SUSE 5020 Published by

The following 4 security updates are available for SUSE: [security-announce] SUSE-SU-2011:0696-1: important: libgssglue, [security-announce] openSUSE-SU-2011:0695-1: important: subversion: security udpate, [security-announce] openSUSE-SU-2011:0693-1: important: subversion security udpate, [security-announce] SUSE-SU-2011:0692-1: important: subversion



[security-announce] SUSE-SU-2011:0696-1: important: libgssglue
SUSE Security Update: libgssglue
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:0696-1
Rating: important
References: #694598
Affected Products:
SUSE Linux Enterprise Teradata 10 SP3
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

An update that contains security fixes can now be installed.

Description:


This update fixes insecure getenv() usage in libgssglue,
which could be used under some circumstances by local
attackers do gain root privileges.

Indications:

Please install this update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP1:

zypper in -t patch sdksp1-libgssglue-4620

- SUSE Linux Enterprise Server 11 SP1 for VMware:

zypper in -t patch slessp1-libgssglue-4620

- SUSE Linux Enterprise Server 11 SP1:

zypper in -t patch slessp1-libgssglue-4620

- SUSE Linux Enterprise Desktop 11 SP1:

zypper in -t patch sledsp1-libgssglue-4620

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Teradata 10 SP3 (x86_64):

libgssapi-0.6-13.12.1
libgssapi-32bit-0.6-13.12.1

- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64):

libgssglue-devel-0.1-20.2.1

- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):

libgssglue1-0.1-20.2.1

- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):

libgssglue1-0.1-20.2.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

libgssapi-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

libgssapi-32bit-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP4 (ia64):

libgssapi-x86-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP4 (ppc):

libgssapi-64bit-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64):

libgssapi-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):

libgssapi-32bit-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP3 (ia64):

libgssapi-x86-0.6-13.12.1

- SUSE Linux Enterprise Server 10 SP3 (ppc):

libgssapi-64bit-0.6-13.12.1

- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):

libgssglue1-0.1-20.2.1

- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

libgssapi-0.6-13.12.1

- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):

libgssapi-32bit-0.6-13.12.1


References:

https://bugzilla.novell.com/694598
http://download.novell.com/patch/finder/?keywords=5b5de538464acbf06386b39d37563e66
http://download.novell.com/patch/finder/?keywords=88b0a4c3666d54637f8fff06918865ef
http://download.novell.com/patch/finder/?keywords=f3c8cc7c70c0e2250dce0f068395c09e

[security-announce] openSUSE-SU-2011:0695-1: important: subversion: security udpate
openSUSE Security Update: subversion: security udpate
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0695-1
Rating: important
References: #698205
Cross-References: CVE-2011-1752 CVE-2011-1783 CVE-2011-1921

Affected Products:
openSUSE 11.4
______________________________________________________________________________

An update that fixes three vulnerabilities is now
available. It includes one version update.

Description:

Subversion was updated to version 1.6.17 to fix several
security issues:

- CVE-2011-1752: The mod_dav_svn Apache HTTPD server
module can be crashed though when asked to deliver
baselined WebDAV resources.
- CVE-2011-1783: The mod_dav_svn Apache HTTPD server module
can trigger a loop which consumes all available memory on
the system.
- CVE-2011-1921: The mod_dav_svn Apache HTTPD server module
may leak to remote users the file contents of files
configured to be unreadable by those users.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch libsvn_auth_gnome_keyring-1-0-4688

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64) [New Version: 1.6.17]:

libsvn_auth_gnome_keyring-1-0-1.6.17-1.2.1
libsvn_auth_kwallet-1-0-1.6.17-1.2.1
subversion-1.6.17-1.2.1
subversion-devel-1.6.17-1.2.1
subversion-perl-1.6.17-1.2.1
subversion-python-1.6.17-1.2.1
subversion-ruby-1.6.17-1.2.1
subversion-server-1.6.17-1.2.1
subversion-tools-1.6.17-1.2.1


References:

http://support.novell.com/security/cve/CVE-2011-1752.html
http://support.novell.com/security/cve/CVE-2011-1783.html
http://support.novell.com/security/cve/CVE-2011-1921.html
https://bugzilla.novell.com/698205

