-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                mozilla,MozillaFirefox
        Announcement ID:        SUSE-SA:2005:058
        Date:                   Fri, 30 Sep 2005 10:00:00 +0000
        Affected Products:      Novell Linux Desktop 9
                                SuSE Linux 9.0
                                SUSE LINUX 9.1
                                SUSE LINUX 9.2
                                SUSE LINUX 9.3
                                SUSE LINUX 10.0
                                SUSE LINUX 10.0 OSS
                                SUSE Linux Enterprise Server 9
                                SuSE Linux Desktop 1.0
                                SuSE Linux Enterprise Server 8
                                UnitedLinux 1.0
        Vulnerability Type:     remote code execution
        Severity (1-10):        8
        SUSE Default Package:   yes
        Cross-References:       CAN-2005-2701
                                CAN-2005-2702
                                CAN-2005-2703
                                CAN-2005-2704
                                CAN-2005-2705
                                CAN-2005-2706
                                CAN-2005-2707

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various security problems in Mozilla based browsers           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The web browsers Mozilla and Mozilla Firefox have been updated to
   contain fixes for the vulnerabilities fixed in:

   - Mozilla browser suite version 1.7.12
   - Mozilla Firefox version 1.0.7

   The security problems with their corresponding Mitre CVE ID are:
   - CAN-2005-2701: Heap overrun in XBM image processing
   - CAN-2005-2702: Crash on "zero-width non-joiner" sequence
   - CAN-2005-2703: XMLHttpRequest header spoofing
   - CAN-2005-2704: Object spoofing using XBL 
   - CAN-2005-2705: Javascript integer overflow
   - CAN-2005-2706: Privilege escalation using about: scheme
   - CAN-2005-2707: Chrome window spoofing

2) Solution or Work-Around


   There is no known workaround, please install the update packages.
3) Special Instructions and Notes


   Please close and restart all running instances of mozilla or Firefox after the update.
4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.0 OSS:
             b070f22c50716e9793c6286e75d7f1d3
             b7e3dbc40ec322b6b4baff3db1ab8f33
             3d363104fbaccb6ed24bcbfdaf8d3e0b
             dfeb241e004969274396918859ce9c29
             9ccff14aedb21ded7a274de9452c68fb
             c7fc87a1c63e9be69b5d32eea19d0779
             cb8a2af71a14a9158c57717649766a74
             494909fceea44bd110e08482ae151a78
             41d9c223405d9d94dfcc5b6fb98dc066
             292cc9a346d743de3144b71b1b61feb7

   SUSE LINUX 10.0:
             b070f22c50716e9793c6286e75d7f1d3
             b7e3dbc40ec322b6b4baff3db1ab8f33
             3d363104fbaccb6ed24bcbfdaf8d3e0b
             dfeb241e004969274396918859ce9c29
             9ccff14aedb21ded7a274de9452c68fb
             c7fc87a1c63e9be69b5d32eea19d0779
             cb8a2af71a14a9158c57717649766a74
             494909fceea44bd110e08482ae151a78
             41d9c223405d9d94dfcc5b6fb98dc066
             292cc9a346d743de3144b71b1b61feb7

   SUSE LINUX 9.3:
             e98cdd73507000f7fa68c48821f37f04
             e7faca0efbe75c279ffa99cd1f076f37
             06712cf8c34b60c89e88d92b7ead910d
             059b7754c74ae3c84affe8df06a47794
             a45be8b0f1276601f8dcf05485ea78e2
             0dc9f868e9ca4e232fa3da840d501c4f
             979c5dc463d2f1a56e1d9127ccc5710b
             7f6abe44aa06eeac8a25475c2b751f57
             f9952790bb4be571626b25d08fd1e342
             cf5a35adb33f12a0395b847566a4a6f9

