evince-lang.rpm Fixes zooming of PDF documents in evince. evince.rpm Fixes zooming of PDF documents in evince. evince-doc.rpm Fixes zooming of PDF documents in evince. jfbterm.rpm The default configuration of jfbterm still used the font paths /usr/X11R6/lib/X11/fonts. But the fonts have been moved to /usr/share/fonts. This patch corrects this in the default configuration. cpio.rpm This patch fixes segmentation fault of cpio when doing some copy-in operations. wvdial.rpm This patch changes the logging functions in wvdial so that log rotation gets disabled when the log file is set to /dev/null so that /dev/null does not get overwritten. fvwm2-gtk.rpm This patch fixes segmentation fault in Fvwm modules initialization on dual core and brings also new functionality. fvwm2.rpm This patch fixes segmentation fault in Fvwm modules initialization on dual core and brings also new functionality. ksh.rpm Update to last bugfix version and fix of an overflow. ksh-devel.rpm Update to last bugfix version and fix of an overflow. nautilus-gnome-main-menu.rpm Identifies misplaced system item .desktop files and replaces them appropriately. gnome-main-menu-lang.rpm Identifies misplaced system item .desktop files and replaces them appropriately. gnome-main-menu-devel.rpm Identifies misplaced system item .desktop files and replaces them appropriately. gnome-main-menu.rpm Identifies misplaced system item .desktop files and replaces them appropriately. yauap.rpm This patch includes fixes to increase the stability of Amarok when playing music and improves the collaboration with the GStreamer/Yauap engine. amarok-lang.rpm This patch includes fixes to increase the stability of Amarok when playing music and improves the collaboration with the GStreamer/Yauap engine. tk-devel.rpm This update fixes a buffer overflow that occurs while processing interlaced/animatedGIF images. (CVE-2007-4851) This bug could be used to execute code remotely. tk-64bit.rpm This update fixes a buffer overflow that occurs while processing interlaced/animatedGIF images. (CVE-2007-4851) This bug could be used to execute code remotely. tk.rpm This update fixes a buffer overflow that occurs while processing interlaced/animatedGIF images. (CVE-2007-4851) This bug could be used to execute code remotely. opensuse-updater-gnome.rpm Fixing security bug in the installation mechanism of updater-gnome and several other fixes. updater-gnome UI doesn't hang at some occasions anymore. xorg-x11-doc.rpm This update fixes the following issues: X Font Server build_range() Integer Overflow Vulnerability [IDEF2708], X Font Server swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite extension buffer overflow. lighttpd-mod_rrdtool.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_mysql_vhost.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_cml.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_webdav.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_trigger_b4_dl.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) lighttpd-mod_magnet.rpm This update fixes a buffer overflow in the fcgi_env_add() function. Under some circumstances this bug allows remote code execution. (CVE-2007-4727) zypper.rpm This patch fixes the following problems: - automatic online update broken due to missing '-y' zypper command-line option. (bug #331632) - misalignment in localized tables (#328918). - correctly translate the command list in help text (#327487) - don't check if to refresh cd/dvd repos even on user request unless forced - man page corrections - translations update i4l-base.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. i4l-isdnlog.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. capi4linux.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. capi4linux-devel.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. ant-phone.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. capi4linux-64bit.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. i4l-vbox.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. i4lfirm.rpm This update correct the ifup-isdn script to handle ISDN syncppp connections properly. Without the update you cannot use ISDN syncppp. smartmontools.rpm This patch fixes possible crashes on ATA discs behind Highpoint RAID controller. libgnomeui-doc.rpm Fixes https://bugzilla.novell.com/show_bug.cgi?id=330187 - CD-ROMs would not appear in the file chooser. Now it follows the same policy as Nautilus. libgnomeui.rpm Fixes https://bugzilla.novell.com/show_bug.cgi?id=330187 - CD-ROMs would not appear in the file chooser. Now it follows the same policy as Nautilus. libgnomeui-devel.rpm Fixes https://bugzilla.novell.com/show_bug.cgi?id=330187 - CD-ROMs would not appear in the file chooser. Now it follows the same policy as Nautilus. libgnomeui-64bit.rpm Fixes https://bugzilla.novell.com/show_bug.cgi?id=330187 - CD-ROMs would not appear in the file chooser. Now it follows the same policy as Nautilus. hplip-hpijs.rpm The deamon 'hpssd' could be exploited by users to execute arbitrary commands as root. hpssd only runs on systems that have HP all-in-one devices configured. In the default configuration the problem is not remotely exploitable as hpssd only listens on local interfaces (CVE-2007-5208). hplip.rpm The deamon 'hpssd' could be exploited by users to execute arbitrary commands as root. hpssd only runs on systems that have HP all-in-one devices configured. In the default configuration the problem is not remotely exploitable as hpssd only listens on local interfaces (CVE-2007-5208). util-linux.rpm Insufficient length checks when reading the passphrase for encrypted paritions in the mount program could cause a buffer overflow that could potentially be exploited to gain root privileges. When executing helper program 'mount' didn't check the return value of setuid(). Therefore helper program could potenially run as root (CVE-2007-5191). libsoup.rpm Fixes the ntlm authentication issue. libsoup-devel.rpm Fixes the ntlm authentication issue. libsoup-64bit.rpm Fixes the ntlm authentication issue. libsoup-doc.rpm Fixes the ntlm authentication issue. libsoup-devel-64bit.rpm Fixes the ntlm authentication issue. pam-config.rpm It may happen that pam-config run in an endless loop. This update fixes this problem. opal.rpm A bug in the SIP protocol handler could be exploited by attackers to crash applications using opal (CVE-2007-4924). opal-devel.rpm A bug in the SIP protocol handler could be exploited by attackers to crash applications using opal (CVE-2007-4924). libgnomecups.rpm The fix silences IPP warnings that come from failed CUPS_GET_DEFAULT ipp requests since having a default printer is not mandatory. libgnomecups-devel.rpm The fix silences IPP warnings that come from failed CUPS_GET_DEFAULT ipp requests since having a default printer is not mandatory. libgnomecups-64bit.rpm The fix silences IPP warnings that come from failed CUPS_GET_DEFAULT ipp requests since having a default printer is not mandatory. libopenssl-devel.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl-doc.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). openssl-certs.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). libopenssl0_9_8.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). libopenssl0_9_8-64bit.rpm A buffer overflow in the DTLS implementation of openssl could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4995). libFLAC++6-64bit.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). flac-devel.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). libFLAC++6.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). flac.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). libFLAC8.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). libFLAC8-64bit.rpm Multiple integer overflows in flac could potentially be exploited by attackers via specially crafted files to execute code in the context of the user opening the file (CVE-2007-4619). scim-bridge.rpm When using scim-bridge on KDE, the X11 frontend of scim was sometimes not started automatically which made CJK input impossible in applications using scim-bridge via XIM, for example OpenOffice. This patch fixes the problem. scim-bridge-qt.rpm When using scim-bridge on KDE, the X11 frontend of scim was sometimes not started automatically which made CJK input impossible in applications using scim-bridge via XIM, for example OpenOffice. This patch fixes the problem. scim-bridge-gtk-64bit.rpm When using scim-bridge on KDE, the X11 frontend of scim was sometimes not started automatically which made CJK input impossible in applications using scim-bridge via XIM, for example OpenOffice. This patch fixes the problem. scim-bridge-gtk.rpm When using scim-bridge on KDE, the X11 frontend of scim was sometimes not started automatically which made CJK input impossible in applications using scim-bridge via XIM, for example OpenOffice. This patch fixes the problem. scim-bridge-qt-64bit.rpm When using scim-bridge on KDE, the X11 frontend of scim was sometimes not started automatically which made CJK input impossible in applications using scim-bridge via XIM, for example OpenOffice. This patch fixes the problem. fetchmailconf.rpm This update fixes a remote denial-of-service attack. (CVE-2007-4565) fetchmail.rpm This update fixes a remote denial-of-service attack. (CVE-2007-4565) libcurl4-64bit.rpm This update fixes a crash in the libcurl library that occured when an HTTP URL redirected to an FTP URL. Since libcurl is used by the libzypp library, this bug also affected the package management stack. libcurl4.rpm This update fixes a crash in the libcurl library that occured when an HTTP URL redirected to an FTP URL. Since libcurl is used by the libzypp library, this bug also affected the package management stack. splashy-themes.rpm The setup-splashy.sh script which generates the needed bits for the initrd aborted if either /etc/suspend or /usr/sbin/resume were not present. So in case the suspend package is not installed, this would cause the initrd build process to fail and prevents a proper initrd creation. This packages fixes this. splashy.rpm The setup-splashy.sh script which generates the needed bits for the initrd aborted if either /etc/suspend or /usr/sbin/resume were not present. So in case the suspend package is not installed, this would cause the initrd build process to fail and prevents a proper initrd creation. This packages fixes this. splashy-devel.rpm The setup-splashy.sh script which generates the needed bits for the initrd aborted if either /etc/suspend or /usr/sbin/resume were not present. So in case the suspend package is not installed, this would cause the initrd build process to fail and prevents a proper initrd creation. This packages fixes this. autofs.rpm A problem with images mounted via autofs as a loop device is fixed. A missing dependency in the autofs init script resulted in a hanging shutdown process when the nfs service has not been enabled. glibc-locale-64bit.