-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                php4,php5
        Announcement ID:        SUSE-SA:2006:024
        Date:                   Fri, 05 May 2006 16:00:00 +0000
        Affected Products:      SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SuSE Linux Enterprise Server 8
                                SUSE SLES 9
                                UnitedLinux 1.0
        Vulnerability Type:     cross site scripting, information leak
        Severity (1-10):        4
        SUSE Default Package:   no
        Cross-References:       CVE-2006-0996, CVE-2006-1014, CVE-2006-1015
                                CVE-2006-1490, CVE-2006-1494

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various security problems in PHP
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   This update fixes the following security issues in the scripting languages
   PHP4 and PHP5:

   - copy() and tempnam() functions could bypass open_basedir restrictions (CVE-2006-1494)
   - Cross-Site-Scripting (XSS) bug in phpinfo() (CVE-2006-0996)
   - mb_send_mail() lacked safe_mode checks (CVE-2006-1014, CVE-2006-1015)
   - html_entity_decode() could expose memory content (CVE-2006-1490)

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   You need to restart Apache if you are using PHP.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.0:
             6b6f828e6f733c9117677a3a234a6602
             76fa73bd92c918aee8c2939a92738d91
             36b6ed77eaf3e83c1a4ad0625e2073f4
             3a3e763d075452614969450d3b86bd98
             fc74bb5bdb43e25f5d66f91d04ce316e
             28958c0a11482bc1d22cbbd6e848e74c
             faab2290d9e7669d4a8d67beddf0e671
             2285d7091733b3bc63d155fcaa778f6c
             9acfc3c6dc0d6683b9a152a76a43b1bd
             ab4af84024ceb74d70e919f9d09a870b
             969af2b2544aeff9646ba36947b862e5
             b9810d851586255c68e6b2331f34a4c3
             3402e2214fd4507ca9aa5c980d75bcc2
             ade4990d7c6993b9c3ba5f510c5fbab7

   SUSE LINUX 9.3:
             99ba46ea991c883808c304d07f33d249
             0503aec4a5a82e1d9ae6192b222b290c
             47600218946ad433fb6b6a9a6afcef0c
             a2a9fc17e960178d2dbf23d8265f5585
             418094d3b37d1c857289f931a87548fa
             658e23a8c0bcad516c3b3fc1be25e6d7
             07a2a44784204b7b52bc1d53354780e1
             bff63a95a377eefeb0189c1d6f9a485b
             98f4b344341405fb41280dda866f9e7c
             5f524f73d17b41c0ea3456807db527fb
             44996581cba4c895651525549e256e5b
             f80e4cf90d5bb46356990dda3ec4927b
             4e0d7297c74ec3b74ad714654ac317d3
             c570418f792f46df575ee1c8a0415873
             ddc40c5e0157cfd67b6c716c1e140741
             4259d22f50ee8f738d00feadd58d715e
             a49ec3d0bf89a9923d9d880d056349b3
             7ef1e26d736769f55cc85383f602235b
             1676e5b1827f3e92e2fe94f089839bce

   SUSE LINUX 9.2:
             8b953a2e17a6ee66c6a1c6046368e5f3
             e473405f2070998d0c85ec0297bf8dc1
             e2162c5888c88d822bda7f53ce596ebf
             795f7a60d9597395d55eea6e6f9c8da1
             734a256606551a24db1618988a963c46
             8b1cc300f4b8aad99431c1c827758d31
             da17518a45eaada3b62b828920f156ae
             796f1b0355769a86eb38011d73db12e4
             e1b25defbee61446c0b97738ea0a247d
             a3c2c81cc6d824559e42fe5e2328ea96

