The OVAL Repository5.82015-09-03T09:54:35.354-04:00SUSE-RU-2013:0291-1 -- Recommended update for release-notes-sledSUSE Linux Enterprise Desktop 10release-notes-sledThis update provides the latest version of the Release
Notes for SUSE Linux Enterprise Desktop 10 SP4.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0322-1 -- Security update for wiresharkSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10wiresharkwireshark was updated to 1.8.5 (bnc#801131), fixing bugs
and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0471-1 -- Security update for Mozilla FirefoxSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10Mozilla FirefoxMozillaFirefox has been updated to the 17.0.4ESR release.
Besides the major version update from the 10ESR stable
release line to the 17ESR stable release line, this update
brings critical security and bugfixes.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0327-1 -- Security update for squidSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10squidA denial of service problem in Squid via invalid
Content-Length headers and memory leaks has been fixed.
(CVE-2012-5643,CVE-2013-0189, SQUID-2012:1)
Also a logrotate permission issue has been fixed.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0373-1 -- Security update for flash-playerSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10flash-playerflash-player has been updated to 11.2.202.273 security
update, which fixes several critical security bugs that
could have been used by remote attackers to execute code.
(CVE-2013-0504, CVE-2013-0643, CVE-2013-0648)
More information can be found on:
https://www.adobe.com/support/security/bulletins/apsb13-08.h
tml
<https://www.adobe.com/support/security/bulletins/apsb13-08.
html>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0437-1 -- Recommended update for partedSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10partedThis collective update for parted provides the following
fixes:
* Fix automatic correcting of GPT label which can cause
problems on systems which use dmraid
* Fix issues while resizing ReiserFS file systems with
YaST2, when parted could either hang or fail to resize the
file system.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0246-1 -- Recommended update for ipmitoolSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10ipmitoolThis collective update for ipmitool provides the following
fixes:
* Fix reading of FRU data from servers where FRU/SDR
device #0, LUN 0 is absent (bnc#789624)
* Fix a string handling problem in ipmi_sel.c that
could cause a segmentation fault (bnc#788393)
* Fix reading of sensors from some specific servers
over lanplus (bnc#794160)
* Handle "BCDplus" fields in FRU descriptors correctly
* Retrieve and print sensor data records (sdr)
correctly (bnc#761203)
* Do not crash in fru command if the lanplus password
is wrong (bnc#767413)
* Do not crash (assert(0)/abort) when BMC replies with
the wrong session id (bnc#729514)
* Fix detection if it is no longer connected to BMC
(bnc#739377)
* Fix ipmitool on UV10 systems (bnc#614916)
* Add sanity checks for erroneous SDR data (bnc#604896).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0409-1 -- Recommended update for timezoneSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10timezoneThis update provides the latest timezone information for
your system. The changes in detail are:
* Chile is changing its DST rules
* Estimate Morocco 2013-2038 transitions for Ramadan
* New alias Europe/Busingen for Europe/Zurich
* New zones Asia/Khandyga, Asia/Ust-Nera
* Libya moving to CET, but with DST.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0349-1 -- Security update for acroreadSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10acroreadAcrobat Reader has been updated to 9.5.4 which fixes two
critical security issues where attackers supplying PDFs
could have caused code execution with acrobat.
(CVE-2013-0640, CVE-2013-0641)
More information can be found on:
https://www.adobe.com/support/security/bulletins/apsb13-07.h
tml
<https://www.adobe.com/support/security/bulletins/apsb13-07.
html>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0798-1 -- Security update for flash-playerSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10flash-playerAdobe flash-player has been updated to 11.2.202.285
security update, which fixes various remote code execution
problems and other security issues.
Some more details can be found on:
https://www.adobe.com/support/security/bulletins/apsb13-14.h
tml
<https://www.adobe.com/support/security/bulletins/apsb13-14.