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-locale.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-profile-64bit.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-64bit.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-profile.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-info.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-devel.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-html.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-obsolete.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-devel-64bit.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. nscd.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. glibc-i18ndata.rpm An error in the implementation of the bcopy(3) function could lead to segfaults or other errors in programs using that function. Not very many programs should be affected as it is obsolete. yast2-gtk.rpm This patch contains fixes to the package selector used during software installation in YaST. Specifically, search and sort times are i mproved, already installed software is not shown in the available software unless an update is available, and pattern installs now incl ude the proper list of packages in the pattern. mono-nunit.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-extras.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. ibm-data-db2.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-sqlite.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-devel.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-complete.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-jscript.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. bytefx-data-mysql.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-oracle.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-postgresql.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-web.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-winforms.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-core.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-locale-extras.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-sybase.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. mono-data-firebird.rpm This update fixes a buffer overflow in Mono's BigInteger implementation. GraphicsMagick.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution perl-GraphicsMagick.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution GraphicsMagick-devel.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution libGraphicsMagick1.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution libGraphicsMagick++1.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution libGraphicsMagick++-devel.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution libGraphicsMagickWand0.rpm This update of GraphicsMagick fixes several vulnerabilities. - CVE-2007-4985: infinite loop while parsing images - CVE-2007-4986: integer overflows that can lead to code execution - CVE-2007-4987: one-byte buffer overflow that can lead to code execution - CVE-2007-4988: integer overflows that can lead to code execution t1lib-devel.rpm A buffer overflow in t1lib could potentially be exploited to execute arbitrary code via specially crafted files (CVE-2007-4033). t1lib.rpm A buffer overflow in t1lib could potentially be exploited to execute arbitrary code via specially crafted files (CVE-2007-4033). procinfo.rpm Through a changed number of interrupts and the new PCI-MSI interrupts lines the procinfo can show a segmentation fault. libgnomesu-devel.rpm Adds polish translations to libgnomesu libgnomesu.rpm Adds polish translations to libgnomesu libgnomesu-lang.rpm Adds polish translations to libgnomesu gnome-power-manager.rpm Solves an issue where built in brightness keys would not work properly gnome-power-manager-lang.rpm Solves an issue where built in brightness keys would not work properly hugin.rpm This update of hugin improve handling of temporary files. librpcsecgss.rpm This update fixes a security problem in the librpcsecgss library used by NFSv4 also found in krb5. A invalid packet could underflow and potentially cause memory corruption and code execution. (CVE-2007-3999) xpdf.rpm A buffer overflow in xpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). xpdf-tools.rpm A buffer overflow in xpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). gtk2-devel-64bit.rpm This patch fixes a crash observed in Mozilla Firefox when running its print preview functionality. gtk2-64bit.rpm This patch fixes a crash observed in Mozilla Firefox when running its print preview functionality. gtk2-doc.rpm This patch fixes a crash observed in Mozilla Firefox when running its print preview functionality. gtk2.rpm This patch fixes a crash observed in Mozilla Firefox when running its print preview functionality. gtk2-devel.rpm This patch fixes a crash observed in Mozilla Firefox when running its print preview functionality. liblcms-64bit.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. liblcms-devel-64bit.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. liblcms.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. liblcms-devel.rpm This update addresses security bugs in liblcms that occurred while parsing ICC profiles in JPEG images. (CVE-2007-2741) Remote attackers can exploit this bug to execute arbitrary commands or cause denial-of-service. transfig.rpm Due to a typo fig2dev has written invalid SVG files. nautilus-64bit.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=335411 - Nautilus would crash during login if it got a notification of a volume being mounted. nautilus-devel.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=335411 - Nautilus would crash during login if it got a notification of a volume being mounted. nautilus.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=335411 - Nautilus would crash during login if it got a notification of a volume being mounted. dbus-1-devel-doc.rpm The boot process has to wait for D-Bus to initialize properly before continuing. Otherwise dependent services like ConsoleKit are not able to properly connect to it. This resulted in some options on the Desktop to be not available, for instance like all different Suspend methods or mounting devices. This issue got fixed with this update. dbus-1-devel.rpm The boot process has to wait for D-Bus to initialize properly before continuing. Otherwise dependent services like ConsoleKit are not able to properly connect to it. This resulted in some options on the Desktop to be not available, for instance like all different Suspend methods or mounting devices. This issue got fixed with this update. dbus-1-64bit.rpm The boot process has to wait for D-Bus to initialize properly before continuing. Otherwise dependent services like ConsoleKit are not able to properly connect to it. This resulted in some options on the Desktop to be not available, for instance like all different Suspend methods or mounting devices. This issue got fixed with this update. dbus-1.rpm The boot process has to wait for D-Bus to initialize properly before continuing. Otherwise dependent services like ConsoleKit are not able to properly connect to it. This resulted in some options on the Desktop to be not available, for instance like all different Suspend methods or mounting devices. This issue got fixed with this update. libgnomecanvas-devel.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=336941 - the canvas would repaint incorrectly when zoomed out. This was especially visible in the Xournal journaling program. libgnomecanvas-64bit.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=336941 - the canvas would repaint incorrectly when zoomed out. This was especially visible in the Xournal journaling program. libgnomecanvas.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=336941 - the canvas would repaint incorrectly when zoomed out. This was especially visible in the Xournal journaling program. libgnomecanvas-doc.rpm This fixes https://bugzilla.novell.com/show_bug.cgi?id=336941 - the canvas would repaint incorrectly when zoomed out. This was especially visible in the Xournal journaling program. koffice-database.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-wordprocessing.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-planning.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-presentation.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-spreadsheet.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-extra.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-illustration.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-ruby.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-database-psql.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-database-mysql.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-python.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). koffice-devel.rpm A buffer overflow in the xpdf code contained in koffice could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-qt4.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-tools.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-qt.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-glib.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-devel.