   SUSE LINUX 9.1:
             87f721efec2666616b2a47b4944925c5
             3612c8ee8d5b46bca8b8ad1d425b7390
             fe7b6eca56264f9d3d8e90b3692be7ff
             f7f2111848c814cefe02eb970a1721a6
             5b3bd9b8e92549fd4173d1d3252f14cd
             82f388d3466061f88662683ec0ba1827
             6edcf094f473d2a41c9a837ffa756d92
             df6780b7209a64e48a015b53bdaa547e
             f6e4492bff66b7222b331ba9e4c5146c
             ce084327411ff832ad9be66055dfd018
             5dee77c752b7025748ed3b4d9315e334
             c9931577245fd8510a8e9b2f4f653485
             02799222b008aa9063955163c0fbbef6
             c002459202d21a3383bb35d8ff67b9f4
             a2748a58b350220eee2645a8e379547c
             77deabd27e0dad24378360f611bf06f8

   Power PC Platform:

   SUSE LINUX 10.0:
             7df2a11e69ffa419d8d5c146d28e15b1
             a2b63bd747c7ff2862db5d42ebb2bbd8
             2a5f8df9ee2ba5cc6880b2c1d34e714f
             c0a367f322c13143cb47187c8cc8bc4f
             11e51e126b6df00bbc6c0dd6166301bb
             7cb52aca3f2e918696b00c4879d30c6d
             6fdd0aee8d829b40377ab09506691608
             d9e48c0c687936a966e4c3094b2b4f9a
             7fd2ac5e7e827499e4761f39364b61e8
             54242526d9b07eaa33dc43f48b820282
             4ac04e6e553ce3c17d946646936ae474
             65c1fc26bcf3f6fd4c86b8c9ac5b8ba4
             a9f8414e2432c10a4b423febd12ccf1b

   x86-64 Platform:

   SUSE LINUX 10.0:
             617475e9e1963f324740a83d70dd2ef7
             a22ecddb37b4841fd876142984391e30
             d3499d403c728e0043c9fe7a2a1b424f
             06995df3092c21296dc9836df2727def
             916cc2e79fb07f83b1b07190eaed8ad8
             81199e8eb4102d0c87fb156b6d6a2e91
             dbb0b9d569f6c0211af1cebcd3841dbe
             6a2a784627b7c9eaaa7aa30c8b50eb81
             e12d1e40671cc0b39c4d6ccee7b9ef14
             48f214e79fac0718f2683d08dba26231
             581c2d0e3b52f9a38894e1498b310821
             dce87385ad055b5c7def9ee8a6ec6dc9
             083b68a179a80bce514aed7505af1d95
             c8b17caf10bf778058ef88c839fb1bd4
             73b94de50d9ae4c5422f02c7bc99ed9e

   SUSE LINUX 9.3:
             9b85ffb1a64a9afe5a1e1c2e18080562
             98ef8c6846f5f797941b8e65325c3bed
             44a631428524605a97738989ce42aefb
             6d28c436645446cd82b990e2b48d4d09
             623e7716648d0f297a78ba448024abad
             da7cc5983d692f4d04c25823eb9937bb
             596f79e9efb92a9f29a79592160bd51c
             ba6055ce00cd78fd15baf6037336710c
             f18da13e175b0e7f8e81cbb3a6a413f0
             d922fc060d5528466c427e39e39881d1
             e734683eb5d103cd68e6ae3ace097f4a
             4511ffc2f95268072a3636cdadb1d415
             862c151fb18d5a836922a9653bebfaee
             2b2d3ceced4156b9e1a78fa6f13e1b1f
             2d040ba5d92ba2007998c838066ee9c1
             0f3689dc6762f7381864315561eb5abd
             19081faac05ba9cdf80cde99d8b43091
             25493b06753bd7f26af2160e3d7e120f
             d29c1c11a2ff543c73ddaa5f8dd80557
             cb02362e2b5cc4e9c7e9ef8d374c8bb9

   SUSE LINUX 9.2:
             8732f4bcdae93f8cea7d368e012745df
             dcb395ac52b140f7355610f509314e1d
             c05b7dc8b4ebe44fde9b791dfcf56717
             95075efcbda482a269559991a32be566
             fa48339738e2d5439f618e9540e33cfb
             56c5d6541e5d5f5ea1b151c20c7f7bec
             b044ce117a68d3f78ed379405fce200c
             44d285be830a99eecb782b4a12a250ba
             e51cc1ecbd9d156d6934dcbb179d2660
             046981702dd16b444669874ed557627a
             69a868e5262a94638ed59890b2fd824b

