SUSE 5008 Published by

The following security updates are available for SUSE: SUSE-SU-2011:0807-1: important: Security update for IBM Java, SUSE-SU-2011:0806-1: critical: Security update for KVM, openSUSE-SU-2011:0803-1: important: kvm, openSUSE-SU-2011:0788-1: important: bind: fixing remote Denial of Service (CVE-2011-2464), openSUSE-SU-2011:0762-1: critical: mariadb: Fixed missing innodb support after last update, and SUSE-SU-2011:0759-1: important: Security update for bind



SUSE-SU-2011:0807-1: important: Security update for IBM Java
SUSE Security Update: Security update for IBM Java
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:0807-1
Rating: important
References: #705423
Cross-References: CVE-2011-0786 CVE-2011-0788 CVE-2011-0802
CVE-2011-0814 CVE-2011-0815 CVE-2011-0817
CVE-2011-0862 CVE-2011-0863 CVE-2011-0865
CVE-2011-0866 CVE-2011-0867 CVE-2011-0868
CVE-2011-0869 CVE-2011-0871 CVE-2011-0872
CVE-2011-0873
Affected Products:
SUSE Linux Enterprise Teradata 10 SP3
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Java 11 SP1
SUSE Linux Enterprise Java 10 SP4
SUSE Linux Enterprise Java 10 SP3
______________________________________________________________________________

An update that fixes 16 vulnerabilities is now available.

Description:


IBM Java 1.6.0 SR9-FP2 fixes several of bugs and thew
following security issues:

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and
earlier allows remote untrusted Java Web Start applications
and untrusted Java applets to affect integrity via unknown
vectors related to Deserialization. (CVE-2011-0865
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and
earlier, when running on Windows, allows remote untrusted
Java Web Start applications and untrusted Java applets to
affect confidentiality, integrity, and availability via
unknown vectors related to Java Runtime Environment. (
CVE-2011-0866
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, when running on Windows, allows remote
untrusted Java Web Start applications and untrusted Java
applets to affect confidentiality, integrity, and
availability via unknown vectors related to Deployment, a
different vulnerability than CVE-2011-0788. (CVE-2011-0786
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, when running on Windows, allows remote
untrusted Java Web Start applications and untrusted Java
applets to affect confidentiality, integrity, and
availability via unknown vectors related to Deployment, a
different vulnerability than CVE-2011-0786. (CVE-2011-0788
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, when running on Windows, allows remote
untrusted Java Web Start applications and untrusted Java
applets to affect confidentiality, integrity, and
availability via unknown vectors related to Deployment, a
different vulnerability than CVE-2011-0786. (CVE-2011-0802
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and
earlier allows remote attackers to affect confidentiality,
integrity, and availability via unknown vectors related to
Sound, a different vulnerability than CVE-2011-0802.
(CVE-2011-0814
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and
earlier allows remote untrusted Java Web Start applications
and untrusted Java applets to affect confidentiality,
integrity, and availability via unknown vectors related to
AWT. (CVE-2011-0815
)

*

Multiple unspecified vulnerabilities in the Java
Runtime Environment (JRE) component in Oracle Java SE 6
Update 25 and earlier, 5.0 Update 29 and earlier, and
1.4.2_31 and earlier allow remote attackers to affect
confidentiality, integrity, and availability via unknown
vectors related to 2D. (CVE-2011-0862
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and
earlier allows remote untrusted Java Web Start applications
and untrusted Java applets to affect confidentiality via
unknown vectors related to Networking. ( CVE-2011-0867
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 26
and earlier allows remote untrusted Java Web Start
applications and untrusted Java applets to affect
confidentiality via unknown vectors related to SAAJ. (
CVE-2011-0869
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, when running on Windows, allows remote
untrusted Java Web Start applications and untrusted Java
applets to affect confidentiality, integrity, and
availability via unknown vectors related to Deployment. (
CVE-2011-0817
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier allows remote untrusted Java Web Start
applications and untrusted Java applets to affect
confidentiality, integrity, and availability via unknown
vectors related to Deployment. (CVE-2011-0863
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier allows remote attackers to affect
confidentiality via unknown vectors related to 2D.
(CVE-2011-0868
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and
earlier allows remote untrusted Java Web Start applications
and untrusted Java applets to affect confidentiality,
integrity, and availability via unknown vectors related to
Swing. (CVE-2011-0871
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier allows remote attackers to affect availability
via unknown vectors related to NIO. (CVE-2011-0872
)