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). poppler-doc.rpm A buffer overflow in the xpdf code contained in poppler could be exploited by attackers to potentially execute arbitrary code (CVE-2007-4352, CVE-2007-5392, CVE-2007-5393). yast2-core-devel.rpm This update fixes a security bug in yast2-core that allowed local attackers to provide malicious yast2 modules to yast2 that are executed with root privileges. To trigger this vulnerability root has to execute yast2 in an untrusted directory (i.e. /tmp). Thanks to Stefan Nordhausen for reporting this to us. yast2-core.rpm This update fixes a security bug in yast2-core that allowed local attackers to provide malicious yast2 modules to yast2 that are executed with root privileges. To trigger this vulnerability root has to execute yast2 in an untrusted directory (i.e. /tmp). Thanks to Stefan Nordhausen for reporting this to us. libpurple.rpm This update fixes a crash in pidgin when specifying invalid HMTL. (CVE-2007-4999) libpurple-devel.rpm This update fixes a crash in pidgin when specifying invalid HMTL. (CVE-2007-4999) kdegraphics3-pdf.rpm A buffer overflow in the xpdf code contained in kpdf could be exploited by attackers to potentially execute arbitrary code (CVE-2007-5393). rubygem-activesupport.rpm A cross site scripting (XSS) bug allowed attackers to execute Javascript code in the context of other web sites (CVE-2007-3227). Specially crafted requests could crash an application when processing XML data (CVE-2007-5379). nut.rpm This patch fixes access permissions for the USB UPS devices, which cause failures on startup. It also fixes possible NUT crash. Warning: Some devices may trigger kernel failure, see https://bugzilla.novell.com/show_bug.cgi?id=335676 for more. nut-devel.rpm This patch fixes access permissions for the USB UPS devices, which cause failures on startup. It also fixes possible NUT crash. Warning: Some devices may trigger kernel failure, see https://bugzilla.novell.com/show_bug.cgi?id=335676 for more. audit.rpm For 10.3 release, auditd was started in a manner which enabled syscall auditing. This is the default behaviour for the audit daemon package but was a change from earlier SuSE releases. This update restores the old 10.2 and earlier behaviour whereby auditd will not enable the creation of audit contexts thereby avoiding the resultant syscall performance overhead. Whether auditd should disable the creation of syscall contexts at startup is controlled by the value AUDITD_DISABLE_CONTEXTS in /etc/sysconfig/auditd. The default is AUDITD_DISABLE_CONTEXTS=yes which will cause auditd to be started with the options "-s disable" preventing the creation of syscall contexts. Note this will prevent the generation of any syscall and filewatch auditing data using 'auditctl'. If you require such functionality, either comment out AUDITD_DISABLE_CONTEXTS or set it to the value 'no'. audit-libs-python.rpm For 10.3 release, auditd was started in a manner which enabled syscall auditing. This is the default behaviour for the audit daemon package but was a change from earlier SuSE releases. This update restores the old 10.2 and earlier behaviour whereby auditd will not enable the creation of audit contexts thereby avoiding the resultant syscall performance overhead. Whether auditd should disable the creation of syscall contexts at startup is controlled by the value AUDITD_DISABLE_CONTEXTS in /etc/sysconfig/auditd. The default is AUDITD_DISABLE_CONTEXTS=yes which will cause auditd to be started with the options "-s disable" preventing the creation of syscall contexts. Note this will prevent the generation of any syscall and filewatch auditing data using 'auditctl'. If you require such functionality, either comment out AUDITD_DISABLE_CONTEXTS or set it to the value 'no'. audit-libs.rpm For 10.3 release, auditd was started in a manner which enabled syscall auditing. This is the default behaviour for the audit daemon package but was a change from earlier SuSE releases. This update restores the old 10.2 and earlier behaviour whereby auditd will not enable the creation of audit contexts thereby avoiding the resultant syscall performance overhead. Whether auditd should disable the creation of syscall contexts at startup is controlled by the value AUDITD_DISABLE_CONTEXTS in /etc/sysconfig/auditd. The default is AUDITD_DISABLE_CONTEXTS=yes which will cause auditd to be started with the options "-s disable" preventing the creation of syscall contexts. Note this will prevent the generation of any syscall and filewatch auditing data using 'auditctl'. If you require such functionality, either comment out AUDITD_DISABLE_CONTEXTS or set it to the value 'no'. audit-libs-64bit.rpm For 10.3 release, auditd was started in a manner which enabled syscall auditing. This is the default behaviour for the audit daemon package but was a change from earlier SuSE releases. This update restores the old 10.2 and earlier behaviour whereby auditd will not enable the creation of audit contexts thereby avoiding the resultant syscall performance overhead. Whether auditd should disable the creation of syscall contexts at startup is controlled by the value AUDITD_DISABLE_CONTEXTS in /etc/sysconfig/auditd. The default is AUDITD_DISABLE_CONTEXTS=yes which will cause auditd to be started with the options "-s disable" preventing the creation of syscall contexts. Note this will prevent the generation of any syscall and filewatch auditing data using 'auditctl'. If you require such functionality, either comment out AUDITD_DISABLE_CONTEXTS or set it to the value 'no'. audit-devel.rpm For 10.3 release, auditd was started in a manner which enabled syscall auditing. This is the default behaviour for the audit daemon package but was a change from earlier SuSE releases. This update restores the old 10.2 and earlier behaviour whereby auditd will not enable the creation of audit contexts thereby avoiding the resultant syscall performance overhead. Whether auditd should disable the creation of syscall contexts at startup is controlled by the value AUDITD_DISABLE_CONTEXTS in /etc/sysconfig/auditd. The default is AUDITD_DISABLE_CONTEXTS=yes which will cause auditd to be started with the options "-s disable" preventing the creation of syscall contexts. Note this will prevent the generation of any syscall and filewatch auditing data using 'auditctl'. If you require such functionality, either comment out AUDITD_DISABLE_CONTEXTS or set it to the value 'no'. yast2-profile-manager.rpm YaST2 Profile Manager used wrong config file, so the configuration options were not saved. Additionally, when writing resource groups it was saving translated values, which broke these resource groups. apache2-doc.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-devel.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-example-pages.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-worker.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-prefork.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) apache2-utils.rpm Several bugs were fixed in the Apache2 webserver: These include the following security issues: - CVE-2006-5752: mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". - CVE-2007-1863: mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value. - CVE-2007-3304: prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. - CVE-2007-3847: mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. - CVE-2007-4465: mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. and the following non-security issues: - get_module_list: replace loadmodule.conf atomically - Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs) tomboy.rpm The tomboy mediaplayer used LD_LIBRARY_PATH unsafely by allowing empty LD_LIBRARY_PATH components. This would enable the player to load its shared libraries of the current directory which might contain user supplied shared libraries, potentially supplied from the network by an attacker. (CVE-2005-4790) perl.rpm This update fixes a buffer overflow in perl's regex engine. (CVE-2007-5116) perl-64bit.rpm This update fixes a buffer overflow in perl's regex engine. (CVE-2007-5116) perl-base.rpm This update fixes a buffer overflow in perl's regex engine. (CVE-2007-5116) boost-64bit.rpm Due to some error in the boost build machinery, the package does contain the multi threaded versions but with the non-mt name. This update provides the libraries under their correct names and also contains symlinks to the non-threaded library names. boost.rpm Due to some error in the boost build machinery, the package does contain the multi threaded versions but with the non-mt name. This update provides the libraries under their correct names and also contains symlinks to the non-threaded library names. boost-doc.rpm Due to some error in the boost build machinery, the package does contain the multi threaded versions but with the non-mt name. This update provides the libraries under their correct names and also contains symlinks to the non-threaded library names. boost-devel-64bit.rpm Due to some error in the boost build machinery, the package does contain the multi threaded versions but with the non-mt name. This update provides the libraries under their correct names and also contains symlinks to the non-threaded library names. boost-devel.rpm Due to some error in the boost build machinery, the package does contain the multi threaded versions but with the non-mt name. This update provides the libraries under their correct names and also contains symlinks to the non-threaded library names. ruby-examples.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-doc-html.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-devel.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-test-suite.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-doc-ri.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. ruby-tk.rpm This update of ruby improves the SSL certificate verification process. (CVE-2007-5162, CVE-2007-5770) Prior to this update it was possible to intercept SSL traffic with a man-in-the-middle attack. bug-buddy-lang.rpm This fixes crashes in Java applications launched from GNOME. This package contains the language translation for the recent bug-buddy update which fixes bug #307860. bug-buddy.rpm This fixes crashes in Java applications launched from GNOME. This package contains the language translation for the recent bug-buddy update which fixes bug #307860. openldap2-devel-64bit.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2-devel.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2-back-perl.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2-back-meta.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). openldap2.rpm This update fixes multiple flaws that could cause slapd to crash (CVE-2007-5707, CVE-2007-5708). libpng-devel-64bit.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). libpng-64bit.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). libpng-devel.