dhcp-client.rpm Support DHCLIENT_HOSTNAME_OPTION, the ability to send the hostname to the DHCP server, in NetworkManager. dhcp.rpm Support DHCLIENT_HOSTNAME_OPTION, the ability to send the hostname to the DHCP server, in NetworkManager. ivman.rpm Change user configuration files to use halmount util-linux-crypto.rpm Fix cryptsetup to work with no yet existing device maps. rekall-unisql.rpm This update fixes several crashes and misbehaviour in the package. rekall-postgresql.rpm This update fixes several crashes and misbehaviour in the package. rekall.rpm This update fixes several crashes and misbehaviour in the package. rekall-mysql.rpm This update fixes several crashes and misbehaviour in the package. rekall-xbase.rpm This update fixes several crashes and misbehaviour in the package. rekall-examples.rpm This update fixes several crashes and misbehaviour in the package. gnome-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gtk-sharp2-64bit.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gtk-sharp2-doc.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. art-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gtk-sharp2-complete.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gnome-vfs-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gtkhtml-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. glib-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. vte-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gtk-sharp2-gapi.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. glade-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gtk-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. rsvg-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. gconf-sharp2.rpm Fixes a hang in Banshee when playing music on multiprocessor systems. foomatic-filters.rpm A Bug in cupsomatic/foomatic-filters that allowed remote printer users to execute arbitrary commands as the uid of the printer daemon has been fixed (CAN-2004-0801). While the same problem was fixed in earlier products, the fix got lost during package upgrade of foomatic-filters. dia.rpm Format string bugs in dia could potentially be exploited to execute arbitrary code (CVE-2006-2453, CVE-2006-2480). NetworkManager-gnome.rpm NetworkManager automatically started ypbind and autofs if the DHCP server provided a NIS server address. NetworkManager-glib.rpm NetworkManager automatically started ypbind and autofs if the DHCP server provided a NIS server address. NetworkManager-devel.rpm NetworkManager automatically started ypbind and autofs if the DHCP server provided a NIS server address. NetworkManager.rpm NetworkManager automatically started ypbind and autofs if the DHCP server provided a NIS server address. xv.rpm XV can not grab a window in KDE if numeric keypad is active which is the default. aaa_skel.rpm In the file /etc/skel/.inputrc there were some mistyped examples about configuring the terminal bell. kdeadmin3.rpm This update fixes the problem that ksysv cannot be quit via usual user actions. cdparanoia.rpm cdparanoia checked only for the first 4 IDE major numbers. It refused to work for instance with devices on /dev/hdk. This update adds support for all IDE major numbers. cdparanoia-64bit.rpm cdparanoia checked only for the first 4 IDE major numbers. It refused to work for instance with devices on /dev/hdk. This update adds support for all IDE major numbers. bash.rpm The BASH can do a segmentation fault on large UTF-8 strings if the Internal Field Separator is used for sorting. cyrus-sasl-saslauthd.rpm Fixes a bug in the "shadow" authmethod that could cause the saslauthd daemon of cyrus-sasl to crash. pam.rpm Pam_tally supports LFS and 32 bit UIDs now. pam-64bit.rpm Pam_tally supports LFS and 32 bit UIDs now. dhcdbd.rpm These update fixes the following issues/bugs: - Send only the most significant hostname, not the entire FQDN, from /etc/HOSTNAME when DHCLIENT_HOSTNAME_OPTION is enabled (bug #179903) - Fix 64-bit build (use pkg-config like we should) - Ask dhclient to set the hostname as required by the sysconfig option DHCLIENT_HOSTNAME_OPTION (bug #139532) - Fix possible memory corruption sysconfig.rpm This update fixes the following issues: - rcnetwork reload now restarts NetworkManager (Bug 162959) - using wrapper script to kill ipw3945d (Bug 170099) - fixed a debug message in update script. Show the right sysfs path. - rcnetwork: quoted two occurrences $OLDPWD to allow spaces in directory names. (Bug 174029) - added sysconfig variable NM_ONLINE_TIMEOUT. If not set to 0, then rcnetwork will wait at least this time until a network connection has established. (Bug 169632) - start NMdispatcher before and stop it after NM itself (Bug 169632) - fix dhcpcd-hook so that syslog picks up a changed hostname during bootup, by reloading syslog. The reload was already being done during IP address change ("renew state") but not during "up" state. (Bug 160916) - Don't load module 'bonding' multiple times but create and delete bonding interfaces via sysfs attribute. (Bug 157936) - Changed comment for LOAD_UNSUPPORTED_MODULES_AUTOMATICALLY; now also rcacpid respects this setting (Bug 180654) - Set LOAD_UNSUPPORTED_MODULES_AUTOMATICALLY=yes only for SLES and not for SLED (Bug 162970) - 'ifdown-dhcp all' kills dhcp clients with -9, because interfaces with STARTMODE=nfsroot must stay up and running. (Bug 176804) - ifdown calls ifdown-dhcp even if BOOTPROTO=static. We need this to to stop dhcp client after reconfiguration to static ip address via YaST (which calls rcnetwork reload). (Bug 179895) - eliminated two error messages that occur when interface bonding is activated. (Bug 181129) gdm.rpm This update solves a bug in GDM. This bug allows to bypass root authorization to access the login configuration. (CVE-2006-2452) pgcalc.rpm This update fixes various crashes in pgcalc2. mysql-administrator.rpm This update fixes a freeze in the mysql-administrator program that would occur after clicking User Administration fontconfig.rpm All system fonts accessed via fontconfig ceased to work recently in wine and crossover office. This was due to a change in the API of fontconfig. But this change was not done on purpose and the problem has been fixed again in the latest upstream version of fontconfig. This patch is a backport of the upstream fix to the fontconfig version used in SUSE Linux 10.1. fontconfig-64bit.rpm All system fonts accessed via fontconfig ceased to work recently in wine and crossover office. This was due to a change in the API of fontconfig. But this change was not done on purpose and the problem has been fixed again in the latest upstream version of fontconfig. This patch is a backport of the upstream fix to the fontconfig version used in SUSE Linux 10.1. yast2-storage.rpm This fixes the bug that creation of an encrypted file fails silently in yast2 expert partitioner. yast2-storage-evms.rpm This fixes the bug that creation of an encrypted file fails silently in yast2 expert partitioner. john.rpm The path to the default config file john.conf was misleadingly pointing to a wrong place. This update fixes the problem. mc.rpm Due to an incompatibility between Slang2 and patched Slang1 libraries, the displaying of non-ASCII characters was broken in non-UTF-8 locales. It had the biggest impact on locales like ru_RU@KOI8R. The bug did not appear in UTF-8 locales, which are the default. snort.rpm This update fixes an evasion attack on URL parsing. The faulty code is in the http_inspect preprocessor. (CVE-2006-2769) tiff.rpm This update fixes a stack-based buffer overflow in tiffsplit that can be triggered with long filemanes (CVE-2006-2656) and a buffer overflow in tiff2pdf. Both tools are not setuid but may be exploited in conjunction with other applications. Exploitation very unlikely. kdemultimedia3-CD.rpm This update re-adds ogg vorbis encoding support in the audiocd:/ kioslave. LibVNCServer.rpm Modified clients could bypass authentication of password protected VNC servers (CVE-2006-2450). glibc.rpm This patch fixes a problem when nscd was accessing memory which was not properly initialized, eventually causing random cratches with varying frequency. It also fixes a problem with Chinese timezones. Value of MADV_REMOVE is fixed as well as page-related macros in . Superfluous inclusion of is removed. glibc-devel.rpm This patch fixes a problem when nscd was accessing memory which was not properly initialized, eventually causing random cratches with varying frequency. It also fixes a problem with Chinese timezones. Value of MADV_REMOVE is fixed as well as page-related macros in . Superfluous inclusion of is removed. glibc-devel-64bit.rpm This patch fixes a problem when nscd was accessing memory which was not properly initialized, eventually causing random cratches with varying frequency. It also fixes a problem with Chinese timezones. Value of MADV_REMOVE is fixed as well as page-related macros in . Superfluous inclusion of is removed. glibc-64bit.rpm This patch fixes a problem when nscd was accessing memory which was not properly initialized, eventually causing random cratches with varying frequency. It also fixes a problem with Chinese timezones. Value of MADV_REMOVE is fixed as well as page-related macros in . Superfluous inclusion of is removed. arts.rpm The KDE soundserver aRts lacked checks around some setuid() calls. This could potentially be used by a local attacker to gain root privileges. (CVE-2006-2916) arts-64bit.rpm The KDE soundserver aRts lacked checks around some setuid() calls. This could potentially be used by a local attacker to gain root privileges. (CVE-2006-2916) wv2-devel.rpm The wv2 library was updated to fix some boundary checks which could be exploited by maliciously crafted files to access memory outside bounds and possibly execute arbitrary code. (CVE-2006-2197) wv2.rpm The wv2 library was updated to fix some boundary checks which could be exploited by maliciously crafted files to access memory outside bounds and possibly execute arbitrary code. (CVE-2006-2197) xntp.rpm This update fixes a bug with NetworkManager that wasn't starting the NTP service properly. rpm-devel.rpm The internal rpmlib(PatchRPM) provides got dropped by accident when the port of the patchrpm code to rpm-4.4.2 was done. Because of this, patchrpms could only be installed with '--nodeps'. This update adds the missing provides. rpm.rpm The internal rpmlib(PatchRPM) provides got dropped by accident when the port of the patchrpm code to rpm-4.4.2 was done. Because of this, patchrpms could only be installed with '--nodeps'. This update adds the missing provides. tcsh.rpm The TCSH can crash when the very first command line file or directory argument is completeted by using the TAB key. wget.rpm This update fixes a security in wget, where evil servers could send terminal escape codes to the user calling wget. This would only affect interactive sessions. (CVE-2004-1488) Additionaly a previous ".file" fix was found to be buggy and replaced. This bug could lead to ".directories" not being retrievable and "_files" being overwritten. audit.rpm This update fixes security problems in the AppArmor confinment technology. Since it adds new flags to the profile syntax, you likely should review and adapt your profiles. - If a profile allowed unconfined execution ("ux") of a child binary it was possible to inject code via LD_PRELOAD or similar environment variables into this child binary and execute code without confiment. We have added new flag "Ux" (and "Px" for "px") which makes the executed child clear the most critical environment variables (similar to setuid programs). Special care needs to be taken nevertheless that this interaction between parent and child programs can not be exploited in other ways to gain the rights of the child process. - If a resource is marked as "r" in the profile it was possible to use mmap with PROT_EXEC flag set to load this resource as executable piece of code, making it effectively "ix". This could be used by a coordinated attack between two applications to potentially inject code into the reader. To allow mmap() executable access, supply the "m" flag to the applications profile. Please also review the updated documentation. audit-libs.rpm This update fixes security problems in the AppArmor confinment technology. Since it adds new flags to the profile syntax, you likely should review and adapt your profiles. - If a profile allowed unconfined execution ("ux") of a child binary it was possible to inject code via LD_PRELOAD or similar environment variables into this child binary and execute code without confiment. We have added new flag "Ux" (and "Px" for "px") which makes the executed child clear the most critical environment variables (similar to setuid programs). Special care needs to be taken nevertheless that this interaction between parent and child programs can not be exploited in other ways to gain the rights of the child process. - If a resource is marked as "r" in the profile it was possible to use mmap with PROT_EXEC flag set to load this resource as executable piece of code, making it effectively "ix". This could be used by a coordinated attack between two applications to potentially inject code into the reader. To allow mmap() executable access, supply the "m" flag to the applications profile. Please also review the updated documentation. audit-devel.rpm This update fixes security problems in the AppArmor confinment technology. Since it adds new flags to the profile syntax, you likely should review and adapt your profiles. - If a profile allowed unconfined execution ("ux") of a child binary it was possible to inject code via LD_PRELOAD or similar environment variables into this child binary and execute code without confiment. We have added new flag "Ux" (and "Px" for "px") which makes the executed child clear the most critical environment variables (similar to setuid programs). Special care needs to be taken nevertheless that this interaction between parent and child programs can not be exploited in other ways to gain the rights of the child process. - If a resource is marked as "r" in the profile it was possible to use mmap with PROT_EXEC flag set to load this resource as executable piece of code, making it effectively "ix". This could be used by a coordinated attack between two applications to potentially inject code into the reader. To allow mmap() executable access, supply the "m" flag to the applications profile. Please also review the updated documentation. apparmor-parser.rpm This update fixes security problems in the AppArmor confinment technology. Since it adds