-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                PHP4,PHP5
        Announcement ID:        SUSE-SA:2006:031
        Date:                   Wed, 14 Jun 2006 18:00:00 +0000
        Affected Products:      SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SuSE Linux Enterprise Server 8
                                SUSE SLES 9
                                UnitedLinux 1.0
        Vulnerability Type:     remote code execution
        Severity (1-10):        6
        SUSE Default Package:   no
        Cross-References:       CVE-2006-1990, CVE-2006-1991, CVE-2006-2657
                                CVE-2006-2906

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             multiple PHP4/5 security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   This update fixes the following security issues in the PHP scripting
   language, both version 4 and 5:

   - Invalid characters in session names were not blocked.

   - CVE-2006-2657: A bug in zend_hash_del() allowed attackers to prevent
     unsetting of some variables

   - CVE-2006-1991, CVE-2006-1990: Bugs in the substr_compare()  and
     wordwrap function could crash the php interpreter.

   - CVE-2006-2906: A CPU consumption denial of service attack in php-gd
     was fixed.

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   Please close and restart all running instances of Apache/Apache2
   after the update.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
             43caed16d11d6d744cc9ffd8395b556f
             c710b5f21c59e26b3614bd9f678f3cd9
             bdbdf268f1e7c28380280eb92f401543

   SUSE LINUX 10.0:
             ee9a036c0c3e7980a0e7d549b7cc002f
             f481f326f7f54dfc3206556a9bf67205
             d75c89b6b52acbef2b390cea964bd9b5
             a3cd814e0fad2159a8b2792a6fd911f9
             c3afcc6e4032720fe1eea12a765f61dc
             6a7a52370500ae40e9326cc381c2675d
             c50ba2c19f5fe867795f65bf137aea93
             04435104d2b5b5b66d0b5225d285700f
             4fdc57479a471ad661c4eac0e2b69026
             df6a2c45dbba97b16211fbd2897de09d
             35e432a21e77c68843b51b65ace9b6a0
             497e4234c830dc8206bbd011dbbb8bfd
             1afe872c30a7789c608146de00abf369
             e8c65c894d7ea28aa09bf7e8f7f3ccd9
             73f0b104e6a9e74fe2ded7e77dfecb7d
             232e84253c063a8942396b8e10338682
             8bb28c6c7e48b64ea24740dbffd8892f

   SUSE LINUX 9.3:
             821357c5187d35011ca6719a4800ad7e
             262d39f817115eb7ee6e7684976fc4d0
             34b0fedf7ed621c9733df67b7495331c
             7a0ad94e62e8c743094f6ec40a1d9b1d
             407c70d3733afd11132cbeab07c631e3
             671185e5ea32d549247714b4d677fd14
             96ef30c80ab27d9d7cf4adb8c27ede5f
             7c98b8423f6499926f8dd0d49c7e06a6
             8065b470f710f03ee254618edec63330
             36e29339a0f06826813baf1fe3c0183a
             1cd935f93eeb3e1e08467a8ec9da1546
             068daf588e69e8e032ae9b8788660c8e
             d21c0b2190b4a9eacb8d01baa2a94cc8
             15be3d77516c642011e7a219b2dc9f19
             233eb72898dff61aaaf96d4619a5dfe6
             000b41b363221d36f461710b78b70306
             92a47575b0c8de691ef41dd29b7efc6e
             e263a60c24b957b1fdebe7b00d769e83
             b4334f824c9f7943417b745426a63b11
             b2d16811dfd728c67addb90f79b54d67
             0477129977e118178cb9e0431d706990
             530bda9a7f5a7ab7568a8e69f99c7868

   SUSE LINUX 9.2:
             f212924910ec209c3f8f0c5db3b18447
             21b4f9c977f76764f02961510aa80b49
             0d6fac421b1c28b6610cdec8c2525ba6
             02dc039703f3f781a5861c9535203624
             8175deacb02985b6a9fdbf60140c2563
             c26e1826c2f5e32370f6a304dec39bd8
             0ed67cbb3bceeeb61588c1d9e300fa7b
             6201452c9c6b9181d0fcfb5642aa1897
             39956165064be228b7ced1d8fc8b1975
             67b3927a7e0bb817f62c883639df0334
             36f89680156c19d5d84047ba69d6a719