*

An unspecified vulnerability in the Java Runtime
Environment (JRE) component in Oracle Java SE 6 Update 25
and earlier, and 5.0 Update 29 and earlier, allows remote
attackers to affect confidentiality, integrity, and
availability via unknown vectors related to 2D. (
CVE-2011-0873
)

Indications:

Please install this update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP1:

zypper in -t patch sdksp1-java-1_6_0-ibm-4875

- SUSE Linux Enterprise Server 11 SP1 for VMware:

zypper in -t patch slessp1-java-1_6_0-ibm-4875

- SUSE Linux Enterprise Server 11 SP1:

zypper in -t patch slessp1-java-1_6_0-ibm-4875

- SUSE Linux Enterprise Java 11 SP1:

zypper in -t patch slejsp1-java-1_6_0-ibm-4875

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Teradata 10 SP3 (x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-32bit-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-alsa-32bit-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-devel-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-devel-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Server 11 SP1 for VMware (i586):

java-1_6_0-ibm-alsa-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Server 11 SP1 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Server 11 SP1 (i586 x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Server 11 SP1 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-devel-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ppc x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

java-1_6_0-ibm-32bit-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Server 10 SP4 (x86_64):

java-1_6_0-ibm-alsa-32bit-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Server 10 SP4 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Server 10 SP4 (ppc):

java-1_6_0-ibm-64bit-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Server 10 SP3 (i586 ppc s390x x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-devel-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Server 10 SP3 (i586 ppc x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):

java-1_6_0-ibm-32bit-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Server 10 SP3 (x86_64):

java-1_6_0-ibm-alsa-32bit-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Server 10 SP3 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Server 10 SP3 (ppc):

java-1_6_0-ibm-64bit-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Java 11 SP1 (i586 ppc64 s390x x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-devel-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.4.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Java 11 SP1 (i586 x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Java 11 SP1 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr9.2-0.4.1

- SUSE Linux Enterprise Java 10 SP4 (x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-devel-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.9.1
java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.9.1

- SUSE Linux Enterprise Java 10 SP3 (i586 ppc s390x x86_64):

java-1_6_0-ibm-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-devel-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-fonts-1.6.0_sr9.2-0.6.1
java-1_6_0-ibm-jdbc-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Java 10 SP3 (i586 ppc x86_64):

java-1_6_0-ibm-plugin-1.6.0_sr9.2-0.6.1

- SUSE Linux Enterprise Java 10 SP3 (i586):

java-1_6_0-ibm-alsa-1.6.0_sr9.2-0.6.1


References:

http://support.novell.com/security/cve/CVE-2011-0786.html
http://support.novell.com/security/cve/CVE-2011-0788.html
http://support.novell.com/security/cve/CVE-2011-0802.html
http://support.novell.com/security/cve/CVE-2011-0814.html
http://support.novell.com/security/cve/CVE-2011-0815.html
http://support.novell.com/security/cve/CVE-2011-0817.html
http://support.novell.com/security/cve/CVE-2011-0862.html
http://support.novell.com/security/cve/CVE-2011-0863.html
http://support.novell.com/security/cve/CVE-2011-0865.html
http://support.novell.com/security/cve/CVE-2011-0866.html
http://support.novell.com/security/cve/CVE-2011-0867.html
http://support.novell.com/security/cve/CVE-2011-0868.html
http://support.novell.com/security/cve/CVE-2011-0869.html
http://support.novell.com/security/cve/CVE-2011-0871.html
http://support.novell.com/security/cve/CVE-2011-0872.html
http://support.novell.com/security/cve/CVE-2011-0873.html
https://bugzilla.novell.com/705423
http://download.novell.com/patch/finder/?keywords=3b42568f807335f093098352626f1978
http://download.novell.com/patch/finder/?keywords=3f77af6299b12bd1d66ad30d1902f9d3
http://download.novell.com/patch/finder/?keywords=a24675426b4665a2a4dc9290d8ff82f6
SUSE-SU-2011:0806-1: critical: Security update for KVM
SUSE Security Update: Security update for KVM
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:0806-1
Rating: critical
References: #626654 #695766 #698237 #701161 #702823
Cross-References: CVE-2011-2212 CVE-2011-2512
Affected Products:
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________

An update that solves two vulnerabilities and has three
fixes is now available. It includes one version update.

Description:


A privileged guest user could cause a buffer overflow in
the virtio subsystem of the host, therefore crashing the
guest or potentially execute arbitrary code on the host
(CVE-2011-2212, CVE-2011-2512).