new flags to the profile syntax, you likely should review and adapt your profiles. - If a profile allowed unconfined execution ("ux") of a child binary it was possible to inject code via LD_PRELOAD or similar environment variables into this child binary and execute code without confiment. We have added new flag "Ux" (and "Px" for "px") which makes the executed child clear the most critical environment variables (similar to setuid programs). Special care needs to be taken nevertheless that this interaction between parent and child programs can not be exploited in other ways to gain the rights of the child process. - If a resource is marked as "r" in the profile it was possible to use mmap with PROT_EXEC flag set to load this resource as executable piece of code, making it effectively "ix". This could be used by a coordinated attack between two applications to potentially inject code into the reader. To allow mmap() executable access, supply the "m" flag to the applications profile. Please also review the updated documentation. control-center2.rpm This update includes the following improvements to Xgl and compiz: - Improved handling in Gnome environments - Better configuration utility - More information about known hardware - Bugfixes - Better YUY2 + YUV XVideo handling - Workaround for Java applications - Better icon support - Improved keyboard navigation - Updated Mesa version - Translations - Performance improvements libwnck-64bit.rpm This update includes the following improvements to Xgl and compiz: - Improved handling in Gnome environments - Better configuration utility - More information about known hardware - Bugfixes - Better YUY2 + YUV XVideo handling - Workaround for Java applications - Better icon support - Improved keyboard navigation - Updated Mesa version - Translations - Performance improvements libwnck.rpm This update includes the following improvements to Xgl and compiz: - Improved handling in Gnome environments - Better configuration utility - More information about known hardware - Bugfixes - Better YUY2 + YUV XVideo handling - Workaround for Java applications - Better icon support - Improved keyboard navigation - Updated Mesa version - Translations - Performance improvements libwnck-devel.rpm This update includes the following improvements to Xgl and compiz: - Improved handling in Gnome environments - Better configuration utility - More information about known hardware - Bugfixes - Better YUY2 + YUV XVideo handling - Workaround for Java applications - Better icon support - Improved keyboard navigation - Updated Mesa version - Translations - Performance improvements control-center2-devel.rpm This update includes the following improvements to Xgl and compiz: - Improved handling in Gnome environments - Better configuration utility - More information about known hardware - Bugfixes - Better YUY2 + YUV XVideo handling - Workaround for Java applications - Better icon support - Improved keyboard navigation - Updated Mesa version - Translations - Performance improvements powersave-libs.rpm Documentation updates, keep CPU frequency settings over suspend cycle, pay attention to performance depending on the operational area (server/notebook), fix intermittend freezes with suspend to ram, print consistent error messages if a client is not allowed to talk to the powersave daemon, fix system freeze under certain circumstances when shutting down the system within KDE through the power button, fix recognition of the SUSPEND2DISK_IMAGE_SIZE setting powersave-libs-64bit.rpm Documentation updates, keep CPU frequency settings over suspend cycle, pay attention to performance depending on the operational area (server/notebook), fix intermittend freezes with suspend to ram, print consistent error messages if a client is not allowed to talk to the powersave daemon, fix system freeze under certain circumstances when shutting down the system within KDE through the power button, fix recognition of the SUSPEND2DISK_IMAGE_SIZE setting powersave-devel.rpm Documentation updates, keep CPU frequency settings over suspend cycle, pay attention to performance depending on the operational area (server/notebook), fix intermittend freezes with suspend to ram, print consistent error messages if a client is not allowed to talk to the powersave daemon, fix system freeze under certain circumstances when shutting down the system within KDE through the power button, fix recognition of the SUSPEND2DISK_IMAGE_SIZE setting powersave.rpm Documentation updates, keep CPU frequency settings over suspend cycle, pay attention to performance depending on the operational area (server/notebook), fix intermittend freezes with suspend to ram, print consistent error messages if a client is not allowed to talk to the powersave daemon, fix system freeze under certain circumstances when shutting down the system within KDE through the power button, fix recognition of the SUSPEND2DISK_IMAGE_SIZE setting xorg-x11-driver-video-nvidia.rpm This update permits the coexistance of Mesa and NVIDIA driver. Added support for new NVidia graphics cards. Added alternative Intel video driver. Fixed driver issues with Matrox G200 SE GPUs. 3ddiag.rpm Enhanced 3ddiag to detect also supported graphics cards, which driver has been installed via Novell's "Linux Driver Process". sax2-libsax.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-tools.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-libsax-devel.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-libsax-csharp.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-libsax-python.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-gui.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-libsax-perl.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. sax2-libsax-java.rpm Enhanced SaX2 to handle graphics drivers, which have been installed via Novell's "Linux Driver Process". Added detection/configuration of new supported NVidia graphics cards. hal-gnome.rpm This update fixes the detection of system.formfactor, fixes a unaligned access warning, adds storage methodes to unprobed devices (as e.g. internal Floppy drives), fixes read smbios information, fixes libhal-storage library to return correct volume size, fixes several memory leaks in libhal and libhal-storage, fixes umount handling of PCMCIA storage devices and fixes the haldaemon start script. This version now also supports debug to syslog for prober and addons, allows to mount partitions from fstab which contain option user, allows to umount floppy devices if they are in fstab. It also includes some performance patches to preserve memory usage and enhance the speed of HAL. kpowersave.rpm This update fixes autosuspend and inactivity detection (workarounds for broken X libraries), fixes the DCOP function for autosuspend, fixes detection/handling if DBUS/HAL/powersaved are not running, fixes the config dialog to respect DPMS timeout rules, checks the applet menu before trigger autosuspend, fixes distribution detection in configure, and changes the default bug reporting links for dists. It adds missing DCOP functions, allows changing brightness with the mouse wheel over the applet icon, and updates the autosuspend blacklist and translations. KPowersave depends now on powersave >= v0.12.18. CASA-devel.rpm Various bugs and problems were fixed in the CASA authentication framework, some of them security relevant: - Secrets with special characters inside were handled incorrectly. - Enhanced Salt generation. CASA-gui.rpm Various bugs and problems were fixed in the CASA authentication framework, some of them security relevant: - Secrets with special characters inside were handled incorrectly. - Enhanced Salt generation. CASA.rpm Various bugs and problems were fixed in the CASA authentication framework, some of them security relevant: - Secrets with special characters inside were handled incorrectly. - Enhanced Salt generation. CASA-64bit.rpm Various bugs and problems were fixed in the CASA authentication framework, some of them security relevant: - Secrets with special characters inside were handled incorrectly. - Enhanced Salt generation. libtiff.rpm This update of libtiff is the result of a source-code audit done by Tavis Ormandy. It fixes various bugs that can lead to denial-of-service conditions as well as to remote code execution while parsing a tiff image. (CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465) Please restart your applications. libtiff-64bit.rpm This update of libtiff is the result of a source-code audit done by Tavis Ormandy. It fixes various bugs that can lead to denial-of-service conditions as well as to remote code execution while parsing a tiff image. (CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465) Please restart your applications. libtiff-devel-64bit.rpm This update of libtiff is the result of a source-code audit done by Tavis Ormandy. It fixes various bugs that can lead to denial-of-service conditions as well as to remote code execution while parsing a tiff image. (CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465) Please restart your applications. libtiff-devel.rpm This update of libtiff is the result of a source-code audit done by Tavis Ormandy. It fixes various bugs that can lead to denial-of-service conditions as well as to remote code execution while parsing a tiff image. (CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465) Please restart your applications. kdenetwork3.rpm Recent (July 2006) changes to the ICQ server prevent login with older versions of Kopete. This update allows Kopete to login again. libwmf.rpm A heap overflow could be triggered by specially crafted WMF (Windows Meta Files) in the libwmf library. This problem could be exploited to execute code, by a remote attacker providing a file with embedded WMF data to an application understanding this (like OpenOffice_org, abiword, gimp). This issue is tracked by the Mitre CVE ID CVE-2006-3376. libwmf-devel.rpm A heap overflow could be triggered by specially crafted WMF (Windows Meta Files) in the libwmf library. This problem could be exploited to execute code, by a remote attacker providing a file with embedded WMF data to an application understanding this (like OpenOffice_org, abiword, gimp). This issue is tracked by the Mitre CVE ID CVE-2006-3376. perl-Bootloader.rpm This update fixes a problem where the bootloader code would use device symlinks in sysfs as a criteria for device detection which breaks on SmartArray controllers (#189348). This could have left the system not bootable after a kernel update. fbi.rpm The fbgs program did not activate security options in the postscript interpreter due to a typo (CVE-2006-3119). fbgs also used a temporary directory with predictable name (CVE-2006-1695). beagle.rpm Mono has a bug in which dangling symlinks aren't correctly deleted with the FileInfo.Delete() function. This patch works around that bug when cleaning up its current-* symlinks in ~/.beagle/Log at startup, ensuring that they always point to the latest logs. midgard.rpm This update fixes a bug in the midgard php extension that caused midgard's php scripts crash the php module and apache. compiz.rpm Fix a set of issues found when testing lotus client. Issues may also occur in other applications. gnome-vfs2-devel.rpm This fixes the gnome-vfs2 part of https://bugzilla.novell.com/show_bug.cgi?id=172870. With this, floppies can be unmounted again. This also fixes https://bugzilla.novell.com/show_bug.cgi?id=183723, so that NFS mounts work again. gnome-vfs2.rpm This fixes the gnome-vfs2 part of https://bugzilla.novell.com/show_bug.cgi?id=172870. With this, floppies can be unmounted again. This also fixes https://bugzilla.novell.com/show_bug.cgi?id=183723, so that NFS mounts work again. gnome-vfs2-64bit.rpm This fixes the gnome-vfs2 part of https://bugzilla.novell.com/show_bug.cgi?id=172870. With this, floppies can be unmounted again. This also fixes https://bugzilla.novell.com/show_bug.cgi?id=183723, so that NFS mounts work again. nautilus-64bit.rpm This fixes the Nautilus part of https://bugzilla.novell.com/show_bug.cgi?id=172870. Nautilus is now able to unmount floppies appropriately. nautilus-devel.rpm This fixes the Nautilus part of https://bugzilla.novell.com/show_bug.cgi?id=172870. Nautilus is now able to unmount floppies appropriately. nautilus.rpm This fixes the Nautilus part of https://bugzilla.novell.com/show_bug.cgi?id=172870. Nautilus is now able to unmount floppies appropriately. yast2-printer.rpm When configured samba printer using authentication there was wrong characters writted. This patch fix that. libksba.rpm The gpgsm program (which uses the libksba library) crashed when verifying a signature with certain malformed x.509 certificates. libksba-devel.rpm The gpgsm program (which uses the libksba library) crashed when verifying a signature with certain malformed x.509 certificates. nfs-server.rpm This update fixes a bug in the userspace NFS server that caused file open calls to return an error, truncating the files nevertheless. vrfy.rpm Fixes a bug causing a segfault immediately upon execution of vrfy. gtetrinet.rpm Malicious tetrinet servers could overflow a buffer within the gtetrinet client, making it possible to execute code. CVE-2006-3125 libkexif.rpm This update fixes empty EXIF information in various KDE properties dialogs (e.g. digikam). sendmail.rpm Without this update sendmail may crash when finishing a mail due to referencing an already freed variable (CVE-2006-4434). smart.rpm This updates fixes smart's rpm file conflict handling. SDL.rpm Due to a bug in SDL library, some SDL based games were broken on Xgl. This patch fixes this issue. SDL-64bit.rpm Due to a bug in SDL library, some SDL based games were broken on Xgl. This patch fixes this issue. sax2-ident.rpm Starting from the driver version 8.25.18 ATI has replaced "agplock" option with "locked-userpages". This update to sax2 will fix issues where updating to newer ATI drivers will cause X server to no longer load. zmd.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2-devel.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2-perl-bindings.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2-qt.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2-pkg-bindings.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2-ncurses.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run yast2-packager.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run libzypp-zmd-backend.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run zmd-devel.