   SUSE LINUX 9.1:
             a2b008f7e72ca4bd56fed705957e2646
             a6e18c5af1bc830d6fbb843b085f6202
             1332a3720198a22c18dacac4a7bddaff
             2e8f6be0568855df432f17504295e0af
             139a70888ff4e58f3fc35dccda0283bf
             3aba9aeb421172074ad58593bf685f38
             8b79b81aa4eb8796a4ab1061c3a0d148
             f0f6b1662f9c8e131835642a5e4162c3
             6b650204f8c4c4b4fc8b904240c9d80f
             5ed97fa003f672ec905f9b4cf79cb75d
             097dde03d49f21377f9dfffa95b269ae
             bca76c3108beb3154a8bc7b0549f6af4
             2037e5a699a856b58a0c51f81af7b02b
             e8124a04e304ce665389ba1aab05be9a
             df48ad0c0324e6f894cf75d72c7b2f00
             e84fdb5f8f74586cf0f3c9618630648d

   Sources:

   SUSE LINUX 10.0:
             2e8d3ddf53c6d89ee1d266a8d3fe81c1
             97415f55701b39fc5502e3ad831e2987

   SUSE LINUX 9.3:
             3d7992db3f9cef46e73be3618a5dd02b
             fb589c97d0c50c630fabd6653224010c

   SUSE LINUX 9.2:
             0e206f224cb742f6a9eee278535af277

   SUSE LINUX 9.1:
             fad2b28eab018eb532b3bc666a841914
             18c1e7eaba11bf82399f862bb90b721d

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE CORE 9 for Itanium Processor Family
     
   SUSE SLES 9
     
   UnitedLinux 1.0
     
   SuSE Linux Enterprise Server 8
     
______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

SuSE: 2006-024: php4,php5 various security problems Security Update

May 5, 2006
This update fixes the following security issues in the scripting languages This update fixes the following security issues in the scripting languages PHP4 and PHP5: PHP4 and PHP5: ...

Summary


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                php4,php5
        Announcement ID:        SUSE-SA:2006:024
        Date:                   Fri, 05 May 2006 16:00:00 +0000
        Affected Products:      SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SuSE Linux Enterprise Server 8
                                SUSE SLES 9
                                UnitedLinux 1.0
        Vulnerability Type:     cross site scripting, information leak
        Severity (1-10):        4
        SUSE Default Package:   no
        Cross-References:       CVE-2006-0996, CVE-2006-1014, CVE-2006-1015
                                CVE-2006-1490, CVE-2006-1494

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various security problems in PHP
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   This update fixes the following security issues in the scripting languages
   PHP4 and PHP5:

   - copy() and tempnam() functions could bypass open_basedir restrictions (CVE-2006-1494)
   - Cross-Site-Scripting (XSS) bug in phpinfo() (CVE-2006-0996)
   - mb_send_mail() lacked safe_mode checks (CVE-2006-1014, CVE-2006-1015)
   - html_entity_decode() could expose memory content (CVE-2006-1490)

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   You need to restart Apache if you are using PHP.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.0:
             6b6f828e6f733c9117677a3a234a6602
             76fa73bd92c918aee8c2939a92738d91
             36b6ed77eaf3e83c1a4ad0625e2073f4
             3a3e763d075452614969450d3b86bd98
             fc74bb5bdb43e25f5d66f91d04ce316e
             28958c0a11482bc1d22cbbd6e848e74c
             faab2290d9e7669d4a8d67beddf0e671
             2285d7091733b3bc63d155fcaa778f6c
             9acfc3c6dc0d6683b9a152a76a43b1bd
             ab4af84024ceb74d70e919f9d09a870b
             969af2b2544aeff9646ba36947b862e5
             b9810d851586255c68e6b2331f34a4c3
             3402e2214fd4507ca9aa5c980d75bcc2
             ade4990d7c6993b9c3ba5f510c5fbab7

   SUSE LINUX 9.3:
             99ba46ea991c883808c304d07f33d249
             0503aec4a5a82e1d9ae6192b222b290c
             47600218946ad433fb6b6a9a6afcef0c
             a2a9fc17e960178d2dbf23d8265f5585
             418094d3b37d1c857289f931a87548fa
             658e23a8c0bcad516c3b3fc1be25e6d7
             07a2a44784204b7b52bc1d53354780e1
             bff63a95a377eefeb0189c1d6f9a485b
             98f4b344341405fb41280dda866f9e7c
             5f524f73d17b41c0ea3456807db527fb
             44996581cba4c895651525549e256e5b
             f80e4cf90d5bb46356990dda3ec4927b
             4e0d7297c74ec3b74ad714654ac317d3
             c570418f792f46df575ee1c8a0415873
             ddc40c5e0157cfd67b6c716c1e140741
             4259d22f50ee8f738d00feadd58d715e
             a49ec3d0bf89a9923d9d880d056349b3
             7ef1e26d736769f55cc85383f602235b
             1676e5b1827f3e92e2fe94f089839bce

   SUSE LINUX 9.2:
             8b953a2e17a6ee66c6a1c6046368e5f3
             e473405f2070998d0c85ec0297bf8dc1
             e2162c5888c88d822bda7f53ce596ebf
             795f7a60d9597395d55eea6e6f9c8da1
             734a256606551a24db1618988a963c46
             8b1cc300f4b8aad99431c1c827758d31
             da17518a45eaada3b62b828920f156ae
             796f1b0355769a86eb38011d73db12e4
             e1b25defbee61446c0b97738ea0a247d
             a3c2c81cc6d824559e42fe5e2328ea96

   SUSE LINUX 9.1:
             87f721efec2666616b2a47b4944925c5
             3612c8ee8d5b46bca8b8ad1d425b7390
             fe7b6eca56264f9d3d8e90b3692be7ff
             f7f2111848c814cefe02eb970a1721a6
             5b3bd9b8e92549fd4173d1d3252f14cd
             82f388d3466061f88662683ec0ba1827
             6edcf094f473d2a41c9a837ffa756d92
             df6780b7209a64e48a015b53bdaa547e
             f6e4492bff66b7222b331ba9e4c5146c
             ce084327411ff832ad9be66055dfd018
             5dee77c752b7025748ed3b4d9315e334
             c9931577245fd8510a8e9b2f4f653485
             02799222b008aa9063955163c0fbbef6
             c002459202d21a3383bb35d8ff67b9f4
             a2748a58b350220eee2645a8e379547c
             77deabd27e0dad24378360f611bf06f8

   Power PC Platform:

   SUSE LINUX 10.0:
             7df2a11e69ffa419d8d5c146d28e15b1
             a2b63bd747c7ff2862db5d42ebb2bbd8
             2a5f8df9ee2ba5cc6880b2c1d34e714f
             c0a367f322c13143cb47187c8cc8bc4f
             11e51e126b6df00bbc6c0dd6166301bb
             7cb52aca3f2e918696b00c4879d30c6d
             6fdd0aee8d829b40377ab09506691608
             d9e48c0c687936a966e4c3094b2b4f9a
             7fd2ac5e7e827499e4761f39364b61e8
             54242526d9b07eaa33dc43f48b820282
             4ac04e6e553ce3c17d946646936ae474
             65c1fc26bcf3f6fd4c86b8c9ac5b8ba4
             a9f8414e2432c10a4b423febd12ccf1b

   x86-64 Platform:

   SUSE LINUX 10.0:
             617475e9e1963f324740a83d70dd2ef7
             a22ecddb37b4841fd876142984391e30
             d3499d403c728e0043c9fe7a2a1b424f
             06995df3092c21296dc9836df2727def
             916cc2e79fb07f83b1b07190eaed8ad8
             81199e8eb4102d0c87fb156b6d6a2e91
             dbb0b9d569f6c0211af1cebcd3841dbe
             6a2a784627b7c9eaaa7aa30c8b50eb81
             e12d1e40671cc0b39c4d6ccee7b9ef14
             48f214e79fac0718f2683d08dba26231
             581c2d0e3b52f9a38894e1498b310821
             dce87385ad055b5c7def9ee8a6ec6dc9
             083b68a179a80bce514aed7505af1d95
             c8b17caf10bf778058ef88c839fb1bd4
             73b94de50d9ae4c5422f02c7bc99ed9e

