An ipsec-tools security update is available for SUSE Linux
A security summary report from SUSE:
Updated MySQL packages are available for SUSE Linux:
A security announcement from SUSE:
An ImageMagick security update has been released for SUSE Linux
A Security Summary from SUSE:
A Mozilla Firefox security update is available for SUSE Linux:
A security announcement from SUSE:
A RealPlayer security update is available for SUSE Linux 9.2 and Novell Linux Desktop 9
A Security Summary Report from SUSE:
A cyrus-sasl security update is available for SUSE Linux:
A Security Announcement from SUSE:
A security announcement from SUSE:
A Security Summary Report from SUSE:
An announcement from SUSE:
A security announcement from SUSE:
A new squid security update is available for SUSE Linux ______________________________________________________________________________ SUSE Security Announcement Package: squid Announcement-ID: SUSE-SA:2005:008 Date: Tue, Feb 22nd 2005 14:30:00 MEST Affected products: 8.2, 9.0, 9.1, 9.2 SUSE Linux Enterprise Server 8, 9 Vulnerability Type: remote denial of service Severity (1-10): 4 SUSE default package: no Cross References: CAN-2005-0446 Content of this advisory: 1) security vulnerability resolved: remote denial of service attack 2) solution/workaround 3) special instructions and notes 4) package location and checksums 5) pending vulnerabilities, solutions, workarounds: none 6) standard appendix (further information)
A squid security update is available for SUSE Linux ______________________________________________________________________________ SUSE Security Announcement Package: squid Announcement-ID: SUSE-SA:2005:006 Date: Thursday, Feb 10th 2005 13:30 MET Affected products: 8.1, 8.2, 9.0, 9.1, 9.2 SUSE Linux Enterprise Server 8, 9 Vulnerability Type: remote command execution Severity (1-10): 8 SUSE default package: no Cross References: CAN-2005-0094 CAN-2005-0095 CAN-2005-0096 CAN-2005-0097 CAN-2005-0173 CAN-2005-0174 CAN-2005-0175 CAN-2005-0211 CAN-2005-0241 Content of this advisory: 1) security vulnerability resolved: + buffer overflow in gopher parser + integer overflow in WCCP handling code + memory leak in the NTLM fakeauth_auth helper + denial-of-service in NTLM component + lax LDAP account name handling + cache poisoning by malformed HTTP packets + cache poisoning by splitted HTTP responses + buffer overflow in WCCP handling code + httpProcessReplyHeader function does not properly set the debug context problem description 2) solution/workaround 3) special instructions and notes 4) package location and checksums 5) pending vulnerabilities, solutions, workarounds: 6) standard appendix (further information) ______________________________________________________________________________
A Realplayer 8 security update has been released for SUSE Linux ______________________________________________________________________________ SUSE Security Announcement Package: realplayer 8 Announcement-ID: SUSE-SA:2005:004 Date: Monday, Jan 24th 2005 16:00 MET Affected products: 8.1, 8.2, 9.0, 9.1 SUSE Linux Desktop 1.0 Vulnerability Type: remote code execution Severity (1-10): 8 SUSE default package: yes Cross References: none Content of this advisory: 1) security vulnerability discussed: - integer overflow problem description 2) solution/workaround 3) standard appendix (further information)
A new kernel is available for SUSE Linux ______________________________________________________________________________ SUSE Security Announcement Package: kernel Announcement-ID: SUSE-SA:2005:003 Date: Friday, Jan 21st 2005 16:00 MET Affected products: 8.1, 8.2, 9.0, 9.1, 9.2 SUSE Linux Enterprise Server 8, 9 SUSE Linux Desktop 1.0 Novell Linux Desktop 9 Vulnerability Type: local privilege escalation Severity (1-10): 7 SUSE default package: yes Cross References: CAN-2004-1235 CAN-2005-0001 Content of this advisory: 1) security vulnerability resolved: - local privilege escalation - local denial of service attacks problem description 2) solution/workaround 3) special instructions and notes 4) package location and checksums 5) pending vulnerabilities, solutions, workarounds: - see summary report 6) standard appendix (further information)