   SUSE LINUX 9.2:
             58e9886032fe946144548daf1b4e47b8
             eea987167c75d56ace45d361cb4cc924
             5b79318a93799582dc072ccf20ad30e0
             d30905577f54fa8b62f15ddc258f74a7
             c2f24bd8207dd6f66d393d96e3df38c4
             670ac56681d0e07805df24ea6ab250b1
             3716981c5488f9f91ae0591a6d078301
             cf222da855dba56dad4183944c999c63
             d4fbc3fd3516101ad4bc1a0c7f54b004
             101f9906054da65fa796c84d8c61e257
             4a96a0f7b9f804b4a50f719702e7fcd6
             0a9b0eff1927fb41097d04c92f31ec91
             7d43bc0f6efdba8ec8d2bee4708cac9d
             cdcdb5714caac35a0e1a54deb20a37aa
             a871f995700d1a3ddf9511c10fd1caac

   SUSE LINUX 9.1:
             37080fb2690efd9be2c43e8256a682dc
             dba6e7624528c385d92f9060326763ea
             79f25c5c016aa6ba5b5e03edaa5250b0
             e1a17720cb3e02365dfff9e827cbbc07
             f39e3c1a52914234ecad41921f873107
             56204c9d290201e272e4ec4e9facfacb
             d596bfa47dfdbab3b0875cb04c296572
             c1d2f354fa2a213ab5fce5a59db8b561
             f7870dc318dab84dc53c446460524eff
             7ebe1eeba553ece769f914f7c09f2ba0
             d53222a37715570d1db4b1baeb6f36ba
             b9a321e8fd0f67e677be6efc125359b2
             8fcddcef60122566c180938c6bcd0b99
             4bb1efcd97b8066dd4913c9223d18dc8
             51421590af63afa139ac0622a1baf684

   SuSE Linux 9.0:
             4e53eabcd32f3abad4c3b1b5e407f318
             5371abafdf197f561b42cbb62a3955cd
             05af99fbab21e29a4dc20b5b3aa48350
             c99f2fb5bc86968de3e16f420923984c
             ee755cccefdb8f16ddff4f636a26fe11
             2029374bce342b76df4217dc3529b71d
             95db2c6e045a546811d35808c76431f1
             5b641188c547f742399c1fa1d3a1ba3c
             19935f7e9f70ad9825f110cc8b7a8f36
             57e5689880bacdedc82874f66f51704a
             1f64833df09e7c5f17fa384ae392f943
             20b1ecc87577dedaa7db1633e8e58bc5

   Power PC Platform:

   SUSE LINUX 10.0 OSS:
             430e1c4f054bcb88b715b5ca34ba9725
             95c070ad06d421ff645ed898fe4066c2
             a57b62e27f94ae3156adfea528b55bc4
             fd030f1a7c191ea06c3c63300a52dd2c
             7394df9566dc9b52cdacdc6ae91cbaf4
             0515073dafedc53d0ec5d5c3b0cfa144
             55d8e9f1d9110e965b5c6c7b84ca8c15
             493263b3ec34285c9bac277b99b762fc

   x86-64 Platform:

   SUSE LINUX 10.0 OSS:
             f4069ccda839c1146e478e8927b42ae0
             e059af96039f550a0eb1dbdcaa51d691
             eba511d40cc67672c9d4461b551543a1
             1afaabbf461d0d7d439861efd638bf82
             13a5d28dffe9fb8f4eaee758a03d54c5
             01a2b53726e958516315bf2e11390fff
             5b5cdd12fc9002ca41cf3efcca1025f0
             02740535ecb1adc8534e4ebd2d28ced1

   SUSE LINUX 10.0:
             f4069ccda839c1146e478e8927b42ae0
             e059af96039f550a0eb1dbdcaa51d691
             eba511d40cc67672c9d4461b551543a1
             1afaabbf461d0d7d439861efd638bf82
             13a5d28dffe9fb8f4eaee758a03d54c5
             01a2b53726e958516315bf2e11390fff
             5b5cdd12fc9002ca41cf3efcca1025f0
             02740535ecb1adc8534e4ebd2d28ced1

   SUSE LINUX 9.3:
             ad132a0176b38d35aa5a59f5dddd48e9
             3ca7760002db72b56644085727877b40
             87efa7a30315bcc8bdd2f580141f4ebe
             91e920dc2e883d38c0fe362cfeaaedb3
             ac3b0bbf03ded04a2b7e7991a724d59a
             86afd380a362338baeb96ba1e1673071
             3548f885148faf1d6d8f31a2149693c9
             ea4339aa06d16ef076193368be577788
             d1f485c3cea08964be5cfc935d6476db

   SUSE LINUX 9.2:
             5cffdac01a15a951168244554255c832
             c49627cf05e2a069e3d540edc434da1f
             719c1d18b869185e45f349898ffaa4b0
             597c527c061a6758b87bd392cc7e85fd
             99d2fad0d66ca029ae13606e0b38a678
             02e692e00a2401301e9dc8ea3eff25b1
             7eb3ca48f665999523d3fe2ffa69fb99
             28e756cebc948024d3d7eb19090fb8b8
             68388f461bf620f6b8050f706cfd87a4
             e2a710fc8344c9e96bd0dc11bccb5de2
             d10426280e0a7daafcad9c52f8cc90a6
             24d8f99ca3b83f2f647e2e3a69814fbc
             73ee0e42d82b38e3a1420e72366782b0
             1dd0a5bc9598750c6417afdf9eb89a2b
             92fbc53b7e94cb6b736b134a201da6f0

   SUSE LINUX 9.1:
             00c2104c2a6cfced9254fd529e2a3eb0
             d9c05812c47c81d65664feb010af7891
             b630d42f44fa70f5c41216fc42beaa06
             9de2513892aed768d01ba77853400bf5
             8298d98b7fd64707227b97ccf8e2ccf8
             5b7c071a12a0867107dcdb4b26ea3965
             2c2c42b0f518a5e139338f0083073add
             43924915be1555fa119bf8a0fb50ac39
             182349498b15b1c8cd1bfa6b7087a2a6
             af2a1dcacbda6ef35c456c4cf5be4729
             cd694a201d6e9416be5634ff2b4ed08a
             e542067f8c9565e0e5ea018ae69a6eb5
             78606b9b9a607dde560e7bc58047363c
             e669c013cd3a564909464d466cf004de
             0ac108535f987e0d37fab840f24e820d

   SuSE Linux 9.0:
             ee62a8fa3053951b7069a7523bac87bc
             59be47c90cc3a5134d6856df4a3453ad
             99b376ba53d6bce9e006cfb6b471843a
             c85120938f7111382804d9ffeb7d80f2
             952a6ba1d1c52fb715606570eeb4d69e
             b643663a2fd73baa85b1cb2a0388fb9f
             a6d1b59b10bd06d0359a507401c2735b
             82d3508a125302620ba6762eeb0c76a4
             cb45dc7828a793cf841b4a26829a0b0a
             b3c39f74bd1b3a6c3d28a9f47e590c8a
             5c8c42792d29095560b734109f37c01f
             27eca70e1e49b9bcbea2c00fbdc6ca98

   Sources:

   SUSE LINUX 10.0 OSS:
             d09caffc894595153a79d1b97f016954
             d83a9eacb5faa1c095ab8158146f077b

   SUSE LINUX 10.0:
             d09caffc894595153a79d1b97f016954
             0be969f1998e2619aa06af9403fb1f71

   SUSE LINUX 9.3:
             593d44805da6927c4f6d0f8baba9a39e
             9e3cb1bcc89d282ba1867778eb59cf41

   SUSE LINUX 9.2:
             5d29e5a760c0c7c47294a64604a06cf0
             345a1cd4936264eb420624bee8e117ec
             51eb4a5a6dbc77afea461563493f590b
             886a6b86ffec1f3a513f49ef95321340
             1bb1d4a94210c6dc7371fe09a8dfba98

   SUSE LINUX 9.1:
             1f9d95f57d6a80a36dce9d8f84c3963a
             80533e066eaed0a657bf5cb8e25234ab
             47220d851a53e7a63fbf12dea62b1cc6
             07c014a5492f61a68320863281db4c96
             bdbc740b3c37c17103aa56d219351e4c
             14aecf150956f4635f021b64f554f78d
             7a1ea397402d592477e5310a3250e549
             b77f775d1e92864fbe8023a24b1720e0
             30b43409cd492ae0656d752732b95d86
             3c1170db7e139b7f6ea4e15784c8ff38
             bbc9ac1ef35c3d86103fa6fc6d7f8537
             e43906af2dee9bf63a9e1089b8a3f368
             2a82cf5cbb535a285ce0ba81b9201c8c
             45d09732344464d46c0dc702c7c543f0

   SuSE Linux 9.0:
             580b76681deef6804eab49cf69a173f3
             34de2c3f3f025eebf20eaef3a67cd163
             0722c1ed3f1876b5aaeb9beb461ff94d
             d692de86ba4705d68b4601fe98ef9a34
             67ee232260f2e968666ead52e61b0733
             c2990ece2e6034aa2d3018f5bd715f0c
             c94b039006cc2fa88d427892c02817bd
             b3de942cf3bca2fd421a9eea038b59f9
             23abbabf17c82104fc795dcaac639352
             27827ab4dc20eba79ed514a0f6a40f92

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

      https://www.suse.com:443/
      https://www.suse.com:443/
      https://www.suse.com:443/
      https://www.suse.com:443/

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

SuSE: 2005-058: Mozilla,Mozilla Firefox remote code execution Security Update

September 30, 2005
The web browsers Mozilla and Mozilla Firefox have been updated to The web browsers Mozilla and Mozilla Firefox have been updated to contain fixes for the vulnerabilities fixed in: ...

Summary


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                mozilla,MozillaFirefox
        Announcement ID:        SUSE-SA:2005:058
        Date:                   Fri, 30 Sep 2005 10:00:00 +0000
        Affected Products:      Novell Linux Desktop 9
                                SuSE Linux 9.0
                                SUSE LINUX 9.1
                                SUSE LINUX 9.2
                                SUSE LINUX 9.3
                                SUSE LINUX 10.0
                                SUSE LINUX 10.0 OSS
                                SUSE Linux Enterprise Server 9
                                SuSE Linux Desktop 1.0
                                SuSE Linux Enterprise Server 8
                                UnitedLinux 1.0
        Vulnerability Type:     remote code execution
        Severity (1-10):        8
        SUSE Default Package:   yes
        Cross-References:       CAN-2005-2701
                                CAN-2005-2702
                                CAN-2005-2703
                                CAN-2005-2704
                                CAN-2005-2705
                                CAN-2005-2706
                                CAN-2005-2707

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various security problems in Mozilla based browsers           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The web browsers Mozilla and Mozilla Firefox have been updated to
   contain fixes for the vulnerabilities fixed in:

   - Mozilla browser suite version 1.7.12
   - Mozilla Firefox version 1.0.7

   The security problems with their corresponding Mitre CVE ID are:
   - CAN-2005-2701: Heap overrun in XBM image processing
   - CAN-2005-2702: Crash on "zero-width non-joiner" sequence
   - CAN-2005-2703: XMLHttpRequest header spoofing
   - CAN-2005-2704: Object spoofing using XBL 
   - CAN-2005-2705: Javascript integer overflow
   - CAN-2005-2706: Privilege escalation using about: scheme
   - CAN-2005-2707: Chrome window spoofing

2) Solution or Work-Around


   There is no known workaround, please install the update packages.
3) Special Instructions and Notes


