LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
SuSE: binutils, kdelibs3, kdegraphics3, koffice, dia, lyx Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
SuSE A SUSE specific patch to the GNU linker 'ld' removes redundant RPATH and RUNPATH components when linking binaries. Due to a bug in this routine ld occasionally left empty RPATH components. When running a binary with empty RPATH components the dynamic linker tries to load shared libraries from the current directory.
______________________________________________________________________________

                        SUSE Security Announcement

        Package:                binutils,kdelibs3,kdegraphics3,koffice,dia,lyx
        Announcement ID:        SUSE-SA:2006:007
        Date:                   Fri, 10 Feb 2006 15:00:00 +0000
        Affected Products:      Novell Linux Desktop 9
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SUSE SLES 9
        Vulnerability Type:     local privilege escalation
        Severity (1-10):        6
        SUSE Default Package:   yes
        Cross-References:       -

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             privilege escalation due to empty RPATH in binaries
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            - See SuSE Security Summary Report
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   A SUSE specific patch to the GNU linker 'ld' removes redundant RPATH
   and RUNPATH components when linking binaries.
   
   Due to a bug in this routine ld occasionally left empty RPATH
   components. When running a binary with empty RPATH components the
   dynamic linker tries to load shared libraries from the current
   directory.
   
   By tricking users into running an affected application in a
   directory that contains a specially crafted shared library an
   attacker could execute arbitrary code with the user id of the
   victim.

2) Solution or Work-Around

   Do not run affected binaries in directories that are writeable by
   other users. It is recommended to install the update packages.
   
   To fix self-compiled applications install the updated binutils
   package and relink the application.

3) Special Instructions and Notes

   Use 'objdump -p' to check whether a binary is affected. RPATH and
   RUNPATH must not contain a colon that is not surrounded by path
   names.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.

   
   x86 Platform:
   
   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/binutils-2.16.91.0.2-8.4.i586.rpm
          5336c44f08baed1eb20e31672e376996
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdegraphics3-3.4.2-12.2.i586.rpm
          8fa8cadb9fc305648d809c43d078ee74
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdegraphics3-3D-3.4.2-12.2.i586.rpm
          b04b5ea686bface4391d91b96a06b4b7
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdegraphics3-imaging-3.4.2-12.2.i586.rpm
          4be879313304f774cc0e0721b9a4ca52
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdegraphics3-scan-3.4.2-12.2.i586.rpm
          f93207a11a661c6beac8620693ceeb26
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdegraphics3-tex-3.4.2-12.2.i586.rpm
          bdcdbdfb5651faabb99493b861fda9b2
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdelibs3-3.4.2-24.3.i586.rpm
          82a02e5e55613d7cd60df86fbbb2b050
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kdelibs3-devel-3.4.2-24.3.i586.rpm
          68702ff3f54cca4d3e8c95fd1953b02b
   
   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/binutils-2.15.94.0.2.2-3.3.i586.rpm
          4cdc297d2ddc398829356d8032d2c570
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdegraphics3-3.4.0-11.5.i586.rpm
          f8364afec78108dcb3bb089112c9e486
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdegraphics3-3D-3.4.0-11.5.i586.rpm
          e8405aca4fb3ddf5a5fe38095891173f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdegraphics3-imaging-3.4.0-11.5.i586.rpm
          1521df464699151917c5edebf7c0e9c8
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdegraphics3-scan-3.4.0-11.5.i586.rpm
          d5f69e63936e044c7668453643ebdb8d
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdegraphics3-tex-3.4.0-11.5.i586.rpm
          c6db7f1b79c54fdbfee5306fb06d327c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdelibs3-3.4.0-20.11.i586.rpm
          3986977230c6cf5e375652707599d086
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdelibs3-devel-3.4.0-20.11.i586.rpm
          13e39a04f8dcdb2235a4554a242c01d8
   
