Users login

Create an account »


Users login

Home » Security Advisories » SUSE

SUSE Security Advisories

Here you'll find the latest security advisories from SUSE. Our database currently contains 274 SUSE security advisories.
Page: 123456 out of 11

Security summary report | SR:2005:023 | October 14, 2005
Solved Security Vulnerabilities: imap-lib crashes in client library, texinfo temporary file handling fixes, cfengine temporary file handling fixes, abiword buffer overflow in RTF import filter, variou

RealPlayer remote code execution | SA:2005:059 | October 10, 2005
A format string bug in the RealPlayer RealPix (.rp) file format parser was fixed. This bug allowed remote attackers to execute arbitrary code by supplying a specially crafted file, e.g via Web page or

Security Summary Report | SR:2005:022 | October 07, 2005
Solved Security Vulnerabilities: resmgr usb device restriction problems, liby2util problems with untrusted remote repositories, mediawiki edit history problems, powersave permission problems, bacula t

Security Summary Report | SR:2005:021 | September 30, 2005
Solved Security Vulnerabilities: storeBackup insecure /tmp usage and permissions, squid remote denial of service problems, mysql stack overflow in function handling, util-linux umount privilege escala

Mozilla browsers remote code execution | SA:2005:058 | September 30, 2005
The web browsers Mozilla and Mozilla Firefox have been updated to contain fixes for the vulnerabilities fixed in: Mozilla browser suite version 1.7.12, Mozilla Firefox version 1.0.7. The security pro

Opera remote code execution | SUSE-SA:2005:057 | September 26, 2005
Attached files are opened without any warnings directly from the user's cache directory. This can be exploited to execute arbitrary Javascript in context of "file://". Normally, filename extensions ar

XFree86-server, Xorg-x11-server remote command execution | SUSE-SA:2005:056 | September 26, 2005
The X server memory can be accessed my a malicious X client by exploiting a missing range check in the function XCreatePixmap(). This bug can probably be used to execute arbitrary code with the privil

ClamAv remote code execution | SUSE-SA:2005:055 | September 26, 2005
This update upgrades clamav to version 0.87. It fixes vulnerabilities in handling of UPX and FSG compressed executables, which could lead to a remote attacker executing code within the daemon using cl

Evolution remote code execution | SA:2005:054 | September 16, 2005
Several format string bugs allowed remote attackers to cause evolution to crash or even execute code via full vCard data, contact data from remote LDAP servers, task list data from remote servers or c

Squid remote denial of service | SA:2005:053 | September 15, 2005
This update of the Squid web-proxy fixes two remotely exploitable denial of service vulnerabilities. One can be triggered by aborting a request due to a faultyassertion. The other one occurs in sslCon

Apache2 security issues | SA:2005:052 | September 15, 2005
This update of apache v2 fixes an integer overflow in the PCRE quantifier parsing which can be triggered by a local untrusted user by using a carefully crafted regex in a .htaccess file to execute arb

Security Summary Report | SR:2005:020 | September 12, 2005
Solved security vulnerabilities: kismet remote buffer overflow, openvpn denial of service attack, gaim AOL bugfix, ldap TLS forwarding problem and kaudiocreator cddb file overwrite problem.

Apache2 multiple vulnerabilities | SA:2005:051 | September 12, 2005
This update of apache2 fixes an integer overflow in the PCRE quantifier parsing which can be triggered by a local untrusted user by using a carefully crafted regex in a .htaccess file to execute arbit

PHP remote code execution | SA:2005:051 | September 05, 2005
Bugs in the PEAR::XML_RPC library allowed remote attackers to pass arbitrary PHP code to the eval() function (CAN-2005-1921, CAN-2005-2498). An integer overflow bug was found in the PCRE (perl compati

Kernel denial of service and privilege escalation | SA:2005:050 | September 01, 2005
The Linux kernel was updated to fix the following security issues: a potential buffer overflow in the zlib decompression handling in the kernel was fixed, some return codes in zlib decoding were fixed

Php remote code execution | SA:2005:049 | August 30, 2005
Bugs in the PEAR::XML_RPC library allowed remote attackers to pass arbitrary PHP code to the eval() function. The Pear::XML_RPC library is not used by default in SUSE Linux, but might be used by third

Pcre remote code execution | SA:2005:048 | August 30, 2005
A vulnerability was found in the PCRE regular expression handling library which allows an attacker to crash or overflow a buffer in the program by specifying a special regular expression.

Acrobat Reader remote code execution | SA:2005:047 | August 22, 2005
A buffer overflow was found in the core application plug-in for the Adobe Reader, that allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.

Security Summary Report | SR:2005:019 | August 19, 2005
Solved Security Vulnerabilities: pstopnm use of ghostscript without -dSAFER, gaim various security problems, kopete gadu denial of service attack, squirrelmail various cross site scripting issues, aws

Apache and Apache2 authentication bypass | SA:2005:046 | August 16, 2005
A security flaw was found in the Apache and Apache2 web servers which allows remote attacker to "smuggle" requests past filters by providing handcrafted header entries.

Kernel several security problems | SA:2005:044 | August 04, 2005
This update fixes various security as well as non-security problems discovered since the last round of kernel updates.

Zlib denial of service | SA:2005:043 | July 28, 2005
The previous zlib update for CAN-2005-2096 fixed a flaw in zlib that could allow a carefully crafted compressed stream to crash an application. While the original patch corrected the reported overflo

Security summary report | SR:2005:018 | July 28, 2005
Solved security vulnerabilities in apache2 (HTTP Request Smuggling), clamav (several integer overflows), fetchmail (buffer overflow), Mozilla Firefox (several security issues), ruby (remote attackers

Acrobat Reader remote code execution | SA:2005:042 | July 14, 2005
This update fixes a buffer overflow in Acrobat Reader versions 5, where an attacker could execute code by providing a handcrafted PDF to the viewer.

Security summary | SR:2005:017 | July 13, 2005
Solved Security Vulnerabilities: tcpdump remote denial of service attack, perl-Net-Server remote denial of service attack, gaim remote denial of service attack, pam_krb5 denial of service attack, dhcp

Page: 123456 out of 11

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »