-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: MozillaFirefox,seamonkey
Announcement ID: SUSE-SA:2010:015
Date: Thu, 04 Mar 2010 15:00:00 +0000
Affected Products: openSUSE 11.0
openSUSE 11.1
openSUSE 11.2
SLE SDK 10 SP2
SLE SDK 10 SP3
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
SUSE Linux Enterprise 10 SP3 DEBUGINFO
SUSE Linux Enterprise Server 10 SP3
SLES 11 DEBUGINFO
SUSE Moblin 2.0
SUSE Moblin 2.1
SLE 11
SLED 11
SLES 11
Vulnerability Type: remote code execution
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
SUSE Default Package: yes
Cross-References: CVE-2009-1571, CVE-2009-3988, CVE-2010-0159
CVE-2010-0160, CVE-2010-0162, MFSA 2010-01
MFSA 2010-02, MFSA 2010-03, MFSA 2010-04
MFSA 2010-05
Content of This Advisory:
1) Security Vulnerability Resolved:
Mozilla Firefox security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Mozilla Firefox was upgraded to version 3.5.8, fixing various bugs and security issues.
On openSUSE 11.0 and 11.1 Mozilla Firefox was updated to version 3.0.18.
On openSUSE 11.2 Mozilla Seamonkey was updated to version 2.0.2.
Following security issues have been fixed:
MFSA 2010-01 / CVE-2010-0159: Mozilla developers identified and fixed several stability bugs in the browser
engine used in Firefox and other Mozilla-based products. Some of these crashes
showed evidence of memory corruption under certain circumstances and we presume
that with enough effort at least some of these could be exploited to run
arbitrary code.
MFSA 2010-02 / CVE-2010-0160: Security researcher Orlando Barrera II reported
via TippingPoint's Zero Day Initiative that Mozilla's implementation of Web
Workers contained an error in its handling of array data types when processing
posted messages. This error could be used by an attacker to corrupt heap memory
and crash the browser, potentially running arbitrary code on a victim's
computer.
MFSA 2010-03 / CVE-2009-1571: Security researcher Alin Rad Pop of Secunia
Research reported that the HTML parser incorrectly freed used memory when
insufficient space was available to process remaining input. Under such
circumstances, memory occupied by in-use objects was freed and could later be
filled with attacker-controlled text. These conditions could result in the
execution or arbitrary code if methods on the freed objects were subsequently
called.
MFSA 2010-04 / CVE-2009-3988: Security researcher Hidetake Jo of Microsoft
Vulnerability Research reported that the properties set on an object passed to
showModalDialog were readable by the document contained in the dialog, even
when the document was from a different domain. This is a violation of the
same-origin policy and could result in a website running untrusted JavaScript
if it assumed the dialogArguments could not be initialized by another site.
An anonymous security researcher, via TippingPoint's Zero Day Initiative, also
independently reported this issue to Mozilla.
MFSA 2010-05 / CVE-2010-0162: Mozilla security researcher Georgi Guninski
reported that when a SVG document which is served with Content-Type:
application/octet-stream is embedded into another document via an tag
with type="image/svg+xml", the Content-Type is ignored and the SVG document is
processed normally. A website which allows arbitrary binary data to be uploaded
but which relies on Content-Type: application/octet-stream to prevent script
execution could have such protection bypassed. An attacker could upload a SVG
document containing JavaScript as a binary file to a website, embed the SVG
document into a malicious page on another site, and gain access to the script
environment from the SVG-serving site, bypassing the same-origin policy.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please restart the Mozilla browser after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
to apply the update, replacing with the filename of the
downloaded RPM package.