html>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0440-4 -- Security update for JavaSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10JavaIBM Java 5 has been updated to SR16 which fixes various
critical security issues and bugs.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0846-1 -- Recommended update for apparmor-profilesSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10apparmor-profilesThis update for apparmor-profiles provides fixes in ntpd's
profile which is allowing the daemon to access all needed
files in /proc.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0822-1 -- Security update for nfs-utilsSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10nfs-utilsThis update fixes a DNS spoofing problem with NFS
rpc-gssd. (CVE-2013-1923)(bnc#813464)
Security Issue reference:
* CVE-2013-1923
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0442-1 -- Security update for PerlSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10PerlThis update of Perl 5 fixes the following security issues:
* fix rehash DoS [bnc#804415] [CVE-2013-1667]
* improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
* fix glob denial of service [bnc#796014]
[CVE-2011-2728]
* sanitize input in Maketext.pm [bnc#797060]
[CVE-2012-6329]
* make getgrent work with long group entries
[bnc#788388]
Security Issue reference:
* CVE-2013-1667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1001-1 -- Recommended update for supportutilsSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10supportutilsThis update fixes the following issues:
- supportconfig: 2.25-370
- supportconfig: 2.25-359
- supportconfig: 2.25-358
- supportconfig: 2.25-350Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0645-1 -- Security update for Mozilla FirefoxSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10Mozilla FirefoxMozillaFirefox has been updated to the 17.0.5ESR release
fixing bugs and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0996-1 -- Recommended update for lvm2SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10lvm2The following issue has been fixed:
* SLE-10-SP4 LVM2 pvmove event deregistration failed:
No such device (bnc#748617)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0857-1 -- Security update for xorg-x11-serverSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10xorg-x11-serverIn some cases, input events are sent to X servers not
currently the VT owner, allowing a user to capture
passwords. This update fixes this issue. CVE-2013-1940 has
been assigned to this issue.
Security Issue reference:
* CVE-2013-1940
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1061-1 -- Security update for gpgSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10gpgThis update for gpg provides the following fixes:
* Set proper file permissions when en/de-crypting files
(bnc#780943)
* Fix an issue that could cause corruption of the
public keys database. (CVE-2012-6085, bnc#798465)
Security Issue reference:
* CVE-2012-6085
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0795-1 -- Security update for libtiffSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10libtiffThis update fixes two buffer overflow security issues with
libtiff:
* CVE-2013-1960
* CVE-2013-1961Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0458-1 -- Security update for flash-playerSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10flash-playerAdobe Flash Player has been updated to security release
11.2.202.275 (APSB13-09), fixing severe security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0869-1 -- Recommended update for autofs5SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10autofs5This collective update for AutoFS provides fixes for some issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0595-1 -- Security update for popplerSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10popplerThis update of poppler fixes the following vulnerabilities:
* CVE-2013-1788: Various invalid memory issues could be
used by attackers supplying PDFs to crash the PDF viewer or
potentially execute code.
* CVE-2013-1789: A crash in poppler could be used by
attackers providing PDFs to crash the PDF viewer.
* CVE-2013-1790: An uninitialized memory read could be
used by attackers providing PDFs to crash the PDF viewer.
This also fixes that transparent background in images are
rendered black with evince. (bnc#745620).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0837-1 -- Security update for subversionSUSE Linux Enterprise Desktop 10subversionThis update fixes several DoS vulnerabilities in
subversion's mod_dav_svn Apache HTTPD server module.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1166-1 -- Security update for compat-curl2SUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10compat-curl2This update of compat-curl2 fixes a security vulnerability:
* libcurl URL decode buffer boundary flaw (bnc#824517 /
CVE-2013-2174)
Security Issue reference:
* CVE-2013-2174
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0856-1 -- Security update for Linux kernelSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10Linux kernelThe SUSE Linux Enterprise 10 SP4 kernel has been updated to
fix various bugs and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1059-1 -- Security update for clamavSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10clamavThis update contains clamav 0.97.8 which fixes security
issues (bnc#816865):
* CVE-2013-2020: Fix heap corruption
* CVE-2013-2021: Fix overflow due to PDF key length
computation.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0388-1 -- Security update for pidginSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10pidginidgin was updated to fix 4 security issues:
* Fixed a crash when receiving UPnP responses with
abnormally long values. (CVE-2013-0274, bnc#804742)
* Fixed a crash in Sametime protocol when a malicious
server sends us an abnormally long user ID. (CVE-2013-0273,
bnc#804742)
* Fixed a bug where the MXit server or a
man-in-the-middle could potentially send specially crafted
data that could overflow a buffer and lead to a crash or
remote code execution.(CVE-2013-0272, bnc#804742)
* Fixed a bug where a remote MXit user could possibly
specify a local file path to be written to. (CVE-2013-0271,
bnc#804742)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0674-1 -- Security update for Linux kernelSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10Linux kernelThis Linux kernel update fixes various security issues and
bugs in the SUSE Linux Enterprise 10 SP4 kernel.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0858-1 -- Security update for glibcSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10glibcThis collective update for the GNU C library (glibc)
provides the following fixes:
* Fix stack overflow in getaddrinfo with many results
(bnc#813121, CVE-2013-1914)
* Fix locking in _IO_cleanup (bnc#796982)
* Fix buffer overflow in glob (bnc#691365)
* Fix memory leak in execve (bnc#805899)
Security Issue reference:
* CVE-2013-1914
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0756-1 -- Security update for ImageMagickSUSE Linux Enterprise Desktop 10ImageMagickImageMagick has been updated to fix an integer overflow
(CVE-2012-3438).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0744-1 -- Security update for libxml2SUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10libxml2libxml2 has been updated to fix entity expansion problems:
* CVE-2013-0338: Internal entity expansion within XML
was not bounded, leading to simple small XML files being
able to cause "out of memory" denial of service conditions.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0343-1 -- Recommended update for CUPSSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10CUPSThis update for CUPS adjusts the translations of site
templates to send the session ID on POST operations.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1183-1 -- Security update for xorg-x11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10xorg-x11This update of xorg-x11 fixes several security
vulnerabilities.