[security-announce] openSUSE-SU-2011:0693-1: important: subversion security udpate
openSUSE Security Update: subversion security udpate
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0693-1
Rating: important
References: #676949 #688968 #698205
Cross-References: CVE-2011-0715 CVE-2011-1752 CVE-2011-1783
CVE-2011-1921
Affected Products:
openSUSE 11.3
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

- CVE-2011-1752: The mod_dav_svn Apache HTTPD server
module can be crashed though when asked to deliver
baselined WebDAV resources.
- CVE-2011-1783: The mod_dav_svn Apache HTTPD server module
can trigger a loop which consumes all available memory on
the system.
- CVE-2011-1921: The mod_dav_svn Apache HTTPD server module
may leak to remote users the file contents of files
configured to be unreadable by those users.
- CVE-2011-0715: Remote attackers could crash an svn server
by causing a NULL deref


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch libsvn_auth_gnome_keyring-1-0-4689

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.3 (i586 x86_64):

libsvn_auth_gnome_keyring-1-0-1.6.9-4.7.1
libsvn_auth_kwallet-1-0-1.6.9-4.7.1
subversion-1.6.9-4.7.1
subversion-devel-1.6.9-4.7.1
subversion-perl-1.6.9-4.7.1
subversion-python-1.6.9-4.7.1
subversion-ruby-1.6.9-4.7.1
subversion-server-1.6.9-4.7.1
subversion-tools-1.6.9-4.7.1


References:

http://support.novell.com/security/cve/CVE-2011-0715.html
http://support.novell.com/security/cve/CVE-2011-1752.html
http://support.novell.com/security/cve/CVE-2011-1783.html
http://support.novell.com/security/cve/CVE-2011-1921.html
https://bugzilla.novell.com/676949
https://bugzilla.novell.com/688968
https://bugzilla.novell.com/698205


[security-announce] SUSE-SU-2011:0692-1: important: subversion
SUSE Security Update: subversion
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:0692-1
Rating: important
References: #676949 #698205
Cross-References: CVE-2011-0715 CVE-2011-1752 CVE-2011-1783

Affected Products:
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
SLE SDK 10 SP3
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:


Subversion was updated to fix several security issues:

* CVE-2011-1752: The mod_dav_svn Apache HTTPD server
module can be crashed though when asked to deliver
baselined WebDAV resources.
* CVE-2011-1783: The mod_dav_svn Apache HTTPD server
module can trigger a loop which consumes all available
memory on the system.
* CVE-2011-0715: Remote attackers could crash an svn
server by causing a NULL deref

Security Issue references:

* CVE-2011-1752

* CVE-2011-1783

* CVE-2011-0715




Package List:

- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

subversion-1.3.1-1.18.1
subversion-devel-1.3.1-1.18.1

- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):

cvs2svn-1.3.0-30.18.1
subversion-1.3.1-1.18.1
subversion-devel-1.3.1-1.18.1
subversion-python-1.3.1-1.18.1
subversion-server-1.3.1-1.18.1
subversion-tools-1.3.1-1.18.1
viewcvs-1.0.5-0.18.1

- SLE SDK 10 SP3 (i586 ia64 ppc s390x x86_64):

cvs2svn-1.3.0-30.18.1
subversion-1.3.1-1.18.1
subversion-devel-1.3.1-1.18.1
subversion-python-1.3.1-1.18.1
subversion-server-1.3.1-1.18.1
subversion-tools-1.3.1-1.18.1
viewcvs-1.0.5-0.18.1


References:

http://support.novell.com/security/cve/CVE-2011-0715.html
http://support.novell.com/security/cve/CVE-2011-1752.html
http://support.novell.com/security/cve/CVE-2011-1783.html
https://bugzilla.novell.com/676949
https://bugzilla.novell.com/698205
http://download.novell.com/patch/finder/?keywords=39703f93de4dd5819f6910aa7cad5e38
http://download.novell.com/patch/finder/?keywords=dc2a8d54fb644c1ef1dc261a23ba432e