   Please close and restart all running instances of mozilla or Firefox after the update.
4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.0 OSS:
             b070f22c50716e9793c6286e75d7f1d3
             b7e3dbc40ec322b6b4baff3db1ab8f33
             3d363104fbaccb6ed24bcbfdaf8d3e0b
             dfeb241e004969274396918859ce9c29
             9ccff14aedb21ded7a274de9452c68fb
             c7fc87a1c63e9be69b5d32eea19d0779
             cb8a2af71a14a9158c57717649766a74
             494909fceea44bd110e08482ae151a78
             41d9c223405d9d94dfcc5b6fb98dc066
             292cc9a346d743de3144b71b1b61feb7

   SUSE LINUX 10.0:
             b070f22c50716e9793c6286e75d7f1d3
             b7e3dbc40ec322b6b4baff3db1ab8f33
             3d363104fbaccb6ed24bcbfdaf8d3e0b
             dfeb241e004969274396918859ce9c29
             9ccff14aedb21ded7a274de9452c68fb
             c7fc87a1c63e9be69b5d32eea19d0779
             cb8a2af71a14a9158c57717649766a74
             494909fceea44bd110e08482ae151a78
             41d9c223405d9d94dfcc5b6fb98dc066
             292cc9a346d743de3144b71b1b61feb7

   SUSE LINUX 9.3:
             e98cdd73507000f7fa68c48821f37f04
             e7faca0efbe75c279ffa99cd1f076f37
             06712cf8c34b60c89e88d92b7ead910d
             059b7754c74ae3c84affe8df06a47794
             a45be8b0f1276601f8dcf05485ea78e2
             0dc9f868e9ca4e232fa3da840d501c4f
             979c5dc463d2f1a56e1d9127ccc5710b
             7f6abe44aa06eeac8a25475c2b751f57
             f9952790bb4be571626b25d08fd1e342
             cf5a35adb33f12a0395b847566a4a6f9

   SUSE LINUX 9.2:
             58e9886032fe946144548daf1b4e47b8
             eea987167c75d56ace45d361cb4cc924
             5b79318a93799582dc072ccf20ad30e0
             d30905577f54fa8b62f15ddc258f74a7
             c2f24bd8207dd6f66d393d96e3df38c4
             670ac56681d0e07805df24ea6ab250b1
             3716981c5488f9f91ae0591a6d078301
             cf222da855dba56dad4183944c999c63
             d4fbc3fd3516101ad4bc1a0c7f54b004
             101f9906054da65fa796c84d8c61e257
             4a96a0f7b9f804b4a50f719702e7fcd6
             0a9b0eff1927fb41097d04c92f31ec91
             7d43bc0f6efdba8ec8d2bee4708cac9d
             cdcdb5714caac35a0e1a54deb20a37aa
             a871f995700d1a3ddf9511c10fd1caac

   SUSE LINUX 9.1:
             37080fb2690efd9be2c43e8256a682dc
             dba6e7624528c385d92f9060326763ea
             79f25c5c016aa6ba5b5e03edaa5250b0
             e1a17720cb3e02365dfff9e827cbbc07
             f39e3c1a52914234ecad41921f873107
             56204c9d290201e272e4ec4e9facfacb
             d596bfa47dfdbab3b0875cb04c296572
             c1d2f354fa2a213ab5fce5a59db8b561
             f7870dc318dab84dc53c446460524eff
             7ebe1eeba553ece769f914f7c09f2ba0
             d53222a37715570d1db4b1baeb6f36ba
             b9a321e8fd0f67e677be6efc125359b2
             8fcddcef60122566c180938c6bcd0b99
             4bb1efcd97b8066dd4913c9223d18dc8
             51421590af63afa139ac0622a1baf684