* Bug 815451- X.Org Security Advisory: May 23, 2013
* Bug 821664 - libX11
* Bug 821671 - libXv
* Bug 821670 - libXt
* Bug 821669 - libXrender
* Bug 821668 - libXp
* Bug 821667 - libXfixes
* Bug 821665 - libXext
* Bug 821663 - libFS, libXcursor, libXi, libXinerama,
libXRes, libXtst, libXvMC, libXxf86dga, libXxf86vm, libdmxSergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1184-1 -- Recommended update for timezoneSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10timezoneThis update provides the latest timezone information for
your system. The changes in detail are:
* Morocco's midsummer transitions this year are July 7
and August 10
* Israel now falls back from DST on the last Sunday of
October
* Palestine observed DST starting March 29, 2013
* From 2013 on, Gaza and Hebron both observe DST.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1166-2 -- Security update for curlSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10curlThis update of curl fixes several security issues.
* libcurl URL decode buffer boundary flaw (bnc#824517 /
CVE-2013-2174)
Security Issue reference:
* CVE-2013-2174
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0554-1 -- Security update for OpenSSLSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10OpenSSLOpenSSL has been updated to fix several security issues:
*
CVE-2012-4929: Avoid the openssl CRIME attack by
disabling SSL compression by default. Setting the
environment variable "OPENSSL_NO_DEFAULT_ZLIB" to "no"
enables compression again.
Please note that openssl on SUSE Linux Enterprise 10
is not built with compression support.
*
CVE-2013-0169: Timing attacks against TLS could be
used by physically local attackers to gain access to
transmitted plain text or private keymaterial. This issue
is also known as the "Lucky-13" issue.
*
CVE-2013-0166: A OCSP invalid key denial of service
issue was fixed.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0703-2 -- Recommended update for kshSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10kshThis update to Korn Shell 93u+ provides fixes for many
issues, including:
* Fix segmentation fault on typeset on ENV variable.
(bnc#803613)
* Do not free data which is used later on in the hash
tree of reloaded shell functions. (bnc#795324)
* Make sure that tty is closed even if an interrupt
arrived during close. (bnc#790315)
* Fix truncation of variables when TMOUT is used.
(bnc#808956)
* Fix syntax error on command substitution in
here-document. (bnc#804998)
* Make Shift_JIS patch more reliable as requested by
upstream.
For a comprehensive list of fixes please refer to the
package's change log.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0617-1 -- Security update for ClamAVSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10ClamAVClamAV has been updated to the 0.97.7 release that contains
various security related hardening fixes.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0731-1 -- Security update for GnuTLSSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10GnuTLSThis GnuTLS update fixes incorrect padding which weakens
the encryption. CVE-2013-1619 has been assigned to this
issue.
Security Issue reference:
* CVE-2013-1619
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0325-1 -- Security update for SambaSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10SambaThe Samba Web Administration Tool (SWAT) in Samba versions
3.0.x to 4.0.1 was affected by a cross-site request
forgery (CVE-2013-0214) and a click-jacking attack
(CVE-2013-0213). This has been fixed.
Additionally a bug in mount.cifs has been fixed which could
have lead to file disclosure (CVE-2012-1586).
Also a uninitialized memory read bug in talloc_free() has
been fixed. (bnc#764577).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1217-1 -- Security update for subversionSUSE Linux Enterprise Desktop 10subversionThis update of subversion fixes two potential DoS
vulnerabilities (bug#821505, CVE-2013-1968, CVE-2013-2112).
