---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: SUSE update for file SECUNIA ADVISORY ID: SA25931 VERIFY ADVISORY: http://secunia.com/advisories/25931/ CRITICAL: Less critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: SUSE Linux 10 http://secunia.com/product/6221/ SUSE Linux 10.1 http://secunia.com/product/10796/ openSUSE 10.2 http://secunia.com/product/13375/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ SOFTWARE: Novell Open Enterprise Server http://secunia.com/product/4664/ DESCRIPTION: SUSE has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA24548 SOLUTION: Apply updated packages. x86 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/file-4.17-27.i586.rpm 71fb39025842635d3d2a369f67d36966 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/file-devel-4.17-27.i586.rpm 58c8c5cc8219c3a27c6fa35c00d562d1 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/file-4.16-15.13.i586.rpm 0dfcb7061a69c3ea263e259cdc5622a3 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/file-devel-4.16-15.13.i586.rpm 81647420e3676bd1327ad3ee93a2d66c SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/file-4.14-3.5.i586.rpm 2b6b5eb1e6713683ab0062237b18b270 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/file-devel-4.14-3.5.i586.rpm c2341c2361c6ff61a975471a077d8370 Power PC Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/file-4.17-27.ppc.rpm a34ffaaa3557c9d95b410fb13305feb5 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/file-devel-4.17-27.ppc.rpm f37b44f3b7faaa5614108f243199478d SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/file-4.16-15.13.ppc.rpm 56f3f787274846955a55a47df9d80f47 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/file-devel-4.16-15.13.ppc.rpm 293aaa3d05a2446c4735e5d60ece2e61 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/file-4.14-3.5.ppc.rpm 01722877b74c715ccaf9bfc57cdb4537 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/file-devel-4.14-3.5.ppc.rpm d46fdd9f2cf95e14bea4e6bdfd304d78 x86-64 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/file-32bit-4.17-27.x86_64.rpm 04fa107453847fdbacba7ac20c416c14 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/file-4.17-27.x86_64.rpm 9b25a6c3c36b64da56d18c64c0d41541 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/file-devel-4.17-27.x86_64.rpm 43ad432ef1020371d63a955cba3b4904 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/file-32bit-4.16-15.13.x86_64.rpm 97f580b6bd4ab6afc3484bb9c75aa27a ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/file-4.16-15.13.x86_64.rpm 5b2fc247062c970cc6bfd8fcd7de8b51 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/file-devel-4.16-15.13.x86_64.rpm 6857325d13a32187461b980f47f8e52f SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/file-32bit-4.14-3.5.x86_64.rpm a84f3907a7384a27b532c370bfc90371 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/file-4.14-3.5.x86_64.rpm 09430fce30b187c0bc78829ace54fbe6 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/file-devel-4.14-3.5.x86_64.rpm 17168aee14e6bffdf6b300e24e3e2568 Sources: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/file-4.17-27.src.rpm 63b8e44129d7526ffb6562a2d811933f SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/file-4.16-15.13.src.rpm 06e9f7f0ce0217a20bab1b572004a513 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/file-4.14-3.5.src.rpm 515371c885768d38cf506c1cd8227ca3 Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web: SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/16b049160f20102b048862a6595a6130.html SLE SDK 10 SP1 http://support.novell.com/techcenter/psdb/16b049160f20102b048862a6595a6130.html SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/16b049160f20102b048862a6595a6130.html Open Enterprise Server http://support.novell.com/techcenter/psdb/40f3a050df9659ee95c994d2fde2b2b0.html Novell Linux POS 9 http://support.novell.com/techcenter/psdb/40f3a050df9659ee95c994d2fde2b2b0.html Novell Linux Desktop 9 http://support.novell.com/techcenter/psdb/40f3a050df9659ee95c994d2fde2b2b0.html SUSE SLES 9 http://support.novell.com/techcenter/psdb/40f3a050df9659ee95c994d2fde2b2b0.html ORIGINAL ADVISORY: http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00002.html OTHER REFERENCES: SA24548: http://secunia.com/advisories/24548/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------