maintenance.suse.de> SUSE Recommended Update: Recommended update for sg3_utils ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0379-1 Rating: low References: #712645 #736188 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update of sg3_utils fixes two bugs in rescan-scsi-bus.sh: * bnc#712645: script error in rescan-scsi-bus.sh * bnc#736188: rescan-scsi-bus.sh fails to correctly scan LUN0 Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-sg3_utils-5815 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-sg3_utils-5815 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-sg3_utils-5815 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-sg3_utils-5815 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): sg3_utils-devel-1.28-0.7.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): sg3_utils-1.28-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): sg3_utils-1.28-0.7.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): sg3_utils-1.28-0.7.1 References: https://bugzilla.novell.com/712645 https://bugzilla.novell.com/736188 http://download.novell.com/patch/finder/?keywords=6d02c11218ca04e350f213f561280dc1 From sle-updates at lists.suse.com Sat Mar 17 00:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 17 Mar 2012 07:08:15 +0100 (CET) Subject: SUSE-RU-2012:0380-1: moderate: Recommended update for ocfs2-tools Message-ID: <20120317060815.6F9C732285@maintenance.suse.de> SUSE Recommended Update: Recommended update for ocfs2-tools ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0380-1 Rating: moderate References: #727592 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes endianess issues in ocfs2-tools. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-ocfs2-tools-5995 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64): ocfs2-tools-1.6.4-0.5.3 ocfs2-tools-devel-1.6.4-0.5.3 ocfs2-tools-o2cb-1.6.4-0.5.3 ocfs2console-1.6.4-0.5.3 References: https://bugzilla.novell.com/727592 http://download.novell.com/patch/finder/?keywords=68c4c18843417a581e1b93d21a4b7362 From sle-updates at lists.suse.com Sat Mar 17 00:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 17 Mar 2012 07:08:16 +0100 (CET) Subject: SUSE-RU-2012:0381-1: moderate: Recommended update for rubygem-gettext Message-ID: <20120317060816.CEE2F32284@maintenance.suse.de> SUSE Recommended Update: Recommended update for rubygem-gettext ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0381-1 Rating: moderate References: #723312 Affected Products: WebYaST 1.2 SUSE Studio Standard Edition 1.2 SUSE Studio Extension for System z 1.2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update provides a rebuild of the update to version 2.1.0 of the GetText rubygem for matching the WebYaST for 11 SP2 release. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-rubygem-gettext-5996 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-rubygem-gettext-5996 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-rubygem-gettext-5996 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64): rubygem-gettext-2.1.0-5.7.1 - SUSE Studio Standard Edition 1.2 (x86_64): rubygem-gettext-2.1.0-5.7.1 - SUSE Studio Extension for System z 1.2 (s390x): rubygem-gettext-2.1.0-5.7.1 References: https://bugzilla.novell.com/723312 http://download.novell.com/patch/finder/?keywords=3e1fb8aa1318ea1101e8618372b42c2d From sle-updates at lists.suse.com Sat Mar 17 01:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 17 Mar 2012 08:08:15 +0100 (CET) Subject: SUSE-RU-2012:0382-1: Recommended update for cluster-glue Message-ID: <20120317070815.7EFFE32287@maintenance.suse.de> SUSE Recommended Update: Recommended update for cluster-glue ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0382-1 Rating: low References: #636576 #641979 #662816 #694243 #727295 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP1 ______________________________________________________________________________ An update that has 5 recommended fixes can now be installed. It includes one version update. Description: This update of cluster-glue to version 1.0.8 brings many stability improvements and fixes for the following customer reports: * 636576: Many warnings about operation list with many resources * 641979: hb_report does not install debuginfo/debugsource packages * 662816: hb_report doesn't work correctly with interactive scripts in your .profile * 694243: ipmilan stonith device does not work * 727295: Simultaneous "crm history" runs from multiple nodes stomp on each other Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP1: zypper in -t patch sleshasp1-cluster-glue-5434 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.0.8]: cluster-glue-1.0.8-0.4.4.1 libglue-devel-1.0.8-0.4.4.1 libglue2-1.0.8-0.4.4.1 References: https://bugzilla.novell.com/636576 https://bugzilla.novell.com/641979 https://bugzilla.novell.com/662816 https://bugzilla.novell.com/694243 https://bugzilla.novell.com/727295 http://download.novell.com/patch/finder/?keywords=f8e8263a214f9c877d84e160c27e2100 From sle-updates at lists.suse.com Mon Mar 19 12:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 19 Mar 2012 19:08:15 +0100 (CET) Subject: SUSE-RU-2012:0384-1: moderate: Recommended update for syslogd Message-ID: <20120319180815.3DB0E323CB@maintenance.suse.de> SUSE Recommended Update: Recommended update for syslogd ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0384-1 Rating: moderate References: #626318 #750263 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update adds the missing "su" entry to the logrotate file to avoid logrotate warnings with the news log file (bnc#750263). In addition, the output of the postrotate script is now redirected to /dev/null to reduce noise (bnc#626318). Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc ppc64 s390x x86_64): syslogd-1.4.1-559.24.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): klogd-1.4.1-559.24.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): klogd-1.4.1-559.24.1 - SLE SDK 10 SP4 (i586 ia64 ppc ppc64 s390x x86_64): syslogd-1.4.1-559.24.1 References: https://bugzilla.novell.com/626318 https://bugzilla.novell.com/750263 http://download.novell.com/patch/finder/?keywords=97d48ad4add572fd753cc39f088bf167 From sle-updates at lists.suse.com Mon Mar 19 15:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 19 Mar 2012 22:08:14 +0100 (CET) Subject: SUSE-RU-2012:0385-1: Recommended update for syslog-ng Message-ID: <20120319210814.22CF0323C7@maintenance.suse.de> SUSE Recommended Update: Recommended update for syslog-ng ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0385-1 Rating: low References: #744036 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes the mark timestamp counter for handling system dates past the year 2038. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-syslog-ng-5772 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-syslog-ng-5772 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-syslog-ng-5772 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): syslog-ng-2.0.9-27.34.34.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): syslog-ng-2.0.9-27.34.34.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): syslog-ng-2.0.9-27.34.34.1 References: https://bugzilla.novell.com/744036 http://download.novell.com/patch/finder/?keywords=9d2bb144eadd6a3d9753a03c7d0265e8 From sle-updates at lists.suse.com Mon Mar 19 16:08:13 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 19 Mar 2012 23:08:13 +0100 (CET) Subject: SUSE-SU-2012:0386-1: Security update for Xen and libvirt Message-ID: <20120319220813.B01C2323C7@maintenance.suse.de> SUSE Security Update: Security update for Xen and libvirt ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0386-1 Rating: low References: #649209 #694863 #725169 #726332 #727515 #732782 #734826 #735403 #736824 #739585 #740165 Cross-References: CVE-2012-0029 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. It includes one version update. Description: This collective update 2012/02 for Xen provides fixes for the following reports: Xen: * 740165: Fix heap overflow in e1000 device emulation (applicable to Xen qemu - CVE-2012-0029) * 739585: Xen block-attach fails after repeated attach/detach * 727515: Fragmented packets hang network boot of HVM guest * 736824: Microcode patches for AMD's 15h processors panic the system * 732782: xm create hangs when maxmen value is enclosed in "quotes" * 734826: xm rename doesn't work anymore * 694863: kexec fails in xen * 726332: Fix considerable performance hit by previous changeset * 649209: Fix slow Xen live migrations libvirt * 735403: Fix connection with virt-manager as normal user virt-utils * Add Support for creating images that can be run on Microsoft Hyper-V host (Fix vpc file format. Add support for fixed disks) Security Issue references: * CVE-2012-0029 Indications: Every Xen user should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-xen-201202-5796 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-xen-201202-5796 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-xen-201202-5796 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-xen-201202-5796 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): libvirt-devel-0.7.6-1.29.2 xen-devel-4.0.3_21548_02-0.5.2 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 1.1.3]: libvirt-0.7.6-1.29.2 libvirt-doc-0.7.6-1.29.2 libvirt-python-0.7.6-1.29.2 virt-utils-1.1.3-1.5.1 xen-4.0.3_21548_02-0.5.2 xen-doc-html-4.0.3_21548_02-0.5.2 xen-doc-pdf-4.0.3_21548_02-0.5.2 xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 xen-libs-4.0.3_21548_02-0.5.2 xen-tools-4.0.3_21548_02-0.5.2 xen-tools-domU-4.0.3_21548_02-0.5.2 - SUSE Linux Enterprise Server 11 SP1 (i586): xen-kmp-pae-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 1.1.3]: libvirt-0.7.6-1.29.2 libvirt-doc-0.7.6-1.29.2 libvirt-python-0.7.6-1.29.2 virt-utils-1.1.3-1.5.1 xen-4.0.3_21548_02-0.5.2 xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 xen-libs-4.0.3_21548_02-0.5.2 xen-tools-4.0.3_21548_02-0.5.2 xen-tools-domU-4.0.3_21548_02-0.5.2 - SUSE Linux Enterprise Desktop 11 SP1 (i586): xen-kmp-pae-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 References: http://support.novell.com/security/cve/CVE-2012-0029.html https://bugzilla.novell.com/649209 https://bugzilla.novell.com/694863 https://bugzilla.novell.com/725169 https://bugzilla.novell.com/726332 https://bugzilla.novell.com/727515 https://bugzilla.novell.com/732782 https://bugzilla.novell.com/734826 https://bugzilla.novell.com/735403 https://bugzilla.novell.com/736824 https://bugzilla.novell.com/739585 https://bugzilla.novell.com/740165 http://download.novell.com/patch/finder/?keywords=cc26db394df4e1893e567ae94e3d664f From sle-updates at lists.suse.com Mon Mar 19 18:08:25 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 20 Mar 2012 01:08:25 +0100 (CET) Subject: SUSE-RU-2012:0387-1: Recommended update for atk Message-ID: <20120320000825.72CFD323C7@maintenance.suse.de> SUSE Recommended Update: Recommended update for atk ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0387-1 Rating: low References: #743659 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a crash when handling the underline-error attribute of pango drawing calls (bnc#743659). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-atk-5736 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-atk-5736 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-atk-5736 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-atk-5736 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): atk-devel-1.28.0-1.4.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): atk-doc-1.28.0-1.4.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64): atk-devel-32bit-1.28.0-1.4.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): atk-1.28.0-1.4.1 atk-doc-1.28.0-1.4.1 atk-lang-1.28.0-1.4.1 libatk-1_0-0-1.28.0-1.4.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64): libatk-1_0-0-32bit-1.28.0-1.4.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): atk-1.28.0-1.4.1 atk-doc-1.28.0-1.4.1 atk-lang-1.28.0-1.4.1 libatk-1_0-0-1.28.0-1.4.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64): libatk-1_0-0-32bit-1.28.0-1.4.1 - SUSE Linux Enterprise Server 11 SP1 (ia64): libatk-1_0-0-x86-1.28.0-1.4.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): atk-1.28.0-1.4.1 atk-devel-1.28.0-1.4.1 atk-lang-1.28.0-1.4.1 libatk-1_0-0-1.28.0-1.4.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64): libatk-1_0-0-32bit-1.28.0-1.4.1 References: https://bugzilla.novell.com/743659 http://download.novell.com/patch/finder/?keywords=003661d1bb02a397be5707756da6bea7 From sle-updates at lists.suse.com Tue Mar 20 08:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 20 Mar 2012 15:08:15 +0100 (CET) Subject: SUSE-RU-2012:0390-1: Recommended update for SUSE_SLED-SP2-migration and sled-release Message-ID: <20120320140815.7E94B323CF@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE_SLED-SP2-migration and sled-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0390-1 Rating: low References: #749912 Affected Products: SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update prepares the system for a System Upgrade to SUSE Linux Enterprise Desktop 11 SP2. Please follow the technical instruction document for the information on how to upgrade your system to SUSE Linux Enterprise Desktop 11 SP2: http://www.novell.com/support/documentLink.do?externalID=701 0200 Please have a look for more Information and Resources about SUSE Linux Enterprise Desktop 11 SP2 here: http://www.suse.com/promo/sle11sp2.html Indications: Enablement of Upgrade to SLED 11 SP2. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-SLED-SP2-Migration-5909 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): SUSE_SLED-SP2-migration-11.1-1.6 sled-release-11.1-1.206 References: https://bugzilla.novell.com/749912 http://download.novell.com/patch/finder/?keywords=378f0620624bf97c7cad20fd5d77340a From sle-updates at lists.suse.com Wed Mar 21 03:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 10:08:14 +0100 (CET) Subject: SUSE-RU-2012:0391-1: Recommended update for sle-hae-SP2-migration and sle-hae-release Message-ID: <20120321090814.75375323C4@maintenance.suse.de> SUSE Recommended Update: Recommended update for sle-hae-SP2-migration and sle-hae-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0391-1 Rating: low References: #707061 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise High Availability Extension 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update prepares the system for a System Upgrade to SUSE Linux Enterprise High Availability Extension 11 SP2. The technical instruction document contains many details on how to upgrade your system: http://www.novell.com/support/documentLink.do?externalID=701 0200 Please have a look for more Information and Resources about SUSE Linux Enterprise 11 SP2 here: http://www.suse.com/promo/sle11sp2.html Indications: SLE11 SDK Online Migration to SP2. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-SDK-SP2-Migration-5914 - SUSE Linux Enterprise High Availability Extension 11 SP1: zypper in -t patch sleshasp1-SLE-HA-SP2-Migration-5913 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): sle-sdk-SP2-migration-11.1-1.6 sle-sdk-release-11.1-1.60 - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64 s390x x86_64): sle-hae-SP2-migration-11.1-1.6 sle-hae-release-11.1-1.62 References: https://bugzilla.novell.com/707061 http://download.novell.com/patch/finder/?keywords=3e21ea97c4f5eba184d5d23250ed6bed http://download.novell.com/patch/finder/?keywords=4da26703f1fbb8b6d1f8ea4a7598937b From sle-updates at lists.suse.com Wed Mar 21 03:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 10:08:16 +0100 (CET) Subject: SUSE-YU-2012:0392-1: YOU update for Software Update Stack Message-ID: <20120321090816.882C4323C2@maintenance.suse.de> SUSE YOU Update: YOU update for Software Update Stack ______________________________________________________________________________ Announcement ID: SUSE-YU-2012:0392-1 Rating: low References: #744094 #746313 #748144 #749418 #750485 #750746 #751147 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has 7 YOU fixes can now be installed. It includes 5 new package versions. Description: This Software Update Stack Update 2012/03 fixes the following reports: libsatsolver: * change duprule generation to ignore uninstallable packages [bnc#750485] * repo2solv: fix parsing code 10 product.xml (bnc#744094) libzypp: * Apply soft locks by name and not per package (bnc#749418) * Fix support for NTLM authentication (fate#305546) zypper: * Fix augeas lense enforcing a non empty anonymous section (bnc#748144) yast2-wagon: * Always ensure to remove migration products if the workflow is aborted (bnc#750746) * Automatically save solver test case in the migration proposal dialog for easy debugging (saved to /var/log/YaST2/wagon_test_case directory) (bnc#746313) * Avoid downgrading of release packages (bnc#751147) yast2-pkg-bindings: * Add functionality to avoid downgrading of release packages (bnc#751147) Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE YOU Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-softwaremgmt-201203-5957 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-softwaremgmt-201203-5957 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-softwaremgmt-201203-5957 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-softwaremgmt-201203-5957 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 x86_64) [New Version: 0.17.5 and 9.11.9]: libsatsolver-devel-0.17.5-0.5.1 libzypp-devel-9.11.9-0.5.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (noarch) [New Version: 2.17.58]: yast2-pkg-bindings-devel-doc-2.17.58-0.5.1 yast2-pkg-bindings-devel-doc-2.17.58-0.5.2 - SUSE Linux Enterprise Software Development Kit 11 SP2 (s390x) [New Version: 0.17.5 and 9.11.9]: libsatsolver-devel-0.17.5-0.5.2 libzypp-devel-9.11.9-0.5.2 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 0.17.5,1.6.162,2.17.58 and 9.11.9]: libzypp-9.11.9-0.5.1 satsolver-tools-0.17.5-0.5.1 yast2-pkg-bindings-2.17.58-0.5.1 zypper-1.6.162-0.5.2 zypper-log-1.6.162-0.5.2 - SUSE Linux Enterprise Server 11 SP2 for VMware (noarch) [New Version: 2.17.32]: yast2-wagon-2.17.32-0.7.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 x86_64) [New Version: 0.17.5,1.6.162,2.17.58 and 9.11.9]: libzypp-9.11.9-0.5.1 satsolver-tools-0.17.5-0.5.1 yast2-pkg-bindings-2.17.58-0.5.1 zypper-1.6.162-0.5.2 zypper-log-1.6.162-0.5.2 - SUSE Linux Enterprise Server 11 SP2 (noarch) [New Version: 2.17.32]: yast2-wagon-2.17.32-0.7.1 yast2-wagon-2.17.32-0.7.2 - SUSE Linux Enterprise Server 11 SP2 (s390x) [New Version: 0.17.5,1.6.162,2.17.58 and 9.11.9]: libzypp-9.11.9-0.5.2 satsolver-tools-0.17.5-0.5.2 yast2-pkg-bindings-2.17.58-0.5.2 zypper-1.6.162-0.5.3 zypper-log-1.6.162-0.5.3 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.17.5,1.6.162,2.17.58 and 9.11.9]: libzypp-9.11.9-0.5.1 satsolver-tools-0.17.5-0.5.1 yast2-pkg-bindings-2.17.58-0.5.1 zypper-1.6.162-0.5.2 zypper-log-1.6.162-0.5.2 - SUSE Linux Enterprise Desktop 11 SP2 (noarch) [New Version: 2.17.32]: yast2-wagon-2.17.32-0.7.1 References: https://bugzilla.novell.com/744094 https://bugzilla.novell.com/746313 https://bugzilla.novell.com/748144 https://bugzilla.novell.com/749418 https://bugzilla.novell.com/750485 https://bugzilla.novell.com/750746 https://bugzilla.novell.com/751147 http://download.novell.com/patch/finder/?keywords=923b84ad35843c47520926fd4f907365 From sle-updates at lists.suse.com Wed Mar 21 04:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 11:08:16 +0100 (CET) Subject: SUSE-RU-2012:0390-2: Recommended update for SLES-for-VMware-SP2-migration and SLES-for-VMware-release Message-ID: <20120321100816.35FC3323C0@maintenance.suse.de> SUSE Recommended Update: Recommended update for SLES-for-VMware-SP2-migration and SLES-for-VMware-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0390-2 Rating: low References: #749912 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update prepares the system for a System Upgrade to SUSE Linux Enterprise Server for VMware 11 SP2. Please follow the technical instruction document for the information on how to upgrade your system to SUSE Linux Enterprise Server 11 SP2: http://www.novell.com/support/documentLink.do?externalID=701 0200 Please have a look for more Information and Resources about SUSE Linux Enterprise Server 11 SP2 here: http://www.suse.com/promo/sle11sp2.html Indications: Enablement of Upgrade to SLES 11 SP2. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-SLES-for-VMware-SP2-Migration-5915 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-SLES-SP2-Migration-5910 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): SLES-for-VMware-SP2-migration-11.1-1.5 SLES-for-VMware-release-11.1-1.69 SLES-for-VMware-release-DVD-11.1-1.69 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): SUSE_SLES-SP2-migration-11.1-1.6 sles-release-11.1-1.206 References: https://bugzilla.novell.com/749912 http://download.novell.com/patch/finder/?keywords=54f892ed28b7f92ccedb19ca8c3d2dcb http://download.novell.com/patch/finder/?keywords=d8b5cbad37e5e64cf55205c164611435 From sle-updates at lists.suse.com Wed Mar 21 04:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 11:08:17 +0100 (CET) Subject: SUSE-SU-2012:0393-1: Security update for Mono Message-ID: <20120321100817.A727F323C4@maintenance.suse.de> SUSE Security Update: Security update for Mono ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0393-1 Rating: low References: #648080 Cross-References: CVE-2010-3332 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The FORMS authentication methods of mono ASP.net implementation were vulnerable to a padding oracle attack as described in CVE-2010-3332, as they did encryption after checksum. This update changes the method to checksum after encryption to avoid this attack. Security Issue reference: * CVE-2010-3332 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): mono-core-1.2.2-12.32.1 mono-data-1.2.2-12.32.1 mono-data-firebird-1.2.2-12.32.1 mono-data-oracle-1.2.2-12.32.1 mono-data-postgresql-1.2.2-12.32.1 mono-data-sqlite-1.2.2-12.32.1 mono-data-sybase-1.2.2-12.32.1 mono-locale-extras-1.2.2-12.32.1 mono-nunit-1.2.2-12.32.1 mono-web-1.2.2-12.32.1 mono-winforms-1.2.2-12.32.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): mono-core-32bit-1.2.2-12.32.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): mono-core-x86-1.2.2-12.32.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): bytefx-data-mysql-1.2.2-12.32.1 ibm-data-db2-1.2.2-12.32.1 mono-core-1.2.2-12.32.1 mono-data-1.2.2-12.32.1 mono-data-firebird-1.2.2-12.32.1 mono-data-oracle-1.2.2-12.32.1 mono-data-postgresql-1.2.2-12.32.1 mono-data-sqlite-1.2.2-12.32.1 mono-data-sybase-1.2.2-12.32.1 mono-devel-1.2.2-12.32.1 mono-extras-1.2.2-12.32.1 mono-locale-extras-1.2.2-12.32.1 mono-nunit-1.2.2-12.32.1 mono-web-1.2.2-12.32.1 mono-winforms-1.2.2-12.32.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): mono-core-32bit-1.2.2-12.32.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): bytefx-data-mysql-1.2.2-12.32.1 ibm-data-db2-1.2.2-12.32.1 mono-core-1.2.2-12.32.1 mono-data-1.2.2-12.32.1 mono-data-firebird-1.2.2-12.32.1 mono-data-oracle-1.2.2-12.32.1 mono-data-postgresql-1.2.2-12.32.1 mono-data-sqlite-1.2.2-12.32.1 mono-data-sybase-1.2.2-12.32.1 mono-devel-1.2.2-12.32.1 mono-extras-1.2.2-12.32.1 mono-jscript-1.2.2-12.32.1 mono-locale-extras-1.2.2-12.32.1 mono-nunit-1.2.2-12.32.1 mono-web-1.2.2-12.32.1 mono-winforms-1.2.2-12.32.1 - SLE SDK 10 SP4 (s390x x86_64): mono-core-32bit-1.2.2-12.32.1 - SLE SDK 10 SP4 (ia64): mono-core-x86-1.2.2-12.32.1 References: http://support.novell.com/security/cve/CVE-2010-3332.html https://bugzilla.novell.com/648080 http://download.novell.com/patch/finder/?keywords=acf3e342c719d9e5ee642a15f5422903 From sle-updates at lists.suse.com Wed Mar 21 05:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 12:08:17 +0100 (CET) Subject: SUSE-YU-2012:0394-1: YOU update for Software Update Stack Message-ID: <20120321110817.66A61323C4@maintenance.suse.de> SUSE YOU Update: YOU update for Software Update Stack ______________________________________________________________________________ Announcement ID: SUSE-YU-2012:0394-1 Rating: low References: #680630 #719690 #742198 #744094 #746313 #749418 #750485 #750746 #751147 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Point of Service 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has 9 YOU fixes can now be installed. It includes 5 new package versions. Description: This Software Update Stack Update 2012/03 fixes the following reports: libsatsolver: * change duprule generation to ignore uninstallable packages [bnc#750485] * repo2solv: fix parsing code 10 product.xml (bnc#744094) libzypp: * Apply soft locks by name and not per package (bnc#749418) zypper: * Return nonzero (104 - INF_CAP_NOT_FOUND) when query matches no package (bnc#719690) * Fix handling of locked patches (bnc#742198) * Update manpage to give some repo URI examples (bnc#680630) yast2-wagon: * Automatically save solver test case in the migration proposal dialog for easy debugging (saved to /var/log/YaST2/wagon_test_case directory) (bnc#746313) * Avoid downgrading of release packages (bnc#751147) * Always ensure to remove migration products if the workflow is aborted (bnc#750746) yast2-pkg-bindings: * Add functionality to avoid downgrading of release packages (bnc#751147) Special Instructions and Notes: This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. This update triggers a restart of the software management stack. More updates will be available for installation after applying this update and restarting the application. Patch Instructions: To install this SUSE YOU Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-softwaremgmt-201203-5947 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-softwaremgmt-201203-5947 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-softwaremgmt-201203-5947 - SUSE Linux Enterprise Point of Service 11 SP1: zypper in -t patch sleposp1-softwaremgmt-201203-5947 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-softwaremgmt-201203-5947 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.14.20 and 6.37.6]: libsatsolver-devel-0.14.20-0.3.1 libzypp-devel-6.37.6-0.3.1 ruby-satsolver-0.14.20-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (noarch) [New Version: 2.17.45.6]: yast2-pkg-bindings-devel-doc-2.17.45.6-0.4.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 0.14.20,1.3.18,2.17.45.6 and 6.37.6]: libzypp-6.37.6-0.3.1 perl-satsolver-0.14.20-0.3.1 python-satsolver-0.14.20-0.3.1 satsolver-tools-0.14.20-0.3.1 yast2-pkg-bindings-2.17.45.6-0.4.1 zypper-1.3.18-0.3.2 - SUSE Linux Enterprise Server 11 SP1 for VMware (noarch) [New Version: 2.17.17.11]: yast2-wagon-2.17.17.11-0.4.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.14.20,1.3.18,2.17.45.6 and 6.37.6]: libzypp-6.37.6-0.3.1 perl-satsolver-0.14.20-0.3.1 python-satsolver-0.14.20-0.3.1 satsolver-tools-0.14.20-0.3.1 yast2-pkg-bindings-2.17.45.6-0.4.1 zypper-1.3.18-0.3.2 - SUSE Linux Enterprise Server 11 SP1 (noarch) [New Version: 2.17.17.11]: yast2-wagon-2.17.17.11-0.4.1 - SUSE Linux Enterprise Point of Service 11 SP1 (x86_64): yast2-pkg-bindings-2.17.45.6-0.4.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.14.20,1.3.18,2.17.45.6 and 6.37.6]: libzypp-6.37.6-0.3.1 perl-satsolver-0.14.20-0.3.1 python-satsolver-0.14.20-0.3.1 satsolver-tools-0.14.20-0.3.1 yast2-pkg-bindings-2.17.45.6-0.4.1 zypper-1.3.18-0.3.2 - SUSE Linux Enterprise Desktop 11 SP1 (noarch) [New Version: 2.17.17.11]: yast2-wagon-2.17.17.11-0.4.1 References: https://bugzilla.novell.com/680630 https://bugzilla.novell.com/719690 https://bugzilla.novell.com/742198 https://bugzilla.novell.com/744094 https://bugzilla.novell.com/746313 https://bugzilla.novell.com/749418 https://bugzilla.novell.com/750485 https://bugzilla.novell.com/750746 https://bugzilla.novell.com/751147 http://download.novell.com/patch/finder/?keywords=ecbb6620279f04f2283c8d8d3b171fda From sle-updates at lists.suse.com Wed Mar 21 07:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 14:08:14 +0100 (CET) Subject: SUSE-RU-2012:0395-1: important: Recommended update for perl-IO-Socket-INET6 Message-ID: <20120321130814.629C1323C4@maintenance.suse.de> SUSE Recommended Update: Recommended update for perl-IO-Socket-INET6 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0395-1 Rating: important References: #749571 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a regression in handling multihome hosts (hosts that have both a IPv6 and a IPv4 address assigned). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-perl-IO-Socket-INET6-5954 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-perl-IO-Socket-INET6-5954 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-perl-IO-Socket-INET6-5954 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-perl-IO-Socket-INET6-5954 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-perl-IO-Socket-INET6-5954 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-perl-IO-Socket-INET6-5954 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-perl-IO-Socket-INET6-5954 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): perl-IO-Socket-INET6-2.56-3.10.4.1 References: https://bugzilla.novell.com/749571 http://download.novell.com/patch/finder/?keywords=1dca665f6c6c5dac11595abfbf1d13ef From sle-updates at lists.suse.com Wed Mar 21 14:08:11 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 21 Mar 2012 21:08:11 +0100 (CET) Subject: SUSE-SU-2012:0201-2: moderate: Security update for lighttpd Message-ID: <20120321200811.C471A323C0@maintenance.suse.de> SUSE Security Update: Security update for lighttpd ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0201-2 Rating: moderate References: #733607 Cross-References: CVE-2011-4362 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update of lighttpd fixes an out-of-bounds read due to a signedness error which could have caused a Denial of Service (CVE-2011-4362). Security Issue reference: * CVE-2011-4362 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-lighttpd-6002 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64): lighttpd-1.4.20-2.46.10 References: http://support.novell.com/security/cve/CVE-2011-4362.html https://bugzilla.novell.com/733607 http://download.novell.com/patch/finder/?keywords=dd6c296252c3013697b6a2717cc65b62 From sle-updates at lists.suse.com Thu Mar 22 15:08:15 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 22 Mar 2012 22:08:15 +0100 (CET) Subject: SUSE-OU-2012:0404-1: [TRACKERBUG] Add ext4-writeable-kmp to SLES/SLED11 Unsupported Extras channel Message-ID: <20120322210815.2A1DC3229C@maintenance.suse.de> SUSE Optional Update: [TRACKERBUG] Add ext4-writeable-kmp to SLES/SLED11 Unsupported Extras channel ______________________________________________________________________________ Announcement ID: SUSE-OU-2012:0404-1 Rating: low References: #753573 Affected Products: SLE 11 SERVER Unsupported Extras SLE 11 DESKTOP Unsupported Extras ______________________________________________________________________________ An update that has one optional fix can now be installed. Description: This update provides the ext4-writeable Kernel Module Package (kmp) for SUSE Linux Enterprise 11 SP2. Package List: - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): ext4-writeable-kmp-default-0_3.0.23_0.5-0.12.3 - SLE 11 SERVER Unsupported Extras (i586 x86_64): ext4-writeable-kmp-xen-0_3.0.23_0.5-0.12.3 - SLE 11 SERVER Unsupported Extras (ppc64): ext4-writeable-kmp-ppc64-0_3.0.23_0.5-0.12.3 - SLE 11 SERVER Unsupported Extras (i586): ext4-writeable-kmp-pae-0_3.0.23_0.5-0.12.3 - SLE 11 DESKTOP Unsupported Extras (i586 x86_64): ext4-writeable-kmp-default-0_3.0.23_0.5-0.12.3 ext4-writeable-kmp-xen-0_3.0.23_0.5-0.12.3 - SLE 11 DESKTOP Unsupported Extras (i586): ext4-writeable-kmp-pae-0_3.0.23_0.5-0.12.3 References: https://bugzilla.novell.com/753573 http://download.novell.com/patch/finder/?keywords=69c28b1a5606c6c12e765befb6fcc42e From sle-updates at lists.suse.com Thu Mar 22 22:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 23 Mar 2012 05:08:14 +0100 (CET) Subject: SUSE-RU-2012:0405-1: moderate: Recommended update for iscsitarget Message-ID: <20120323040815.0250C323B2@maintenance.suse.de> SUSE Recommended Update: Recommended update for iscsitarget ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0405-1 Rating: moderate References: #710353 #732751 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Real Time 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update for iscsitarget provides the following fixes: * Add obsoletes on old tgt versions that unconditionally obsoleted iscsitarget versions (bnc#732751) * Install the correct services file for the firewall (bnc#710353) * Define _GNU_SOURCE to get correct prototypes from glibc. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-iscsitarget-5966 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-iscsitarget-5966 - SUSE Linux Enterprise Real Time 11 SP1: zypper in -t patch slertesp1-iscsitarget-5966 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-iscsitarget-5966 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): iscsitarget-1.4.19-0.9.11.6 iscsitarget-kmp-default-1.4.19_2.6.32.54_0.3-0.9.11.6 iscsitarget-kmp-trace-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586): iscsitarget-kmp-pae-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): iscsitarget-1.4.19-0.9.11.6 iscsitarget-kmp-default-1.4.19_2.6.32.54_0.3-0.9.11.6 iscsitarget-kmp-trace-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64): iscsitarget-kmp-xen-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Server 11 SP1 (ppc64): iscsitarget-kmp-ppc64-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Server 11 SP1 (i586): iscsitarget-kmp-pae-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Real Time 11 SP1 (x86_64): iscsitarget-kmp-rt-1.4.19_2.6.33.20_rt31_0.3-0.9.11.6 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): iscsitarget-1.4.19-0.9.11.6 iscsitarget-kmp-default-1.4.19_2.6.32.54_0.3-0.9.11.6 iscsitarget-kmp-xen-1.4.19_2.6.32.54_0.3-0.9.11.6 - SUSE Linux Enterprise Desktop 11 SP1 (i586): iscsitarget-kmp-pae-1.4.19_2.6.32.54_0.3-0.9.11.6 References: https://bugzilla.novell.com/710353 https://bugzilla.novell.com/732751 http://download.novell.com/patch/finder/?keywords=60b4178181926f591ef1606790495762 From sle-updates at lists.suse.com Fri Mar 23 16:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 23 Mar 2012 23:08:16 +0100 (CET) Subject: SUSE-RU-2012:0406-1: Recommended update for SMT Message-ID: <20120323220816.98BE1323C0@maintenance.suse.de> SUSE Recommended Update: Recommended update for SMT ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0406-1 Rating: low References: #695852 #738904 #747194 Affected Products: Subscription Management Tool 10 SP3 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This update fixes the following issues: * fix "smt mirror --clean" to clean all repositories * fix typo in module name * require openssl-certs to get new CA certificate which is used on Novell registration and update servers Indications: Everbody should update. Package List: - Subscription Management Tool 10 SP3 (i586 x86_64): smt-1.0.18-0.5.1 References: https://bugzilla.novell.com/695852 https://bugzilla.novell.com/738904 https://bugzilla.novell.com/747194 http://download.novell.com/patch/finder/?keywords=672926ced14f458d34f8ae81bc55c548 From sle-updates at lists.suse.com Fri Mar 23 17:08:30 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 00:08:30 +0100 (CET) Subject: SUSE-RU-2012:0407-1: moderate: Recommended update for seahorse Message-ID: <20120323230830.5A9D6323B2@maintenance.suse.de> SUSE Recommended Update: Recommended update for seahorse ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0407-1 Rating: moderate References: #697847 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a inconsistency in the keyring management which might show previously removed passwords again (bnc#697847). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-seahorse-5841 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-seahorse-5841 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-seahorse-5841 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-seahorse-5841 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): seahorse-2.28.1-0.3.1 seahorse-devel-2.28.1-0.3.1 seahorse-lang-2.28.1-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): seahorse-2.28.1-0.3.1 seahorse-devel-2.28.1-0.3.1 seahorse-lang-2.28.1-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): seahorse-2.28.1-0.3.1 seahorse-lang-2.28.1-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): seahorse-2.28.1-0.3.1 seahorse-lang-2.28.1-0.3.1 References: https://bugzilla.novell.com/697847 http://download.novell.com/patch/finder/?keywords=83bd11c5dd62329df7ab3234589377e9 From sle-updates at lists.suse.com Fri Mar 23 17:08:43 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 00:08:43 +0100 (CET) Subject: SUSE-RU-2012:0408-1: Recommended update for autofs Message-ID: <20120323230843.29118323B2@maintenance.suse.de> SUSE Recommended Update: Recommended update for autofs ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0408-1 Rating: low References: #739637 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes parsing of maps in multimount format (bnc#739637). Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): autofs-4.1.4-23.34.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): autofs-4.1.4-23.34.1 References: https://bugzilla.novell.com/739637 http://download.novell.com/patch/finder/?keywords=7db07bbe1cead194efc003cc01478351 From sle-updates at lists.suse.com Fri Mar 23 17:08:55 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 00:08:55 +0100 (CET) Subject: SUSE-RU-2012:0409-1: moderate: Recommended update for seahorse-plugins Message-ID: <20120323230855.629A8323C0@maintenance.suse.de> SUSE Recommended Update: Recommended update for seahorse-plugins ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0409-1 Rating: moderate References: #729159 Affected Products: SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes a crash of X during login when seahorse-agent is being used (bnc#729159). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-seahorse-plugins-5777 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): seahorse-plugins-2.28.1-0.3.1 seahorse-plugins-applet-2.28.1-0.3.1 seahorse-plugins-gedit-2.28.1-0.3.1 seahorse-plugins-lang-2.28.1-0.3.1 seahorse-plugins-nautilus-2.28.1-0.3.1 References: https://bugzilla.novell.com/729159 http://download.novell.com/patch/finder/?keywords=e9c545f66760ff252b92be0b5343b5f2 From sle-updates at lists.suse.com Fri Mar 23 20:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 03:08:16 +0100 (CET) Subject: SUSE-RU-2012:0410-1: moderate: Recommended update for syslogd Message-ID: <20120324020816.76DD932294@maintenance.suse.de> SUSE Recommended Update: Recommended update for syslogd ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0410-1 Rating: moderate References: #750263 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update adds the missing "su" entry to the logrotate file to avoid logrotate warnings with the news log file (bnc#750263) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-klogd-5969 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-klogd-5969 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-klogd-5969 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-klogd-5969 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-klogd-5969 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-klogd-5969 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-klogd-5969 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): syslogd-1.4.1-708.39.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): syslogd-1.4.1-708.39.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): klogd-1.4.1-708.39.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): klogd-1.4.1-708.39.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): klogd-1.4.1-708.39.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): klogd-1.4.1-708.39.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): klogd-1.4.1-708.39.1 References: https://bugzilla.novell.com/750263 http://download.novell.com/patch/finder/?keywords=36e02d29cd9842d40a0581b441555a44 From sle-updates at lists.suse.com Fri Mar 23 20:08:28 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 03:08:28 +0100 (CET) Subject: SUSE-SU-2012:0411-1: important: Security update for PHP5 Message-ID: <20120324020828.216203229C@maintenance.suse.de> SUSE Security Update: Security update for PHP5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0411-1 Rating: important References: #741520 #741859 #742273 #742806 #743308 #744966 #746661 #749111 Cross-References: CVE-2011-4153 CVE-2011-4885 CVE-2012-0057 CVE-2012-0781 CVE-2012-0788 CVE-2012-0789 CVE-2012-0807 CVE-2012-0830 CVE-2012-0831 Affected Products: SUSE Linux Enterprise Server 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This update of php5 fixes multiple security flaws: * CVE-2011-4153, missing checks of return values could allow remote attackers to cause a denial of service (NULL pointer dereference) * CVE-2011-4885, denial of service via hash collisions * CVE-2012-0057, specially crafted XSLT stylesheets could allow remote attackers to create arbitrary files with arbitrary content * CVE-2012-0781, remote attackers can cause a denial of service via specially crafted input to an application that attempts to perform Tidy::diagnose operations * CVE-2012-0788, applications that use a PDO driver were prone to denial of service flaws which could be exploited remotely * CVE-2012-0789, memory leak in the timezone functionality could allow remote attackers to cause a denial of service (memory consumption) * CVE-2012-0807, a stack based buffer overflow in php5's Suhosin extension could allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header * CVE-2012-0830, this fixes an incorrect fix for CVE-2011-4885 which could allow remote attackers to execute arbitrary code via a request containing a large number of variables * CVE-2012-0831, temporary changes to the magic_quotes_gpc directive during the importing of environment variables is not properly performed which makes it easier for remote attackers to conduct SQL injections Security Issue references: * CVE-2011-4153 * CVE-2011-4885 * CVE-2012-0057 * CVE-2012-0781 * CVE-2012-0788 * CVE-2012-0789 * CVE-2012-0807 * CVE-2012-0830 * CVE-2012-0831 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): apache2-mod_php5-5.2.14-0.26.3 php5-5.2.14-0.26.3 php5-bcmath-5.2.14-0.26.3 php5-bz2-5.2.14-0.26.3 php5-calendar-5.2.14-0.26.3 php5-ctype-5.2.14-0.26.3 php5-curl-5.2.14-0.26.3 php5-dba-5.2.14-0.26.3 php5-dbase-5.2.14-0.26.3 php5-devel-5.2.14-0.26.3 php5-dom-5.2.14-0.26.3 php5-exif-5.2.14-0.26.3 php5-fastcgi-5.2.14-0.26.3 php5-ftp-5.2.14-0.26.3 php5-gd-5.2.14-0.26.3 php5-gettext-5.2.14-0.26.3 php5-gmp-5.2.14-0.26.3 php5-hash-5.2.14-0.26.3 php5-iconv-5.2.14-0.26.3 php5-imap-5.2.14-0.26.3 php5-json-5.2.14-0.26.3 php5-ldap-5.2.14-0.26.3 php5-mbstring-5.2.14-0.26.3 php5-mcrypt-5.2.14-0.26.3 php5-mhash-5.2.14-0.26.3 php5-mysql-5.2.14-0.26.3 php5-ncurses-5.2.14-0.26.3 php5-odbc-5.2.14-0.26.3 php5-openssl-5.2.14-0.26.3 php5-pcntl-5.2.14-0.26.3 php5-pdo-5.2.14-0.26.3 php5-pear-5.2.14-0.26.3 php5-pgsql-5.2.14-0.26.3 php5-posix-5.2.14-0.26.3 php5-pspell-5.2.14-0.26.3 php5-shmop-5.2.14-0.26.3 php5-snmp-5.2.14-0.26.3 php5-soap-5.2.14-0.26.3 php5-sockets-5.2.14-0.26.3 php5-sqlite-5.2.14-0.26.3 php5-suhosin-5.2.14-0.26.3 php5-sysvmsg-5.2.14-0.26.3 php5-sysvsem-5.2.14-0.26.3 php5-sysvshm-5.2.14-0.26.3 php5-tokenizer-5.2.14-0.26.3 php5-wddx-5.2.14-0.26.3 php5-xmlreader-5.2.14-0.26.3 php5-xmlrpc-5.2.14-0.26.3 php5-xsl-5.2.14-0.26.3 php5-zlib-5.2.14-0.26.3 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): apache2-mod_php5-5.2.14-0.26.3 php5-5.2.14-0.26.3 php5-bcmath-5.2.14-0.26.3 php5-bz2-5.2.14-0.26.3 php5-calendar-5.2.14-0.26.3 php5-ctype-5.2.14-0.26.3 php5-curl-5.2.14-0.26.3 php5-dba-5.2.14-0.26.3 php5-dbase-5.2.14-0.26.3 php5-devel-5.2.14-0.26.3 php5-dom-5.2.14-0.26.3 php5-exif-5.2.14-0.26.3 php5-fastcgi-5.2.14-0.26.3 php5-ftp-5.2.14-0.26.3 php5-gd-5.2.14-0.26.3 php5-gettext-5.2.14-0.26.3 php5-gmp-5.2.14-0.26.3 php5-hash-5.2.14-0.26.3 php5-iconv-5.2.14-0.26.3 php5-imap-5.2.14-0.26.3 php5-ldap-5.2.14-0.26.3 php5-mbstring-5.2.14-0.26.3 php5-mcrypt-5.2.14-0.26.3 php5-mhash-5.2.14-0.26.3 php5-mysql-5.2.14-0.26.3 php5-ncurses-5.2.14-0.26.3 php5-odbc-5.2.14-0.26.3 php5-openssl-5.2.14-0.26.3 php5-pcntl-5.2.14-0.26.3 php5-pdo-5.2.14-0.26.3 php5-pear-5.2.14-0.26.3 php5-pgsql-5.2.14-0.26.3 php5-posix-5.2.14-0.26.3 php5-pspell-5.2.14-0.26.3 php5-shmop-5.2.14-0.26.3 php5-snmp-5.2.14-0.26.3 php5-soap-5.2.14-0.26.3 php5-sockets-5.2.14-0.26.3 php5-sqlite-5.2.14-0.26.3 php5-suhosin-5.2.14-0.26.3 php5-sysvmsg-5.2.14-0.26.3 php5-sysvsem-5.2.14-0.26.3 php5-sysvshm-5.2.14-0.26.3 php5-tidy-5.2.14-0.26.3 php5-tokenizer-5.2.14-0.26.3 php5-wddx-5.2.14-0.26.3 php5-xmlreader-5.2.14-0.26.3 php5-xmlrpc-5.2.14-0.26.3 php5-xsl-5.2.14-0.26.3 php5-zlib-5.2.14-0.26.3 References: http://support.novell.com/security/cve/CVE-2011-4153.html http://support.novell.com/security/cve/CVE-2011-4885.html http://support.novell.com/security/cve/CVE-2012-0057.html http://support.novell.com/security/cve/CVE-2012-0781.html http://support.novell.com/security/cve/CVE-2012-0788.html http://support.novell.com/security/cve/CVE-2012-0789.html http://support.novell.com/security/cve/CVE-2012-0807.html http://support.novell.com/security/cve/CVE-2012-0830.html http://support.novell.com/security/cve/CVE-2012-0831.html https://bugzilla.novell.com/741520 https://bugzilla.novell.com/741859 https://bugzilla.novell.com/742273 https://bugzilla.novell.com/742806 https://bugzilla.novell.com/743308 https://bugzilla.novell.com/744966 https://bugzilla.novell.com/746661 https://bugzilla.novell.com/749111 http://download.novell.com/patch/finder/?keywords=12fa3ee1e0074dc69ed195ba32ed4339 From sle-updates at lists.suse.com Fri Mar 23 21:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 04:08:14 +0100 (CET) Subject: SUSE-RU-2012:0412-1: Recommended update for release-notes-sles Message-ID: <20120324030814.88F9E323B2@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-sles ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0412-1 Rating: low References: #726754 #731924 #742845 #744314 #746579 #746871 #747343 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 ______________________________________________________________________________ An update that has 7 recommended fixes can now be installed. It includes one version update. Description: This update provides the latest update for the Release Notes of SUSE Linux Enterprise Server 11 SP2: * New entry: ATI Radeon ES1000 Support (bnc#744314), Broadcom 57712 * vNICs Disappearing under SP2 (bnc#742845), Brocade FCoE Switch Does Not Accept Fabric Logins from Initiator (bnc#726754). * Updated entries: Migrating to SLE 11 SP2 Using Zypper bnc#731924); * Btrfs from FATE (see bnc#747343). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-release-notes-sles-201203-5968 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-release-notes-sles-201203-5968 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 11.2.0.35]: release-notes-SLES-for-VMware-11.2.0.35-0.7.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 11.2.0.35]: release-notes-sles-11.2.0.35-0.7.1 References: https://bugzilla.novell.com/726754 https://bugzilla.novell.com/731924 https://bugzilla.novell.com/742845 https://bugzilla.novell.com/744314 https://bugzilla.novell.com/746579 https://bugzilla.novell.com/746871 https://bugzilla.novell.com/747343 http://download.novell.com/patch/finder/?keywords=4ac1a690d378847294465f93768f82c5 From sle-updates at lists.suse.com Fri Mar 23 21:09:51 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 24 Mar 2012 04:09:51 +0100 (CET) Subject: SUSE-SU-2012:0413-1: moderate: Security update for libraptor Message-ID: <20120324030951.8B34F32294@maintenance.suse.de> SUSE Security Update: Security update for libraptor ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0413-1 Rating: moderate References: #745298 Cross-References: CVE-2012-0037 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Specially crafted XML files could have allowed XML External Entity (XXE) attacks resulting in file theft and a loss of user privacy. This has been fixed. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-libraptor-devel-5836 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-libraptor-devel-5836 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-libraptor-devel-5836 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-libraptor-devel-5836 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-libraptor-devel-5836 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-libraptor-devel-5836 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-libraptor-devel-5836 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libraptor-devel-1.4.18-28.23.2 raptor-1.4.18-28.23.2 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64): libraptor-devel-1.4.18-28.23.2 raptor-1.4.18-28.23.2 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libraptor1-1.4.18-28.23.2 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): libraptor1-1.4.18-28.23.2 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): libraptor1-1.4.18-28.23.2 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libraptor1-1.4.18-28.23.2 raptor-1.4.18-28.23.2 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libraptor1-1.4.18-28.23.2 raptor-1.4.18-28.23.2 References: http://support.novell.com/security/cve/CVE-2012-0037.html https://bugzilla.novell.com/745298 http://download.novell.com/patch/finder/?keywords=5bf88cc8f664a7f7ee325f680a34e378 From sle-updates at lists.suse.com Tue Mar 27 09:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 27 Mar 2012 17:08:17 +0200 (CEST) Subject: SUSE-OU-2012:0418-1: Optional update for xrdp Message-ID: <20120327150818.2675C3242A@maintenance.suse.de> SUSE Optional Update: Optional update for xrdp ______________________________________________________________________________ Announcement ID: SUSE-OU-2012:0418-1 Rating: low References: #442182 #497578 Affected Products: SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has two optional fixes can now be installed. Description: This update provides xrdp, a fully functionnal Linux terminal server, capable of accepting connection from rdesktop and Microsoft's own terminal server / remote desktop clients. This update has xkbd support implemented and fixes the remaining issues with protocol checking for invalid sizes. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-xrdp-5956 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): xrdp-0.4.1-28.16.12.1 References: https://bugzilla.novell.com/442182 https://bugzilla.novell.com/497578 http://download.novell.com/patch/finder/?keywords=0011def893d95740e39628d8299f1b6b From sle-updates at lists.suse.com Tue Mar 27 21:08:12 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 28 Mar 2012 05:08:12 +0200 (CEST) Subject: SUSE-RU-2012:0419-1: Recommended update for gpg2 Message-ID: <20120328030812.8EDFD3242B@maintenance.suse.de> SUSE Recommended Update: Recommended update for gpg2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0419-1 Rating: low References: #741352 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update fixes the preset-passphrase option in gpg2 (bnc#741352). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-gpg2-5778 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-gpg2-5778 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-gpg2-5778 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): gpg2-2.0.9-25.33.29.1 gpg2-lang-2.0.9-25.33.29.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64): gpg2-2.0.9-25.33.29.1 gpg2-lang-2.0.9-25.33.29.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): gpg2-2.0.9-25.33.29.1 gpg2-lang-2.0.9-25.33.29.1 References: https://bugzilla.novell.com/741352 http://download.novell.com/patch/finder/?keywords=4136fe604481b17d66629651c7cf76d2 From sle-updates at lists.suse.com Wed Mar 28 13:08:28 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 28 Mar 2012 21:08:28 +0200 (CEST) Subject: SUSE-SU-2012:0424-1: critical: Security update for Mozilla Firefox Message-ID: <20120328190829.503183242D@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0424-1 Rating: critical References: #745017 #750044 Cross-References: CVE-2012-0451 CVE-2012-0454 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0463 CVE-2012-0464 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP1 SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 11 SP1 for VMware SUSE Linux Enterprise Server 11 SP1 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. It includes three new package versions. Description: Mozilla Firefox was updated to 10.0.3 ESR to fix various bugs and security issues. The following security issues have been fixed: * MFSA 2012-19: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References: Bob Clary reported two bugs that causes crashes that affected Firefox 3.6, Firefox ESR, and Firefox 10. CVE-2012-0461 Christian Holler, Jesse Ruderman, Nils, Michael Bebenita, Dindog, and David Anderson reported memory safety problems and crashes that affect Firefox ESR and Firefox 10. CVE-2012-0462 Jeff Walden reported a memory safety problem in the array.join function. This bug was independently reported by Vincenzo Iozzo via TippingPoint's Zero Day Initiative Pwn2Own contest. CVE-2012-0464 Masayuki Nakano reported a memory safety problem that affected Mobile Firefox * CVE-2012-0463 * MFSA 2012-18 / CVE-2012-0460: Mozilla developer Matt Brubeck reported that window.fullScreen is writeable by untrusted content now that the DOM fullscreen API is enabled. Because window.fullScreen does not include mozRequestFullscreen's security protections, it could be used for UI spoofing. This code change makes window.fullScreen read only by untrusted content, forcing the use of the DOM fullscreen API in normal usage. Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability. * MFSA 2012-17 / CVE-2012-0459: Mozilla community member Daniel Glazman of Disruptive Innovations reported a crash when accessing a keyframe's cssText after dynamic modification. This crash may be potentially exploitable. Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability. * MFSA 2012-16 / CVE-2012-0458: Security researcher Mariusz Mlynski reported that an attacker able to convince a potential victim to set a new home page by dragging a link to the "home" button can set that user's home page to a javascript: URL. Once this is done the attacker's page can cause repeated crashes of the browser, eventually getting the script URL loaded in the privileged about:sessionrestore context. * MFSA 2012-15 / CVE-2012-0451: Security Researcher Mike Brooks of Sitewatch reported that if multiple Content Security Policy (CSP) headers are present on a page, they have an additive effect page policy. Using carriage return line feed (CRLF) injection, a new CSP rule can be introduced which allows for cross-site scripting (XSS) on sites with a separate header injection vulnerability. Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability. * MFSA 2012-14 / CVE-2012-0457 / CVE-2012-0456: Security researcher Atte Kettunen from OUSPG found two issues with Firefox's handling of SVG using the Address Sanitizer tool. The first issue, critically rated, is a use-after-free in SVG animation that could potentially lead to arbitrary code execution. The second issue is rated moderate and is an out of bounds read in SVG Filters. This could potentially incorporate data from the user's memory, making it accessible to the page content. * MFSA 2012-13 / CVE-2012-0455: Firefox prevents the dropping of javascript: links onto a frame to prevent malicious sites from tricking users into performing a cross-site scripting (XSS) attacks on themselves. Security researcher Soroush Dalili reported a way to bypass this protection. * MFSA 2012-12 / CVE-2012-0454: Security researchers Blair Strang and Scott Bell of Security Assessment found that when a parent window spawns and closes a child window that uses the file open dialog, a crash can be induced in shlwapi.dll on 32-bit Windows 7 systems. This crash may be potentially exploitable. Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability. * Reworked the KDE4 integration. bnc#745017 Security Issue references: * CVE-2012-0461 * CVE-2012-0462 * CVE-2012-0464 * CVE-2012-0463 * CVE-2012-0460 * CVE-2012-0459 * CVE-2012-0458 * CVE-2012-0451 * CVE-2012-0457 * CVE-2012-0456 * CVE-2012-0455 * CVE-2012-0454 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp1-MozillaFirefox-6007 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-MozillaFirefox-6007 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-MozillaFirefox-6007 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-MozillaFirefox-6007 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-MozillaFirefox-6007 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-MozillaFirefox-6007 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-MozillaFirefox-6007 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.13.3 and 4.9.0]: mozilla-nspr-devel-4.9.0-0.3.1 mozilla-nss-devel-3.13.3-0.2.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.13.3 and 4.9.0]: mozilla-nspr-devel-4.9.0-0.3.1 mozilla-nss-devel-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 10.0.3,3.13.3 and 4.9.0]: MozillaFirefox-10.0.3-0.7.1 MozillaFirefox-translations-10.0.3-0.7.1 libfreebl3-3.13.3-0.2.1 mozilla-nspr-4.9.0-0.3.1 mozilla-nss-3.13.3-0.2.1 mozilla-nss-tools-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-32bit-3.13.3-0.2.1 mozilla-nspr-32bit-4.9.0-0.3.1 mozilla-nss-32bit-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-x86-3.13.3-0.2.1 mozilla-nspr-x86-4.9.0-0.3.1 mozilla-nss-x86-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 10.0.3,3.13.3 and 4.9.0]: MozillaFirefox-10.0.3-0.7.1 MozillaFirefox-translations-10.0.3-0.7.1 libfreebl3-3.13.3-0.2.1 mozilla-nspr-4.9.0-0.3.1 mozilla-nss-3.13.3-0.2.1 mozilla-nss-tools-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-32bit-3.13.3-0.2.1 mozilla-nspr-32bit-4.9.0-0.3.1 mozilla-nss-32bit-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 10.0.3,3.13.3 and 4.9.0]: MozillaFirefox-10.0.3-0.7.1 MozillaFirefox-translations-10.0.3-0.7.1 libfreebl3-3.13.3-0.2.1 mozilla-nspr-4.9.0-0.3.1 mozilla-nss-3.13.3-0.2.1 mozilla-nss-tools-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-32bit-3.13.3-0.2.1 mozilla-nspr-32bit-4.9.0-0.3.1 mozilla-nss-32bit-3.13.3-0.2.1 - SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-x86-3.13.3-0.2.1 mozilla-nspr-x86-4.9.0-0.3.1 mozilla-nss-x86-3.13.3-0.2.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 10.0.3,3.13.3 and 4.9.0]: MozillaFirefox-10.0.3-0.7.1 MozillaFirefox-translations-10.0.3-0.7.1 libfreebl3-3.13.3-0.2.1 mozilla-nspr-4.9.0-0.3.1 mozilla-nss-3.13.3-0.2.1 mozilla-nss-tools-3.13.3-0.2.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-32bit-3.13.3-0.2.1 mozilla-nspr-32bit-4.9.0-0.3.1 mozilla-nss-32bit-3.13.3-0.2.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 10.0.3,3.13.3 and 4.9.0]: MozillaFirefox-10.0.3-0.7.1 MozillaFirefox-translations-10.0.3-0.7.1 libfreebl3-3.13.3-0.2.1 mozilla-nspr-4.9.0-0.3.1 mozilla-nss-3.13.3-0.2.1 mozilla-nss-tools-3.13.3-0.2.1 - SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 3.13.3 and 4.9.0]: libfreebl3-32bit-3.13.3-0.2.1 mozilla-nspr-32bit-4.9.0-0.3.1 mozilla-nss-32bit-3.13.3-0.2.1 References: http://support.novell.com/security/cve/CVE-2012-0451.html http://support.novell.com/security/cve/CVE-2012-0454.html http://support.novell.com/security/cve/CVE-2012-0455.html http://support.novell.com/security/cve/CVE-2012-0456.html http://support.novell.com/security/cve/CVE-2012-0457.html http://support.novell.com/security/cve/CVE-2012-0458.html http://support.novell.com/security/cve/CVE-2012-0459.html http://support.novell.com/security/cve/CVE-2012-0460.html http://support.novell.com/security/cve/CVE-2012-0461.html http://support.novell.com/security/cve/CVE-2012-0462.html http://support.novell.com/security/cve/CVE-2012-0463.html http://support.novell.com/security/cve/CVE-2012-0464.html https://bugzilla.novell.com/745017 https://bugzilla.novell.com/750044 http://download.novell.com/patch/finder/?keywords=19608dcf2d85bd752570d6368784dd84 From sle-updates at lists.suse.com Wed Mar 28 22:08:18 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 29 Mar 2012 06:08:18 +0200 (CEST) Subject: SUSE-SU-2012:0425-1: critical: Security update for Mozilla Firefox Message-ID: <20120329040818.C6BDC3242A@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0425-1 Rating: critical References: #752168 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that contains security fixes can now be installed. It includes four new package versions. Description: Mozilla Firefox was updated to 3.6.28 to fix various bugs and security issues. The following security issues have been fixed: * MFSA 2012-19: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References Bob Clary reported two bugs that causes crashes that affected Firefox 3.6, Firefox ESR, and Firefox 10. CVE-2012-0461 Christian Holler, Jesse Ruderman, Nils, Michael Bebenita, Dindog, and David Anderson reported memory safety problems and crashes that affect Firefox ESR and Firefox 10. CVE-2012-0462 Jeff Walden reported a memory safety problem in the array.join function. This bug was independently reported by Vincenzo Iozzo via TippingPoint's Zero Day Initiative Pwn2Own contest. CVE-2012-0464 Masayuki Nakano reported a memory safety problem that affected Mobile Firefox 10. CVE-2012-0463 * MFSA 2012-16 / CVE-2012-0458: Security researcher Mariusz Mlynski reported that an attacker able to convince a potential victim to set a new home page by dragging a link to the "home" button can set that user's home page to a javascript: URL. Once this is done the attacker's page can cause repeated crashes of the browser, eventually getting the script URL loaded in the privileged about:sessionrestore context. * MFSA 2012-14 / CVE-2012-0457 / CVE-2012-0456: Security researcher Atte Kettunen from OUSPG found two issues with Firefox's handling of SVG using the Address Sanitizer tool. The first issue, critically rated, is a use-after-free in SVG animation that could potentially lead to arbitrary code execution. The second issue is rated moderate and is an out of bounds read in SVG Filters. This could potentially incorporate data from the user's memory, making it accessible to the page content. * MFSA 2012-13 / CVE-2012-0455: Firefox prevents the dropping of javascript: links onto a frame to prevent malicious sites from tricking users into performing a cross-site scripting (XSS) attacks on themselves. Security researcher Soroush Dalili reported a way to bypass this protection. The full overview can be found on Mozillas security page at: http://www.mozilla.org/security/announce/ Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 1.9.2.28,3.13.3 and 4.9.0]: mozilla-nspr-4.9.0-0.6.1 mozilla-nspr-devel-4.9.0-0.6.1 mozilla-nss-3.13.3-0.5.1 mozilla-nss-devel-3.13.3-0.5.1 mozilla-nss-tools-3.13.3-0.5.1 mozilla-xulrunner192-1.9.2.28-0.7.1 mozilla-xulrunner192-gnome-1.9.2.28-0.7.1 mozilla-xulrunner192-translations-1.9.2.28-0.7.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x) [New Version: 3.6.28]: MozillaFirefox-3.6.28-0.5.2 MozillaFirefox-translations-3.6.28-0.5.2 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64) [New Version: 1.9.2.28,3.13.3 and 4.9.0]: mozilla-nspr-32bit-4.9.0-0.6.1 mozilla-nss-32bit-3.13.3-0.5.1 mozilla-xulrunner192-32bit-1.9.2.28-0.7.1 mozilla-xulrunner192-gnome-32bit-1.9.2.28-0.7.1 mozilla-xulrunner192-translations-32bit-1.9.2.28-0.7.1 - SUSE Linux Enterprise Server 10 SP4 (ia64) [New Version: 3.13.3 and 4.9.0]: mozilla-nspr-x86-4.9.0-0.6.1 mozilla-nss-x86-3.13.3-0.5.1 - SUSE Linux Enterprise Server 10 SP4 (ppc) [New Version: 3.13.3 and 4.9.0]: mozilla-nspr-64bit-4.9.0-0.6.1 mozilla-nss-64bit-3.13.3-0.5.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 1.9.2.28,3.13.3 and 4.9.0]: mozilla-nspr-4.9.0-0.6.1 mozilla-nspr-devel-4.9.0-0.6.1 mozilla-nss-3.13.3-0.5.1 mozilla-nss-devel-3.13.3-0.5.1 mozilla-nss-tools-3.13.3-0.5.1 mozilla-xulrunner192-1.9.2.28-0.7.1 mozilla-xulrunner192-gnome-1.9.2.28-0.7.1 mozilla-xulrunner192-translations-1.9.2.28-0.7.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64) [New Version: 1.9.2.28,3.13.3 and 4.9.0]: mozilla-nspr-32bit-4.9.0-0.6.1 mozilla-nss-32bit-3.13.3-0.5.1 mozilla-xulrunner192-32bit-1.9.2.28-0.7.1 mozilla-xulrunner192-gnome-32bit-1.9.2.28-0.7.1 mozilla-xulrunner192-translations-32bit-1.9.2.28-0.7.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 3.6.28]: MozillaFirefox-3.6.28-0.5.2 MozillaFirefox-translations-3.6.28-0.5.2 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 3.13.3]: mozilla-nss-tools-3.13.3-0.5.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x): MozillaFirefox-branding-upstream-3.6.28-0.5.2 References: https://bugzilla.novell.com/752168 http://download.novell.com/patch/finder/?keywords=3cbbf6dfa64d498549bb143a54005d87 From sle-updates at lists.suse.com Thu Mar 29 18:08:14 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 02:08:14 +0200 (CEST) Subject: SUSE-RU-2012:0430-1: Recommended update for release-notes-sled Message-ID: <20120330000814.47AA532428@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-sled ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0430-1 Rating: low References: #731924 #747622 #749380 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. It includes one version update. Description: This update provides the latest release notes for SUSE Linux Enterprise Desktop 11 SP2: * Updated entries: Migrating to SLE 11 SP2 Using Zypper (bnc#731924). * Other fixes: bnc#749380; bnc#747622 (Gnome and KDE version, remove statement about java plug-in). * Remove now confusing gfdl license file; cf. .changes entry Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-release-notes-sled-5999 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (noarch) [New Version: 11.2.24]: release-notes-sled-11.2.24-0.8.1 References: https://bugzilla.novell.com/731924 https://bugzilla.novell.com/747622 https://bugzilla.novell.com/749380 http://download.novell.com/patch/finder/?keywords=b9dc5039b7149b5468caca9a5d77a8f5 From sle-updates at lists.suse.com Thu Mar 29 18:08:52 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 02:08:52 +0200 (CEST) Subject: SUSE-RU-2012:0431-1: important: Recommended update for SUSE Manager 1.2 documentation and Release Notes Message-ID: <20120330000852.ED78B32428@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager 1.2 documentation and Release Notes ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0431-1 Rating: important References: #754304 Affected Products: SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update refreshes the manuals and release notes for SUSE Manager. The updated manuals especially cover the "SUSE Manager Server 1.2 with Database" product, which bundles a production-ready database. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-release-notes-susemanager-201203-6055 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.2 for SLE 11 SP1 (x86_64) [New Version: 1.2.3]: release-notes-susemanager-1.2.3-0.15.1 - SUSE Manager 1.2 for SLE 11 SP1 (noarch): susemanager-client-config_en-pdf-1.2-0.44.1 susemanager-install_en-pdf-1.2-0.44.1 susemanager-jsp_en-1.2-0.38.2 susemanager-manuals_en-1.2-0.44.1 susemanager-proxy-quick_en-pdf-1.2-0.44.1 susemanager-quick_en-pdf-1.2-0.44.1 susemanager-reference_en-pdf-1.2-0.44.1 References: https://bugzilla.novell.com/754304 http://download.novell.com/patch/finder/?keywords=d73a03838699421e91d1a191fdf0daf2 From sle-updates at lists.suse.com Fri Mar 30 11:08:17 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 19:08:17 +0200 (CEST) Subject: SUSE-SU-2012:0434-1: moderate: Security update for Ruby On Rails Message-ID: <20120330170817.61AAC3242D@maintenance.suse.de> SUSE Security Update: Security update for Ruby On Rails ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0434-1 Rating: moderate References: #668817 #712057 #712058 #712060 #712062 Cross-References: CVE-2010-3933 CVE-2011-0446 CVE-2011-0447 CVE-2011-0448 CVE-2011-0449 CVE-2011-2930 CVE-2011-2931 CVE-2011-2932 CVE-2011-3186 Affected Products: WebYaST [Appliance - Tools] WebYaST 1.2 SUSE Studio Standard Edition 1.2 SUSE Studio Onsite 1.2 SUSE Studio Extension for System z 1.2 SUSE Linux Enterprise Software Development Kit 11 SP1 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. It includes two new package versions. Description: This update of Ruby on Rails to 2.3.14 fixes the following security issues: * CVE-2011-2930 - SQL-injection in quote_table_name function via specially crafted column names (bnc#712062) * CVE-2011-2931 - Cross-Site Scripting (XSS) in the strip_tags helper (bnc#712057) * CVE-2011-3186 - Response Splitting (bnc#712058) * CVE-2010-3933 - Arbitrary modification of records via specially crafted form parameters (bnc#712058) * CVE-2011-0446 - Cross-Site Scripting (XSS) in the mail_to helper (bnc#668817) * CVE-2011-0447 - Improper validation of 'X-Requested-With' header (bnc#668817) * CVE-2011-0448 - SQL-injection caused by improperly sanitized arguments to the limit function (bnc#668817) * CVE-2011-0449 - Bypass of access restrictions via specially crafted action names (bnc#668817) * CVE-2011-2932 - Cross-Site Scripting in output_safety.rb (bnc#712060) Security Issue reference: * CVE-2011-2930 * CVE-2011-2931 * CVE-2011-3186 * CVE-2010-3933 * CVE-2011-0446 * CVE-2011-0447 * CVE-2011-0448 * CVE-2011-0449 * CVE-2011-2932 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST [Appliance - Tools]: zypper in -t patch slewystsp1-rubyonrails-2314-201202-5884 - WebYaST 1.2: zypper in -t patch slewyst12-rubyonrails-2314-201202-5884 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-rubyonrails-2314-201202-5884 - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-rubyonrails-2314-201202-5884 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-rubyonrails-2314-201202-5884 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-rubyonrails-2314-201202-5884 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST [Appliance - Tools] (i586 ia64 ppc64 s390x x86_64) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.7.4.3 rubygem-actionpack-2_3-2.3.14-0.7.4.3 rubygem-activerecord-2_3-2.3.14-0.7.4.3 rubygem-activeresource-2_3-2.3.14-0.7.4.3 rubygem-activesupport-2_3-2.3.14-0.7.4.3 rubygem-rack-1.1.2-0.8.8.3 rubygem-rails-2_3-2.3.14-0.7.4.3 - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.7.4.3 rubygem-actionpack-2_3-2.3.14-0.7.4.3 rubygem-activerecord-2_3-2.3.14-0.7.4.3 rubygem-activeresource-2_3-2.3.14-0.7.4.3 rubygem-activesupport-2_3-2.3.14-0.7.4.3 rubygem-rack-1.1.2-0.8.8.3 rubygem-rails-2_3-2.3.14-0.7.4.3 - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.7.4.3 rubygem-actionpack-2_3-2.3.14-0.7.4.3 rubygem-activerecord-2_3-2.3.14-0.7.4.3 rubygem-activeresource-2_3-2.3.14-0.7.4.3 rubygem-activesupport-2_3-2.3.14-0.7.4.3 rubygem-rack-1.1.2-0.8.8.3 rubygem-rails-2_3-2.3.14-0.7.4.3 - SUSE Studio Standard Edition 1.2 (noarch) [New Version: 2.3.14]: rubygem-rails-2.3.14-0.8.6.1 - SUSE Studio Onsite 1.2 (x86_64) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.7.4.3 rubygem-actionpack-2_3-2.3.14-0.7.4.3 rubygem-activerecord-2_3-2.3.14-0.7.4.3 rubygem-activeresource-2_3-2.3.14-0.7.4.3 rubygem-activesupport-2_3-2.3.14-0.7.4.3 rubygem-rack-1.1.2-0.8.8.3 rubygem-rails-2_3-2.3.14-0.7.4.3 - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.7.4.3 rubygem-actionpack-2_3-2.3.14-0.7.4.3 rubygem-activerecord-2_3-2.3.14-0.7.4.3 rubygem-activeresource-2_3-2.3.14-0.7.4.3 rubygem-activesupport-2_3-2.3.14-0.7.4.3 rubygem-rack-1.1.2-0.8.8.3 rubygem-rails-2_3-2.3.14-0.7.