x86 Platform:
openSUSE 11.2:
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/MozillaFirefox-debuginfo-3.5.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/MozillaFirefox-debugsource-3.5.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/mozilla-xulrunner191-debuginfo-1.9.1.8-0.1.1.i586.rpm
http://download.opensuse.org/debug/update/11.2/rpm/i586/mozilla-xulrunner191-debugsource-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/mozilla-xulrunner191-devel-debuginfo-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/mozilla-xulrunner191-gnomevfs-debuginfo-1.9.1.8-0.1.1.i586.rpm
http://download.opensuse.org/debug/update/11.2/rpm/i586/mozilla-xulrunner191-kde4-debuginfo-0.6-0.1.2.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/mozilla-xulrunner191-kde4-debugsource-0.6-0.1.2.i586.rpm
http://download.opensuse.org/debug/update/11.2/rpm/i586/python-xpcom191-debuginfo-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/seamonkey-debuginfo-2.0.3-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/i586/seamonkey-debugsource-2.0.3-0.1.1.i586.rpm
http://download.opensuse.org/update/11.2/rpm/i586/MozillaFirefox-3.5.8-0.1.1.i586.rpm
http://download.opensuse.org/update/11.2/rpm/i586/MozillaFirefox-branding-upstream-3.5.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/MozillaFirefox-translations-common-3.5.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/MozillaFirefox-translations-other-3.5.8-0.1.1.i586.rpm
http://download.opensuse.org/update/11.2/rpm/i586/mozilla-xulrunner191-1.9.1.8-0.1.1.i586.rpm
http://download.opensuse.org/update/11.2/rpm/i586/mozilla-xulrunner191-devel-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/mozilla-xulrunner191-gnomevfs-1.9.1.8-0.1.1.i586.rpm
http://download.opensuse.org/update/11.2/rpm/i586/mozilla-xulrunner191-kde4-0.6-0.1.2.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/mozilla-xulrunner191-translations-common-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/mozilla-xulrunner191-translations-other-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/python-xpcom191-1.9.1.8-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/seamonkey-2.0.3-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/seamonkey-dom-inspector-2.0.3-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/seamonkey-irc-2.0.3-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/i586/seamonkey-venkman-2.0.3-0.1.1.i586.rpm
openSUSE 11.1:
http://download.opensuse.org/debug/update/11.1/rpm/i586/MozillaFirefox-debuginfo-3.0.18-0.1.1.i586.rpm
http://download.opensuse.org/debug/update/11.1/rpm/i586/MozillaFirefox-debugsource-3.0.18-0.1.1.i586.rpm
http://download.opensuse.org/debug/update/11.1/rpm/i586/mozilla-xulrunner190-debuginfo-1.9.0.18-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.1/rpm/i586/mozilla-xulrunner190-debugsource-1.9.0.18-0.1.1.i586.rpm
http://download.opensuse.org/update/11.1/rpm/i586/MozillaFirefox-3.0.18-0.1.1.i586.rpm
http://download.opensuse.org/update/11.1/rpm/i586/MozillaFirefox-branding-upstream-3.0.18-0.1.1.i586.rpm
http://download.opensuse.org/update/11.1/rpm/i586/MozillaFirefox-translations-3.0.18-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/i586/mozilla-xulrunner190-1.9.0.18-0.1.1.i586.rpm
http://download.opensuse.org/update/11.1/rpm/i586/mozilla-xulrunner190-devel-1.9.0.18-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/i586/mozilla-xulrunner190-gnomevfs-1.9.0.18-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/i586/mozilla-xulrunner190-translations-1.9.0.18-0.1.1.i586.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/i586/python-xpcom190-1.9.0.18-0.1.1.i586.rpm
openSUSE 11.0:
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/i586/MozillaFirefox-3.0.18-0.1.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/MozillaFirefox-translations-3.0.18-0.1.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-1.9.0.18-0.1.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-devel-1.9.0.18-0.1.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-gnomevfs-1.9.0.18-0.1.i586.rpm
http://download.opensuse.org/update/11.0/rpm/i586/mozilla-xulrunner190-translations-1.9.0.18-0.1.i586.rpm
Power PC Platform:
openSUSE 11.1:
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.1/rpm/ppc/MozillaFirefox-debuginfo-3.0.18-0.1.1.ppc.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.1/rpm/ppc/MozillaFirefox-debugsource-3.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/debug/update/11.1/rpm/ppc/mozilla-xulrunner190-debuginfo-1.9.0.18-0.1.1.ppc.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.1/rpm/ppc/mozilla-xulrunner190-debugsource-1.9.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/MozillaFirefox-3.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/MozillaFirefox-branding-upstream-3.0.18-0.1.1.ppc.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/ppc/MozillaFirefox-translations-3.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-1.9.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-devel-1.9.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/mozilla-xulrunner190-gnomevfs-1.9.0.18-0.1.1.ppc.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/ppc/mozilla-xulrunner190-translations-1.9.0.18-0.1.1.ppc.rpm
http://download.opensuse.org/update/11.1/rpm/ppc/python-xpcom190-1.9.0.18-0.1.1.ppc.rpm
openSUSE 11.0:
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/ppc/MozillaFirefox-3.0.18-0.1.ppc.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/ppc/MozillaFirefox-translations-3.0.18-0.1.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-1.9.0.18-0.1.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-64bit-1.9.0.18-0.1.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-devel-1.9.0.18-0.1.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-gnomevfs-1.9.0.18-0.1.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-gnomevfs-64bit-1.9.0.18-0.1.ppc.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/ppc/mozilla-xulrunner190-translations-1.9.0.18-0.1.ppc.rpm
http://download.opensuse.org/update/11.0/rpm/ppc/mozilla-xulrunner190-translations-64bit-1.9.0.18-0.1.ppc.rpm
x86-64 Platform:
openSUSE 11.2:
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/x86_64/MozillaFirefox-debuginfo-3.5.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/MozillaFirefox-debugsource-3.5.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-debuginfo-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-debuginfo-32bit-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-debugsource-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-devel-debuginfo-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-gnomevfs-debuginfo-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-gnomevfs-debuginfo-32bit-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-kde4-debuginfo-0.6-0.1.2.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.2/rpm/x86_64/mozilla-xulrunner191-kde4-debugsource-0.6-0.1.2.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/python-xpcom191-debuginfo-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/seamonkey-debuginfo-2.0.3-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.2/rpm/x86_64/seamonkey-debugsource-2.0.3-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/MozillaFirefox-3.5.8-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.2/rpm/x86_64/MozillaFirefox-branding-upstream-3.5.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/MozillaFirefox-translations-common-3.5.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/MozillaFirefox-translations-other-3.5.8-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.2/rpm/x86_64/mozilla-xulrunner191-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/mozilla-xulrunner191-32bit-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.2/rpm/x86_64/mozilla-xulrunner191-devel-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.2/rpm/x86_64/mozilla-xulrunner191-gnomevfs-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/mozilla-xulrunner191-gnomevfs-32bit-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/mozilla-xulrunner191-kde4-0.6-0.1.2.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/mozilla-xulrunner191-translations-common-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/mozilla-xulrunner191-translations-other-1.9.1.8-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.2/rpm/x86_64/python-xpcom191-1.9.1.8-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/seamonkey-2.0.3-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/seamonkey-dom-inspector-2.0.3-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.2/rpm/x86_64/seamonkey-irc-2.0.3-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.2/rpm/x86_64/seamonkey-venkman-2.0.3-0.1.1.x86_64.rpm
openSUSE 11.1:
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/MozillaFirefox-debuginfo-3.0.18-0.1.2.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.1/rpm/x86_64/MozillaFirefox-debugsource-3.0.18-0.1.2.x86_64.rpm
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/mozilla-xulrunner190-debuginfo-1.9.0.18-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/debug/update/11.1/rpm/x86_64/mozilla-xulrunner190-debuginfo-32bit-1.9.0.18-0.1.1.x86_64.rpm