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run ruby-zypp.rpm This update contains the following new features: * support for patch/delta RPMs in YUM sources (#168844) This update includes fixes for the following bugs: * various performance enhancements * 190163 - *-kmp-* dependencies match multiple kernel packages * 176568 - Evaluate possible xml parser optimizations * 195567 - 100 /var/tmp/TmpFile.xxxxx in 3 Days * 193584 - cut-off package description in zen-updater * 194424 - Online update setup creates unusable cron job * 191676 - zen installer/updater cannot add an FTP YUM repository * 190295 - zen-updater/zmd/rug does not install update stack patches first * 193212 - zmd does not unblock transactions after transaction preparation failure * 191506 - zen-updated showing updates from non-subscribed catalog * 183656 - mono needed for YaST package management since last update * 195911 - Missing dependency of package management on 'unzip' * 192535 - test fetchmsttfonts script does not get run xmms-plugins.rpm Specially crafted AMF files could potentially be used to exploit a heap based buffer overflow in libmodplug (CVE-2006-4192). scim-64bit.rpm This patch makes it possible to use scim in non-standard gtk applications which do not use the gtk main loop. Without this patch, the scim gtk immodule doesn't get any key events from such an application which makes scim unusable. scim-devel.rpm This patch makes it possible to use scim in non-standard gtk applications which do not use the gtk main loop. Without this patch, the scim gtk immodule doesn't get any key events from such an application which makes scim unusable. scim.rpm This patch makes it possible to use scim in non-standard gtk applications which do not use the gtk main loop. Without this patch, the scim gtk immodule doesn't get any key events from such an application which makes scim unusable. mozilla-nss.rpm A security problem in the SSL handling of the NSS libraries was found: If an RSA key with exponent 3 is used it may be possible to forge a PKCS verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature. This bug is tracked by the Mitre CVE ID CVE-2006-4340 and CVE-2006-4341. mozilla-nss-devel.rpm A security problem in the SSL handling of the NSS libraries was found: If an RSA key with exponent 3 is used it may be possible to forge a PKCS verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature. This bug is tracked by the Mitre CVE ID CVE-2006-4340 and CVE-2006-4341. mozilla-nss-64bit.rpm A security problem in the SSL handling of the NSS libraries was found: If an RSA key with exponent 3 is used it may be possible to forge a PKCS verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature. This bug is tracked by the Mitre CVE ID CVE-2006-4340 and CVE-2006-4341. kdebase3-SuSE.rpm This update fixes the sysinfo protocol, which did not work in Konqueror and showed a wrong rather than the currently installed KDE version. f-spot.rpm F-Spot, a photo management program, could fail to correctly create new images when exporting resulting in broken galleries. gzip.rpm This update fixes several security problems that can be exploited to compromise the system in conjunction with other programs while processing malformated archive files. (CVE-2006-4334,CVE-2006-4335,CVE-2006-4336,CVE-2006-4337,CVE-2006-4338) gnutls.rpm A security problem was fixed in the GNU TLS library, where excess data was not checked during signature checking with RSA keys with exponent 3. This problem could be used to fake those RSA signatures. (CVE-2006-4790) gnutls-devel.rpm A security problem was fixed in the GNU TLS library, where excess data was not checked during signature checking with RSA keys with exponent 3. This problem could be used to fake those RSA signatures. (CVE-2006-4790) gnutls-devel-64bit.rpm A security problem was fixed in the GNU TLS library, where excess data was not checked during signature checking with RSA keys with exponent 3. This problem could be used to fake those RSA signatures. (CVE-2006-4790) gnutls-64bit.rpm A security problem was fixed in the GNU TLS library, where excess data was not checked during signature checking with RSA keys with exponent 3. This problem could be used to fake those RSA signatures. (CVE-2006-4790) heartbeat-stonith.rpm This update fixes both a local and a remote denial of service attack within heartbeat, as well as numerous other bugs in the messaging and membership layer, GUI, Cluster Resource Manager, Local Resource Manager and Resource Agents. (CVE-2006-3815,CVE-2006-3121) heartbeat-ldirectord.rpm This update fixes both a local and a remote denial of service attack within heartbeat, as well as numerous other bugs in the messaging and membership layer, GUI, Cluster Resource Manager, Local Resource Manager and Resource Agents. (CVE-2006-3815,CVE-2006-3121) heartbeat-pils.rpm This update fixes both a local and a remote denial of service attack within heartbeat, as well as numerous other bugs in the messaging and membership layer, GUI, Cluster Resource Manager, Local Resource Manager and Resource Agents. (CVE-2006-3815,CVE-2006-3121) heartbeat-cmpi.rpm This update fixes both a local and a remote denial of service attack within heartbeat, as well as numerous other bugs in the messaging and membership layer, GUI, Cluster Resource Manager, Local Resource Manager and Resource Agents. (CVE-2006-3815,CVE-2006-3121) heartbeat.rpm This update fixes both a local and a remote denial of service attack within heartbeat, as well as numerous other bugs in the messaging and membership layer, GUI, Cluster Resource Manager, Local Resource Manager and Resource Agents. (CVE-2006-3815,CVE-2006-3121) kdebluetooth.rpm The kdebluetooth update includes follwing fixes: - fix problem with regard to malformed URLs while browsing Bluetooth devices in Konqueror - fix kbluepin permission problem with NIS user accounts bluez-utils.rpm This update of the bluez-utils package moves Bluetooth link-keys to the correct directory. banshee-devel.rpm Allows queueing of files if banshee is already running. Prevents a crash when removing queued files. Prevents a crash if there is no cd burner device. bind-devel.rpm This update fixes two vulnerabilities in bind that allow a remote attacker to trigger a denial-of-service attack. (VU#697164 - BIND INSIST failure due to excessive recursive queries, VU#915404 - BIND assertion failure during SIG query processing) bind-devel-64bit.rpm This update fixes two vulnerabilities in bind that allow a remote attacker to trigger a denial-of-service attack. (VU#697164 - BIND INSIST failure due to excessive recursive queries, VU#915404 - BIND assertion failure during SIG query processing) evolution-exchange.rpm Critical and annoying issues like Pinging IMAP server even when offline, attachment drag & drop crash, Hang in connector, appointment loses, crashes due to specific appointments, attachment getting corrupted, handling of GPG/PGP signed mails, Junk/Unjunk handling of GW, MS-live meeting handling, hang in exchange-connector and exchange connection issues are fixed. libmusicbrainz.rpm This update fixes various buffer overflows that can by exploited by malicious servers to execute arbitrary code. (CVE-2006-4197) libmusicbrainz-devel.rpm This update fixes various buffer overflows that can by exploited by malicious servers to execute arbitrary code. (CVE-2006-4197) yast2-sound.rpm This is o fix for the problem that the CD drive detection in the yast module was obsoleted, Yast could not detect the source drive for reading sound fonts (MIDI Sound Samples) properly. libzypp.rpm This update reduces excess logging inside libzypp possibly leading to a completely filled up /var/log libzypp-devel.rpm This update reduces excess logging inside libzypp possibly leading to a completely filled up /var/log compat-openssl097g-64bit.rpm A buffer overflow condition within the SSL_get_shared_ciphers() function and a DoS condition known as "parasitic public keys" have been fixed. The later problem allowed attackers to trick the OpenSSL engine to spend an extraordinary amount of time to process public keys. The following CAN numbers have been assigned: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339 and CVE-2006-4343. compat-openssl097g.rpm A buffer overflow condition within the SSL_get_shared_ciphers() function and a DoS condition known as "parasitic public keys" have been fixed. The later problem allowed attackers to trick the OpenSSL engine to spend an extraordinary amount of time to process public keys. The following CAN numbers have been assigned: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339 and CVE-2006-4343. xorg-x11-driver-video.rpm On some machines with ATI Radeon ES1000 gfx hardware, e.g. Dell PE2950, the OS rebooted, when graphics resolution was changed several times. This issue has been fixed by patching the "radeon" driver. binutils.rpm Fix a performance problem in the linker which can lead to increased link times. binutils-64bit.rpm Fix a performance problem in the linker which can lead to increased link times. screen.rpm A special formed UTF-8 sequence in text could be used to crash the terminal multitasker screen by overwriting memory in the heap. This is potentially exploitable to execute code. (CVE-2006-4573) mailman.rpm This update of mailman fixes the following security issues: - A malicious user could visit a specially crafted URI and inject an apparent log message into Mailman's error log which might induce an unsuspecting administrator to visit a phishing site. This has been blocked. Thanks to Moritz Naumann for its discovery. - Fixed denial of service attack which can be caused by some standards-breaking RFC 2231 formatted headers. CVE-2006-2941. - Several cross-site scripting issues have been fixed. Thanks to Moritz Naumann for their discovery. CVE-2006-3636 - Fixed an unexploitable format string vulnerability. Discovery and fix by Karl Chen. Analysis of non-exploitability by Martin 'Joey' Schulze. Also thanks go to Lionel Elie Mamane. CVE-2006-2191. OpenPBS-clients.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. OpenPBS-utils.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. OpenPBS-scheduler.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. OpenPBS.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. OpenPBS-server.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. OpenPBS-mom.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. OpenPBS-devel.rpm This update of OpenPBS fixes some potential security vulnerabilities that may allow the compromising of a system remotely and/or locally. log4net.rpm This update fixes a format string exploit in the RemoteSyslogAppender of log4net. CVE-2006-0743 pdns.rpm Two security problems that have been found in PowerDNS are fixed by this update: CVE-2006-4251: The PowerDNS Recursor can be made to crash by sending malformed questions to it over TCP potentially executing code. CVE-2006-4252: Zero second CNAME TTLs can make PowerDNS exhaust allocated stack space, and crash. imlib2-loaders.rpm Various security problems have been fixed in the imlib2 image loaders: CVE-2006-4809: A stack buffer overflow in loader_pnm.c could be used by attackers to execute code by supplying a handcrafted PNM image. CVE-2006-4808: A heap buffer overflow in loader_tga.c could potentially be used by attackers to execute code by supplying a handcrafted TGA image. CVE-2006-4807: A out of bounds memory read in loader_tga.c could be used to crash the imlib2 using application with a handcrafted TGA image. CVE-2006-4806: Various integer overflows in width*height calculations could lead to heap overflows which could potentially be used to execute code. Affected here are the ARGB, PNG, LBM, JPEG and TIFF loaders. Additionaly loading of TIFF images on 64bit systems is now possible. This update obsoletes the previous one, which had problems with JPEG loading. module-init-tools.rpm In certain cases the update to a newer version of a KMP package caused module compatibility symlinks to be removed. diffutils.rpm Fix exit code of cmp when stdout is redirected to /dev/null. pam_ldap.rpm pam_ldap did not return an error conditions correctly when an LDAP directory server responded with a PasswordPolicyResponse control response, which caused the pam_authenticate function to return a success code even if authentication has failed. (CVE-2006-5170) pam_ldap-64bit.rpm pam_ldap did not return an error conditions correctly when an LDAP directory server responded with a PasswordPolicyResponse control response, which caused the pam_authenticate function to return a success code even if authentication has failed. (CVE-2006-5170) links.rpm Malicious web sites could abuse smb:// URLs to read or write arbitrary files of the user (CVE-2006-5925). Therefore this update disables SMB support in links. pvm.rpm Allow linking pvm into dynamic libraries on 64bit architectures Mesa-devel-64bit.rpm Fixed GoogleEarth glitches with Intel driver and fixes also Suspend-To-Ram issues after resume with Xgl on some Intel onboard graphics and also googleearth glitches with Intel driver. Mesa-devel.rpm Fixed GoogleEarth glitches with Intel driver and fixes also Suspend-To-Ram issues after resume with Xgl on some Intel onboard graphics and also googleearth glitches with Intel driver. Mesa-64bit.rpm Fixed GoogleEarth glitches with Intel driver and fixes also Suspend-To-Ram issues after resume with Xgl on some Intel onboard graphics and also googleearth glitches with Intel driver. Mesa-devel-static.rpm Fixed GoogleEarth glitches with Intel driver and fixes also Suspend-To-Ram issues after resume with Xgl on some Intel onboard graphics and also googleearth glitches with Intel driver. Mesa.rpm Fixed GoogleEarth glitches with Intel driver and fixes also Suspend-To-Ram issues after resume with Xgl on some Intel onboard graphics and also googleearth glitches with Intel driver. openldap2-client-64bit.rpm OpenLDAP libldap's strval2strlen() function contained a bug when processing the authcid string of certain Bind Requests, which could allow attackers to cause an affected application (especially the OpenLDAP Server) to crash (CVE-2006-5779). openldap2-client.rpm OpenLDAP libldap's strval2strlen() function contained a bug when processing the authcid string of certain Bind Requests, which could allow attackers to cause an affected application (especially the OpenLDAP Server) to crash (CVE-2006-5779). NetworkManager-kde.rpm KNetworkManager asks for the KWallet password on each start if encrypted wireless networks are stored. With this update KWallet will only be accessed once a connection attempt to an encrypted network is being made. Also, this update brings several smaller fixes. xgl.rpm Remove a potential upgrade issue from 10.1 to 10.2 where the postuninstall script of xgl could fail and cause an error. kdegraphics3.rpm The KFILE JPEG plugin that is responsible for displaying meta-data of JPEG files was affected by some old common vulnerabilities in EXIF handling. A JPEG file could be prepared with an EXIF section with endless recursion that would overflow the stack and cause the plugin and so the image browser (konqueror, digikam or other kfile users) to crash. cyrus-imapd.rpm Due to an incompatibility with Berkely DB 4.3.X in cyrus-imapd it could happen that under certain circumstances (e.g. high server load) messages delivered via LMTP would bounce. texinfo.rpm Specially crafted texinfo files could crash texinfo utilities. (CVE-2006-4810) ghostscript-library.rpm With this update three problems are fixed. Some PDF files were not viewable, the duplex support of pstoraster was broken, and for some fonts the umlauts were sometime not printed correctly. wv.rpm Two integer overflows were found in the Microsoft Word converter library "wv", which could potentially be used to crash programs using this library or to even execute code. - A LVL Count Integer Overflow Vulnerability was fixed. - A LFO Count Integer Overflow Vulnerability was fixed. Both problems have been assigned the Mitre CVE ID CVE-2006-4513. gnome-session.rpm The test currently used by gnome-session to decide whether to run metacity or compiz is not completely reliable. In particular, at some point NVIDIA will release a new version of their driver that has changed in such a way that gnome-session will get confused and think it should start compiz rather than metacity under Xorg, which will not work, with the end result being that the user ends up with no window manager at all. This patch changes gnome-session to use the same test which is used in openSUSE 10.2. gv.rpm The previous "gv" update to fix a stack overflow did not completely fix the problem spotted. An attacker could still cause the handling to use up all system memory, or open windows much wider than the X display and crash. Code execution however was not possible. gpg2.rpm - Specially crafted files could overflow a buffer when gpg2 was used in interactive mode (CVE-2006-6169). - Specially crafted files could modify a function pointer and execute code this way (CVE-2006-6235). evince.rpm Specially crafted Postscript files could be used to execute arbitrary code by causing a buffer overflow in evince (CVE-2006-5864). libgsf.rpm Specially crafted OLE documents enabled attackers to use a heap buffer overlow for executing code (CVE-2006-4514). libgsf-64bit.rpm Specially crafted OLE documents enabled attackers to use a heap buffer overlow for executing code (CVE-2006-4514). privoxy.rpm This patch fixes the problem that privoxy stops working when network connection is switched using the Network Manager. sysstat.rpm The 'sysstat' package requires the 'lockfile' binary which is provided by the 'procmail' package, but 'sysstat' does not indicate this in it's requires list. wxGTK.rpm This update removes unneeded files from source code. w3m.rpm A format string problem in w3m -dump / -backend mode could be used by a malicious server to crash w3m or execute code. (CVE-2006-6772) xsupplicant.rpm xsupplicant has been upgraded to version 1.2.8, which includes bugfixes and one security fix: CVE-2006-5601: A post-authentication stack overflow in the EAP handling could be used by already authenticated attacker to overflow a stackbuffer and so potentially execute code. ulogd.rpm This update of ulogd fixes a potential buffer overflow due to improper string length calculations. gtk2-devel-64bit.rpm A bug in gdk-pixbuf could crash applications such as Evolution when trying to display certain images (CVE-2007-0010) gtk2-64bit.rpm A bug in gdk-pixbuf could crash applications such as Evolution when trying to display certain images (CVE-2007-0010) gtk2.rpm A bug in gdk-pixbuf could crash applications such as Evolution when trying to display certain images (CVE-2007-0010) gtk2-devel.rpm A bug in gdk-pixbuf could crash applications such as Evolution when trying to display certain images (CVE-2007-0010) libsoup.rpm This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) libsoup-devel.rpm This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) libsoup-64bit.rpm This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) libsoup-devel-64bit.rpm This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) libgtop.rpm This update fixes a buffer overflow in libgtop's glibtop_get_proc_map_s() function. (CVE-2007-0235) libgtop-devel.rpm This update fixes a buffer overflow in libgtop's glibtop_get_proc_map_s() function. (CVE-2007-0235) libgtop-64bit.rpm This update fixes a buffer overflow in libgtop's glibtop_get_proc_map_s() function. (CVE-2007-0235) kchmviewer.rpm This update of kchmviewer fixes a vulnerability that allowed the execution of arbitrary code. hal-devel.rpm This package fix problems with several memory leaks in the libhal and libhal-storage library (b.n.c #187108, #185032), fix problems with mount options which contails a '-' as e.g. 'iocharset=iso8859-1', allow fmask and dmask as options for vfat and fix the luks script. Also fixed some smaller problems in the rc-script. hal-64bit.rpm This package fix problems with several memory leaks in the libhal and libhal-storage library (b.n.c #187108, #185032), fix problems with mount options which contails a '-' as e.g. 'iocharset=iso8859-1', allow fmask and dmask as options for vfat and fix the luks script. Also fixed some smaller problems in the rc-script. hal.rpm This package fix problems with several memory leaks in the libhal and libhal-storage library (b.n.c #187108, #185032), fix problems with mount options which contails a '-' as e.g. 'iocharset=iso8859-1', allow fmask and dmask as options for vfat and fix the luks script. Also fixed some smaller problems in the rc-script. dhcp-server.rpm A bug was fixed were a LDAP server with malicious data providing information to the DHCP server could crash and potentially execute code as the DHCP server. kdenetwork3-InstantMessenger.rpm Groupwise Messenger SP2 introduces the use of keepalives to conserve server resources. This requires a client update to enable the sending of keepalives. capi4hylafax.rpm By using shell meta characters in the sender number remote attackers could execute arbitrary commands (CVE-2006-3126). banshee.rpm Allows queueing of files if banshee is already running. Prevents a crash when removing queued files. Prevents a crash if there is no cd burner device. banshee-plugins-default.rpm Allows queueing of files if banshee is already running. Prevents a crash when removing queued files. Prevents a crash if there is no cd burner device. banshee-engine-gst.rpm Allows queueing of files if banshee is already running. Prevents a crash when removing queued files. Prevents a crash if there is no cd burner device. banshee-engine-helix.rpm Allows queueing of files if banshee is already running. Prevents a crash when removing queued files. Prevents a crash if there is no cd burner device. ksh.rpm The KSH builtin uname can have a segmentation fault with option -p. Do not trim backslash part of a multibyte character away. No segmentation fault if ksh uses shared command libray. Fix segmentation fault in vi command line mode. Make -i and -p option of uname builtin work. rubygems.rpm This update fixes a vulnerability in rubygems that allowed to overwrite files with root privileges. (CVE-2007-0469) python-wbem.rpm This update switches the usage from python's SSL class to python-openssl. The original python class does not verify the SSL certificates which makes python-wbem vulnerable to a man-in-the-middle attack. syslog-ng.rpm This update provides fixes for following issues: - Bug #250562: Fixed to set signal handlers before the config and thus the log destinations are initialized to avoid the creation of zombie processes when a program (e.g. destination) fails to execute, e.g. because apparmor profile prohibits it. - Bug #240676: Implemented checks to detect recursive filter definitions. gpg.rpm When printing a text stream with a GPG signature it was possible for an attacker to create a stream with "unsigned text, signed text" where both unsigned and signed text would be shown without distinction which one was signed and which part wasn't. This is tracked by the Mitre CVE ID CVE-2007-1263. The update introduces a new option --allow-multiple-messages to print out such messages in the future, by default it only prints and handles the first one. unrar.rpm This update fixes a stack-absed buffer overflow in unrar that can be exploited with user-assistence by sending a password-protected archive. (CVE-2007-0855) libwpd-tools.rpm CVE-2007-0002: Various problems were fixed in the Wordperfect converter library libwpd in OpenOffice_org which could be used by remote attackers to potentially execute code or crash OpenOffice_org. libwpd-devel.rpm CVE-2007-0002: Various problems were fixed in the Wordperfect converter library libwpd in OpenOffice_org which could be used by remote attackers to potentially execute code or crash OpenOffice_org. libwpd.rpm CVE-2007-0002: Various problems were fixed in the Wordperfect converter library libwpd in OpenOffice_org which could be used by remote attackers to potentially execute code or crash OpenOffice_org. gwenview.rpm This Update fixes a crash during scaling overly large images. qt.rpm qt wrongly accepts overly long UTF-8 sequences due to a bug in the UTF-8 decoder. This may lead to security problems unter certain circumstances. The bug for example allows for script tag injection in konqueror (CVE-2007-0242). qt-devel.rpm qt wrongly accepts overly long UTF-8 sequences due to a bug in the UTF-8 decoder. This may lead to security problems unter certain circumstances. The bug for example allows for script tag injection in konqueror (CVE-2007-0242). qt-devel-64bit.rpm qt wrongly accepts overly long UTF-8 sequences due to a bug in the UTF-8 decoder. This may lead to security problems unter certain circumstances. The bug for example allows for script tag injection in konqueror (CVE-2007-0242). qt-64bit.rpm qt wrongly accepts overly long UTF-8 sequences due to a bug in the UTF-8 decoder. This may lead to security problems unter certain circumstances. The bug for example allows for script tag injection in konqueror (CVE-2007-0242). xmms-lib-64bit.rpm Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files (CVE-2007-0653,CVE-2007-0654). xmms-lib.rpm Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files (CVE-2007-0653,CVE-2007-0654). xmms.rpm Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files (CVE-2007-0653,CVE-2007-0654). xmms-devel.rpm Two integer overflows when processing BMP skin images potentially allows attackers to execute arbitrary code via specially crafted files (CVE-2007-0653,CVE-2007-0654). spamassassin.rpm This upgrade brings spamassassin to version 3.1.8 with following changes: * fix for CVE-2007-0451: possible DoS due to incredibly long URIs found in the message content. * disable perl module usage in update channels unless --allowplugins is specified * files with names starting/ending in whitespace weren't usable * remove Text::Wrap related code due to upstream issues * update spamassassin and sa-learn to better deal with STDIN * improvements and bug fixes related to DomainKeys and DKIM support * several updates for Received header parsing * several documentation updates and random taint-variable related issues This update also adds some missing dependencies. perl-spamassassin.rpm This upgrade brings spamassassin to version 3.1.8 with following changes: * fix for CVE-2007-0451: possible DoS due to incredibly long URIs found in the message content. * disable perl module usage in update channels unless --allowplugins is specified * files with names starting/ending in whitespace weren't usable * remove Text::Wrap related code due to upstream issues * update spamassassin and sa-learn to better deal with STDIN * improvements and bug fixes related to DomainKeys and DKIM support * several updates for Received header parsing * several documentation updates and random taint-variable related issues This update also adds some missing dependencies. ktorrent.rpm Ktorrent insufficiently validated the target file name. A malicious Server could therefore overwrite arbitary files of the user (CVE-2007-1384,CVE-2007-1799). Another bug could be exploited to crash Ktorrent (CVE-2007-1385). cron.rpm By setting hard links to /etc/crontab users were able to prevent cron from running scheduled jobs (CVE-2007-1856). A re-emerged symlink bug allowed users to edit the crontab of other users (CVE-2005-1038). man.rpm A heap based buffer overflow in the 'man' command could potentially be exploited by users to run code as root (CVE-2006-4250). dovecot.rpm A bug in dovecot allowed users to read compressed mailboxes of other users under certain circumstances. ipsec-tools.rpm A bug in the IKE daemon "racoon" allowed remote attackers shut down established tunnels (CVE-2007-1841). inkscape.rpm Several format string problems where fixed in inkscape. CVE-2007-1463: A format string vulnerability in Inkscape allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs. CVE-2007-1464: Format string vulnerability in the whiteboard Jabber protocol in Inkscape allows user-assisted remote attackers to execute arbitrary code via unspecified vectors. rarpd.rpm rarpd was sending reply packets with increasing leading in the end to rarpd not being able to send packets at all anymore and so disabling itself. This bug has been fixed. libvisual.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. gstreamer010-plugins-base-visual-64bit.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. gstreamer010-plugins-base.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. libvisual-64bit.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. gstreamer010-plugins-base-64bit.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. liboil-64bit.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. liboil.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. gstreamer010-plugins-base-oil.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. gstreamer010-plugins-base-oil-64bit.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. gstreamer010-plugins-base-visual.rpm This update recommends additional gstreamer packages to be able to play as much as possible by GStreamer-enabled applications. stunnel.rpm To fix crashes on new connections, stunnel is now being built with thread model "pthreads" (instead of "ucontext", which turned out to be broken on x86_64). gnomemeeting.rpm This update fixes format string problems in gnomemeeting. (CVE-2007-1007) xscreensaver.rpm xscreensaver could crash under certain circumstances and so cause unlocking the screen. That could happen for example when LDAP is used for authentication and the network connection gets interrupted for a long time (CVE-2007-1859). quagga-devel.rpm Remote attackers could crash quagga via specially crafted "UPDATE" messages (CVE-2007-1995). quagga.rpm Remote attackers could crash quagga via specially crafted "UPDATE" messages (CVE-2007-1995). libjasper.rpm This update fixes two problems in libjasper that occured while parsing image files. Both bugs lead to memory corruption. libjasper-64bit.rpm This update fixes two problems in libjasper that occured while parsing image files. Both bugs lead to memory corruption. jasper.rpm This update fixes two problems in libjasper that occured while parsing image files. Both bugs lead to memory corruption. rdesktop.rpm After installing the latest security updates of X.org, rdesktop crashed with segmentation fault. freeradius-devel.rpm A memory leak in the code for handling EAP-TTLS tunnels could be exploited by attackers to crash freeradius (CVE-2007-2028). freeradius.rpm A memory leak in the code for handling EAP-TTLS tunnels could be exploited by attackers to crash freeradius (CVE-2007-2028). xfsdump.rpm The program xfs_fsr created a temporary directory with unrestricted read and write permissions. zope.rpm This update fixes a cross site scripting bug (XSS) in zope (CVE-2007-0240). otrs.rpm This update fixes a cross site scripting (XSS) vulnerability in OTRS (CVE-2007-2524). file-64bit.rpm This update fixes an integer overflow in function file_printf() of file. This bug can be used to execute arbitrary code. (CVE-2007-2799) file.rpm This update fixes an integer overflow in function file_printf() of file. This bug can be used to execute arbitrary code. (CVE-2007-2799) file-devel.rpm This update fixes an integer overflow in function file_printf() of file. This bug can be used to execute arbitrary code. (CVE-2007-2799) freetype2-devel-64bit.rpm This update of freetype2 fixes an integer signedness bug when handling TTF images. This bug can lead to a heap overflow that can be exploited to execute arbitrary code. (CVE-2007-2754) freetype2.rpm This update of freetype2 fixes an integer signedness bug when handling TTF images. This bug can lead to a heap overflow that can be exploited to execute arbitrary code. (CVE-2007-2754) freetype2-devel.rpm This update of freetype2 fixes an integer signedness bug when handling TTF images. This bug can lead to a heap overflow that can be exploited to execute arbitrary code. (CVE-2007-2754) freetype2-64bit.rpm This update of freetype2 fixes an integer signedness bug when handling TTF images. This bug can lead to a heap overflow that can be exploited to execute arbitrary code. (CVE-2007-2754) mutt.rpm This update of mutt fixes a vulnerability in the APOP implementation that allows an active attacker to guess three bytes of the password. (CVE-2007-1558) avahi-compat-mDNSResponder-devel.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-compat-mDNSResponder.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-devel.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-qt3.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-mono.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-qt4.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-glib.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-compat-howl-devel.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. avahi-compat-howl.rpm Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. gd.rpm This update fixes multiple integer overflows in the gd library. Specially crafted files could leverage them to at least crash gd based applications (CVE-2007-3472, CVE-2007-3475, CVE-2007-3476, CVE-2007-3477, CVE-2007-3478). gd-devel.rpm This update fixes multiple integer overflows in the gd library. Specially crafted files could leverage them to at least crash gd based applications (CVE-2007-3472, CVE-2007-3475, CVE-2007-3476, CVE-2007-3477, CVE-2007-3478). kvirc.rpm A bug in the IRC-URI parser allowed attackers to execute arbitrary commands by tricking a user into opening a specially crafted URI in kvirc (CVE-2007-2951). evolution-pilot.rpm Format string problems in the Memo Viewer of evolution could be used to potentially execute code when viewing shared memos. (CVE-2007-1002) evolution.rpm Format string problems in the Memo Viewer of evolution could be used to potentially execute code when viewing shared memos. (CVE-2007-1002) evolution-devel.rpm Format string problems in the Memo Viewer of evolution could be used to potentially execute code when viewing shared memos. (CVE-2007-1002) asterisk.rpm This update fixes multiple bugs in asterisk that allowed remote attackers to crash the asterisk server or even execute arbitrary code (CVE-2007-3762, CVE-2007-3763, CVE-2007-3764). bind-utils.rpm The bind nameserver generated predicatable DNS query IDs. Remote attackers could use that to perform DNS poisoning attacks (CVE-2007-2926). bind-libs-64bit.rpm The bind nameserver generated predicatable DNS query IDs. Remote attackers could use that to perform DNS poisoning attacks (CVE-2007-2926). bind.rpm The bind nameserver generated predicatable DNS query IDs. Remote attackers could use that to perform DNS poisoning attacks (CVE-2007-2926). bind-libs.rpm The bind nameserver generated predicatable DNS query IDs. Remote attackers could use that to perform DNS poisoning attacks (CVE-2007-2926). gimp-devel.rpm Multiple gimp import filters contained integer overflows. Attackers could exploit that to potentially execute code by tricking users into opening specially crafted files (CVE-2006-4519). gimp-unstable.rpm Multiple gimp import filters contained integer overflows. Attackers could exploit that to potentially execute code by tricking users into opening specially crafted files (CVE-2006-4519). gimp.rpm Multiple gimp import filters contained integer overflows. Attackers could exploit that to potentially execute code by tricking users into opening specially crafted files (CVE-2006-4519). gimp-unstable-devel.rpm Multiple gimp import filters contained integer overflows. Attackers could exploit that to potentially execute code by tricking users into opening specially crafted files (CVE-2006-4519). aaa_base.rpm Firefox (and konqueror) try to download aspx pages rather than rendering them. Bug reproduced by visting http://www.jobcentreplus.gov.uk/JCP/Customers/index.html and clicking on the search for a job link. Open file dialogue will come up with no way to render the page Bug has been discussed and a work around found in the mozilla bugzilla but as bug is to do with opensuse I have filed it here too as bug has been carried forward from Suse 10.1 to opensuse 10.2 Work around is to comment out the "application/x-aspx aspx" line in /etc/mime.types by placing a # before that line findutils-locate.rpm The cronjob that deletes old core files could be tricked to delete arbitrary files. Old core files are deleted if DELETE_OLD_CORE=yes is set. That is not the case by default though. tcpdump.rpm This update fixes a buffer overlow that could be triggered when displaying BGP packets (CVE-2007-3798). perl-Net-DNS.rpm perl-Net-DNS used sequential IDs for DNS lookups which could cause problem with some programs like spamassassin. It potentially also simplified DNS spoofing attacks against perl-Net-DNS (CVE-2007-3377). Additionally malformed compressed DNS packets could trigger an endless loop in perl-Net-DNS (CVE-2007-3409). rug.rpm The wrappers scripts for the C# program rug, zen-updater, zen-installer and zen-remover modified LD_LIBRARY_PATH and MONO_GAC_PREFIX insecurely by potentially leaving a empty path in it (same as "."). This update fixes this problem. zen-updater.rpm The wrappers scripts for the C# program rug, zen-updater, zen-installer and zen-remover modified LD_LIBRARY_PATH and MONO_GAC_PREFIX insecurely by potentially leaving a empty path in it (same as "."). This update fixes this problem. lksctp-tools-devel.rpm The userland SCTP helper tools in the "lksctp-tools" package were not aligned with the kernel interface. They have been updated to version 1.0.6 to match them. lksctp-tools.rpm The userland SCTP helper tools in the "lksctp-tools" package were not aligned with the kernel interface. They have been updated to version 1.0.6 to match them. RealPlayer.rpm The media player RealPlayer was updated to version 10.0.9. vim.rpm This update of Vim addresses a format-string bug in "helptags". This bug can be exploited to execute code with the privileges of the user running Vim. (CVE-2007-2953) gvim.rpm This update of Vim addresses a format-string bug in "helptags". This bug can be exploited to execute code with the privileges of the user running Vim. (CVE-2007-2953) star.rpm This update fixes a directory traversal bug in star. (CVE-2007-4131) tar.rpm This update fixes a bug in function safer_name_suffix() of tar which leads to a crashing stack. Exploitability is unknown. cpio.rpm This update fixes a bug in function safer_name_suffix() of cpio which leads to a crashing stack. Exploitability is unknown. (CVE-2007-4476) pcfclock-kmp-ppc64.rpm These packages are dependend on the kernel and need to be updated with it. lirc-kmp-iseries64.rpm These packages are dependend on the kernel and need to be updated with it. zaptel-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. drbd.rpm These packages are dependend on the kernel and need to be updated with it. wlan-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. lirc-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. wlan-kmp-ppc64.rpm These packages are dependend on the kernel and need to be updated with it. openafs-kmp-iseries64.rpm These packages are dependend on the kernel and need to be updated with it. quickcam-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. pcfclock-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. cloop-kmp-iseries64.rpm These packages are dependend on the kernel and need to be updated with it. cloop-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. cloop-kmp-ppc64.rpm These packages are dependend on the kernel and need to be updated with it. drbd-kmp-default.rpm These packages are dependend on the kernel and need to be updated with it. drbd-kmp-ppc64.rpm These packages are dependend on the kernel and need to be updated with it. lirc-kmp-ppc64.rpm These packages are dependend on the kernel and need to be updated with it. openafs-kmp-ppc64.rpm These packages are dependend on the kernel and need to be updated with it. wlan-kmp-iseries64.rpm These packages are dependend on the kernel and need to be updated with it. drbd-kmp-iseries64.rpm These packages are dependend on the kernel and need to be updated with it. id3lib-devel.rpm This update fixes a bug that allows local attackers to overwrite arbitrary files. (CVE-2007-4460) id3lib-examples.rpm This update fixes a bug that allows local attackers to overwrite arbitrary files. (CVE-2007-4460) id3lib.rpm This update fixes a bug that allows local attackers to overwrite arbitrary files. (CVE-2007-4460) util-linux.rpm This update fixes a problem with fdisk where it incorrectly defaults to cylinder one when creating partitions. It also resolves a readprofile problem on ppc64. Prevents appending an addr option on each nfs remount. The mkfs tools now open with O_EXCL to avoid possible corruption. A race condition in mount -o loop is fixed. Locking of accesses to mtab is fixed to avoid mtab corruption. qt3-devel-tools-64bit.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) qt3-devel-tools.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) qt3-devel.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) qt3-64bit.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) qt3.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) qt3-static.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) qt3-devel-64bit.rpm This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137) balsa.rpm This update of balsa fixes a buffer overflow that occurs while reading data from an IMAP server. evms-gui.rpm There is a window between DOS segment manager realizes a disk has Netware partitions and the disk is assigned to Netware segment manager. In such a window, data may be written to the wrong address and thus cause corruption. Bug description: Server Hardware x86 Sles10 sp1 aha29160 scsi with two Seagate 180 gig scsi drives Pool and volume is created and mounted without issues. When pool is deactivated, or server rebooted, pool fails to activate. The following is the error in iManager when "activate" button is clicked. Error: POOL: Cannot change state for this pool. Error Number: The pool is being disabled. I/O is not allowed. This is the output from NSS screen: Activating pool "POOL"... ** Pool layout v43.02 ** Previous clean shutdown detected (consistency check OK) ** Loading system objects Sep 6, 2007 8:47:29 am NSS-4.10a-1448: zfsVol[393] Unable to read ROOTDIR from the volume "POOL_IV_", status=20206. You may be out of memory. Run Verify. Sep 6, 2007 8:47:29 am NSS-4.10a-xxxx: comnPool[2504] Pool POOL: System data error 20012(purgeLog[652]). Block 44323975(file block -44323975)(ZID 4) Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zlssLogicalVolume[4980] Error reading PoolData Block 44323974, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zfsVolumeData[216] Error reading VolumeData Block 44323971, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zlssLogicalVolume[4980] Error reading PoolData Block 44323974, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-689: comnPool[402] Could not change pool POOL to the ACTIVE state. Status=20206 zio[1820]. Use 'NSS /ErrorCode=20206' to obtain more information. I have tried to create the pool with both drives in the same pool, or with each drive in it's own pool...get the same issue. This hardware config has a very long history with SLES9/Sles10. The drives work fine when used as ext3 or reiser. evms.rpm There is a window between DOS segment manager realizes a disk has Netware partitions and the disk is assigned to Netware segment manager. In such a window, data may be written to the wrong address and thus cause corruption. Bug description: Server Hardware x86 Sles10 sp1 aha29160 scsi with two Seagate 180 gig scsi drives Pool and volume is created and mounted without issues. When pool is deactivated, or server rebooted, pool fails to activate. The following is the error in iManager when "activate" button is clicked. Error: POOL: Cannot change state for this pool. Error Number: The pool is being disabled. I/O is not allowed. This is the output from NSS screen: Activating pool "POOL"... ** Pool layout v43.02 ** Previous clean shutdown detected (consistency check OK) ** Loading system objects Sep 6, 2007 8:47:29 am NSS-4.10a-1448: zfsVol[393] Unable to read ROOTDIR from the volume "POOL_IV_", status=20206. You may be out of memory. Run Verify. Sep 6, 2007 8:47:29 am NSS-4.10a-xxxx: comnPool[2504] Pool POOL: System data error 20012(purgeLog[652]). Block 44323975(file block -44323975)(ZID 4) Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zlssLogicalVolume[4980] Error reading PoolData Block 44323974, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zfsVolumeData[216] Error reading VolumeData Block 44323971, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zlssLogicalVolume[4980] Error reading PoolData Block 44323974, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-689: comnPool[402] Could not change pool POOL to the ACTIVE state. Status=20206 zio[1820]. Use 'NSS /ErrorCode=20206' to obtain more information. I have tried to create the pool with both drives in the same pool, or with each drive in it's own pool...get the same issue. This hardware config has a very long history with SLES9/Sles10. The drives work fine when used as ext3 or reiser. evms-ha.rpm There is a window between DOS segment manager realizes a disk has Netware partitions and the disk is assigned to Netware segment manager. In such a window, data may be written to the wrong address and thus cause corruption. Bug description: Server Hardware x86 Sles10 sp1 aha29160 scsi with two Seagate 180 gig scsi drives Pool and volume is created and mounted without issues. When pool is deactivated, or server rebooted, pool fails to activate. The following is the error in iManager when "activate" button is clicked. Error: POOL: Cannot change state for this pool. Error Number: The pool is being disabled. I/O is not allowed. This is the output from NSS screen: Activating pool "POOL"... ** Pool layout v43.02 ** Previous clean shutdown detected (consistency check OK) ** Loading system objects Sep 6, 2007 8:47:29 am NSS-4.10a-1448: zfsVol[393] Unable to read ROOTDIR from the volume "POOL_IV_", status=20206. You may be out of memory. Run Verify. Sep 6, 2007 8:47:29 am NSS-4.10a-xxxx: comnPool[2504] Pool POOL: System data error 20012(purgeLog[652]). Block 44323975(file block -44323975)(ZID 4) Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zlssLogicalVolume[4980] Error reading PoolData Block 44323974, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zfsVolumeData[216] Error reading VolumeData Block 44323971, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-1449: zlssLogicalVolume[4980] Error reading PoolData Block 44323974, status=20206. Sep 6, 2007 8:47:29 am NSS-4.10a-689: comnPool[402] Could not change pool POOL to the ACTIVE state. Status=20206 zio[1820]. Use 'NSS /ErrorCode=20206' to obtain more information. I have tried to create the pool with both drives in the same pool, or with each drive in it's own pool...get the same issue. This hardware config has a very long history with SLES9/Sles10. The drives work fine when used as ext3 or reiser. tk-devel.rpm This update fixes a buffer overflow that occurs while processing interlaced/animatedGIF images. (CVE-2007-4851) This bug could be used to execute code remotely. tk-64bit.rpm This update fixes a buffer overflow that occurs while processing interlaced/animatedGIF images. (CVE-2007-4851) This bug could be used to execute code remotely. tk.rpm This update fixes a buffer overflow that occurs while processing interlaced/animatedGIF images. (CVE-2007-4851) This bug could be used to execute code remotely. xorg-x11-fonts-syriac.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-doc.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-man.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-server-glx.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-fonts-100dpi.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-sdk.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-fonts-75dpi.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-Xprt.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-fonts-cyrillic.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-driver-options.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. xorg-x11-fonts-scalable.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. lighttpd-mod_rrdtool.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_mysql_vhost.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_cml.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_webdav.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_trigger_b4_dl.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) festival.rpm The festival daemon runs as root. The default config doesn't have a password set. A local attacker could therefore connect to the daemon to have commands executed as root (CVE-2007-4074). festival-devel.rpm The festival daemon runs as root. The default config doesn't have a password set. A local attacker could therefore connect to the daemon to have commands executed as root (CVE-2007-4074). openssl-64bit.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl-doc.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl-devel.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl-devel-64bit.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). flac-devel.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). flac.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). flac-64bit.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). fetchmailconf.rpm This update fixes a remote denial-of-service attack. (CVE-2007-4565) fetchmail.rpm This update fixes a remote denial-of-service attack. (CVE-2007-4565) libgcc.rpm libgcc now provides "libgcc_s.so.1(GCC_4.2.0)" which is required by some updates. This patch contains the updated package. libgcc-64bit.rpm libgcc now provides "libgcc_s.so.1(GCC_4.2.0)" which is required by some updates. This patch contains the updated package. mono-nunit.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-extras.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. ibm-data-db2.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-sqlite.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-devel.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-jscript.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. bytefx-data-mysql.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-oracle.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-postgresql.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-web.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-winforms.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-core.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-locale-extras.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-basic.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-sybase.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-firebird.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. ImageMagick.rpm This update of ImageMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution (SLES8- and SLES9-based products are not affected) - CVE-2007-4988: integer overflows that can lead to code execution perl-PerlMagick.rpm This update of ImageMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution (SLES8- and SLES9-based products are not affected) - CVE-2007-4988: integer overflows that can lead to code execution ImageMagick-devel.rpm This update of ImageMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution (SLES8- and SLES9-based products are not affected) - CVE-2007-4988: integer overflows that can lead to code execution ImageMagick-Magick++-devel.rpm This update of ImageMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution (SLES8- and SLES9-based products are not affected) - CVE-2007-4988: integer overflows that can lead to code execution ImageMagick-Magick++.rpm This update of ImageMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution (SLES8- and SLES9-based products are not affected) - CVE-2007-4988: integer overflows that can lead to code execution t1lib-devel.rpm A buffer overflow in t1lib could potentially be exploited to execute arbitrary code via specially crafted files (CVE-2007-4033). t1lib.rpm A buffer overflow in t1lib could potentially be exploited to execute arbitrary code via specially crafted files (CVE-2007-4033). libvorbis-64bit.rpm Specially crafted OGG files could crash libvorbis or make it run into an endless loop (CVE-2007-4029, CVE-2007-4065, CVE-2007-4066). libvorbis-devel.rpm Specially crafted OGG files could crash libvorbis or make it run into an endless loop (CVE-2007-4029, CVE-2007-4065, CVE-2007-4066). libvorbis.rpm Specially crafted OGG files could crash libvorbis or make it run into an endless loop (CVE-2007-4029, CVE-2007-4065, CVE-2007-4066). pdftohtml.rpm A buffer overflow in the xpdf code contained in pdftohtml could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). libextractor-devel.rpm A buffer overflow in the xpdf code contained in libextractor could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). libextractor.rpm A buffer overflow in the xpdf code contained in libextractor could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). librpcsecgss.rpm This update fixes a security problem in the librpcsecgss library used by NFSv4 also found in krb5. A invalid packet could underflow and potentially cause memory corruption and code execution. (CVE-2007-3999) xpdf.rpm A buffer overflow in xpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). xpdf-tools.rpm A buffer overflow in xpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). liblcms-64bit.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. liblcms-devel-64bit.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. liblcms.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. liblcms-devel.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. openssh.rpm Due to backmerge of SLES10 SP1 openssh code, the GSSAPI support in openssh got lost. This patch readds this support. openssh-askpass.rpm Due to backmerge of SLES10 SP1 openssh code, the GSSAPI support in openssh got lost. This patch readds this support. koffice-illustration.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-database.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-wordprocessing.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-presentation.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-devel.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-spreadsheet.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-extra.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-qt.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-glib.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-devel.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). gpdf.rpm A buffer overflow in the xpdf code contained in gpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). yast2-core-devel.rpm This update fixes a security bug in yast2-core that allowed local attackers to provide malicious yast2 modules to yast2 that are executed with root privileges. To trigger this vulnerability root has to execute yast2 in an untrusted directory (i.e. /tmp). Thanks to Stefan Nordhausen for reporting this to us. yast2-core.rpm This update fixes a security bug in yast2-core that allowed local attackers to provide malicious yast2 modules to yast2 that are executed with root privileges. To trigger this vulnerability root has to execute yast2 in an untrusted directory (i.e. /tmp). Thanks to Stefan Nordhausen for reporting this to us. kdegraphics3-pdf.rpm A buffer overflow in the xpdf code contained in kpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-5393). apache2-doc.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-devel.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-example-pages.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-worker.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-prefork.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) perl.rpm This update fixes a buffer overflow in perl's regex engine. (CVE-2007-5116) perl-64bit.rpm This update fixes a buffer overflow in perl's regex engine. (CVE-2007-5116) ruby-examples.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-doc-html.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-devel.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-test-suite.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-doc-ri.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-tk.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. openldap2-devel-64bit.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2-devel.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2-back-perl.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2-back-meta.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). libpng-devel-64bit.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). libpng-64bit.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). libpng-devel.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). libpng.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). apache2-mod_python.rpm This update fixes a buffer overflow in apache2-mod_python that occurs while using python-based output-filter. This bug can be triggered remotely to read possibly confidential data from the process space of the web-server and in rare cases to execute arbitrary code. (CVE-2004-2680) nagios-plugins-extras.rpm fix possible buffer overflow during HTTP Location header parsing in check_http (CVE-2007-5198) fix possible buffer overflow during snmpget parsing in check_snmp (CVE-2007-5623) nagios-plugins.rpm fix possible buffer overflow during HTTP Location header parsing in check_http (CVE-2007-5198) fix possible buffer overflow during snmpget parsing in check_snmp (CVE-2007-5623) pcre-devel.rpm Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2006-7230). pcre-64bit.rpm Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2006-7230). pcre.rpm Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2006-7230). emacs-nox.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs-info.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs-x11.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs-el.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. MozillaFirefox-translations.rpm This update brings Mozilla Firefox to security update version 2.0.0.10 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. MozillaFirefox.rpm This update brings Mozilla Firefox to security update version 2.0.0.10 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. net-snmp.rpm This update of net-snmp fixes the following bug: - default and configurable maximum number of varbinds returnable to a GETBULK request (CVE-2007-5846) - crash when smux peers were configured with empty passwords perl-SNMP.rpm This update of net-snmp fixes the following bug: - default and configurable maximum number of varbinds returnable to a GETBULK request (CVE-2007-5846) - crash when smux peers were configured with empty passwords net-snmp-devel-64bit.rpm This update of net-snmp fixes the following bug: - default and configurable maximum number of varbinds returnable to a GETBULK request (CVE-2007-5846) - crash when smux peers were configured with empty passwords net-snmp-devel.rpm This update of net-snmp fixes the following bug: - default and configurable maximum number of varbinds returnable to a GETBULK request (CVE-2007-5846) - crash when smux peers were configured with empty passwords net-snmp-64bit.rpm This update of net-snmp fixes the following bug: - default and configurable maximum number of varbinds returnable to a GETBULK request (CVE-2007-5846) - crash when smux peers were configured with empty passwords htdig.rpm A flaw in the htsearch Program could be exploited by attackers to conduct cross site scripting (XSS) attacks. e2fsprogs.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libcom_err.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libcom_err-64bit.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) e2fsprogs-64bit.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) e2fsprogs-devel-64bit.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) e2fsprogs-devel.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) dmapi-devel.rpm dmapi: provide dmapi via update repository to solve new samba dependency dmapi.rpm dmapi: provide dmapi via update repository to solve new samba dependency libsmbclient-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-client-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libsmbclient.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-pdb.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libsmbclient-devel.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) cifs-mount.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) ldapsmb.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-winbind.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-winbind-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-python.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libmsrpc-devel.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libmsrpc.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-client.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-vscan.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) OpenOffice_org-sv.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-ca.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-zh-CN.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-pl.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-el.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-gnome.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-ko.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-hi-IN.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-et.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-cs.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-zu.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-da.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-pt.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-bg.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-mono.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-ru.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-it.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-galleries.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-xh.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-cy.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-sr-CS.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-km.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-lt.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-nb.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-rw.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-sk.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-be-BY.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-nn.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-af.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-fi.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-hr.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-zh-TW.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-fr.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-ja.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-st.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-sl.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-pt-BR.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-tr.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-hu.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-officebean.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-es.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-en-GB.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-mk.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-vi.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-de.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-kde.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-nl.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-ts.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-pa-IN.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-gu-IN.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-ar.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) libnetpbm.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) netpbm.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) libnetpbm-64bit.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) seamonkey-spellchecker.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. seamonkey-calendar.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. seamonkey-venkman.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. seamonkey-mail.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. seamonkey-irc.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. seamonkey-dom-inspector.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. seamonkey.rpm This update fixed various security problems in Mozilla Seamonkey. Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. timezone.rpm This update updates timezone database according to last-minute change of time shift date by Venezuelan government from 2008-01-01 to 2007-12-09. Venezulea will move from UTC-4:00 to UTC-4:30. America/Caracas * Other timezones have been updated as well: Asia/Damascus (time change in effect since start of November) America/Havana (dtto) America/St_Barthelemy, America/Marigot (new) kdepim3.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. kdepim3-networkstatus.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. kdepim3-mobile.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. kdepim3-devel.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. kdepim3-sync.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. kdepim3-time-management.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. kdepim3-kpilot.rpm This update fixes a crash in GroupWise I/Os slave which is used by korganizer to retrive the calendar. clamav-db.rpm This version upgrade to 0.92 fixes numerous flaws including some security problems (CVE-2007-6335, CVE-2007-6336, CVE-2007-6337). Please note that the version number of the clamav library has changed. Programs linked against libclamav therefore need to be updated as well. clamav.rpm This version upgrade to 0.92 fixes numerous flaws including some security problems (CVE-2007-6335, CVE-2007-6336, CVE-2007-6337). Please note that the version number of the clamav library has changed. Programs linked against libclamav therefore need to be updated as well. php5-exif.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-soap.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-sysvmsg.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-ftp.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-dba.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-imap.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-fastcgi.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-ctype.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-mhash.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-mcrypt.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-xmlrpc.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-ldap.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pcntl.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-sqlite.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-devel.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-sysvsem.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-shmop.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-snmp.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-xmlwriter.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-posix.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-odbc.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pspell.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-mysqli.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-mbstring.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-bz2.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-openssl.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-wddx.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-dom.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-dbase.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-tidy.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-filepro.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-mysql.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-sysvshm.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-gettext.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pdo_mysql.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-gmp.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pdo.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-tokenizer.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-gd.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-ncurses.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-zlib.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pgsql.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-bcmath.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-xmlreader.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pear.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pdo_pgsql.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-calendar.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-xsl.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-pdo_sqlite.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-sockets.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-curl.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated php5-iconv.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated apache2-mod_php5.rpm This update fixes multiple bugs in php: - use system pcre library to fix several pcre vulnerabilities (CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227 CVE-2005-4872, CVE-2006-7228) - Flaws in processing multi byte sequences in htmlentities/htmlspecialchars (CVE-2007-5898) - overly long arguments to the dl() function could crash php (CVE-2007-4825) - overy long arguments to the glob() function could crash php (CVE-2007-4782) - overly long arguments to some iconv functions could crash php (CVE-2007-4840) - overy long arguments to the setlocale() function could crash php (CVE-2007-4784) - the wordwrap-Function could cause a floating point exception (CVE-2007-3998) - overy long arguments to the fnmatch() function could crash php (CVE-2007-4782) - incorrect size calculation in the chunk_split function could lead to a buffer overflow (CVE-2007-4661) - Flaws in the GD extension could lead to integer overflows (CVE-2007-3996) - The money_format function contained format string flaws (CVE-2007-4658) - Data for some time zones has been updated nmap.rpm nmap contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code. This update makes nmap use the system's pcre library which was already updated to fix the above mentioned problems. Make sure to also install the pcre update. nmap-gtk.rpm nmap contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code. This update makes nmap use the system's pcre library which was already updated to fix the above mentioned problems. Make sure to also install the pcre update. rsync.rpm This update fixes a bug in rsync that allowed remote attackers to access restricted files outside a module's hierarchy if no chroot setup was used. (CVE-2007-6199) Please read http://rsync.samba.org/security.html entry from November 28th, 2007 to get more information about a secure configuration of rsync that also covers the bug tracked with CVE-2007-6200. This update also fixes some crashes that only affect rsync-2.6.8 on SLES10. squid.rpm This update of squid fixes a denial-of-service bug during cache update reply processing. (CVE-2007-6239) libsndfile-progs.rpm This update fixes a possible buffer overflow that occurs while reading decoded PCM data from the FLAC library. (CVE-2007-4974) libsndfile-devel.rpm This update fixes a possible buffer overflow that occurs while reading decoded PCM data from the FLAC library. (CVE-2007-4974) libsndfile-64bit.rpm This update fixes a possible buffer overflow that occurs while reading decoded PCM data from the FLAC library. (CVE-2007-4974) libsndfile.rpm This update fixes a possible buffer overflow that occurs while reading decoded PCM data from the FLAC library. (CVE-2007-4974) libsndfile-octave.rpm This update fixes a possible buffer overflow that occurs while reading decoded PCM data from the FLAC library. (CVE-2007-4974) sylpheed-claws.rpm The new clamav provides a new libclamav major version, this update contains just a rebuild of sylpheed-claws against this new major version. opera.rpm Opera released version 9.25 of their browser to fix various security problems. CVE-2007-6520: Fixed an issue where plug-ins could be used to allow cross domain scripting, as reported by David Bloom. Details will be disclosed at a later date. CVE-2007-6521: Fixed an issue with TLS certificates that could be used to execute arbitrary code, as reported by Alexander Klink (Cynops GmbH). Details will be disclosed at a later date. CVE-2007-6522: Rich text editing can no longer be used to allow cross domain scripting, as reported by David Bloom. See our advisory. CVE-2007-6523: Fixed a problem where malformed BMP files could cause Opera to temporarily freeze. CVE-2007-6524: Prevented bitmaps from revealing random data from memory, as reported by Gynvael Coldwind. Details will be disclosed at a later date. te_dvilj.