   SUSE LINUX 9.1:
             6b7dce5b6fc404959f2bb9d2cc837f98
             6598a95fa00d7b011a0d56d76cd70f0d
             b3a5aa3461fa89cd35d1a20d321bb7f4
             ddb3e2ddf9b9b45655ff44f1e7e9317c
             73302ac6b1ae2d5120e8a7d2a05052db
             5ffedeb8515eafc065c639f9470eb7d3
             7c194d8b2bc3de4a96928e2c99a80a96
             0bf2068e87c47cea0f81bf4f55b6dc50
             4b9dd632e7d5a7d8aa0dd8a4efc8e37b
             bea433cff0221243363ea0105111c86c
             96dd1d3d5063be3216e7492670d00cc9
             a84d8ddd7ce534c7acc7972628f2ae0c
             5b646636567e96cca066695f6ce6cfe9
             04c41b24b8d8c20a925f1c17d0acb281
             982d7b35f8061f74bbc66ba00b25d88b
             bf9af241b791dc090925c09ef135afc0
             b085e91f153f26b164d5d6a342097bf1

   Power PC Platform:

   SUSE LINUX 10.1:
             c9d486f1c9b55bfb9e810adb6abc8aab
             1e23a318feeaa1f34ed00cc399ad356a
             5108034703d9c2108babee92c0ae17d3

   SUSE LINUX 10.0:
             3938e739a478cccb4b71f6b7e43edd2c
             0673e6b7978d86592a2e49571aa6a2a7
             be46e319b18df7e2109d356ff4ebc20e
             c1996ef13815d7fdcee7f8f5baed4bcf
             92e5fabb5f4dad75be2b4a3617e97988
             eee4690f118364474826d26c054bdf10
             f318576b118be51d17a0e60a87e17d9f
             95e643e8edc72663358494c534b62552
             9cf6ee8f88a5060ac8a0f594d9e48fa6
             bfa39d4d148b56ad8b7c6e44510a0c11
             3adbbbf720410c1ed23dd79bea9e220d
             948fc3125a641981d3f87975d6e97c54
             cb0923a3313c4fd116318bf471e50778
             50e68b88d43d25ec73d9aecc69f30e5b
             71dfa81dfd012f548d8f025bfdfeedbd
             8653bdc6fd1339ab69c36eac0ba686ac

   x86-64 Platform:

   SUSE LINUX 10.1:
             f4dede6f601bfcee52dd3b93859870e3
             ef9cee1726b8bd511855f874823ab825
             ad72b93f1472ab9103f092ad899d697a

   SUSE LINUX 10.0:
             b9bf78047d75d193eb45e76f889e48b2
             677743bbf4162fde6757a055ddf1a1c1
             c55eed73f54c6f0a145342644fe44078
             f9907902edf1a76b44cf3adb7a1b484d
             90fcd0d1423caf1b96f79b7b16f65439
             b05af431c9bb58ecb9d5e6d1871f17eb
             e07adcdd81a962e259ae4b1c0d21f89d
             591794e8f5690db6eb0544f75ca5aabb
             b35a87bba7a2d1301806a7af10473725
             b432e0e35ee0cb30672e89b324a23396
             a82f50460802a1767854758d406b82cb
             78f9287306f1d029a9b3d471318fafda
             f6dd1443d043715c103ff0ec77bcb9b7
             aaf4cdd7b69405bc2fc46d721cb208b8
             8fac63d139a16a587c6a38f7ef622531
             1b0a546491b54b4d73eecfee1db04a5a
             b60a17edeb48d6cdc291bdb3204398ec
             1030f5db7852122bc3d7a0d6432a8dc6

