SUSE 5637 Published by Philipp Esselbach 0

A kernel update has been released for SUSE Linux

______________________________________________________________________________

SUSE Security Announcement

Package: Linux Kernel
Announcement-ID: SuSE-SA:2004:010
Date: Tuesday, May 5th 2004 02:30 MEST
Affected products: 8.0, 8.1, 8.2, 9.0, 9.1
SuSE Linux Database Server,
SuSE eMail Server III, 3.1
SuSE Linux Enterprise Server 7, 8
SuSE Linux Firewall on CD/Admin host
SuSE Linux Connectivity Server
SuSE Linux Office Server
UnitedLinux 1.0
SuSE Linux Desktop 1.0
Vulnerability Type: privilege escalation, local DoS
Severity (1-10): 7
SUSE default package: yes
Cross References: CAN-2004-0427
CAN-2004-0424
CAN-2004-0229
CAN-2004-0228
CAN-2004-0394

Content of this advisory:
1) security vulnerability resolved:
- do_fork() memory leak (CAN-2004-0427)
- setsockopt() buffer overflow (CAN-2004-0424)
- misuse of fb_copy_cmap() (CAN-2004-0229)
- cpufreq_procctl() integer overflow (CAN-2004-0228)
- buffer overflow in panic() (CAN-2004-0394)
- wrong permissions on /proc/scsi/qla2300/HbaApiNode
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- canna
- xchat
- tcpdump
- lha
3) standard appendix (further information)

______________________________________________________________________________

SUSE 5637 Published by Philipp Esselbach 0

A cvs update is available for SUSE Linux

______________________________________________________________________________

SUSE Security Announcement

Package: cvs
Announcement-ID: SuSE-SA:2004:008
Date: Wed Apr 14 16:00:00 MEST 2004
Affected products: 8.0, 8.1, 8.2, 9.0
SuSE Firewall on CD 2
SuSE Linux Enterprise Server 7, 8
SLES 8 for IBM iSeries and IBM pSeries
SuSE Linux Office Server
UnitedLinux 1.0
Vulnerability Type: remote code execution
Severity (1-10): 5
SUSE default package: No
Cross References:

Content of this advisory:
1) security vulnerability resolved: arbitrary file creation in cvs
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- neon
- tcpdump
- openssh
- kdeprint/kdelibs3
- MPlayer
- mailman
- systat
- apache2
- emil
3) standard appendix (further information)

______________________________________________________________________________

SUSE 5637 Published by Philipp Esselbach 0

SUSE has released a kernel update

______________________________________________________________________________

SUSE Security Announcement

Package: Linux Kernel
Announcement-ID: SuSE-SA:2004:009
Date: Wednesday, Apr. 14th 2004 16:00 MEST
Affected products: 8.0, 8.1, 8.2, 9.0
SuSE Linux Database Server,
SuSE eMail Server III, 3.1
SuSE Linux Enterprise Server 7, 8
SuSE Linux Firewall on CD/Admin host
SuSE Linux Connectivity Server
SuSE Linux Office Server
Vulnerability Type: - local privilege escalation
- information leakage
Severity (1-10): 6
SUSE default package: yes
Cross References: CAN-2004-0109
CAN-2004-0181

Content of this advisory:
1) security vulnerability resolved:
- buffer overflow in ISO9660 code
- information leakage in JFS
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- mailman
- sysstat
- neon
- openssh
- kdeprint/kdelibs3
- MPlayer
- sysstat
- apache2
- emil
- metamail
- tcpdump
3) standard appendix (further information)

______________________________________________________________________________

SUSE 5637 Published by Philipp Esselbach 0

Siemens Business Services GmbH & Co. OHG (SBS), the IT service subsidiary of German electronics giant Siemens AG, has agreed to a sales partnership with Novell Inc.'s newly acquired open source software vendor, SuSE Linux AG, the companies said Tuesday.

Read more

SUSE 5637 Published by Philipp Esselbach 0

SUSE has released updated OpenSSL packages:

______________________________________________________________________________

SUSE Security Announcement

Package: openssl
Announcement-ID: SuSE-SA:2004:007
Date: Wednesday, Mar 17th 2004 13:30 MEST
Affected products: 8.0, 8.1, 8.2, 9.0
SuSE Linux Database Server,
SuSE eMail Server III, 3.1
SuSE Linux Enterprise Server 7, 8
SuSE Linux Firewall on CD/Admin host
SuSE Linux Connectivity Server
SuSE Linux Office Server
Vulnerability Type: remote denial-of-service
Severity (1-10): 4
SUSE default package: yes
Cross References: CAN-2004-0079
CAN-2004-0112

Content of this advisory:
1) security vulnerability resolved:
- null pointer assignment due to handshake
- crash with Kerberos cipher-suite support
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- xf86_glx/xmodules/xloader
- gnome-session
- pwlib
- libxml2
- mod_python
- mozilla
- kernel
- mailman
- metamail
- sysstat
3) standard appendix (further information)

______________________________________________________________________________