*
Server-side bugfixes:
o fix FSFS repository corruption due to newline
in filename (issue #4340) o fix svnserve exiting when a
client connection is aborted (r1482759)
*
Other tool improvements and bugfixes:
o fix argument processing in contrib hook scripts
(r1485350)
Security Issues:
* CVE-2013-1968
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968
>
* CVE-2013-2112
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0793-1 -- Security update for sudoSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10sudoThis update fixes the following security issues which
allowed to bypass the sudo authentication: CVE-2013-1775,
CVE-2013-1776, CVE-2013-2776 and CVE-2013-2777.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1260-2 -- Security update for rubySUSE Linux Enterprise Desktop 10rubyRuby failed to check hostnames correctly when setting up a
SSL client connection. CVE-2013-4073 was assigned to this
issue.
Security Issues:
* CVE-2013-4073
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1290-2 -- Recommended update for release-notes-sledSUSE Linux Enterprise Desktop 10release-notes-sledThis announcement marks the end of the security and
maintenance patch period for SUSE Linux Enterprise Desktop
10 Service Pack 4 and the end of General Support for SUSE
Linux Enterprise 10.
In order to keep your systems up to date and secure, please
migrate your systems to SUSE Linux Enterprise Desktop 11
Service Pack 3. All customers with active SUSE Linux
Enterprise Desktop subscriptions can migrate to SUSE Linux
Enterprise Desktop 11 Service Pack 3 at no additional cost.
For more information on how to upgrade to SUSE Linux
Enterprise Desktop 11 Service Pack 3, please read:
https://www.suse.com/support/kb/doc.php?id=7012368
<https://www.suse.com/support/kb/doc.php?id=7012368>
Please make sure that you applied all maintenance updates
provided for SUSE Linux Enterprise Desktop 10 Service Pack
4 before starting the migration.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0727-1 -- Security update for libxsltSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10libxsltlibxslt has been updated to fix two denial of service
issues via crashes by NULL pointer dereference on attacker
supplied XSLT scripts (CVE-2012-6139).Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1190-1 -- Security update for krb5SUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10krb5This krb5 update fixes a security issue.
* kpasswd UDP ping-pong (bug#825985 / CVE-2002-2443)
Security Issue reference:
* CVE-2002-2443
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1105-1 -- Recommended update for SambaSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10SambaThis collective update for Samba provides the following
fixes:
* Fix 'map untrusted to domain' with NTLMv2.
(bnc#817919)
* Fix logon of AD users with many group memberships.
(bnc#657026)
* CIFS: do not restart during dhcp lease renewal when
IP address remains the same. (bnc#573246)
* Relicense source/client/{mount.cifs,mount.h,mtab.c}.c
under GPLv2+Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0772-1 -- Security update for compat-curl2SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10compat-curl2This update of compat-curl2 fixes several security issues.
* fixes for the cookie domain tailmatch vulnerability
(bnc#814655)
* updated curl CA-Cert Bundle (bnc#810010)
* fixes for a potential BEAST attack (bnc#742306)
Security Issue reference:
* CVE-2013-1944
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0547-1 -- Recommended update for timezoneSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10timezoneThis update provides the latest timezone information for
your system. The changes in detail are:
* Haiti uses US daylight-saving rules this year
* Paraguay will end DST on March 24 this year
* Morocco does not observe DST during Ramadan.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0350-1 -- Security update for inkscapeSUSE Linux Enterprise Desktop 10inkscapeinkscape has been updated to fix a XXE (Xml eXternal
Entity) attack during rasterization of SVG images.
(CVE-2012-5656), where the rendering of malicious SVG
images could have connected from inkscape to internal hosts.
Security Issue reference:
* CVE-2012-5656
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0296-1 -- Security update for flash-playerSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10flash-playerThis update for flash-player to version 11.2.202.270,
tracked as ABSP13-05Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0699-1 -- Recommended update for util-linuxSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10util-linuxThis collective update for util-linux provides the
following fixes and enhancements:
Fix creation of partitions spanning across the entire disk
(", , ") in sfdisk(8). (bnc#808155)
Fix typos in taskset(1) man page. (bnc#771925)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0714-1 -- Security update for wiresharkSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10wiresharkwireshark has been updated to 1.8.6 which fixes bugs and
security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1060-1 -- Security update for GnuTLSSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10GnuTLSThis update of GnuTLS fixes a regression introduced by the
previous update that could have resulted in a Denial of
Service (application crash).