http://download.opensuse.org/debug/update/11.1/rpm/x86_64/mozilla-xulrunner190-debugsource-1.9.0.18-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.1/rpm/x86_64/MozillaFirefox-3.0.18-0.1.2.x86_64.rpm
http://download.opensuse.org/update/11.1/rpm/x86_64/MozillaFirefox-branding-upstream-3.0.18-0.1.2.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/x86_64/MozillaFirefox-translations-3.0.18-0.1.2.x86_64.rpm
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-1.9.0.18-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/x86_64/mozilla-xulrunner190-32bit-1.9.0.18-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-devel-1.9.0.18-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.1/rpm/x86_64/mozilla-xulrunner190-gnomevfs-1.9.0.18-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/x86_64/mozilla-xulrunner190-gnomevfs-32bit-1.9.0.18-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/x86_64/mozilla-xulrunner190-translations-1.9.0.18-0.1.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.1/rpm/x86_64/mozilla-xulrunner190-translations-32bit-1.9.0.18-0.1.1.x86_64.rpm
http://download.opensuse.org/update/11.1/rpm/x86_64/python-xpcom190-1.9.0.18-0.1.1.x86_64.rpm
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/x86_64/MozillaFirefox-3.0.18-0.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/x86_64/MozillaFirefox-translations-3.0.18-0.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/x86_64/mozilla-xulrunner190-1.9.0.18-0.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/x86_64/mozilla-xulrunner190-32bit-1.9.0.18-0.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/x86_64/mozilla-xulrunner190-devel-1.9.0.18-0.1.x86_64.rpm
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-gnomevfs-1.9.0.18-0.1.x86_64.rpm
http://download.opensuse.org/update/11.0/rpm/x86_64/mozilla-xulrunner190-gnomevfs-32bit-1.9.0.18-0.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/x86_64/mozilla-xulrunner190-translations-1.9.0.18-0.1.x86_64.rpm
http://ftp5.gwdg.de/pub/opensuse/discontinued/update/11.0/rpm/x86_64/mozilla-xulrunner190-translations-32bit-1.9.0.18-0.1.x86_64.rpm
Sources:
openSUSE 11.2:
http://download.opensuse.org/update/11.2/rpm/src/mozilla-xulrunner191-kde4-0.6-0.1.2.src.rpm
openSUSE 11.1:
openSUSE 11.0:
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SLE SDK 10 SP3
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=630708f048967bcbe3d7e12e91204fcf
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=d41075930b3e4dc43019336480f6a248
SUSE Linux Enterprise Server 10 SP3
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=630708f048967bcbe3d7e12e91204fcf
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=d41075930b3e4dc43019336480f6a248
SUSE Linux Enterprise Desktop 10 SP3
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=630708f048967bcbe3d7e12e91204fcf
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=d41075930b3e4dc43019336480f6a248
SLE SDK 10 SP2
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=2755cbbc26038704cb28fe5609654649
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=92493341108c831de901f98149d82c69
SUSE Linux Enterprise Server 10 SP2
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=2755cbbc26038704cb28fe5609654649
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=92493341108c831de901f98149d82c69
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=2755cbbc26038704cb28fe5609654649
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=92493341108c831de901f98149d82c69
SLES 11
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=deb36b8154e27ded345f064786253ca1
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=5c9ba6a33f35e3ab788cbbefde6cf8a6
SLED 11
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=deb36b8154e27ded345f064786253ca1
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=5c9ba6a33f35e3ab788cbbefde6cf8a6
SLE 11
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=deb36b8154e27ded345f064786253ca1
http://download.novell.com/index.jsp?search=Search&set_restricted=true&keywords=5c9ba6a33f35e3ab788cbbefde6cf8a6
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
replacing with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team "
where is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig
to verify the signature of the package, replacing with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
opensuse-security@opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
.
opensuse-security-announce@opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
.
==================================================================== SUSE's security contact is or .
The public key is listed below.
====================================================================