   SUSE LINUX 9.3:
             3efa464de374a316bcfc48edc0728b80
             0807c3ffba97947d7f58e434d6be424a
             ac4933dcb44e3a28f19ec4535e3d1f69
             d5d5e1b56a7c99004bf7048bead9506f
             8cddaa485f432a4e3c644e53fa31b3fd
             1f5aeb49f2cb874fd213c97563c11492
             f9f96ed8c0cce5ab6aef622a79d6e67b
             1e3ddeafab63b93e6149df2996afc674
             001446522678324806c21f2777dcce19
             566299076beb81ab015e834707646fb8
             2bdad5f2e29738442e49fee529862842
             6219659daad37fbcbee11748f1d2b34f
             67757dc0a8a9cb00ffd653ae2cf26224
             bc3737aaf8c7f5b0ec4f76ac333b4f49
             a1f6a145f2af57e006a2099baeb1398f
             3caafddfc109b70e80acf683a155219b
             eaab55971ca52912c0853d0d29ed98ec
             629dc2798d1dff92a1b1f5ca1f3334a3
             6947c955edc17fe914feebe48fcfae3b
             f8c743c3cb7973ccbece026844cae9fb
             a11dedb05754fcf1f2d4a4eff98d1070
             6500afb7ff16fa52098805f0a8aee789
             fef838635d36eda73402eabfab666a5c

   SUSE LINUX 9.2:
             a984fab6423ee37c7d479180b670d635
             b3f236a5f51d6916ebce5306e9cf8dc9
             8899d8b26da5381a69e928b07f7af3e1
             b41e5526228b3a47a8d33ccc4bfd8593
             2e0b5cd33d5a401b85757a9185240f39
             9b35b4fcb6ba77ffcd05a662d4ce5318
             6886ac119c43e6cd535974bdf2f30698
             b5f4c3eeb0f1a167e3dbc030b9c1edd3
             c4c258802dbecfac5106064561d24255
             67b7965d8b9624e8243b6f46de8411d3
             11b2e0a23639145772a3c359abb52e59
             e2cd105c941877d49e28277705a7039e

   SUSE LINUX 9.1:
             6881897376e783520b891056e35ec534
             30947f905b21c7ef536478d64fee5bfd
             bb4d633dcc7dcb10ef1a3bcfcdc84797
             8e4b3fea82c3cbb106377b87f1fee6c9
             04e5fa26ac5e8fc63314aacad1d6b249
             5f2a74b4adb0c839562e02b42bf4f05c
             3fdad764d7b36a3b5b7870e18c984e9e
             68d576893b580efc27be7a634bb42568
             2838bcfd8f223d81c471e3405da00c33
             573fad1c28b3e8554f2cb4e0861dc057
             869974b14a9a22e79bbc73f6a7af6a55
             6ba59734b7107a021a68bcd315db1bf2
             77421b8c21f635fbc78f64168961b62c
             b32cbd1db68a50f843fbdf0cbabefa68
             00376ad2619727f8d7feef6f5d8d3e26
             1acf46b9184a55159ac1e38bb26d43ff
             e017ba71e1269460e5124ba46cd34bac

   Sources:

   SUSE LINUX 10.1:
             98d8846387e3b252a7af710388460128

   SUSE LINUX 10.0:
             507d65d8ee0d358ee43fcf793c0d7955
             9adf218a1b0d39b06350a57a0f627a55

   SUSE LINUX 9.3:
             42587bbd02008e856204797ba2d3e312
             ba707c9762597086350062dcce3d8d99

   SUSE LINUX 9.2:
             f8ee786af575e1bd2dcf4f243a471623

   SUSE LINUX 9.1:
             d1c7f23f762099bcabacb3b9a1425ab6
             bc7a12efeaf4cc118a857914e3a09910

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE CORE 9 for Itanium Processor Family
     
   SUSE SLES 9
     
   UnitedLinux 1.0
     
   SuSE Linux Enterprise Server 8
     
______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

SuSE: 2006-031: php4,php5 problems Security Update

June 14, 2006
This update fixes the following security issues in the PHP scripting This update fixes the following security issues in the PHP scripting language, both version 4 and 5: language, ...