   SUSE LINUX 9.3:
             9b85ffb1a64a9afe5a1e1c2e18080562
             98ef8c6846f5f797941b8e65325c3bed
             44a631428524605a97738989ce42aefb
             6d28c436645446cd82b990e2b48d4d09
             623e7716648d0f297a78ba448024abad
             da7cc5983d692f4d04c25823eb9937bb
             596f79e9efb92a9f29a79592160bd51c
             ba6055ce00cd78fd15baf6037336710c
             f18da13e175b0e7f8e81cbb3a6a413f0
             d922fc060d5528466c427e39e39881d1
             e734683eb5d103cd68e6ae3ace097f4a
             4511ffc2f95268072a3636cdadb1d415
             862c151fb18d5a836922a9653bebfaee
             2b2d3ceced4156b9e1a78fa6f13e1b1f
             2d040ba5d92ba2007998c838066ee9c1
             0f3689dc6762f7381864315561eb5abd
             19081faac05ba9cdf80cde99d8b43091
             25493b06753bd7f26af2160e3d7e120f
             d29c1c11a2ff543c73ddaa5f8dd80557
             cb02362e2b5cc4e9c7e9ef8d374c8bb9

   SUSE LINUX 9.2:
             8732f4bcdae93f8cea7d368e012745df
             dcb395ac52b140f7355610f509314e1d
             c05b7dc8b4ebe44fde9b791dfcf56717
             95075efcbda482a269559991a32be566
             fa48339738e2d5439f618e9540e33cfb
             56c5d6541e5d5f5ea1b151c20c7f7bec
             b044ce117a68d3f78ed379405fce200c
             44d285be830a99eecb782b4a12a250ba
             e51cc1ecbd9d156d6934dcbb179d2660
             046981702dd16b444669874ed557627a
             69a868e5262a94638ed59890b2fd824b

   SUSE LINUX 9.1:
             a2b008f7e72ca4bd56fed705957e2646
             a6e18c5af1bc830d6fbb843b085f6202
             1332a3720198a22c18dacac4a7bddaff
             2e8f6be0568855df432f17504295e0af
             139a70888ff4e58f3fc35dccda0283bf
             3aba9aeb421172074ad58593bf685f38
             8b79b81aa4eb8796a4ab1061c3a0d148
             f0f6b1662f9c8e131835642a5e4162c3
             6b650204f8c4c4b4fc8b904240c9d80f
             5ed97fa003f672ec905f9b4cf79cb75d
             097dde03d49f21377f9dfffa95b269ae
             bca76c3108beb3154a8bc7b0549f6af4
             2037e5a699a856b58a0c51f81af7b02b
             e8124a04e304ce665389ba1aab05be9a
             df48ad0c0324e6f894cf75d72c7b2f00
             e84fdb5f8f74586cf0f3c9618630648d

   Sources:

   SUSE LINUX 10.0:
             2e8d3ddf53c6d89ee1d266a8d3fe81c1
             97415f55701b39fc5502e3ad831e2987

   SUSE LINUX 9.3:
             3d7992db3f9cef46e73be3618a5dd02b
             fb589c97d0c50c630fabd6653224010c

   SUSE LINUX 9.2:
             0e206f224cb742f6a9eee278535af277

   SUSE LINUX 9.1:
             fad2b28eab018eb532b3bc666a841914
             18c1e7eaba11bf82399f862bb90b721d

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE CORE 9 for Itanium Processor Family
     
   SUSE SLES 9
     
   UnitedLinux 1.0
     
   SuSE Linux Enterprise Server 8
     
______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

References

Severity

Related News