SuSE Linux Distribution - Page 727

Find the information you need for your favorite open source distribution .

SuSE: wget/curl overflow in NTLM authentication Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This update fixes a stack-based buffer overflow in the NTLM This update fixes a stack-based buffer overflow in the NTLM authentication code used by the file download tools/libraries curl authentication code used by the file download tools/libraries curl and wget that can be triggered by using a long user or domain name (also works with HTTP redirects). By exploiting this bug by using a malicious [More...]

SuSE: 2005-062: permissions Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SUSE LINUX ships with three pre defined sets of permissions, 'easy', SUSE LINUX ships with three pre defined sets of permissions, 'easy', 'secure' and 'paranoid'. The chkstat program contained in the 'secure' and 'paranoid'. The chkstat program contained in the permissions package is used to set those permissions to the chosen level. Level 'easy' which is the default allows some world writeable di [More...]

SuSE: 2005-061: openSSL protocol downgrade attack Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The openssl cryptographic libraries have been updated to fix The openssl cryptographic libraries have been updated to fix a protocol downgrading attack which allows a man-in-the-middle a protocol downgrading attack which allows a man-in-the-middle attacker to force the usage of SSLv2. This happens due to the work-around code of SSL_OP_MSIE_SSLV2_RSA_PADDING which is included in SSL_OP_ALL (which i [More...]

SuSE: 2005-060: OpenWBEM Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The SUSE Security Team performed a security review of important The SUSE Security Team performed a security review of important parts of the OpenWBEM system. During the audit, several integer parts of the OpenWBEM system. During the audit, several integer wrap arounds and buffer overflows have been discovered and fixed. If exploited, they allow remote attackers to execute arbitrary code with root [More...]

SuSE: 2005-056: XFree86-server,xorg-x11-server Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The X server memory can be accessed my a malicious X client by exploiting The X server memory can be accessed my a malicious X client by exploiting a missing range check in the function XCreatePixmap(). This bug can probably a missing range check in the function XCreatePixmap(). This bug can probably be used to execute arbitrary code with the privileges of the X server (root). 2) Solution or Work [More...]

SuSE: 2005-054: evolution Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Several format string bugs allowed remote attackers to cause Several format string bugs allowed remote attackers to cause evolution to crash or even execute code via full vCard data, contact evolution to crash or even execute code via full vCard data, contact data from remote LDAP servers, task list data from remote servers (CAN-2005-2549) or calendar entries (CAN-2005-2550). 2) Solution or Work- [More...]

SuSE: 2005-053: squid Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This update of the Squid web-proxy fixes two remotely exploitable denial This update of the Squid web-proxy fixes two remotely exploitable denial of service vulnerabilities. of service vulnerabilities. One can be triggered by aborting a request (CAN-2005-2794) due to a faulty assertion. The other one occurs in sslConnectTimeout while handling malformated

SuSE: 2005-052: apache2 Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PLEASE NOTE: This advisory is a re-release of SUSE-SA:2005:051 with a PLEASE NOTE: This advisory is a re-release of SUSE-SA:2005:051 with a new SA ID because the ID SUSE-SA:2005:051 was already used. new SA ID because the ID SUSE-SA:2005:051 was already used. This update of apache2 fixes an integer overflow in the PCRE quantifier parsing which can be triggered by a local untrusted user by using [More...]

SuSE: 2005-051: apache2 Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This update of apache2 fixes an integer overflow in the PCRE quantifier This update of apache2 fixes an integer overflow in the PCRE quantifier parsing which can be triggered by a local untrusted user by using a carefully parsing which can be triggered by a local untrusted user by using a carefully crafted regex in a .htaccess file to execute arbitrary code. (CAN-2005-2491) A memory consumption b [More...]

SuSE: 2005-050: kernel multiple security problems Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Linux kernel was updated to fix the following security issues: The Linux kernel was updated to fix the following security issues: - CAN-2005-2457: A problem in decompression of files on "zisofs" - CAN-2005-2457: A problem in decompression of files on "zisofs" filesystem was fixed. - CAN-2005-2458: A potential buffer overflow in the zlib decompressionhandling in the kernel was fixed.

SuSE: 2005-048: pcre integer overflows Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A vulnerability was found in the PCRE regular expression handling A vulnerability was found in the PCRE regular expression handling library which allows an attacker to crash or overflow a buffer in the library which allows an attacker to crash or overflow a buffer in the program by specifying a special regular expression. Since this library is used in a large number of packages, including apache2 [More...]

SuSE: 2005-047: Adobe Reader Plugin buffer overflow Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A buffer overflow was found in the core application plug-in for the A buffer overflow was found in the core application plug-in for the Adobe Reader, that allows attackers to cause a denial of service Adobe Reader, that allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. This is tracked by the Mitre CVE ID CAN-2005-2470. Note that for SU [More...]

SuSE: 2005-046: apache, apache2 request smuggling problem Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security flaw was found in the Apache and Apache2 web servers which A security flaw was found in the Apache and Apache2 web servers which allows remote attacker to "smuggle" requests past filters by providing allows remote attacker to "smuggle" requests past filters by providing handcrafted header entries. Fixed Apache 2 server packages were released on July 26th, fixed Apache 1 server packages [More...]

SuSE: 2005-045: Mozilla various security problems Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Various security vulnerabilities in the mozilla browser suite and Various security vulnerabilities in the mozilla browser suite and the Mozilla Firefox browser have been reported and fixed upstream. the Mozilla Firefox browser have been reported and fixed upstream. The Mozilla suite browser has been updated to a security fix level of Mozilla 1.7.11, the Mozilla Firefox browser has been updated t [More...]

SuSE: 2005-044: several kernel security problems Security Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Linux kernel is the core component of the Linux system. The Linux kernel is the core component of the Linux system. This update fixes various security as well as non-security problems discovered since the last round of kernel updates. Not all kernels are affected by all the problems, each of the problems has an affected note attached to it.