Summary


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                PHP4,PHP5
        Announcement ID:        SUSE-SA:2006:031
        Date:                   Wed, 14 Jun 2006 18:00:00 +0000
        Affected Products:      SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SuSE Linux Enterprise Server 8
                                SUSE SLES 9
                                UnitedLinux 1.0
        Vulnerability Type:     remote code execution
        Severity (1-10):        6
        SUSE Default Package:   no
        Cross-References:       CVE-2006-1990, CVE-2006-1991, CVE-2006-2657
                                CVE-2006-2906

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             multiple PHP4/5 security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   This update fixes the following security issues in the PHP scripting
   language, both version 4 and 5:

   - Invalid characters in session names were not blocked.

   - CVE-2006-2657: A bug in zend_hash_del() allowed attackers to prevent
     unsetting of some variables

   - CVE-2006-1991, CVE-2006-1990: Bugs in the substr_compare()  and
     wordwrap function could crash the php interpreter.

   - CVE-2006-2906: A CPU consumption denial of service attack in php-gd
     was fixed.

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   Please close and restart all running instances of Apache/Apache2
   after the update.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
             43caed16d11d6d744cc9ffd8395b556f
             c710b5f21c59e26b3614bd9f678f3cd9
             bdbdf268f1e7c28380280eb92f401543

   SUSE LINUX 10.0:
             ee9a036c0c3e7980a0e7d549b7cc002f
             f481f326f7f54dfc3206556a9bf67205
             d75c89b6b52acbef2b390cea964bd9b5
             a3cd814e0fad2159a8b2792a6fd911f9
             c3afcc6e4032720fe1eea12a765f61dc
             6a7a52370500ae40e9326cc381c2675d
             c50ba2c19f5fe867795f65bf137aea93
             04435104d2b5b5b66d0b5225d285700f
             4fdc57479a471ad661c4eac0e2b69026
             df6a2c45dbba97b16211fbd2897de09d
             35e432a21e77c68843b51b65ace9b6a0
             497e4234c830dc8206bbd011dbbb8bfd
             1afe872c30a7789c608146de00abf369
             e8c65c894d7ea28aa09bf7e8f7f3ccd9
             73f0b104e6a9e74fe2ded7e77dfecb7d
             232e84253c063a8942396b8e10338682
             8bb28c6c7e48b64ea24740dbffd8892f

   SUSE LINUX 9.3:
             821357c5187d35011ca6719a4800ad7e
             262d39f817115eb7ee6e7684976fc4d0
             34b0fedf7ed621c9733df67b7495331c
             7a0ad94e62e8c743094f6ec40a1d9b1d
             407c70d3733afd11132cbeab07c631e3
             671185e5ea32d549247714b4d677fd14
             96ef30c80ab27d9d7cf4adb8c27ede5f
             7c98b8423f6499926f8dd0d49c7e06a6
             8065b470f710f03ee254618edec63330
             36e29339a0f06826813baf1fe3c0183a
             1cd935f93eeb3e1e08467a8ec9da1546
             068daf588e69e8e032ae9b8788660c8e
             d21c0b2190b4a9eacb8d01baa2a94cc8
             15be3d77516c642011e7a219b2dc9f19
             233eb72898dff61aaaf96d4619a5dfe6
             000b41b363221d36f461710b78b70306
             92a47575b0c8de691ef41dd29b7efc6e
             e263a60c24b957b1fdebe7b00d769e83
             b4334f824c9f7943417b745426a63b11
             b2d16811dfd728c67addb90f79b54d67
             0477129977e118178cb9e0431d706990
             530bda9a7f5a7ab7568a8e69f99c7868