Security Issue reference:
* CVE-2013-2116
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0286-1 -- Recommended update for nfs-utilsSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10nfs-utilsThis update for the NFS support utilities (nfs-utils)
provides the following fixes:
* Allow gssd to work with more than 1024 connections,
depending on the 'nofile' resource limit. Increase this
limit to 4096 before starting rpc.gssd
* Fix a signal handling issue that could cause silent
termination of the rpc.idmapd daemonSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1098-2 -- Security update for MesaSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10MesaThis update of Mesa fixes multiple integer overflows.
Security Issue reference:
* CVE-2013-1993
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0843-1 -- Security update for Mozilla FirefoxSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10Mozilla FirefoxMozilla Firefox has been updated to the 17.0.6ESR security
release.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1213-1 -- Security update for flash-playerSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10flash-playerAdobe flash-player has been updated to version 11.2.202.291
(ABSP13-17) which fixes bugs and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0835-2 -- Security update for Java 1.5.0SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10Java 1.5.0IBM Java 1.5.0 has been updated to SR13-FP2 which fixes
several bugs and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1115-1 -- Recommended update for kshSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10kshThis update for Korn Shell provides fixes for the following
issues:
* #808449: set -k does not work properly with
ksh-93t-13.17 and higher
* #814135: crash in bestreclaim() after traversing a
memory block with a very large size
* #824187: set -k breaks aliases with ksh-93u.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0773-1 -- Security update for curl, curlSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10curlThis update fixes the cookie domain tailmatch vulnerability
in curl. CVE-2013-1944 has been assigned to this issue.
Also the CA-Cert Bundle has been updated to the current
state.
Security Issue reference:
* CVE-2013-1944
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1076-1 -- Recommended update for krb5SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10krb5This update for Kerberos 5 provides the following fixes and
enhancements:
* Improved compatibility with processes that handle
large numbers of open files (bnc#787272)
* Fixed memory leak in gss_accept_sec_context() and
other functions (bnc#808191)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1150-1 -- Security update for openswanSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10openswanThis openswan update fixes a remote buffer overflow issue
(bnc#824316 / CVE-2013-2053).
Security Issue reference:
* CVE-2013-2053
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053
>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:1066-1 -- Recommended update for curlSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10curlThis update for curl adds Digicert certificates to the CA
bundle.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0809-1 -- Security update for Acrobat ReaderSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10Acrobat ReaderAcrobat Reader has been updated to version 9.5.5.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0288-1 -- Security update for flash-playerSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10flash-playerAdobe Flash Player was updated to release 11.2.202.262,
fixing bugs and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1263-1 -- Security update for java-1_5_0-ibmSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10java-1_5_0-ibmIBM Java 1.5.0 has been updated to SR16-FP3 to fix bugs and
security issues.
Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Also the following bug has been fixed:
* add Europe/Busingen to tzmappings (bnc#817062)
* mark files in jre/bin and bin/ as executable
(bnc#823034)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0701-2 -- Security update for java-1_6_0-ibmSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10java-1_6_0-ibmIBM Java 6 was updated to SR13 FP1, fixing bugs and
security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0634-1 -- Recommended update for XorgSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10XorgThis update for xorg-x11 provides fixes for the following
issues:
* 743810: Xnest to remote machine displays black screen
* 805590: Xvnc server crashes while launching Java
Swing application.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1276-1 -- Security update for wiresharkSUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 10wiresharkThis wireshark version update to 1.6.16 includes several
security and general bug fixes.
http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html
<http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.htm
l>
* The CAPWAP dissector could crash. Discovered by
Laurent Butti. (CVE-2013-4074)
* The HTTP dissector could overrun the stack.
Discovered by David Keeler. (CVE-2013-4081)
* The DCP ETSI dissector could crash. (CVE-2013-4083)
http://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html
<http://www.wireshark.org/docs/relnotes/wireshark-1.6.15.htm
l>
* The ASN.1 BER dissector could crash. ( CVE-2013-3556
CVE-2013-3557 )
The releases also fix various non-security issues.