   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/binutils-2.15.91.0.2-7.3.i586.rpm
          574a32932f442d6ae097c62e67a804bb
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/dia-0.92.2-128.1.i586.rpm
          d3d6d553b0e3f1a1e44e67a1e79cc336
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdegraphics3-3.3.0-13.7.i586.rpm
          0f9f1a102d15103fee1d1e6c29f70148
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdegraphics3-3D-3.3.0-13.7.i586.rpm
          1ee1f29003e5333d777699d6b89b80f1
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdegraphics3-imaging-3.3.0-13.7.i586.rpm
          dcf97cc31d22664de69e730f734479be
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdegraphics3-scan-3.3.0-13.7.i586.rpm
          0e79d0489c8fe12b62964f3ab3c653a2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdegraphics3-tex-3.3.0-13.7.i586.rpm
          cec40000030a2db31d34bbe048581e9a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdelibs3-3.3.0-34.12.i586.rpm
          27b0c1bfa0b2a683483b7122b34523aa
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdelibs3-devel-3.3.0-34.12.i586.rpm
          0a22a4ff2245610205a2275e41cd154a
   
   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/binutils-2.15.90.0.1.1-32.13.i586.rpm
          d499c31bbd95986a70673d8cb11b99f4
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdegraphics3-3.2.1-67.16.i586.rpm
          ff479907370e9848e78b2762395457e0
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdegraphics3-3D-3.2.1-67.16.i586.rpm
          9cf5e0afd4a5650db22cbf8e4da9ba01
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdegraphics3-scan-3.2.1-67.16.i586.rpm
          5c90bfeca61591ce396066a7bba4acc7
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdegraphics3-tex-3.2.1-67.16.i586.rpm
          a1611b75579097aa3d0031818b7b6db6
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdelibs3-3.2.1-44.66.i586.rpm
          26ce2b4076b945a3d9ecf8af0b83e1e6
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdelibs3-devel-3.2.1-44.66.i586.rpm
          8c595a2e37986a22a09848a1a128645a
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/i586/binutils-32bit-9.1-200601211731.i586.rpm
          c2d8945ce2d0607cf909d29f83262f4f
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/i586/kdelibs3-32bit-9.1-200601261432.i586.rpm
          b36749d947eb47286f0a21922b491a70
   
   Power PC Platform:
   
   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/binutils-2.16.91.0.2-8.4.ppc.rpm
          de1e858bf7dac44e8adc2a07a0fcf334
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdegraphics3-3.4.2-12.2.ppc.rpm
          7a2769b5e3e7ec4af6350dc1d826e7c3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdegraphics3-3D-3.4.2-12.2.ppc.rpm
          ceb289844025be2048fb86a671ef3d48
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdegraphics3-imaging-3.4.2-12.2.ppc.rpm
          c94eed10ad637634db3b24f08d5c0c81
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdegraphics3-scan-3.4.2-12.2.ppc.rpm
          6f9aa4b7433345db9826580872438eb5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdegraphics3-tex-3.4.2-12.2.ppc.rpm
          307bdaead8245a26a7b2b00572d290dc
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdelibs3-3.4.2-24.3.ppc.rpm
          fb1247f46a4414bda0ac48acb971c126
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kdelibs3-devel-3.4.2-24.3.ppc.rpm
          4a4d94290e692bf515690953df895155
   
   x86-64 Platform:
   
   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/binutils-2.16.91.0.2-8.4.x86_64.rpm
          07905bd004aff0e7f034fbf1839880e4
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/binutils-32bit-2.16.91.0.2-8.4.x86_64.rpm
          2808eb66106aac360659f314ce6b8e8e
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdegraphics3-3.4.2-12.2.x86_64.rpm
          b72daa5dd362a30acb9c9ee60076a432
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdegraphics3-3D-3.4.2-12.2.x86_64.rpm
          90db781dfd39d8c046c42c3117d42d21
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdegraphics3-imaging-3.4.2-12.2.x86_64.rpm
          50c7e9bb81a223766f8a1b05e961f586
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdegraphics3-scan-3.4.2-12.2.x86_64.rpm
          bd603d3147becf226534a12d58de9848
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdegraphics3-tex-3.4.2-12.2.x86_64.rpm
          324124fb727c6133de4c63fc0d8b109a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdelibs3-3.4.2-24.3.x86_64.rpm
          04f44a7a9113053c11ea2897fea189d1
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdelibs3-32bit-3.4.2-24.3.x86_64.rpm
          1232ac61554a53bb772e4ee03d4e75ef
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kdelibs3-devel-3.4.2-24.3.x86_64.rpm
          a96fa42b4bc03ff15d951029f7606b7d
   