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). libpng.rpm Speciall crafted png files could crash applications when attempting to open such a file (CVE-2007-5269). amarok-libvisual.rpm This update fixes the bug that sometimes Amarok only played one entry in the playlist when using Amarok's yauap engine. amarok-yauap.rpm This update fixes the bug that sometimes Amarok only played one entry in the playlist when using Amarok's yauap engine. amarok-xine.rpm This update fixes the bug that sometimes Amarok only played one entry in the playlist when using Amarok's yauap engine. amarok.rpm This update fixes the bug that sometimes Amarok only played one entry in the playlist when using Amarok's yauap engine. xorg-x11-libxcb-devel-64bit.rpm Setting LIBXCB_ALLOW_SLOPPY_LOCK to workaround the libxcb assertion is no longer necessary. The assertion has been replaced by a warning. xorg-x11-libxcb-devel.rpm Setting LIBXCB_ALLOW_SLOPPY_LOCK to workaround the libxcb assertion is no longer necessary. The assertion has been replaced by a warning. xorg-x11-libxcb-64bit.rpm Setting LIBXCB_ALLOW_SLOPPY_LOCK to workaround the libxcb assertion is no longer necessary. The assertion has been replaced by a warning. xorg-x11-libxcb.rpm Setting LIBXCB_ALLOW_SLOPPY_LOCK to workaround the libxcb assertion is no longer necessary. The assertion has been replaced by a warning. libgphoto2-64bit.rpm This update fixes some problems encountered with cameras that are dual mode Mass Storage and PTP cameras, mostly triggering for Panasonic DMZ and Olympus cameras. It also fixes some problems with Canon cameras. libgphoto2-devel.rpm This update fixes some problems encountered with cameras that are dual mode Mass Storage and PTP cameras, mostly triggering for Panasonic DMZ and Olympus cameras. It also fixes some problems with Canon cameras. libgphoto2.rpm This update fixes some problems encountered with cameras that are dual mode Mass Storage and PTP cameras, mostly triggering for Panasonic DMZ and Olympus cameras. It also fixes some problems with Canon cameras. gnome-session.rpm Fixes serious defects in accessibility operation and configuration. control-center2.rpm Fixes serious defects in accessibility operation and configuration. libbonobo.rpm Fixes serious defects in accessibility operation and configuration. libbonobo-64bit.rpm Fixes serious defects in accessibility operation and configuration. gdm.rpm Fixes serious defects in accessibility operation and configuration. libbonobo-doc.rpm Fixes serious defects in accessibility operation and configuration. control-center2-devel.rpm Fixes serious defects in accessibility operation and configuration. libbonobo-devel.rpm Fixes serious defects in accessibility operation and configuration. jpackage-utils.rpm This update removes the executable check from the javawswrapper script. kommander-runtime.rpm This update fixes Novell bugreport #333895 - Quanta becoming slower over time with parsing HTML. kdewebdev3.rpm This update fixes Novell bugreport #333895 - Quanta becoming slower over time with parsing HTML. kommander.rpm This update fixes Novell bugreport #333895 - Quanta becoming slower over time with parsing HTML. nagios-plugins-extras.rpm fix possible buffer overflow during HTTP Location header parsing in check_http (CVE-2007-5198) fix possible buffer overflow during snmpget parsing in check_snmp (CVE-2007-5623) nagios-plugins.rpm fix possible buffer overflow during HTTP Location header parsing in check_http (CVE-2007-5198) fix possible buffer overflow during snmpget parsing in check_snmp (CVE-2007-5623) emacs-nox.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs-info.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs-x11.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs-el.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. emacs.rpm This update fixes a buffer overflow in emacs that can be triggered over the command-line. rubygem-actionpack.rpm Malicious users could specify their session-ID in the URL and could gain access to an authenticated session that way (CVE-2007-5380). alsa-devel.rpm This update fixes the bug in alsa-lib dmix/dsnoop plugins that may cause a semaphore deadlock. This prevented the audio access when a user is switched. The update contains also a fix of dmix plugin to protect from invalid SHM data. alsa-docs.rpm This update fixes the bug in alsa-lib dmix/dsnoop plugins that may cause a semaphore deadlock. This prevented the audio access when a user is switched. The update contains also a fix of dmix plugin to protect from invalid SHM data. alsa.rpm This update fixes the bug in alsa-lib dmix/dsnoop plugins that may cause a semaphore deadlock. This prevented the audio access when a user is switched. The update contains also a fix of dmix plugin to protect from invalid SHM data. libasound2-64bit.rpm This update fixes the bug in alsa-lib dmix/dsnoop plugins that may cause a semaphore deadlock. This prevented the audio access when a user is switched. The update contains also a fix of dmix plugin to protect from invalid SHM data. libasound2.rpm This update fixes the bug in alsa-lib dmix/dsnoop plugins that may cause a semaphore deadlock. This prevented the audio access when a user is switched. The update contains also a fix of dmix plugin to protect from invalid SHM data. lomoco.rpm Fixes udev and resmgr rules. You can execute lomoco as user and use automatic configuration with udev again. mysql-query-browser.rpm This update fixes mysql-query-browser hanging when selecting a schema. There were two scenarios: 1. Entering Login-Data with schema included. Login window disappeares. No further reaction. 2. Entering Login-Data without schema included. mysql-query-browser pops up. Now it is necessary to select a schema to work with. Both possibilities (selecting via mouse click or by entering "use ") failed. Window freezes but can be closed (Message that there is no answer from the application) Further information can be found at Novell Bugzilla, #339356. xorg-x11.rpm We added the option to use xvkbd as virtual keyboard on GDM login and when unlocking the screensaver, but this never worked fully. This should fix all the problems found and allow users on tablets to have the virtual keyboard on both the GDM login screen and when unlocking the screen. gnome-screensaver.rpm We added the option to use xvkbd as virtual keyboard on GDM login and when unlocking the screensaver, but this never worked fully. This should fix all the problems found and allow users on tablets to have the virtual keyboard on both the GDM login screen and when unlocking the screen. glib2-64bit.rpm Glib2 contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2007-1659, CVE-2007-1660). This update makes glib2 use the system's pcre library which was already updated to fix the above mentioned problems. glib2-devel.rpm Glib2 contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2007-1659, CVE-2007-1660). This update makes glib2 use the system's pcre library which was already updated to fix the above mentioned problems. glib2.rpm Glib2 contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2007-1659, CVE-2007-1660). This update makes glib2 use the system's pcre library which was already updated to fix the above mentioned problems. glib2-devel-64bit.rpm Glib2 contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2007-1659, CVE-2007-1660). This update makes glib2 use the system's pcre library which was already updated to fix the above mentioned problems. glib2-doc.rpm Glib2 contains a copy of the pcre library. Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code (CVE-2007-1659, CVE-2007-1660). This update makes glib2 use the system's pcre library which was already updated to fix the above mentioned problems. htdig-devel.rpm A flaw in the htsearch Program could be exploited by attackers to conduct cross site scripting (XSS) attacks. htdig-doc.rpm A flaw in the htsearch Program could be exploited by attackers to conduct cross site scripting (XSS) attacks. htdig.rpm A flaw in the htsearch Program could be exploited by attackers to conduct cross site scripting (XSS) attacks. libuuid1.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libext2fs2.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libcom_err2.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libext2fs-devel.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libuuid1-64bit.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) e2fsprogs-devel.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) e2fsprogs.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libblkid-devel.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libcom_err-devel.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libblkid1.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libcom_err2-64bit.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) libuuid-devel.rpm This update of e2fsprogs fixes several integer overflows in memory allocating code. Programs that use libext2fs are therefore vulnerable to memory corruptions that can lead to arbitrary code execution while loading a specially crafted image. (CVE-2007-5497) OpenOffice_org-base.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-draw.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-pyuno.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-sdk.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-gnome.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-testtool.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-calc.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-impress.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-mono.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-officebean.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-filters.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-kde.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-sdk-doc.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-devel.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-mailmerge.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-math.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) OpenOffice_org-writer.rpm This update of OpenOffice_org adds restrictions to SQL statements of Java-based databases to avoid the execution of native Jave code by creating procedures. (CVE-2007-4575) dmapi-devel.rpm dmapi: provide dmapi via update repository to solve new samba dependency dmapi.rpm dmapi: provide dmapi via update repository to solve new samba dependency libsmbclient-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-krb-printing.