Additionally, a crash in processing SCTP filters has been
fixed. (bug#816887)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1165-1 -- Security update for libcurl4SUSE Linux Enterprise Desktop 10libcurl4This update of curl fixes several security issues:
* libcurl URL decode buffer boundary flaw (bnc#824517 /
CVE-2013-2174)
* cookie domain tailmatch (bnc#814655 / CVE-2013-1944)
* curl sets SSL_OP_ALL (bnc#742306 / CVE-2011-3389)
* When SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is
enabled, does not properly prevent modification of the
ciphersuite in the session cache, which allows remote
attackers to force the downgrade to an unintended cipher
via vectors involving sniffing network traffic to discover
a session identifier (CVE-2010-4180)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-RU-2013:0557-1 -- Recommended update for nfs-clientSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10nfs-clientThis update for the NFS support utilities (nfs-client,
nfs-kernel-server) enhances gssd to work with more than
1024 connections, respecting the 'nofile' resource limit.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:0670-2 -- Security update for flash-playerSUSE Linux Enterprise Desktop 10flash-playerAdobe Flash Player has been updated to 11.2.202.280 to fix
various bugs and security issues.
More information can be found on:
http://www.adobe.com/support/security/bulletins/apsb13-11.ht
ml
<http://www.adobe.com/support/security/bulletins/apsb13-11.h
tml>
* APSB13-11, CVE-2013-1378, CVE-2013-1379,
CVE-2013-1380, CVE-2013-2555Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDSUSE-SU-2013:1153-1 -- Security update for Mozilla FirefoxSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 10SUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 10Mozilla FirefoxMozilla Firefox has been updated to the 17.0.7 ESR version,
which fixes bugs and security issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDACCEPTEDSUSE Linux Enterprise Desktop 11.x is installedSUSE Linux Enterprise Desktop 11SUSE Linux Enterprise Desktop 11.x is installed.Maria MikhnoDRAFTINTERIMACCEPTEDACCEPTEDSUSE Linux Enterprise Desktop 10 is installedSUSE Linux Enterprise Desktop 10SUSE Linux Enterprise Desktop 10 is installed.Thomas R. JonesDRAFTJonathan BakerINTERIMACCEPTEDNicholas HansenINTERIMACCEPTEDChandan SINTERIMACCEPTEDEvgeniy PavlovINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDSUSE Linux Enterprise Server 11.x is installedSUSE Linux Enterprise Server 11SUSE Linux Enterprise Server 11.x is installed.Maria KedovskayaDRAFTINTERIMACCEPTEDEvgeniy PavlovINTERIMACCEPTEDACCEPTEDSUSE Linux Enterprise Server 10 is installedSUSE Linux Enterprise Server 10SUSE Linux Enterprise Server 10 is installed.Thomas R. JonesDRAFTINTERIMACCEPTEDNicholas HansenINTERIMACCEPTEDEvgeniy PavlovINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDcpe:/o:novell:suse_linux:10:serverrelease-notes-sledmhtml-firefoxsquidpartedparted-develparted-32bitipmitooltimezone-javatimezoneacroread-cmapsacroread-fonts-koacroread-fonts-zh_TWacroread-fonts-jaacroread-fonts-zh_CNflash-player-gnomeflash-player-kde4apparmor-profilesperl-32bitperlsupportutilslibfreebl3-32bitmozilla-nspr-32bitMozillaFirefoxMozillaFirefox-translationsmozilla-nspr-devellibfreebl3mozilla-nss-develmozilla-nss-toolsmozilla-nsprmozilla-nss-32bitmozilla-nsslvm2gpggpg2libtiff-32bitlibtiff3-32bitlibtiff-develtifflibtiff-devel-32bitlibtiff3libtiffflash-player-gnomeflash-player-kde4autofs5popplerpoppler-glibpoppler-qtpoppler-develcompat-curl2kernel-vmikernel-symskernel-defaultkernel-xenpaekernel-vmipaekernel-kdumppaekernel-bigsmplibpurplelibpurple-meanwhilefinchpidginlibpurple-tcllibpurple-langkernel-xenpaekernel-kdumpkernel-vmikernel-xenkernel-bigsmpkernel-symskernel-defaultkernel-sourcekernel-smpkernel-vmipaekernel-kdumppaekernel-debugglibc-localeglibcglibc-devel-32bitglibc-locale-32bitglibc-htmlglibc-infoglibc-i18ndataglibc-profile-32bitnscdglibc-profileglibc-develglibc-32bitperl-PerlMagickImageMagick-Magick++ImageMagick-develImageMagicklibxml2-devellibxml2-32bitlibxml2-devel-32bitlibxml2-pythonlibxml2-doclibxml2cupscups-develcups-libs-32bitcups-clientcups-libsxorg-x11-libs-32bitxorg-x11-fonts-75dpixorg-x11-manxorg-x11-Xvncxorg-x11-fonts-syriacxorg-x11-server-glxxorg-x11-devel-32bitxorg-x11-fonts-cyrillicxorg-x11-fonts-scalabletimezone-javatimezoneopenssl-docopenssl-32bitopenssl-developensslopenssl-devel-32bitclamavlibgnutls26libgnutls26-32bitlibgnutls-extra26samba-32bitsamba-docldapsmblibmsrpcsamba-vscansamba-client-32bitsamba-pythonsamba-winbind-32bitsambasamba-krb-printinglibmsrpc-devellibsmbclient-32bitsubversion-develsubversionsudorubyrelease-notes-sledlibxslt-devellibxsltlibxslt-devel-32bitlibxslt-32bitkrb5-devel-32bitkrb5-apps-serverskrb5-clientkrb5-32bitkrb5-apps-clientslibsmbclientsamba-client-32bitsamba-winbind-32bitlibmsrpclibsmbclient-develsamba-krb-printingsamba-32bitcifs-mountsamba-winbindsamba-vscanlibsmbclient-32bitsambalibmsrpc-develsamba-clientsamba-pythonldapsmbcompat-curl2-32bitcompat-curl2timezonetimezone-javainkscapeutil-linuxlibgnutls26-32bitlibgnutls26libgnutls-extra26gnutls-32bitgnutlsgnutls-devel-32bitgnutls-develMesaMesa-develMesa-32bitMesa-devel-32bitMozillaFirefoxMozillaFirefox-translationsflash-player-kde4flash-player-gnomejava-1_5_0-ibm-demojava-1_5_0-ibm-develjava-1_5_0-ibm-srcjava-1_5_0-ibm-alsa-32bitjava-1_5_0-ibm-pluginjava-1_5_0-ibm-fontsjava-1_5_0-ibm-32bitjava-1_5_0-ibmjava-1_5_0-ibm-jdbcjava-1_5_0-ibm-devel-32bitjava-1_5_0-ibm-alsakshksh-develkrb5krb5-apps-clientskrb5-apps-serverskrb5-devel-32bitkrb5-develkrb5-32bitkrb5-clientkrb5-serveropenswan-docopenswancurl-develcurl-32bitcurlacroread-cmapsacroread-fonts-zh_CNacroread-fonts-jaacroread-fonts-koacroread-fonts-zh_TWacroreadflash-player-kde4flash-player-gnomejava-1_5_0-ibm-32bitjava-1_5_0-ibm-devel-32bitjava-1_5_0-ibm-jdbcjava-1_5_0-ibm-pluginjava-1_5_0-ibm-demojava-1_5_0-ibmjava-1_5_0-ibm-alsa-32bitjava-1_5_0-ibm-srcjava-1_5_0-ibm-develjava-1_5_0-ibm-fontsjava-1_5_0-ibm-alsajava-1_5_0-ibm-alsa-32bitjava-1_5_0-ibm-fontsjava-1_5_