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_cont.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_omega.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). tetex.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_kpath.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_ptex.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_mpost.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_web.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_eplai.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_ams.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_latex.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). te_nfs.rpm Buffer overflows in dvips and dviljk could be triggered by specially crafted dvi files (CVE-2007-5935, CVE-2007-5937). dvips additionally created temporary files in an insecure manner (CVE-2007-5936). MozillaThunderbird-translations.rpm This update brings Mozilla Thunderbird to security update version 1.5.0.14 Following security problems were fixed: - MFSA 2007-29: Crashes with evidence of memory corruption As part of the Firefox 2.0.0.8 update releases Mozilla developers fixed many bugs to improve the stability of the product. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. - CVE-2007-5339 Browser crashes - CVE-2007-5340 JavaScript engine crashes MozillaThunderbird.rpm This update brings Mozilla Thunderbird to security update version 1.5.0.14 Following security problems were fixed: - MFSA 2007-29: Crashes with evidence of memory corruption As part of the Firefox 2.0.0.8 update releases Mozilla developers fixed many bugs to improve the stability of the product. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. - CVE-2007-5339 Browser crashes - CVE-2007-5340 JavaScript engine crashes cups-client.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups-devel.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups-libs.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups-libs-64bit.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. openafs.rpm This update fixes a remote denial of service (crash) against the openafs server. (CVE-2007-6599) openafs-client.rpm This update fixes a remote denial of service (crash) against the openafs server. (CVE-2007-6599) openafs-server.rpm This update fixes a remote denial of service (crash) against the openafs server. (CVE-2007-6599) openafs-devel.rpm This update fixes a remote denial of service (crash) against the openafs server. (CVE-2007-6599) libexif-64bit.rpm Two bugs in libexif were identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6351: Loading EXIF data could be used to cause a infinite recursion and crash CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. libexif.rpm Two bugs in libexif were identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6351: Loading EXIF data could be used to cause a infinite recursion and crash CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. libexif5.rpm One bug in libexif5 was identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. krb5-client.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-64bit.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-devel-64bit.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-apps-servers.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-server.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-apps-clients.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-devel.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) xorg-x11-libs.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. xorg-x11-devel.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. xorg-x11-libs-64bit.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. xorg-x11-devel-64bit.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. kdelibs3.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-arts-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-doc.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-devel.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-arts.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-devel.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-ksysguardd.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-session.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. fileshareset.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-extra.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-kdm.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-samba.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-nsplugin.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. gtk-qt-engine.rpm The gtk-qt-engine had bugs and needed to be updated for the newest flash-player release. gtk-qt-engine-64bit.rpm The gtk-qt-engine had bugs and needed to be updated for the newest flash-player release. ethereal-devel.rpm This update fixes several security bugs in ethereal that can be used to crash the application and to possibly execute arbitrary code remotely. ethereal.rpm This update fixes several security bugs in ethereal that can be used to crash the application and to possibly execute arbitrary code remotely. libxml2-devel-64bit.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2-64bit.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2-devel.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2-python.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. xine-lib.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). Additionally a security update of xorg-x11 revealed a bug in xine-ui. The xine user interface didn't display properly due to that. xine-extra.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). Additionally a security update of xorg-x11 revealed a bug in xine-ui. The xine user interface didn't display properly due to that. xine-lib-64bit.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). Additionally a security update of xorg-x11 revealed a bug in xine-ui. The xine user interface didn't display properly due to that. xine-ui.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). Additionally a security update of xorg-x11 revealed a bug in xine-ui. The xine user interface didn't display properly due to that. xine-devel.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). Additionally a security update of xorg-x11 revealed a bug in xine-ui. The xine user interface didn't display properly due to that. libxfcegui4.rpm A possible double-free bug has been fixed, in case the application free's the passed data arguments. xorg-x11-Xnest.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xorg-x11-Xvfb.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xorg-x11-server.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xorg-x11-Xvnc.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. NX.rpm This update fixes various Xserver security issues that are also present in NX: XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. kernel-syms.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). kernel-source.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). mkinitrd.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). kernel-ppc64.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). kernel-kdump.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). kernel-iseries64.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). kernel-default.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). multipath-tools.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). open-iscsi.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). udev.rpm This kernel update fixes the following security problems: CVE-2008-0007: Insufficient range checks in certain fault handlers could be used by local attackers to potentially read or write kernel memory. CVE-2008-0001: Incorrect access mode checks could be used by local attackers to corrupt directory contents and so cause denial of service attacks or potentially execute code. CVE-2007-5966: Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances, which might allow local users to read sensitive kernel data or cause a denial of service (crash). Furthermore, this kernel catches up to the SLE 10 state of the kernel, with massive additional fixes. All platforms: - patches.suse/bootsplash: Bootsplash for current kernel (none). patch the patch for Bug number 345980. - patches.fixes/megaraid-fixup-driver-version: Megaraid driver version out of sync (299740). - OCFS2: Updated to version 1.2.8 - patches.fixes/ocfs2-1.2-svn-r3070.diff: [PATCH] ocfs2: Remove overzealous BUG_ON(). - patches.fixes/ocfs2-1.2-svn-r3072.diff: [PATCH] ocfs2: fix rename vs unlink race. - patches.fixes/ocfs2-1.2-svn-r3074.diff: [PATCH] ocfs2: Remove expensive local alloc bitmap scan code. - patches.fixes/ocfs2-1.2-svn-r3057.diff: [PATCH] ocfs2: Check for cluster locking in ocfs2_readpage. - patches.fixes/ocfs2-1.2-svn-r2975.diff: ocfs2_dlm: make functions static. - patches.fixes/ocfs2-1.2-svn-r2976.diff: [PATCH] ocfs2_dlm: make tot_backoff more descriptive. - patches.fixes/ocfs2-1.2-svn-r3002.diff: [PATCH] ocfs2: Remove the printing of harmless ERRORS like ECONNRESET, EPIPE.. - patches.fixes/ocfs2-1.2-svn-r3004.diff: [PATCH] ocfs2_dlm: Call cond_resched_lock() once per hash bucket scan. - patches.fixes/ocfs2-1.2-svn-r3006.diff: [PATCH] ocfs2_dlm: Silence compiler warnings. - patches.fixes/ocfs2-1.2-svn-r3062.diff: [PATCH] ocfs2_dlm: Fix double increment of migrated lockres' owner count. - patches.fixes/hugetlb-get_user_pages-corruption.patch: hugetlb: follow_hugetlb_page() for write access (345239). - enable patches.fixes/reiserfs-fault-in-pages.patch (333412) - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids. Get the module to build... - patches.drivers/usb-add-usb_device_and_interface_info.patch: USB: add USB_DEVICE_AND_INTERFACE_INFO(). This is needed to get the HUAWEI devices to work properly, and to get patches.drivers/usb-update-evdo-driver-ids.patch to build without errors. - patches.drivers/usb-update-evdo-driver-ids.patch: USB: update evdo driver ids on request from our IT department (345438). - patches.suse/kdump-dump_after_notifier.patch: Add dump_after_notifier sysctl (265764). - patches.drivers/libata-sata_nv-disable-ADMA: sata_nv: disable ADMA by default (346508). - patches.fixes/cpufreq-fix-ondemand-deadlock.patch: Cpufreq fix ondemand deadlock (337439). - patches.fixes/eliminate-cpufreq_userspace-scaling_setspeed-deadlock.patch: Eliminate cpufreq_userspace scaling_setspeed deadlock (337439). - patches.xen/15181-dma-tracking.patch: Fix issue preventing Xen KMPs from building. - patches.drivers/r8169-perform-a-PHY-reset-before.patch: r8169: perform a PHY reset before any other operation at boot time (345658). - patches.drivers/r8169-more-alignment-for-the-0x8168: refresh. - patches.fixes/lockd-grant-shutdown: Stop GRANT callback from crashing if NFS server has been stopped. (292478). There was a problem with this patch which would cause apparently random crashes when lockd was in use. The offending change has been removed. - patches.fixes/usb_336850.diff: fix missing quirk leading to a device disconnecting under load (336850). - patches.fixes/cifs-incomplete-recv.patch: fix incorrect session reconnects (279783). - patches.fixes/megaraid_mbox-dell-cerc-support: Fix so that it applies properly. I extended the context to 6 lines to help patch find where to apply the patch (267134). - patches.fixes/md-idle-test: md: improve the is_mddev_idle test fix (326591). AMD64/Intel EM64T (x86_64) specific: - patches.arch/x86_64-mce-loop: x86_64: fix misplaced `continue' in mce.c (344239). SDL_image-devel.rpm Specially crafted GIF files could crash the SDL_image library (CVE-2006-4484). SDL_image.rpm Specially crafted GIF files could crash the SDL_image library (CVE-2006-4484). python-idle.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-devel.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-64bit.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-gdbm.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-demo.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-tk.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-xml.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-curses.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). mysql-shared-64bit.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-devel.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-shared.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-client.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-bench.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-Max.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 nss_ldap.rpm nss_ldap returned incorrect data under certain circumstances to the calling process. Some applications could therefore work with wrong user data (CVE-2007-5794). nss_ldap-64bit.rpm nss_ldap returned incorrect data under certain circumstances to the calling process. Some applications could therefore work with wrong user data (CVE-2007-5794). postgresql.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-docs.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-pl.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-libs.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-contrib.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-server.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-devel.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-libs-64bit.rpm This version update to 8.1.11 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 cairo-64bit.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo-devel.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo-doc.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) evolution-data-server-devel.rpm Updates the timezone information for Argentina. evolution-data-server.rpm Updates the timezone information for Argentina. evolution-data-server-64bit.rpm Updates the timezone information for Argentina.