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-client-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libsmbclient.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libsmbsharemodes.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libsmbclient-devel.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) cifs-mount.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) ldapsmb.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libsmbsharemodes-devel.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-winbind-64bit.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-winbind.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-python.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libmsrpc-devel.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) libmsrpc.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-client.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-vscan.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) samba-devel.rpm This update of samba fixes a buffer overflow in function send_mailslot() that allows to overwrite the stack with zero-bytes. (CVE-2007-6015) netpbm.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) libnetpbm10.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) libnetpbm10-64bit.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) libnetpbm-devel.rpm This update of netpbm fixes a security vulnerability in the included libjasper. This bug can be triggered while processing image files and can lead to remote code execution. (CVE-2007-2721) seamonkey-spellchecker.rpm This update brings Mozilla Seamonkey to security update version 1.1.7 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. Also enigmail was upgraded to 0.95.5. seamonkey-venkman.rpm This update brings Mozilla Seamonkey to security update version 1.1.7 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. Also enigmail was upgraded to 0.95.5. seamonkey-mail.rpm This update brings Mozilla Seamonkey to security update version 1.1.7 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. Also enigmail was upgraded to 0.95.5. seamonkey-irc.rpm This update brings Mozilla Seamonkey to security update version 1.1.7 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. Also enigmail was upgraded to 0.95.5. seamonkey-dom-inspector.rpm This update brings Mozilla Seamonkey to security update version 1.1.7 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. Also enigmail was upgraded to 0.95.5. seamonkey.rpm This update brings Mozilla Seamonkey to security update version 1.1.7 Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. Also enigmail was upgraded to 0.95.5. MozillaThunderbird-translations.rpm This update brings Mozilla Thunderbird to security update version 2.0.0.9 Following security problems were fixed: - MFSA 2007-29: Crashes with evidence of memory corruption As part of the Firefox 2.0.0.8 update releases Mozilla developers fixed many bugs to improve the stability of the product. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. - CVE-2007-5339 Browser crashes - CVE-2007-5340 JavaScript engine crashes Also enigmail was upgraded to 0.95.5. MozillaThunderbird.rpm This update brings Mozilla Thunderbird to security update version 2.0.0.9 Following security problems were fixed: - MFSA 2007-29: Crashes with evidence of memory corruption As part of the Firefox 2.0.0.8 update releases Mozilla developers fixed many bugs to improve the stability of the product. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. - CVE-2007-5339 Browser crashes - CVE-2007-5340 JavaScript engine crashes Also enigmail was upgraded to 0.95.5. pm-utils.rpm This update fixes the following bugs: - Bug 332174 - i810: wrong resolution after STD added chvt when patching videobio openssh.rpm This update fixes the following bugs: - fix spurious "chan_read_failed for istate 3" errors [#346042] openssh-askpass.rpm This update fixes the following bugs: - fix spurious "chan_read_failed for istate 3" errors [#346042] NetworkManager-gnome.rpm Fix the problems with WPA Enterprise authentication and connection editor from the GNOME applet. NetworkManager-glib.rpm Fix the problems with WPA Enterprise authentication and connection editor from the GNOME applet. NetworkManager-devel.rpm Fix the problems with WPA Enterprise authentication and connection editor from the GNOME applet. NetworkManager.rpm Fix the problems with WPA Enterprise authentication and connection editor from the GNOME applet. ispell-dutch.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-polish.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-spanish.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-slovene.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-czech.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-italian.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-swedish.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-german.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-nswiss.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-catalan.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-russian.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-finnish.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-norsk.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-danish.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-greek.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-ngerman.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-brazilian.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-esperanto.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-portuguese.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-estonian.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. dicts.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. ispell-french.rpm Due to the new UTF-8 capability of the Emacs 22 there is no characters range anymore allowed. This requires changes in the emacs lisp files for the language support loaded during the start of Emacs. wireless-tools.rpm This update makes iwlwifi work much more reliable and in conjunction with the latest kernel update even hidden networks are usable. clamav-db.rpm This version upgrade to 0.92 fixes numerous flaws including some security problems (CVE-2007-6335, CVE-2007-6336, CVE-2007-6337). Please note that the version number of the clamav library has changed. Programs linked against libclamav therefore need to be updated as well. clamav.rpm This version upgrade to 0.92 fixes numerous flaws including some security problems (CVE-2007-6335, CVE-2007-6336, CVE-2007-6337). Please note that the version number of the clamav library has changed. Programs linked against libclamav therefore need to be updated as well. klamav.rpm clamav has been updated due to security problem. The version number of the clamav library has been changed with that update. Therefore programs like klamav that are linked against libclamav need to be updated as well. claws-mail.rpm clamav has been updated due to security problem. The version number of the clamav library has been changed with that update. Therefore programs like claws-mail that are linked against libclamav need to be updated as well. claws-mail-devel.rpm clamav has been updated due to security problem. The version number of the clamav library has been changed with that update. Therefore programs like claws-mail that are linked against libclamav need to be updated as well. php5-exif.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-soap.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-sysvmsg.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-ftp.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-dba.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-imap.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-fastcgi.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-ctype.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-readline.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-mhash.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-mcrypt.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-xmlrpc.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-suhosin.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-ldap.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-pcntl.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-zip.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-sqlite.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-devel.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-sysvsem.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-shmop.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-snmp.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-xmlwriter.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-posix.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-odbc.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-pspell.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-json.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-mbstring.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-bz2.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-openssl.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-wddx.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-dom.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-dbase.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-tidy.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-mysql.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-sysvshm.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-gettext.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-gmp.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-pdo.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-tokenizer.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-gd.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-ncurses.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-zlib.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-pgsql.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-bcmath.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-xmlreader.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-hash.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-pear.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-calendar.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-xsl.