0-ibmjava-1_5_0-ibm-demojava-1_6_0-ibm-alsajava-1_5_0-ibm-jdbcjava-1_5_0-ibm-pluginjava-1_6_0-ibm-devel-32bitjava-1_6_0-ibm-pluginjava-1_5_0-ibm-alsajava-1_5_0-ibm-srcjava-1_6_0-ibm-plugin-32bitjava-1_5_0-ibm-develjava-1_5_0-ibm-32bitjava-1_5_0-ibm-devel-32bitjava-1_6_0-ibm-32bitjava-1_6_0-ibm-jdbcjava-1_6_0-ibmjava-1_6_0-ibm-fontsjava-1_6_0-ibm-alsa-32bitjava-1_6_0-ibm-develxorg-x11-server-glxxorg-x11-Xvncxorg-x11-fonts-100dpixorg-x11-Xnestxorg-x11-fonts-75dpixorg-x11-libsxorg-x11-fonts-syriacxorg-x11-sdkxorg-x11-Xvfbxorg-x11-serverxorg-x11xorg-x11-libs-32bitxorg-x11-docxorg-x11-develxorg-x11-fonts-scalablexorg-x11-fonts-cyrillicxorg-x11-devel-32bitxorg-x11-manwiresharkwireshark-devellibcurl4-32bitlibcurl4nfs-kernel-servernfs-docnfs-utilsnfs-clientflash-playersled-releasesles-releaseMozillaFirefoxMozillaFirefox-translationsMozillaFirefox-branding-SLED0:10.4.9-0.8.10:1.8.5-0.2.10:1.6.13-0.5.10:0.5-1.13.40:17.0.4esr-0.7.10:7-0.10.40:4.9.4-0.6.30:3.14.1-0.6.30:2.5.STABLE12-18.13.982.4.10:2.7.STABLE5-2.12.12.10:11.2.202.273-0.5.10:11.2.202.273-0.3.10:1.6.25.1-15.37.10:1.8.11-5.10.40:2013a-0.4.10:2013a-0.6.10:9.5.4-0.3.10:9.4.6-0.6.600:9.5.4-0.6.10:9.4.6-0.4.3.10:11.2.202.285-0.5.10:11.2.202.285-0.3.10:1.5.0_sr16.0-0.6.10:2.0.1-20.28.10:1.0.7-36.52.10:5.8.8-14.21.30:1.20-0.28.73.10:1.20-0.73.10:7-0.10.110:17.0.5esr-0.4.10:7-0.6.9.170:17.0.5esr-0.8.10:4.9.6-0.3.10:4.9.6-0.5.10:3.14.3-0.4.3.10:3.14.3-0.5.10:2.02.17-7.40.10:6.9.0-50.82.10:1.4.2-23.21.10:1.9.18-17.23.10:3.8.2-141.152.10:3.8.2-5.34.10:11.2.202.275-0.5.10:11.2.202.275-0.3.10:5.0.5-0.22.20:0.4.4-19.29.10:1.3.1-1.22.10:7.19.7-1.20.27.10:7.19.7-1.28.10:7.11.0-20.11.10:2.6.16.60-0.103.10:0.97.8-0.5.10:0.97.8-0.2.10:2.6.6-0.20.10:2.6.6-0.19.10:2.6.16.60-0.101.10:2.4-31.109.10:6.2.5-16.36.20:2.6.23-15.37.10:2.7.6-0.23.10:1.1.23-40.64.10:6.9.0-50.84.40:6.9.0-50.84.40:2013d-0.3.10:2013d-0.5.10:7.15.1-19.30.10:0.9.8a-18.76.10:93u-0.23.10:0.97.7-0.3.10:0.97.7-0.5.10:1.2.10-13.32.10:2.4.1-24.39.45.10:3.0.36-0.12.24.10:1.34b-25.13.24.10:0.3.6b-43.13.24.10:3.0.36-0.13.24.10:1.3.1-1.24.10:1.7.6p2-0.2.12.10:1.6.9p23-0.18.10:1.8.6.p369-0.16.10:10.4.9-0.10.10:1.1.15-15.20.10:1.1.24-19.21.10:1.4.3-19.49.53.10:1.6.3-133.49.56.10:0.3.6b-43.13.28.10:3.0.36-0.13.28.10:1.34b-25.13.28.10:7.11.0-20.9.10:2013b-0.5.10:2013b-0.4.10:0.43-20.22.10:11.2.202.270-0.3.10:11.2.202.270-0.5.10:2.12r-35.52.10:1.8.6-0.2.10:1.6.14-0.5.10:2.4.1-24.39.47.10:1.2.10-13.36.10:1.0.7-36.48.10:6.4.2-19.20.20:17.0.6esr-0.8.10:11.2.202.297-0.5.20:11.2.202.297-0.3.10:1.5.0_sr16.2-0.5.10:93u-0.22.10:93u-0.27.50:7.15.1-19.26.10:1.4.3-19.49.51.10:2.4.4-18.21.10:2.6.16-1.38.10:7.15.1-19.28.10:9.5.5-0.3.10:9.4.6-0.4.3.20:9.4.6-0.6.630:9.5.5-0.6.10:11.2.202.262-0.5.10:11.2.202.262-0.3.10:1.5.0_sr16.3-0.5.10:1.5.0_sr16.1-0.5.10:1.6.0_sr13.1-0.9.10:1.6.0_sr13.1-0.14.10:6.9.0-50.80.10:6.9.0-50.80.10:1.6.16-0.5.50:7.19.0-11.6.10:1.0.7-36.50.10:1.2.3-18.29.10:11.2.202.280-0.5.1^11(\.\d)*$^11(\.\d)*$^(i586$)|(x86_64$)$(none)100:7-0.6.9.310:17.0.7esr-0.3.10:17.0.7esr-0.6.10:7-0.10.28