   SUSE LINUX 9.2:
             f212924910ec209c3f8f0c5db3b18447
             21b4f9c977f76764f02961510aa80b49
             0d6fac421b1c28b6610cdec8c2525ba6
             02dc039703f3f781a5861c9535203624
             8175deacb02985b6a9fdbf60140c2563
             c26e1826c2f5e32370f6a304dec39bd8
             0ed67cbb3bceeeb61588c1d9e300fa7b
             6201452c9c6b9181d0fcfb5642aa1897
             39956165064be228b7ced1d8fc8b1975
             67b3927a7e0bb817f62c883639df0334
             36f89680156c19d5d84047ba69d6a719

   SUSE LINUX 9.1:
             6b7dce5b6fc404959f2bb9d2cc837f98
             6598a95fa00d7b011a0d56d76cd70f0d
             b3a5aa3461fa89cd35d1a20d321bb7f4
             ddb3e2ddf9b9b45655ff44f1e7e9317c
             73302ac6b1ae2d5120e8a7d2a05052db
             5ffedeb8515eafc065c639f9470eb7d3
             7c194d8b2bc3de4a96928e2c99a80a96
             0bf2068e87c47cea0f81bf4f55b6dc50
             4b9dd632e7d5a7d8aa0dd8a4efc8e37b
             bea433cff0221243363ea0105111c86c
             96dd1d3d5063be3216e7492670d00cc9
             a84d8ddd7ce534c7acc7972628f2ae0c
             5b646636567e96cca066695f6ce6cfe9
             04c41b24b8d8c20a925f1c17d0acb281
             982d7b35f8061f74bbc66ba00b25d88b
             bf9af241b791dc090925c09ef135afc0
             b085e91f153f26b164d5d6a342097bf1

   Power PC Platform:

   SUSE LINUX 10.1:
             c9d486f1c9b55bfb9e810adb6abc8aab
             1e23a318feeaa1f34ed00cc399ad356a
             5108034703d9c2108babee92c0ae17d3

   SUSE LINUX 10.0:
             3938e739a478cccb4b71f6b7e43edd2c
             0673e6b7978d86592a2e49571aa6a2a7
             be46e319b18df7e2109d356ff4ebc20e
             c1996ef13815d7fdcee7f8f5baed4bcf
             92e5fabb5f4dad75be2b4a3617e97988
             eee4690f118364474826d26c054bdf10
             f318576b118be51d17a0e60a87e17d9f
             95e643e8edc72663358494c534b62552
             9cf6ee8f88a5060ac8a0f594d9e48fa6
             bfa39d4d148b56ad8b7c6e44510a0c11
             3adbbbf720410c1ed23dd79bea9e220d
             948fc3125a641981d3f87975d6e97c54
             cb0923a3313c4fd116318bf471e50778
             50e68b88d43d25ec73d9aecc69f30e5b
             71dfa81dfd012f548d8f025bfdfeedbd
             8653bdc6fd1339ab69c36eac0ba686ac

   x86-64 Platform:

   SUSE LINUX 10.1:
             f4dede6f601bfcee52dd3b93859870e3
             ef9cee1726b8bd511855f874823ab825
             ad72b93f1472ab9103f092ad899d697a

   SUSE LINUX 10.0:
             b9bf78047d75d193eb45e76f889e48b2
             677743bbf4162fde6757a055ddf1a1c1
             c55eed73f54c6f0a145342644fe44078
             f9907902edf1a76b44cf3adb7a1b484d
             90fcd0d1423caf1b96f79b7b16f65439
             b05af431c9bb58ecb9d5e6d1871f17eb
             e07adcdd81a962e259ae4b1c0d21f89d
             591794e8f5690db6eb0544f75ca5aabb
             b35a87bba7a2d1301806a7af10473725
             b432e0e35ee0cb30672e89b324a23396
             a82f50460802a1767854758d406b82cb
             78f9287306f1d029a9b3d471318fafda
             f6dd1443d043715c103ff0ec77bcb9b7
             aaf4cdd7b69405bc2fc46d721cb208b8
             8fac63d139a16a587c6a38f7ef622531
             1b0a546491b54b4d73eecfee1db04a5a
             b60a17edeb48d6cdc291bdb3204398ec
             1030f5db7852122bc3d7a0d6432a8dc6

