SuSE: Weekly Summary 2011:003
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2011:003
Date: Tue, 08 Feb 2011 14:00:00 +0000
Cross-References: CVE-2009-3555, CVE-2010-3782, CVE-2010-4172
CVE-2010-4410, CVE-2010-4411, CVE-2010-4530
CVE-2010-4531, CVE-2011-0025, CVE-2011-0413
CVE-2011-0681, CVE-2011-0682, CVE-2011-0683
CVE-2011-0684, CVE-2011-0685, CVE-2011-0686
CVE-2011-0687
Content of this advisory:
1) Solved Security Vulnerabilities:
- gnutls
- tomcat6
- perl-CGI-Simple
- pcsc-lite
- obs-server
- dhcp
- java-1_6_0-openjdk
- opera
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- gnutls
The SSL-renegotiation "authentication gap" has been fixed
in gnutls. (CVE-2009-3555)
Affected Products: SLE10-SP3, SLE11, SLE11-SP1, openSUSE 11.1, 11.2, 11.3
- tomcat6
This update fixes a cross-site scripting vulnerability that affects the
session list screen. This can be used to steal session cookies because
tomcat 6 does not use the httpOnly flag for its cookies. (CVE-2010-4172)
Affected Products: SLE11-SP1, openSUSE 11.2, 11.3
- perl-CGI-Simple
The following vulnerabilities have been fixed in perl-CGI-Simple:a
+ CVE-2010-4410: CVSS v2 Base Score: 4.3: Cross-Site Request Forgery
(CWE-352)
+ CVE-2010-4411: CVSS v2 Base Score: 4.3: incomplete fix for CRLF
injection
Affected Products: openSUSE 11.2, 11.3
- pcsc-ccid/libpcsclite1
An integer overflow in pcsc-ccid and a buffer overflow in pcsc-lite
while handling smart card responses have been fixed.
CVE-2010-4530 and CVE-2010-4531 have been assigned to these issues.
Additionally the device ID for card readers used in HP preload laptops was
added.
Affected Products: SLE10-SP3, SLE11-SP1, openSUSE 11.2, 11.3
- obs-api
User accounts in the opensuse build service can be in state 'confirmed' or
'unconfirmed'. The latter is intended to require an admin to confirm the
account before the user is allowed to log in. Due to a bug in the REST api
implementation log in was allowed for 'unconfirmed' accounts also
(CVE-2010-3782).
obs-server was updated to version 1.7.7 which fixes the security issues and
several other bugs.
Affected Products: SLE11-SP1
- dhcp
A denial of service vulnerability while processing DHCPv6 decline messages
hass been fixed. CVE-2011-0413 has been assigned to this issue.
Affected Products: openSUSE 11.3
- java-1_6_0-openjdk
This update improves the signature handling of jar-files. (CVE-2011-0025)
Affected Products: openSUSE 11.2, 11.3
- opera
Opera 11.01 fixes several critical security bugs:
+ CVE-2011-0681: CVSS v2 Base Score: 4.3: Other (CWE-Other)
+ CVE-2011-0682: CVSS v2 Base Score: 9.3: Buffer Errors (CWE-119)
+ CVE-2011-0683: CVSS v2 Base Score: 4.3: Other (CWE-Other)
+ CVE-2011-0684: CVSS v2 Base Score: 7.8: Input Validation (CWE-20)
+ CVE-2011-0685: CVSS v2 Base Score: 3.6: Input Validation (CWE-20)
+ CVE-2011-0686: CVSS v2 Base Score: 5.0: Insufficient Information
+ CVE-2011-0687: CVSS v2 Base Score: 4.3: Input Validation (CWE-20)
Affected Products: openSUSE 11.2, 11.3
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References