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-sockets.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-curl.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. php5-iconv.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. apache2-mod_php5.rpm This version update to php 5.2.5 fixes numerous bugs including some security vulnerabilities. libexiv2-devel.rpm Specially crafted files could trigger an integer overflow in libexiv2 (CVE-2007-6353). libexiv2.rpm Specially crafted files could trigger an integer overflow in libexiv2 (CVE-2007-6353). rsync.rpm This update fixes a bug in rsync that allowed remote attackers to access restricted files outside a module's hierarchy if no chroot setup was used. (CVE-2007-6199) Please read http://rsync.samba.org/security.html entry from November 28th, 2007 to get more information about a secure configuration of rsync that also covers the bug tracked with CVE-2007-6200. This update also fixes some crashes that only affect rsync-2.6.8 on SLES10. squid.rpm This update of squid fixes a denial-of-service bug during cache update reply processing. (CVE-2007-6239) postfix.rpm receive_override_options = no_address_mappings in main.cf is a bad idea in general. This is set by SuSEconfig.postfix if amavisd is used. Problem with that is that it applies not only to mail delivered via SMTP but also delivered by sendmail/maildrop/pickup and sending mail that way will fail when adressed to a virtual recipient. That parameter should be set in master.cf instead for the smtpd process only. postfix-postgresql.rpm receive_override_options = no_address_mappings in main.cf is a bad idea in general. This is set by SuSEconfig.postfix if amavisd is used. Problem with that is that it applies not only to mail delivered via SMTP but also delivered by sendmail/maildrop/pickup and sending mail that way will fail when adressed to a virtual recipient. That parameter should be set in master.cf instead for the smtpd process only. postfix-devel.rpm receive_override_options = no_address_mappings in main.cf is a bad idea in general. This is set by SuSEconfig.postfix if amavisd is used. Problem with that is that it applies not only to mail delivered via SMTP but also delivered by sendmail/maildrop/pickup and sending mail that way will fail when adressed to a virtual recipient. That parameter should be set in master.cf instead for the smtpd process only. postfix-mysql.rpm receive_override_options = no_address_mappings in main.cf is a bad idea in general. This is set by SuSEconfig.postfix if amavisd is used. Problem with that is that it applies not only to mail delivered via SMTP but also delivered by sendmail/maildrop/pickup and sending mail that way will fail when adressed to a virtual recipient. That parameter should be set in master.cf instead for the smtpd process only. opera.rpm Opera released version 9.25 of their browser to fix various security problems. CVE-2007-6520: Fixed an issue where plug-ins could be used to allow cross domain scripting, as reported by David Bloom. Details will be disclosed at a later date. CVE-2007-6521: Fixed an issue with TLS certificates that could be used to execute arbitrary code, as reported by Alexander Klink (Cynops GmbH). Details will be disclosed at a later date. CVE-2007-6522: Rich text editing can no longer be used to allow cross domain scripting, as reported by David Bloom. See our advisory. CVE-2007-6523: Fixed a problem where malformed BMP files could cause Opera to temporarily freeze. CVE-2007-6524: Prevented bitmaps from revealing random data from memory, as reported by Gynvael Coldwind. Details will be disclosed at a later date. evolution-data-server-devel.rpm The issues fixed are: Selecting a contact category crashes Evolution-data-server High CPU usage is found while eds updates deltas evolution-data-server.rpm The issues fixed are: Selecting a contact category crashes Evolution-data-server High CPU usage is found while eds updates deltas evolution-data-server-doc.rpm The issues fixed are: Selecting a contact category crashes Evolution-data-server High CPU usage is found while eds updates deltas evolution-data-server-64bit.rpm The issues fixed are: Selecting a contact category crashes Evolution-data-server High CPU usage is found while eds updates deltas evolution-pilot.rpm Fixes the issues of extreme slowness observed while updating unread counts crash while trying to add publish-calendar locations evolution.rpm Fixes the issues of extreme slowness observed while updating unread counts crash while trying to add publish-calendar locations evolution-devel.rpm Fixes the issues of extreme slowness observed while updating unread counts crash while trying to add publish-calendar locations tcsh.rpm The patch which solve the problem of the truncated ~/.history file was not applied. aaa_base.rpm This update fixes a problem where the boot process might fail when using iSCSI devices. mozilla-xulrunner181.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. epiphany-extensions-lang.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. epiphany-lang.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. mozilla-xulrunner181-64bit.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. mozilla-xulrunner181-l10n.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. mozilla-xulrunner181-devel.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. epiphany-extensions.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. epiphany.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. epiphany-devel.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. epiphany-doc.rpm This update brings the Mozilla XUL runner engine to security update version 1.8.1.10 MFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI. MFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks. cups-client.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups-devel.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups-libs.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. cups-libs-64bit.rpm This update fixes a buffer overflow that can be exploited by users that are allowed to configure CUPS. (CVE-2007-5848) Additionally a buffer overflow in the SNMP backend of CUPS was fixed that allowed remote attackers to execute arbitrary code by sending specially crafted SNMP responses. (CVE-2007-5849) This vulnerability affects 10.2 and 10.3 only. libexif-64bit.rpm Two bugs in libexif were identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6351: Loading EXIF data could be used to cause a infinite recursion and crash CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. libexif-devel.rpm Two bugs in libexif were identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6351: Loading EXIF data could be used to cause a infinite recursion and crash CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. libexif.rpm Two bugs in libexif were identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6351: Loading EXIF data could be used to cause a infinite recursion and crash CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. libexif5.rpm One bug in libexif5 was identified by a Google Security Audit done by Meder Kydyraliev. CVE-2007-6352: Integer overflows in the thumbnail handler could be used to overflow buffers and potentially execute code or crash a program using libexif. novell-ipsec-tools-devel.rpm This update fixes a security problem in novell-ipsec-tools: CVE-2007-1841: Fix a DoS in isakmp_info_recv and also a non-security bug with a crash in GSSAPI. novell-ipsec-tools.rpm This update fixes a security problem in novell-ipsec-tools: CVE-2007-1841: Fix a DoS in isakmp_info_recv and also a non-security bug with a crash in GSSAPI. krb5-client.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-64bit.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-devel-64bit.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-apps-servers.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-server.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-apps-clients.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) krb5-devel.rpm This update fixes multiple vulnerabilties in krb5. It's unlikely that those vulnerabilties can actually be exploited. (CVE-2007-5894, CVE-2007-5902, CVE-2007-5971, CVE-2007-5972) xorg-x11-libs.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. xorg-x11-devel.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. xorg-x11-libs-64bit.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. xorg-x11-devel-64bit.rpm This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958). XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. PCF font parser vulnerability. less.rpm Up to 10.2 less running inside a terminal emulator automatically adjusted to the new terminal size when xterm got resized. With 10.3 less most of the time stays at the old size, especially when the terminal gets enlarged, and only adjusts to the new size the next time a key is pressed. This update fixes this issue. kdelibs3.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-default-style-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-arts-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-doc.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-devel.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-arts.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdelibs3-default-style.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-devel.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-64bit.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-ksysguardd.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-beagle.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-session.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. fileshareset.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-extra.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-kdm.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-samba.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. kdebase3-nsplugin.rpm This update is necessary to support the new FlashPlayer version, which required XEmbed support. wireshark.rpm This update fixes several security bugs in wireshark that can be used to crash the application and to possibly execute arbitrary code remotely. wireshark-devel.rpm This update fixes several security bugs in wireshark that can be used to crash the application and to possibly execute arbitrary code remotely. libxml2-devel-64bit.