   SUSE LINUX 9.3:
             3efa464de374a316bcfc48edc0728b80
             0807c3ffba97947d7f58e434d6be424a
             ac4933dcb44e3a28f19ec4535e3d1f69
             d5d5e1b56a7c99004bf7048bead9506f
             8cddaa485f432a4e3c644e53fa31b3fd
             1f5aeb49f2cb874fd213c97563c11492
             f9f96ed8c0cce5ab6aef622a79d6e67b
             1e3ddeafab63b93e6149df2996afc674
             001446522678324806c21f2777dcce19
             566299076beb81ab015e834707646fb8
             2bdad5f2e29738442e49fee529862842
             6219659daad37fbcbee11748f1d2b34f
             67757dc0a8a9cb00ffd653ae2cf26224
             bc3737aaf8c7f5b0ec4f76ac333b4f49
             a1f6a145f2af57e006a2099baeb1398f
             3caafddfc109b70e80acf683a155219b
             eaab55971ca52912c0853d0d29ed98ec
             629dc2798d1dff92a1b1f5ca1f3334a3
             6947c955edc17fe914feebe48fcfae3b
             f8c743c3cb7973ccbece026844cae9fb
             a11dedb05754fcf1f2d4a4eff98d1070
             6500afb7ff16fa52098805f0a8aee789
             fef838635d36eda73402eabfab666a5c

   SUSE LINUX 9.2:
             a984fab6423ee37c7d479180b670d635
             b3f236a5f51d6916ebce5306e9cf8dc9
             8899d8b26da5381a69e928b07f7af3e1
             b41e5526228b3a47a8d33ccc4bfd8593
             2e0b5cd33d5a401b85757a9185240f39
             9b35b4fcb6ba77ffcd05a662d4ce5318
             6886ac119c43e6cd535974bdf2f30698
             b5f4c3eeb0f1a167e3dbc030b9c1edd3
             c4c258802dbecfac5106064561d24255
             67b7965d8b9624e8243b6f46de8411d3
             11b2e0a23639145772a3c359abb52e59
             e2cd105c941877d49e28277705a7039e

   SUSE LINUX 9.1:
             6881897376e783520b891056e35ec534
             30947f905b21c7ef536478d64fee5bfd
             bb4d633dcc7dcb10ef1a3bcfcdc84797
             8e4b3fea82c3cbb106377b87f1fee6c9
             04e5fa26ac5e8fc63314aacad1d6b249
             5f2a74b4adb0c839562e02b42bf4f05c
             3fdad764d7b36a3b5b7870e18c984e9e
             68d576893b580efc27be7a634bb42568
             2838bcfd8f223d81c471e3405da00c33
             573fad1c28b3e8554f2cb4e0861dc057
             869974b14a9a22e79bbc73f6a7af6a55
             6ba59734b7107a021a68bcd315db1bf2
             77421b8c21f635fbc78f64168961b62c
             b32cbd1db68a50f843fbdf0cbabefa68
             00376ad2619727f8d7feef6f5d8d3e26
             1acf46b9184a55159ac1e38bb26d43ff
             e017ba71e1269460e5124ba46cd34bac

   Sources:

   SUSE LINUX 10.1:
             98d8846387e3b252a7af710388460128

   SUSE LINUX 10.0:
             507d65d8ee0d358ee43fcf793c0d7955
             9adf218a1b0d39b06350a57a0f627a55

   SUSE LINUX 9.3:
             42587bbd02008e856204797ba2d3e312
             ba707c9762597086350062dcce3d8d99

   SUSE LINUX 9.2:
             f8ee786af575e1bd2dcf4f243a471623

   SUSE LINUX 9.1:
             d1c7f23f762099bcabacb3b9a1425ab6
             bc7a12efeaf4cc118a857914e3a09910

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE CORE 9 for Itanium Processor Family
     
   SUSE SLES 9
     
   UnitedLinux 1.0
     
   SuSE Linux Enterprise Server 8
     
______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

References

Severity

Related News