   SuSE Linux 9.0:
             4e53eabcd32f3abad4c3b1b5e407f318
             5371abafdf197f561b42cbb62a3955cd
             05af99fbab21e29a4dc20b5b3aa48350
             c99f2fb5bc86968de3e16f420923984c
             ee755cccefdb8f16ddff4f636a26fe11
             2029374bce342b76df4217dc3529b71d
             95db2c6e045a546811d35808c76431f1
             5b641188c547f742399c1fa1d3a1ba3c
             19935f7e9f70ad9825f110cc8b7a8f36
             57e5689880bacdedc82874f66f51704a
             1f64833df09e7c5f17fa384ae392f943
             20b1ecc87577dedaa7db1633e8e58bc5

   Power PC Platform:

   SUSE LINUX 10.0 OSS:
             430e1c4f054bcb88b715b5ca34ba9725
             95c070ad06d421ff645ed898fe4066c2
             a57b62e27f94ae3156adfea528b55bc4
             fd030f1a7c191ea06c3c63300a52dd2c
             7394df9566dc9b52cdacdc6ae91cbaf4
             0515073dafedc53d0ec5d5c3b0cfa144
             55d8e9f1d9110e965b5c6c7b84ca8c15
             493263b3ec34285c9bac277b99b762fc

   x86-64 Platform:

   SUSE LINUX 10.0 OSS:
             f4069ccda839c1146e478e8927b42ae0
             e059af96039f550a0eb1dbdcaa51d691
             eba511d40cc67672c9d4461b551543a1
             1afaabbf461d0d7d439861efd638bf82
             13a5d28dffe9fb8f4eaee758a03d54c5
             01a2b53726e958516315bf2e11390fff
             5b5cdd12fc9002ca41cf3efcca1025f0
             02740535ecb1adc8534e4ebd2d28ced1

   SUSE LINUX 10.0:
             f4069ccda839c1146e478e8927b42ae0
             e059af96039f550a0eb1dbdcaa51d691
             eba511d40cc67672c9d4461b551543a1
             1afaabbf461d0d7d439861efd638bf82
             13a5d28dffe9fb8f4eaee758a03d54c5
             01a2b53726e958516315bf2e11390fff
             5b5cdd12fc9002ca41cf3efcca1025f0
             02740535ecb1adc8534e4ebd2d28ced1

   SUSE LINUX 9.3:
             ad132a0176b38d35aa5a59f5dddd48e9
             3ca7760002db72b56644085727877b40
             87efa7a30315bcc8bdd2f580141f4ebe
             91e920dc2e883d38c0fe362cfeaaedb3
             ac3b0bbf03ded04a2b7e7991a724d59a
             86afd380a362338baeb96ba1e1673071
             3548f885148faf1d6d8f31a2149693c9
             ea4339aa06d16ef076193368be577788
             d1f485c3cea08964be5cfc935d6476db

   SUSE LINUX 9.2:
             5cffdac01a15a951168244554255c832
             c49627cf05e2a069e3d540edc434da1f
             719c1d18b869185e45f349898ffaa4b0
             597c527c061a6758b87bd392cc7e85fd
             99d2fad0d66ca029ae13606e0b38a678
             02e692e00a2401301e9dc8ea3eff25b1
             7eb3ca48f665999523d3fe2ffa69fb99
             28e756cebc948024d3d7eb19090fb8b8
             68388f461bf620f6b8050f706cfd87a4
             e2a710fc8344c9e96bd0dc11bccb5de2
             d10426280e0a7daafcad9c52f8cc90a6
             24d8f99ca3b83f2f647e2e3a69814fbc
             73ee0e42d82b38e3a1420e72366782b0
             1dd0a5bc9598750c6417afdf9eb89a2b
             92fbc53b7e94cb6b736b134a201da6f0