Security Issue references:

* CVE-2011-2212

* CVE-2011-2512



Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server 11 SP1:

zypper in -t patch slessp1-kvm-4814

- SUSE Linux Enterprise Desktop 11 SP1:

zypper in -t patch sledsp1-kvm-4814

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 0.12.5]:

kvm-0.12.5-1.16.1

- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.12.5]:

kvm-0.12.5-1.16.1


References:

http://support.novell.com/security/cve/CVE-2011-2212.html
http://support.novell.com/security/cve/CVE-2011-2512.html
https://bugzilla.novell.com/626654
https://bugzilla.novell.com/695766
https://bugzilla.novell.com/698237
https://bugzilla.novell.com/701161
https://bugzilla.novell.com/702823
http://download.novell.com/patch/finder/?keywords=f5cdea8ccfe78b8840fa5072b0211851
openSUSE-SU-2011:0803-1: important: kvm
openSUSE Security Update: kvm
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0803-1
Rating: important
References: #701161 #702823
Cross-References: CVE-2011-2212 CVE-2011-2512
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.
It includes one version update.

Description:

A privileged guest user could cause a buffer overflow in
the virtio subsystem of the host, therefore crashing the
guest or potentially execute arbitrary code on the host
(CVE-2011-2212, CVE-2011-2512).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch kvm-4863

- openSUSE 11.3:

zypper in -t patch kvm-4863

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

kvm-0.14.0.0-1.10.1

- openSUSE 11.3 (i586 x86_64) [New Version: 0.12.5]:

kvm-0.12.5-1.8.1


References:

http://support.novell.com/security/cve/CVE-2011-2212.html
http://support.novell.com/security/cve/CVE-2011-2512.html
https://bugzilla.novell.com/701161
https://bugzilla.novell.com/702823
openSUSE-SU-2011:0788-1: important: bind: fixing remote Denial of Service (CVE-2011-2464)
openSUSE Security Update: bind: fixing remote Denial of Service (CVE-2011-2464)
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0788-1
Rating: important
References: #703907
Cross-References: CVE-2011-2464
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________

An update that fixes one vulnerability is now available. It
includes one version update.

Description:

A remote Denial of Service vulnerability has been fixed in
bind. Specially crafted packets could cause bind servers
(recursive as well as authoritative) to exit.
CVE-2011-2464 has been assigned to this issue.


Special Instructions and Notes:

This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.
This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.
This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch bind-4843

- openSUSE 11.3:

zypper in -t patch bind-4843

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64) [New Version: 9.7.3P3]:

bind-9.7.3P3-0.2.1
bind-chrootenv-9.7.3P3-0.2.1
bind-devel-9.7.3P3-0.2.1
bind-libs-9.7.3P3-0.2.1
bind-utils-9.7.3P3-0.2.1

- openSUSE 11.4 (x86_64) [New Version: 9.7.3P3]:

bind-libs-32bit-9.7.3P3-0.2.1

- openSUSE 11.4 (noarch) [New Version: 9.7.3P3]:

bind-doc-9.7.3P3-0.2.1

- openSUSE 11.3 (i586 x86_64) [New Version: 9.7.3P3]:

bind-9.7.3P3-0.2.1
bind-chrootenv-9.7.3P3-0.2.1
bind-devel-9.7.3P3-0.2.1
bind-libs-9.7.3P3-0.2.1
bind-utils-9.7.3P3-0.2.1

- openSUSE 11.3 (x86_64) [New Version: 9.7.3P3]:

bind-libs-32bit-9.7.3P3-0.2.1

- openSUSE 11.3 (noarch) [New Version: 9.7.3P3]:

bind-doc-9.7.3P3-0.2.1


References:

http://support.novell.com/security/cve/CVE-2011-2464.html
https://bugzilla.novell.com/703907
openSUSE-SU-2011:0762-1: critical: mariadb: Fixed missing innodb support after last update
openSUSE Security Update: mariadb: Fixed missing innodb support after last update
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0762-1
Rating: critical
References: #704811
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________

An update that contains security fixes can now be
installed. It includes one version update.

Description:

The last security version upgrade of MariaDB (a MySQL fork)
removed innodb support, breaking old databases.

