The following 4 security updates are available for SUSE: [security-announce] SUSE-SU-2011:0696-1: important: libgssglue, [security-announce] openSUSE-SU-2011:0695-1: important: subversion: security udpate, [security-announce] openSUSE-SU-2011:0693-1: important: subversion security udpate, [security-announce] SUSE-SU-2011:0692-1: important: subversion
[security-announce] SUSE-SU-2011:0696-1: important: libgssglue
[security-announce] SUSE-SU-2011:0696-1: important: libgssglue
SUSE Security Update: libgssglue[security-announce] openSUSE-SU-2011:0695-1: important: subversion: security udpate
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:0696-1
Rating: important
References: #694598
Affected Products:
SUSE Linux Enterprise Teradata 10 SP3
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update fixes insecure getenv() usage in libgssglue,
which could be used under some circumstances by local
attackers do gain root privileges.
Indications:
Please install this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-libgssglue-4620
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-libgssglue-4620
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-libgssglue-4620
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-libgssglue-4620
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Teradata 10 SP3 (x86_64):
libgssapi-0.6-13.12.1
libgssapi-32bit-0.6-13.12.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64):
libgssglue-devel-0.1-20.2.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
libgssglue1-0.1-20.2.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):
libgssglue1-0.1-20.2.1
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
libgssapi-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
libgssapi-32bit-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP4 (ia64):
libgssapi-x86-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP4 (ppc):
libgssapi-64bit-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64):
libgssapi-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):
libgssapi-32bit-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP3 (ia64):
libgssapi-x86-0.6-13.12.1
- SUSE Linux Enterprise Server 10 SP3 (ppc):
libgssapi-64bit-0.6-13.12.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):
libgssglue1-0.1-20.2.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
libgssapi-0.6-13.12.1
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
libgssapi-32bit-0.6-13.12.1
References:
https://bugzilla.novell.com/694598
http://download.novell.com/patch/finder/?keywords=5b5de538464acbf06386b39d37563e66
http://download.novell.com/patch/finder/?keywords=88b0a4c3666d54637f8fff06918865ef
http://download.novell.com/patch/finder/?keywords=f3c8cc7c70c0e2250dce0f068395c09e
openSUSE Security Update: subversion: security udpate[security-announce] openSUSE-SU-2011:0693-1: important: subversion security udpate
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0695-1
Rating: important
References: #698205
Cross-References: CVE-2011-1752 CVE-2011-1783 CVE-2011-1921
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now
available. It includes one version update.
Description:
Subversion was updated to version 1.6.17 to fix several
security issues:
- CVE-2011-1752: The mod_dav_svn Apache HTTPD server
module can be crashed though when asked to deliver
baselined WebDAV resources.
- CVE-2011-1783: The mod_dav_svn Apache HTTPD server module
can trigger a loop which consumes all available memory on
the system.
- CVE-2011-1921: The mod_dav_svn Apache HTTPD server module
may leak to remote users the file contents of files
configured to be unreadable by those users.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libsvn_auth_gnome_keyring-1-0-4688
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 1.6.17]:
libsvn_auth_gnome_keyring-1-0-1.6.17-1.2.1
libsvn_auth_kwallet-1-0-1.6.17-1.2.1
subversion-1.6.17-1.2.1
subversion-devel-1.6.17-1.2.1
subversion-perl-1.6.17-1.2.1
subversion-python-1.6.17-1.2.1
subversion-ruby-1.6.17-1.2.1
subversion-server-1.6.17-1.2.1
subversion-tools-1.6.17-1.2.1
References:
http://support.novell.com/security/cve/CVE-2011-1752.html
http://support.novell.com/security/cve/CVE-2011-1783.html
http://support.novell.com/security/cve/CVE-2011-1921.html
https://bugzilla.novell.com/698205
openSUSE Security Update: subversion security udpate[security-announce] SUSE-SU-2011:0692-1: important: subversion
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:0693-1
Rating: important
References: #676949 #688968 #698205
Cross-References: CVE-2011-0715 CVE-2011-1752 CVE-2011-1783
CVE-2011-1921
Affected Products:
openSUSE 11.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
- CVE-2011-1752: The mod_dav_svn Apache HTTPD server
module can be crashed though when asked to deliver
baselined WebDAV resources.
- CVE-2011-1783: The mod_dav_svn Apache HTTPD server module
can trigger a loop which consumes all available memory on
the system.
- CVE-2011-1921: The mod_dav_svn Apache HTTPD server module
may leak to remote users the file contents of files
configured to be unreadable by those users.
- CVE-2011-0715: Remote attackers could crash an svn server
by causing a NULL deref
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch libsvn_auth_gnome_keyring-1-0-4689
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64):
libsvn_auth_gnome_keyring-1-0-1.6.9-4.7.1
libsvn_auth_kwallet-1-0-1.6.9-4.7.1
subversion-1.6.9-4.7.1
subversion-devel-1.6.9-4.7.1
subversion-perl-1.6.9-4.7.1
subversion-python-1.6.9-4.7.1
subversion-ruby-1.6.9-4.7.1
subversion-server-1.6.9-4.7.1
subversion-tools-1.6.9-4.7.1
References:
http://support.novell.com/security/cve/CVE-2011-0715.html
http://support.novell.com/security/cve/CVE-2011-1752.html
http://support.novell.com/security/cve/CVE-2011-1783.html
http://support.novell.com/security/cve/CVE-2011-1921.html
https://bugzilla.novell.com/676949
https://bugzilla.novell.com/688968
https://bugzilla.novell.com/698205
SUSE Security Update: subversion
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:0692-1
Rating: important
References: #676949 #698205
Cross-References: CVE-2011-0715 CVE-2011-1752 CVE-2011-1783
Affected Products:
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
SLE SDK 10 SP3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
Subversion was updated to fix several security issues:
* CVE-2011-1752: The mod_dav_svn Apache HTTPD server
module can be crashed though when asked to deliver
baselined WebDAV resources.
* CVE-2011-1783: The mod_dav_svn Apache HTTPD server
module can trigger a loop which consumes all available
memory on the system.
* CVE-2011-0715: Remote attackers could crash an svn
server by causing a NULL deref
Security Issue references:
* CVE-2011-1752
* CVE-2011-1783
* CVE-2011-0715
Package List:
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
subversion-1.3.1-1.18.1
subversion-devel-1.3.1-1.18.1
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
cvs2svn-1.3.0-30.18.1
subversion-1.3.1-1.18.1
subversion-devel-1.3.1-1.18.1
subversion-python-1.3.1-1.18.1
subversion-server-1.3.1-1.18.1
subversion-tools-1.3.1-1.18.1
viewcvs-1.0.5-0.18.1
- SLE SDK 10 SP3 (i586 ia64 ppc s390x x86_64):
cvs2svn-1.3.0-30.18.1
subversion-1.3.1-1.18.1
subversion-devel-1.3.1-1.18.1
subversion-python-1.3.1-1.18.1
subversion-server-1.3.1-1.18.1
subversion-tools-1.3.1-1.18.1
viewcvs-1.0.5-0.18.1
References:
http://support.novell.com/security/cve/CVE-2011-0715.html
http://support.novell.com/security/cve/CVE-2011-1752.html
http://support.novell.com/security/cve/CVE-2011-1783.html
https://bugzilla.novell.com/676949
https://bugzilla.novell.com/698205
http://download.novell.com/patch/finder/?keywords=39703f93de4dd5819f6910aa7cad5e38
http://download.novell.com/patch/finder/?keywords=dc2a8d54fb644c1ef1dc261a23ba432e