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.7.4.3 rubygem-actionpack-2_3-2.3.14-0.7.4.3 rubygem-activerecord-2_3-2.3.14-0.7.4.3 rubygem-activeresource-2_3-2.3.14-0.7.4.3 rubygem-activesupport-2_3-2.3.14-0.7.4.3 rubygem-rack-1.1.2-0.8.8.3 rubygem-rails-2_3-2.3.14-0.7.4.3 - SUSE Linux Enterprise Software Development Kit 11 SP1 (noarch) [New Version: 2.3.14]: rubygem-rails-2.3.14-0.8.6.1 References: http://support.novell.com/security/cve/CVE-2010-3933.html http://support.novell.com/security/cve/CVE-2011-0446.html http://support.novell.com/security/cve/CVE-2011-0447.html http://support.novell.com/security/cve/CVE-2011-0448.html http://support.novell.com/security/cve/CVE-2011-0449.html http://support.novell.com/security/cve/CVE-2011-2930.html http://support.novell.com/security/cve/CVE-2011-2931.html http://support.novell.com/security/cve/CVE-2011-2932.html http://support.novell.com/security/cve/CVE-2011-3186.html https://bugzilla.novell.com/668817 https://bugzilla.novell.com/712057 https://bugzilla.novell.com/712058 https://bugzilla.novell.com/712060 https://bugzilla.novell.com/712062 http://download.novell.com/patch/finder/?keywords=a9a7e5b0e289aeb951fcc43761e059bf From sle-updates at lists.suse.com Fri Mar 30 11:08:19 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 19:08:19 +0200 (CEST) Subject: SUSE-RU-2012:0435-1: Recommended update for SUSE Studio Onsite 1.2 Message-ID: <20120330170820.03EF33242F@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Studio Onsite 1.2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0435-1 Rating: low References: #733690 #734524 #744454 #750527 #751857 #752827 Affected Products: SUSE Studio Onsite 1.2 SUSE Studio Extension for System z 1.2 ______________________________________________________________________________ An update that has 6 recommended fixes can now be installed. It includes one version update. Description: This update of SUSE Studio Onsite brings support for Ruby on Rails 2.3.14 and fixes some bugs. Includes fixes for: * 733690: Fixed cooperation between SLMS and Studio * 734524: Fix configuration API * 750527: Fix starting of Onsite runner after Sass split * 751857: Remove backup files from source tarball * Fix for build tab bug that causes builds to be hidden under certain circumstances. * 750527: Fix Runner failing to start missing rubygem sass * 752827: Fix for loss of LDAP authentication * 744454: Fix import/export of kiwi configuration between test and production setup Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-susestudio-201203-6015 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-susestudio-201203-6015 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.2 (x86_64) [New Version: 1.2.2]: rubygem-gettext_activerecord-2.1.0-5.7.31 susestudio-1.2.2-0.15.4 susestudio-clicfs-1.2.2-0.15.4 susestudio-common-1.2.2-0.15.4 susestudio-image-helpers-1.2.2-0.3.6 susestudio-parted-1.2.2-0.15.4 susestudio-rmds-1.2.2-0.15.4 susestudio-runner-1.2.2-0.15.4 susestudio-squashfs-1.2.2-0.15.4 susestudio-thoth-1.2.2-0.15.4 susestudio-ui-server-1.2.2-0.15.4 - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 1.2.2]: rubygem-gettext_activerecord-2.1.0-5.7.31 susestudio-1.2.2-0.15.4 susestudio-common-1.2.2-0.15.4 susestudio-image-helpers-1.2.2-0.3.6 susestudio-runner-1.2.2-0.15.4 susestudio-ui-server-1.2.2-0.15.4 References: https://bugzilla.novell.com/733690 https://bugzilla.novell.com/734524 https://bugzilla.novell.com/744454 https://bugzilla.novell.com/750527 https://bugzilla.novell.com/751857 https://bugzilla.novell.com/752827 http://download.novell.com/patch/finder/?keywords=e25210a34a813b3657775d8234e52b1b From sle-updates at lists.suse.com Fri Mar 30 11:08:21 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 19:08:21 +0200 (CEST) Subject: SUSE-RU-2012:0436-1: moderate: Recommended update for hawk Message-ID: <20120330170821.8E9493242F@maintenance.suse.de> SUSE Recommended Update: Recommended update for hawk ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0436-1 Rating: moderate References: #668817 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP1 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: hawk was fixed for the ruby on rails 2.3.14 upgrade. * GUI: handle unknown DC version during cluster bringup * Misc: Include CSRF token with AJAX request (now required by new rails) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP1: zypper in -t patch sleshasp1-hawk-5842 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.3.6]: hawk-0.3.6-1.5.1 References: https://bugzilla.novell.com/668817 http://download.novell.com/patch/finder/?keywords=e7c9cecee6b901091f7f5f5462856692 From sle-updates at lists.suse.com Fri Mar 30 12:08:27 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 20:08:27 +0200 (CEST) Subject: SUSE-SU-2012:0437-1: critical: Security update for flash-player Message-ID: <20120330180827.5ECD63242E@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2012:0437-1 Rating: critical References: #754689 Cross-References: CVE-2012-0773 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes two new package versions. Description: Adobe Flash Player 11.1.102.63 fixes a memory corruption vulnerability in the NetStream class that could have lead to code execution (CVE-2012-0773). Security Issue reference: * CVE-2012-0773 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-flash-player-6059 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-flash-player-6059 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.228]: flash-player-11.2.202.228-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 11.2.202.228]: flash-player-11.2.202.228-0.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 10.3.183.18]: flash-player-10.3.183.18-0.5.2 References: http://support.novell.com/security/cve/CVE-2012-0773.html https://bugzilla.novell.com/754689 http://download.novell.com/patch/finder/?keywords=03280de9cddaad9751a83521641289ac http://download.novell.com/patch/finder/?keywords=144a85c0189094a03103ec1018241f01 From sle-updates at lists.suse.com Fri Mar 30 14:08:16 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 22:08:16 +0200 (CEST) Subject: SUSE-RU-2012:0438-1: important: Recommended update for SLES-for-VMware-SP2-migration, SLES-for-VMware-release and SLES-for-VMware-release-DVD Message-ID: <20120330200816.F30BE3242F@maintenance.suse.de> SUSE Recommended Update: Recommended update for SLES-for-VMware-SP2-migration, SLES-for-VMware-release and SLES-for-VMware-release-DVD ______________________________________________________________________________ Announcement ID: SUSE-RU-2012:0438-1 Rating: important References: #754607 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update prepares the system for a System Upgrade to SUSE Linux Enterprise Server for VMware 11 SP2. Please follow the technicqal instruction document for the information on how to upgrade your system to SUSE Linux Enterprise Server 11 SP2: http://www.novell.com/support/documentLink.do?externalID=701 0200 Please have a look for more Information and Resources about SUSE Linux Enterprise Server 11 SP2 here: http://www.suse.com/promo/sle11sp2.html This re-release of the previous update corrects various errors in the metadata of the previous product release. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-SLES-for-VMware-SP2-migration-6056 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): SLES-for-VMware-SP2-migration-11.1-1.11 SLES-for-VMware-release-11.1-1.81 SLES-for-VMware-release-DVD-11.1-1.81 References: https://bugzilla.novell.com/754607 http://download.novell.com/patch/finder/?keywords=1adadc0ebc5852b14a047617fece715d From sle-updates at lists.suse.com Fri Mar 30 14:08:19 2012 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 30 Mar 2012 22:08:19 +0200 (CEST) Subject: SUSE-FU-2012:0439-1: Feature update for SUSE Manager Message-ID: <20120330200819.028543242E@maintenance.suse.de> SUSE Feature Update: Feature update for SUSE Manager ______________________________________________________________________________ Announcement ID: SUSE-FU-2012:0439-1 Rating: low References: #746273 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 11 SP1 ______________________________________________________________________________ An update that has one feature fix can now be installed. Description: This update provides the set of packages needed for registering SUSE Linux Enterprise Server 11 installations against SUSE Manager. Indications: Every SUSE Manager user should update. Patch Instructions: To install this SUSE Feature Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-suse-manager-registration-tools-5865 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-suse-manager-registration-tools-5865 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libnewt0_52-0.52.10-1.35.68 newt-0.52.10-1.35.68 python-dmidecode-3.10.11-0.8.11 python-ethtool-0.3-0.4.11 python-newt-0.52.10-1.35.68 rhnlib-2.5.28-0.7.5 spacewalksd-4.9.7-0.13.2 suseRegisterInfo-1.2.0-0.7.5 - SUSE Linux Enterprise Desktop 11 SP2 (noarch): spacewalk-check-1.2.15-0.21.3 spacewalk-client-setup-1.2.15-0.21.3 spacewalk-client-tools-1.2.15-0.21.3 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64): libnewt0_52-0.52.10-1.35.68 newt-0.52.10-1.35.68 python-dmidecode-3.10.11-0.8.11 python-ethtool-0.3-0.4.11 python-newt-0.52.10-1.35.68 rhnlib-2.5.28-0.7.5 spacewalksd-4.9.7-0.13.2 suseRegisterInfo-1.2.0-0.7.5 zypp-plugin-python-0.3-2.4.2.6 zypp-plugin-spacewalk-0.5-0.3.28 - SUSE Linux Enterprise Desktop 11 SP1 (noarch): spacewalk-check-1.2.15-0.21.3 spacewalk-client-setup-1.2.15-0.21.3 spacewalk-client-tools-1.2.15-0.21.3 References: https://bugzilla.novell.com/746273 http://download.novell.com/patch/finder/?keywords=66fbbad296a5300b489a60fbc717d438