This update fixes this problem.
- #704811: mariadb "security update" breaks database


Special Instructions and Notes:

This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.
This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.
This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch libmariadbclient16-4864

- openSUSE 11.3:

zypper in -t patch libmariadbclient16-4869

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

libmariadbclient16-5.1.55-0.5.1
libmariadbclient_r16-5.1.55-0.5.1
mariadb-5.1.55-0.5.1
mariadb-bench-5.1.55-0.5.1
mariadb-client-5.1.55-0.5.1
mariadb-debug-5.1.55-0.5.1
mariadb-test-5.1.55-0.5.1
mariadb-tools-5.1.55-0.5.1

- openSUSE 11.3 (i586 x86_64) [New Version: 5.1.55]:

libmariadbclient16-5.1.55-0.5.1
libmariadbclient_r16-5.1.55-0.5.1
mariadb-5.1.55-0.5.1
mariadb-bench-5.1.55-0.5.1
mariadb-client-5.1.55-0.5.1
mariadb-debug-5.1.55-0.5.1
mariadb-test-5.1.55-0.5.1
mariadb-tools-5.1.55-0.5.1


References:

https://bugzilla.novell.com/704811
SUSE-SU-2011:0759-1: important: Security update for bind
SUSE Security Update: Security update for bind
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:0759-1
Rating: important
References: #703907
Cross-References: CVE-2011-2464
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________

An update that fixes one vulnerability is now available. It
includes one version update.

Description:


A remote Denial of Service vulnerability has been fixed in
bind. Specially crafted packets could cause bind servers
(recursive as well as authoritative) to exit.

Security Issue reference:

* CVE-2011-2464



Special Instructions and Notes:

This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.
This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.
This update triggers a restart of the software management
stack. More updates will be available for installation
after applying this update and restarting the application.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP1:

zypper in -t patch sdksp1-bind-4846

- SUSE Linux Enterprise Server 11 SP1 for VMware:

zypper in -t patch slessp1-bind-4846

- SUSE Linux Enterprise Server 11 SP1:

zypper in -t patch slessp1-bind-4846

- SUSE Linux Enterprise Desktop 11 SP1:

zypper in -t patch sledsp1-bind-4846

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.6ESVR4P3]:

bind-devel-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64) [New Version: 9.6ESVR4P3]:

bind-devel-32bit-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 9.6ESVR4P3]:

bind-9.6ESVR4P3-0.2.1
bind-chrootenv-9.6ESVR4P3-0.2.1
bind-doc-9.6ESVR4P3-0.2.1
bind-libs-9.6ESVR4P3-0.2.1
bind-utils-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-32bit-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.6ESVR4P3]:

bind-9.6ESVR4P3-0.2.1
bind-chrootenv-9.6ESVR4P3-0.2.1
bind-doc-9.6ESVR4P3-0.2.1
bind-libs-9.6ESVR4P3-0.2.1
bind-utils-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-32bit-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 9.6ESVR4P3]:

bind-libs-x86-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 9.6ESVR4P3]:

bind-9.6ESVR4P3-0.7.1
bind-chrootenv-9.6ESVR4P3-0.7.1
bind-devel-9.6ESVR4P3-0.7.1
bind-doc-9.6ESVR4P3-0.7.1
bind-libs-9.6ESVR4P3-0.7.1
bind-utils-9.6ESVR4P3-0.7.1

- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-32bit-9.6ESVR4P3-0.7.1

- SUSE Linux Enterprise Server 10 SP4 (ia64) [New Version: 9.6ESVR4P3]:

bind-libs-x86-9.6ESVR4P3-0.7.1

- SUSE Linux Enterprise Server 10 SP4 (ppc) [New Version: 9.6ESVR4P3]:

bind-devel-64bit-9.6ESVR4P3-0.7.1
bind-libs-64bit-9.6ESVR4P3-0.7.1

- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-9.6ESVR4P3-0.2.1
bind-utils-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-32bit-9.6ESVR4P3-0.2.1

- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-9.6ESVR4P3-0.7.1
bind-utils-9.6ESVR4P3-0.7.1

- SUSE Linux Enterprise Desktop 10 SP4 (x86_64) [New Version: 9.6ESVR4P3]:

bind-libs-32bit-9.6ESVR4P3-0.7.1

- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64) [New Version: 9.6ESVR4P3]:

bind-9.6ESVR4P3-0.7.1
bind-chrootenv-9.6ESVR4P3-0.7.1
bind-devel-9.6ESVR4P3-0.7.1
bind-doc-9.6ESVR4P3-0.7.1

- SLE SDK 10 SP4 (ppc) [New Version: 9.6ESVR4P3]:

bind-devel-64bit-9.6ESVR4P3-0.7.1


References:

http://support.novell.com/security/cve/CVE-2011-2464.html
https://bugzilla.novell.com/703907
http://download.novell.com/patch/finder/?keywords=cc8a9e2229ae1bb06264ae88ecde9d78
http://download.novell.com/patch/finder/?keywords=e12e60f332d68352b2999aa22f2f12eb