   SUSE LINUX 9.1:
             00c2104c2a6cfced9254fd529e2a3eb0
             d9c05812c47c81d65664feb010af7891
             b630d42f44fa70f5c41216fc42beaa06
             9de2513892aed768d01ba77853400bf5
             8298d98b7fd64707227b97ccf8e2ccf8
             5b7c071a12a0867107dcdb4b26ea3965
             2c2c42b0f518a5e139338f0083073add
             43924915be1555fa119bf8a0fb50ac39
             182349498b15b1c8cd1bfa6b7087a2a6
             af2a1dcacbda6ef35c456c4cf5be4729
             cd694a201d6e9416be5634ff2b4ed08a
             e542067f8c9565e0e5ea018ae69a6eb5
             78606b9b9a607dde560e7bc58047363c
             e669c013cd3a564909464d466cf004de
             0ac108535f987e0d37fab840f24e820d

   SuSE Linux 9.0:
             ee62a8fa3053951b7069a7523bac87bc
             59be47c90cc3a5134d6856df4a3453ad
             99b376ba53d6bce9e006cfb6b471843a
             c85120938f7111382804d9ffeb7d80f2
             952a6ba1d1c52fb715606570eeb4d69e
             b643663a2fd73baa85b1cb2a0388fb9f
             a6d1b59b10bd06d0359a507401c2735b
             82d3508a125302620ba6762eeb0c76a4
             cb45dc7828a793cf841b4a26829a0b0a
             b3c39f74bd1b3a6c3d28a9f47e590c8a
             5c8c42792d29095560b734109f37c01f
             27eca70e1e49b9bcbea2c00fbdc6ca98

   Sources:

   SUSE LINUX 10.0 OSS:
             d09caffc894595153a79d1b97f016954
             d83a9eacb5faa1c095ab8158146f077b

   SUSE LINUX 10.0:
             d09caffc894595153a79d1b97f016954
             0be969f1998e2619aa06af9403fb1f71

   SUSE LINUX 9.3:
             593d44805da6927c4f6d0f8baba9a39e
             9e3cb1bcc89d282ba1867778eb59cf41

   SUSE LINUX 9.2:
             5d29e5a760c0c7c47294a64604a06cf0
             345a1cd4936264eb420624bee8e117ec
             51eb4a5a6dbc77afea461563493f590b
             886a6b86ffec1f3a513f49ef95321340
             1bb1d4a94210c6dc7371fe09a8dfba98

   SUSE LINUX 9.1:
             1f9d95f57d6a80a36dce9d8f84c3963a
             80533e066eaed0a657bf5cb8e25234ab
             47220d851a53e7a63fbf12dea62b1cc6
             07c014a5492f61a68320863281db4c96
             bdbc740b3c37c17103aa56d219351e4c
             14aecf150956f4635f021b64f554f78d
             7a1ea397402d592477e5310a3250e549
             b77f775d1e92864fbe8023a24b1720e0
             30b43409cd492ae0656d752732b95d86
             3c1170db7e139b7f6ea4e15784c8ff38
             bbc9ac1ef35c3d86103fa6fc6d7f8537
             e43906af2dee9bf63a9e1089b8a3f368
             2a82cf5cbb535a285ce0ba81b9201c8c
             45d09732344464d46c0dc702c7c543f0

   SuSE Linux 9.0:
             580b76681deef6804eab49cf69a173f3
             34de2c3f3f025eebf20eaef3a67cd163
             0722c1ed3f1876b5aaeb9beb461ff94d
             d692de86ba4705d68b4601fe98ef9a34
             67ee232260f2e968666ead52e61b0733
             c2990ece2e6034aa2d3018f5bd715f0c
             c94b039006cc2fa88d427892c02817bd
             b3de942cf3bca2fd421a9eea038b59f9
             23abbabf17c82104fc795dcaac639352
             27827ab4dc20eba79ed514a0f6a40f92

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

      https://www.suse.com:443/
      https://www.suse.com:443/
      https://www.suse.com:443/
      https://www.suse.com:443/

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

References

Severity

Related News