   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/binutils-2.15.94.0.2.2-3.3.x86_64.rpm
          503efba51e385e61053e177cab67e111
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/binutils-32bit-9.3-7.1.x86_64.rpm
          c4ac261d7021cff6ce157365c75b659f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdegraphics3-3.4.0-11.5.x86_64.rpm
          b3d2853ee0f65fdb0f771f597555fde7
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdegraphics3-3D-3.4.0-11.5.x86_64.rpm
          92681909dd0d1374386f2a081609cd2f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdegraphics3-imaging-3.4.0-11.5.x86_64.rpm
          5a2494c0e345a35631c22647ff426541
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdegraphics3-scan-3.4.0-11.5.x86_64.rpm
          389b8d61c3776006c4f2389f60b3e3c1
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdegraphics3-tex-3.4.0-11.5.x86_64.rpm
          11f247f28d1dfd1837b8e2f2774c2446
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdelibs3-3.4.0-20.11.x86_64.rpm
          bbe654a9c69c7e110e1b7de14b498312
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdelibs3-32bit-9.3-7.5.x86_64.rpm
          6d4db92e1305e20aa3337624c845bd30
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdelibs3-devel-3.4.0-20.11.x86_64.rpm
          7da490073d6190af2003687951622405
   
   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/binutils-2.15.91.0.2-7.3.x86_64.rpm
          a97601f2e0d5dd4768cda24282b2f4d9
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/binutils-32bit-9.2-200601220214.x86_64.rpm
          6047b8d9493c221302439e289726fbd2
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/dia-0.92.2-128.1.x86_64.rpm
          88b9c13e88b013370ac411f2aaa19c19
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdegraphics3-3.3.0-13.7.x86_64.rpm
          d2f8eba01914b6dd3d05c27c468dcfb0
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdegraphics3-3D-3.3.0-13.7.x86_64.rpm
          7b8f6fbb5a0a311c29e900877aebd9d7
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdegraphics3-imaging-3.3.0-13.7.x86_64.rpm
          8540ad7e2a46994313cfd3a2963463b8
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdegraphics3-scan-3.3.0-13.7.x86_64.rpm
          2032b30bb43091c625baa1792716ae61
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdegraphics3-tex-3.3.0-13.7.x86_64.rpm
          7fbd5512b3598157e80c60f0b2855878
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdelibs3-3.3.0-34.12.x86_64.rpm
          7b5077bce547bcdd4576c6a541f90267
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdelibs3-32bit-9.2-200602011857.x86_64.rpm
          7c62d3a25c8623f156fb43c36468935e
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdelibs3-devel-3.3.0-34.12.x86_64.rpm
          2dc9fac20d13442b3b5302dc29fe9118
   
   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/binutils-2.15.90.0.1.1-32.13.x86_64.rpm
          354087b9758e50f86497996b19eeec94
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/dia-0.92.2-112.11.x86_64.rpm
          03659fbb7563826a87f7f94beb1c75a6
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdegraphics3-3.2.1-67.16.x86_64.rpm
          353ef4a09a8a80e2d64b4d427976ce45
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdegraphics3-3D-3.2.1-67.16.x86_64.rpm
          56d31cb34a3837725df75308e0f88703
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdegraphics3-scan-3.2.1-67.16.x86_64.rpm
          d1458dddfcffacdb5ef6f430c31c6119
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdegraphics3-tex-3.2.1-67.16.x86_64.rpm
          e525803caa7c3dd617f3c5a9a0683ff0
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdelibs3-3.2.1-44.66.x86_64.rpm
          4d3432e2ffc9765d425e69cdf315ba4f
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdelibs3-devel-3.2.1-44.66.x86_64.rpm
          e2abc0442f078a34c1ca8516579e3a50
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/koffice-1.3-67.4.x86_64.rpm
          02bd9d62e0d1c38f8f71f0cf2494b41b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/koffice-illustration-1.3-67.4.x86_64.rpm
          e002a223ab2e3c024c0df5693fd1a3a8
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/koffice-wordprocessing-1.3-67.4.x86_64.rpm
          08b03cb4214d760bf6072cd59aac5003
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/lyx-1.3.4-35.1.x86_64.rpm
          e4bc1e182a72bb3a9e4a878208f13cfe
   