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2-64bit.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2-devel.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2-python.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. libxml2.rpm libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8 processing. CVE-2007-6284 has been assigned to this problem. xine-lib.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). xine-extra.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). xine-lib-64bit.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). xine-devel.rpm Specially crafted rtsp-Streams could cause a buffer overflow in xine. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-0225). libxfcegui4-devel.rpm A possible double-free bug has been fixed, in case the application free's the passed data arguments. libxfcegui4.rpm A possible double-free bug has been fixed, in case the application free's the passed data arguments. xfce4-panel.rpm A buffer overflow in xfce4-panel's launcher tooltips has been fixed. xfce4-panel-devel.rpm A buffer overflow in xfce4-panel's launcher tooltips has been fixed. xorg-x11-server-extra.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xorg-x11-server-sdk.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xorg-x11-server.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xorg-x11-Xvnc.rpm The previous xorg-x11 security update contained a flaw. Due to this some applications using the X shared memory extension did not work properly anymore. xemacs-el.rpm This update fixes a buffer overflow in xemacs. (CVE-2007-6109) xemacs.rpm This update fixes a buffer overflow in xemacs. (CVE-2007-6109) xemacs-info.rpm This update fixes a buffer overflow in xemacs. (CVE-2007-6109) NX.rpm This update fixes various Xserver security issues that are also present in NX: XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427]. TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428]. EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429]. MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. mkinitrd.rpm - Rescan for LVM2 when waiting for the root device - Allow for commandline variables without a value - Include the real bash binary xfsprogs-devel.rpm This is an update to xfsprogs-2.9.4 which fixes some bugs in xfs_repair (among others). xfsprogs.rpm This is an update to xfsprogs-2.9.4 which fixes some bugs in xfs_repair (among others). SDL_image-devel.rpm Specially crafted GIF files could crash the SDL_image library (CVE-2006-4484). SDL_image-64bit.rpm Specially crafted GIF files could crash the SDL_image library (CVE-2006-4484). SDL_image.rpm Specially crafted GIF files could crash the SDL_image library (CVE-2006-4484). python-idle.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-devel.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-64bit.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-gdbm.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-demo.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-tk.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-xml.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). python-curses.rpm Specially crafted images could trigger an integer overflow in the imageop module (CVE-2007-4965). mysql-bench.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-tools.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 libmysqlclient15.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 libmysqlclient-devel.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-debug.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 libmysqlclient_r15.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 libmysqlclient15-64bit.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 libmysqlclient_r15-64bit.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-client.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 mysql-Max.rpm This update fixes several security vulnerabilities (note: not all versions are affected by every bug): - CVE-2007-2583 - CVE-2007-2691 - CVE-2007-2692 - CVE-2007-5925 - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 hal-devel.rpm This update fixes: memory- and file descriptor (b.n.c#344872) leaks, fixes HAL to work also with newer libsmbios versions, fixes possible segfaults (b.n.c#344231) related to FDI-file updates and singleton addons. HAL now handle remaining percentage in multi battery systems (b.n.c#347219) and USB CSR batteries (fd.o#5865) correctly. HAL also detect now laptops with FPI2002 serial tablets as TabletPCs. The FDI-file directive int_outof work now as expected (b.n.c#339309). Also included: ignore PCI devices which have no vendor/product ID and a fix for a possible loop in the storage addon with USB Floppy devices. hal-64bit.rpm This update fixes: memory- and file descriptor (b.n.c#344872) leaks, fixes HAL to work also with newer libsmbios versions, fixes possible segfaults (b.n.c#344231) related to FDI-file updates and singleton addons. HAL now handle remaining percentage in multi battery systems (b.n.c#347219) and USB CSR batteries (fd.o#5865) correctly. HAL also detect now laptops with FPI2002 serial tablets as TabletPCs. The FDI-file directive int_outof work now as expected (b.n.c#339309). Also included: ignore PCI devices which have no vendor/product ID and a fix for a possible loop in the storage addon with USB Floppy devices. hal-doc.rpm This update fixes: memory- and file descriptor (b.n.c#344872) leaks, fixes HAL to work also with newer libsmbios versions, fixes possible segfaults (b.n.c#344231) related to FDI-file updates and singleton addons. HAL now handle remaining percentage in multi battery systems (b.n.c#347219) and USB CSR batteries (fd.o#5865) correctly. HAL also detect now laptops with FPI2002 serial tablets as TabletPCs. The FDI-file directive int_outof work now as expected (b.n.c#339309). Also included: ignore PCI devices which have no vendor/product ID and a fix for a possible loop in the storage addon with USB Floppy devices. hal.rpm This update fixes: memory- and file descriptor (b.n.c#344872) leaks, fixes HAL to work also with newer libsmbios versions, fixes possible segfaults (b.n.c#344231) related to FDI-file updates and singleton addons. HAL now handle remaining percentage in multi battery systems (b.n.c#347219) and USB CSR batteries (fd.o#5865) correctly. HAL also detect now laptops with FPI2002 serial tablets as TabletPCs. The FDI-file directive int_outof work now as expected (b.n.c#339309). Also included: ignore PCI devices which have no vendor/product ID and a fix for a possible loop in the storage addon with USB Floppy devices. postgresql.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-docs.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-pltcl.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-libs.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-contrib.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-plpython.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-plperl.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-server.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-devel.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 postgresql-libs-64bit.rpm This version update to 8.2.6 fixes among other things several security issues: - Index Functions Privilege Escalation: CVE-2007-6600 - Regular Expression Denial-of-Service: CVE-2007-4772, CVE-2007-6067, CVE-2007-4769 - DBLink Privilege Escalation: CVE-2007-6601 cairo-devel-64bit.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo-64bit.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo-devel.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) cairo-doc.rpm This update of cairo fixes several integer overflows while decoding PNG images. This can be exploited remotely with user-assistance to execute arbitrary code. (CVE-2007-5503) pcre-devel.rpm Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code. pcre-64bit.rpm Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code. pcre.rpm Specially crafted regular expressions could lead to a buffer overflow in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code. libzypp.rpm This patch fixes the problem of reading the proxy authentication credentials from the ~/.curlrc file generated by the YaST Proxy module (bnc #330351, bnc #331038). The bug caused users behind a proxy with authentication to fail to work with repositories via libzypp-based applications (YaST, zypper, openSUSE Updater, ZLM). In order to be able to apply the patch if behind an authenticated proxy, please take the following steps: 1. enable the proxy using YaST Proxy module 2. edit your /root/.curlrc so that it contains a line like: proxy-user = "yourusername:yourpassword" 3. apply the patch using YaST Online Update, zypper or the openSUSE Updater applet or (in case the above does not work): 1. enable the proxy using YaST Proxy module 2. edit URLs of your main repository and the update repository and append the following URL parameters to it: ?proxy=yourproxyurl&proxyuser=yourusername&proxypassword=yourpassword 3. apply the patch 4. remove the proxy, proxyuser, proxypassword parameters from the repository URLs (for the sake of security) libzypp-devel.rpm This patch fixes the problem of reading the proxy authentication credentials from the ~/.curlrc file generated by the YaST Proxy module (bnc #330351, bnc #331038). The bug caused users behind a proxy with authentication to fail to work with repositories via libzypp-based applications (YaST, zypper, openSUSE Updater, ZLM). In order to be able to apply the patch if behind an authenticated proxy, please take the following steps: 1. enable the proxy using YaST Proxy module 2. edit your /root/.curlrc so that it contains a line like: proxy-user = "yourusername:yourpassword" 3. apply the patch using YaST Online Update, zypper or the openSUSE Updater applet or (in case the above does not work): 1. enable the proxy using YaST Proxy module 2. edit URLs of your main repository and the update repository and append the following URL parameters to it: ?proxy=yourproxyurl&proxyuser=yourusername&proxypassword=yourpassword 3. apply the patch 4. remove the proxy, proxyuser, proxypassword parameters from the repository URLs (for the sake of security) libqt4-sql-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. qt3-devel.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. qt3-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-sql.