   Sources:
   
   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/binutils-2.16.91.0.2-8.4.src.rpm
          2dd1e35033820628da6b80be0dbe4936
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kdegraphics3-3.4.2-12.2.src.rpm
          0397a4c448a829ac21c11305212ff22b
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kdelibs3-3.4.2-24.3.src.rpm
          7c198fa4ace4919c221939e6eca00734
   
   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/binutils-2.15.94.0.2.2-3.3.src.rpm
          98d6ea23959aea2765f9c17702ec62dd
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kdegraphics3-3.4.0-11.5.src.rpm
          e15f2a22a803a18be7a1ab145a25007b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kdelibs3-3.4.0-20.11.src.rpm
          aeeb36fc3937dd93d506f526c6c98cc4
   
   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/binutils-2.15.91.0.2-7.3.src.rpm
          952e90bdae6b1abeb7ca13b4401b398c
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/dia-0.92.2-128.1.src.rpm
          4f1d414bf9fd2a2515aaf4463a441aaa
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kdegraphics3-3.3.0-13.7.src.rpm
          0fae44a5765adc1de2b5462873560bfd
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kdelibs3-3.3.0-34.12.src.rpm
          7debc7aeee1ffca646d5c7216ce683fe
   
   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/binutils-2.15.90.0.1.1-32.13.src.rpm
          5c7ab33f6c050ba300aaaba7e2040fb4
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kdegraphics3-3.2.1-67.16.src.rpm
          8ae65c3f8ab7d3edf8a4e24209ed9e64
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kdelibs3-3.2.1-44.66.src.rpm
          851de1a4caea121c9ed82d77115928b5
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/binutils-2.15.90.0.1.1-32.13.src.rpm
          239ff55c3e755403a97a121a058c2caf
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/dia-0.92.2-112.11.src.rpm
          309668f36903aed44e8bfd15435f1908
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kdegraphics3-3.2.1-67.16.src.rpm
          51ddd6ca60f542ad852eff7a436a7275
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kdelibs3-3.2.1-44.66.src.rpm
          c23abf7c55209043d1c546877d2aaef7
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/koffice-1.3-67.4.src.rpm
          d341d9f1e16966db09bd071aeece3a3b
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/lyx-1.3.4-35.1.src.rpm
          029f7638dbcba4c841e3803121fb30c7
   
   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:
   
   http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/43ed32936d1f47c23b6d758b748169d9.html
   http://portal.suse.com/psdb/43ed32936d1f47c23b6d758b748169d9.html
   http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/052bc7b0a62a29064c15644ebf01dc51.html
   http://portal.suse.com/psdb/052bc7b0a62a29064c15644ebf01dc51.html
   http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/37ceddfb4166e0699e8b64b9e4afea11.html
   http://portal.suse.com/psdb/37ceddfb4166e0699e8b64b9e4afea11.html
   http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/9a3add7ef9404b778a7defb57a14b531.html
   http://portal.suse.com/psdb/9a3add7ef9404b778a7defb57a14b531.html

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   - See SuSE Security Summary Report
     

______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    =====================================================================
    SUSE's security contact is  or .
    The  public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google to turn on encryption by default in next Android version
TOR users become FBI's No.1 hacking target after legal power grab
OWASP Releases Latest App Sec Guide
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.