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-devel.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-x11.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-qt3support-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-dbus-1-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-qt3support.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-devel-doc.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-dbus-1.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. qt3-devel-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-x11-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. libqt4-64bit.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. qt3.rpm This update fixes crashes during adding/removing CRTCs or resizing the current CRTCs. kernel-default.rpm This kernel update fixes the following security problems: - CVE-2008-0600: A local privilege escalation was found in the vmsplice_pipe system call, which could be used by local attackers to gain root access. - CVE-2007-6206: Core dumps from root might be accessible to the wrong owner. And the following bugs (numbers are https://bugzilla.novell.com/ references): - Update to minor kernel version 2.6.22.17 - networking bugfixes - contains the following patches which were removed: - patches.arch/acpica-psd.patch - patches.fixes/invalid-semicolon - patches.fixes/nopage-range-fix.patch - patches.arch/acpi_thermal_blacklist_add_r50p.patch: Avoid critical temp shutdowns on specific Thinkpad R50p (https://bugzilla.novell.com/show_bug.cgi?id=333043). - Update config files. CONFIG_USB_DEBUG in debug kernel - patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid sas IRQ to non-threaded IRQ (337489). - patches.drivers/libata-implement-force-parameter added to series.conf. - patches.xen/xen3-fixup-arch-i386: xen3 i386 build fixes. - patches.xen/xenfb-module-param: Re: Patching Xen virtual framebuffer. kernel-syms.rpm This kernel update fixes the following security problems: - CVE-2008-0600: A local privilege escalation was found in the vmsplice_pipe system call, which could be used by local attackers to gain root access. - CVE-2007-6206: Core dumps from root might be accessible to the wrong owner. And the following bugs (numbers are https://bugzilla.novell.com/ references): - Update to minor kernel version 2.6.22.17 - networking bugfixes - contains the following patches which were removed: - patches.arch/acpica-psd.patch - patches.fixes/invalid-semicolon - patches.fixes/nopage-range-fix.patch - patches.arch/acpi_thermal_blacklist_add_r50p.patch: Avoid critical temp shutdowns on specific Thinkpad R50p (https://bugzilla.novell.com/show_bug.cgi?id=333043). - Update config files. CONFIG_USB_DEBUG in debug kernel - patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid sas IRQ to non-threaded IRQ (337489). - patches.drivers/libata-implement-force-parameter added to series.conf. - patches.xen/xen3-fixup-arch-i386: xen3 i386 build fixes. - patches.xen/xenfb-module-param: Re: Patching Xen virtual framebuffer. kernel-source.rpm This kernel update fixes the following security problems: - CVE-2008-0600: A local privilege escalation was found in the vmsplice_pipe system call, which could be used by local attackers to gain root access. - CVE-2007-6206: Core dumps from root might be accessible to the wrong owner. And the following bugs (numbers are https://bugzilla.novell.com/ references): - Update to minor kernel version 2.6.22.17 - networking bugfixes - contains the following patches which were removed: - patches.arch/acpica-psd.patch - patches.fixes/invalid-semicolon - patches.fixes/nopage-range-fix.patch - patches.arch/acpi_thermal_blacklist_add_r50p.patch: Avoid critical temp shutdowns on specific Thinkpad R50p (https://bugzilla.novell.com/show_bug.cgi?id=333043). - Update config files. CONFIG_USB_DEBUG in debug kernel - patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid sas IRQ to non-threaded IRQ (337489). - patches.drivers/libata-implement-force-parameter added to series.conf. - patches.xen/xen3-fixup-arch-i386: xen3 i386 build fixes. - patches.xen/xenfb-module-param: Re: Patching Xen virtual framebuffer. kernel-ppc64.rpm This kernel update fixes the following security problems: - CVE-2008-0600: A local privilege escalation was found in the vmsplice_pipe system call, which could be used by local attackers to gain root access. - CVE-2007-6206: Core dumps from root might be accessible to the wrong owner. And the following bugs (numbers are https://bugzilla.novell.com/ references): - Update to minor kernel version 2.6.22.17 - networking bugfixes - contains the following patches which were removed: - patches.arch/acpica-psd.patch - patches.fixes/invalid-semicolon - patches.fixes/nopage-range-fix.patch - patches.arch/acpi_thermal_blacklist_add_r50p.patch: Avoid critical temp shutdowns on specific Thinkpad R50p (https://bugzilla.novell.com/show_bug.cgi?id=333043). - Update config files. CONFIG_USB_DEBUG in debug kernel - patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid sas IRQ to non-threaded IRQ (337489). - patches.drivers/libata-implement-force-parameter added to series.conf. - patches.xen/xen3-fixup-arch-i386: xen3 i386 build fixes. - patches.xen/xenfb-module-param: Re: Patching Xen virtual framebuffer. kernel-kdump.rpm This kernel update fixes the following security problems: - CVE-2008-0600: A local privilege escalation was found in the vmsplice_pipe system call, which could be used by local attackers to gain root access. - CVE-2007-6206: Core dumps from root might be accessible to the wrong owner. And the following bugs (numbers are https://bugzilla.novell.com/ references): - Update to minor kernel version 2.6.22.17 - networking bugfixes - contains the following patches which were removed: - patches.arch/acpica-psd.patch - patches.fixes/invalid-semicolon - patches.fixes/nopage-range-fix.patch - patches.arch/acpi_thermal_blacklist_add_r50p.patch: Avoid critical temp shutdowns on specific Thinkpad R50p (https://bugzilla.novell.com/show_bug.cgi?id=333043). - Update config files. CONFIG_USB_DEBUG in debug kernel - patches.rt/megasas_IRQF_NODELAY.patch: Convert megaraid sas IRQ to non-threaded IRQ (337489). - patches.drivers/libata-implement-force-parameter added to series.conf. - patches.xen/xen3-fixup-arch-i386: xen3 i386 build fixes. - patches.xen/xenfb-module-param: Re: Patching Xen virtual framebuffer. rt2x00-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. pcfclock-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. aufs-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. at76_usb-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. lirc-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. ib-bonding-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. uvcvideo-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. quickcam-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. rfswitch-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. cloop-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. rtl8187-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. acx-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. rt2x00-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. rtl8187-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. acx-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. adm8211-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. gspcav-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. ib-bonding-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. uvcvideo-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. nouveau-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. quickcam-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. adm8211-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. ib-bonding-kmp-kdump.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. p54-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. pcfclock-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. aufs-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. rfswitch-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. itrace-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. cloop-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. at76_usb-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. drbd-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. drbd-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. p54-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. gspcav-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. lirc-kmp-ppc64.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. nouveau-kmp-default.rpm This update contains kernel module packages for 10.3 for the update to 2.6.22.17, which is necessary since some kernel requires/provides changed. It contains all kernel module packages necessary. timezone.rpm Update of timezone data for Argentina reflecting DST adoption since Jan 1. MozillaFirefox-translations.rpm This update brings Mozilla Firefox to security update version 2.0.0.12 Following security problems were fixed: - MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with div overlay - MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect - MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files - MFSA 2008-08/CVE-2008-0591 File action dialog tampering - MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing - MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI - MFSA 2008-04/CVE-2008-0417 Stored password corruption - MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution - MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities - MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12) MozillaFirefox.rpm This update brings Mozilla Firefox to security update version 2.0.0.12 Following security problems were fixed: - MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with div overlay - MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect - MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files - MFSA 2008-08/CVE-2008-0591 File action dialog tampering - MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing - MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI - MFSA 2008-04/CVE-2008-0417 Stored password corruption - MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution - MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities - MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12)