Ispravljeni su brojni nedostaci programskih paketa Mozilla Firefox, Thunderbird, xulrunner i seamonkey 15.0 koje udaljeni napadači mogu iskoristiti za pregled osjetljivih informacija, dobivanje većih privilegija, zaobilaženje postavljenih ograničenja i proizvoljno pokretanje programskog koda.
Paket: | Firefox 11.x, SeaMonkey 1.x, thunderbird 11.x, Xulrunner 10.x |
Operacijski sustavi: | openSUSE 11.4, openSUSE 12.1 |
Kritičnost: | 8.7 |
Problem: | korupcija memorije, neodgovarajuće rukovanje memorijom, pogreška u programskoj komponenti, preljev međuspremnika |
Iskorištavanje: | lokalno/udaljeno |
Posljedica: | dobivanje većih privilegija, otkrivanje osjetljivih informacija, proizvoljno izvršavanje programskog koda, zaobilaženje postavljenih ograničenja |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-1956, CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964, CVE-2012-3965 |
Izvorni ID preporuke: | openSUSE-SU-2012:1065-1; openSUSE-SU-2012:1064-1 |
Izvor: | SUSE |
Problem: | |
Neki od nedostataka su posljedica korupcije memorije, propusta vezanih uz "Object.defineProperty" i "about:newtab" te pogrešaka u raznim komponentama. Za detalje se preporuča čitanje izvorne preporuke. |
|
Posljedica: | |
Propuste je moguće iskoristiti za otkrivanje osjetljivih informacija, dobivanje većih privilegija, zaobilaženje postavljenih ograničenja i proizvoljno pokretanje programskog koda. |
|
Rješenje: | |
Svim korisnicima se savjetuje korištenje nadogradnje koja otklanja opisane propuste. |
Izvorni tekst preporuke
openSUSE Security Update: MozillaFirefox: Update to version 15
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:1065-1
Rating: critical
References: #777588
Cross-References: CVE-2012-1956 CVE-2012-1970 CVE-2012-1972
CVE-2012-1973 CVE-2012-1974 CVE-2012-1975
CVE-2012-1976 CVE-2012-3956 CVE-2012-3957
CVE-2012-3958 CVE-2012-3959 CVE-2012-3960
CVE-2012-3961 CVE-2012-3962 CVE-2012-3963
CVE-2012-3964 CVE-2012-3965 CVE-2012-3966
CVE-2012-3967 CVE-2012-3968 CVE-2012-3969
CVE-2012-3970 CVE-2012-3971 CVE-2012-3972
CVE-2012-3973 CVE-2012-3975 CVE-2012-3976
CVE-2012-3978 CVE-2012-3980
Affected Products:
openSUSE 12.2
______________________________________________________________________________
An update that fixes 29 vulnerabilities is now available.
Description:
Mozilla Firefox, Thunderbird, xulrunner, seamonkey 15.0
update (bnc#777588)
* MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety
hazards
* MFSA
2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1
975
CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-
2012-3959
CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-
2012-3964 Use-after-free issues found using Address
Sanitizer
* MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object
can be shadowed using Object.defineProperty
* MFSA 2012-60/CVE-2012-3965 (bmo#769108) Escalation of
privilege through about:newtab
* MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793)
Memory corruption with bitmap format images with
negative height
* MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL
use-after-free and memory corruption
* MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer
overflow and use-after-free issues
* MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption
* MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds
read in format-number in XSLT
* MFSA 2012-66/CVE-2012-3973 (bmo#757128) HTTPMonitor
extension allows for remote debugging without explicit
activation
* MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads
linked resources in extensions when parsing text/html
* MFSA 2012-69/CVE-2012-3976 (bmo#768568) Incorrect site
SSL certificate data display
* MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object
security checks bypassed by chrome code
* MFSA 2012-72/CVE-2012-3980 (bmo#771859) Web console
eval capable of executing chrome-privileged code
- fix HTML5 video crash with GStreamer enabled (bmo#761030)
- GStreamer is only used for MP4 (no WebM, OGG)
- updated filelist
- moved browser specific preferences to correct location
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:
zypper in -t patch openSUSE-2012-538
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2 (i586 x86_64):
MozillaFirefox-15.0-2.7.1
MozillaFirefox-branding-upstream-15.0-2.7.1
MozillaFirefox-buildsymbols-15.0-2.7.1
MozillaFirefox-debuginfo-15.0-2.7.1
MozillaFirefox-debugsource-15.0-2.7.1
MozillaFirefox-devel-15.0-2.7.1
MozillaFirefox-translations-common-15.0-2.7.1
MozillaFirefox-translations-other-15.0-2.7.1
MozillaThunderbird-15.0-49.9.1
MozillaThunderbird-buildsymbols-15.0-49.9.1
MozillaThunderbird-debuginfo-15.0-49.9.1
MozillaThunderbird-debugsource-15.0-49.9.1
MozillaThunderbird-devel-15.0-49.9.1
MozillaThunderbird-devel-debuginfo-15.0-49.9.1
MozillaThunderbird-translations-common-15.0-49.9.1
MozillaThunderbird-translations-other-15.0-49.9.1
enigmail-1.4.4+15.0-49.9.1
enigmail-debuginfo-1.4.4+15.0-49.9.1
libfreebl3-3.13.6-2.7.1
libfreebl3-debuginfo-3.13.6-2.7.1
libsoftokn3-3.13.6-2.7.1
libsoftokn3-debuginfo-3.13.6-2.7.1
mozilla-js-15.0-2.8.1
mozilla-js-debuginfo-15.0-2.8.1
mozilla-nss-3.13.6-2.7.1
mozilla-nss-certs-3.13.6-2.7.1
mozilla-nss-certs-debuginfo-3.13.6-2.7.1
mozilla-nss-debuginfo-3.13.6-2.7.1
mozilla-nss-debugsource-3.13.6-2.7.1
mozilla-nss-devel-3.13.6-2.7.1
mozilla-nss-sysinit-3.13.6-2.7.1
mozilla-nss-sysinit-debuginfo-3.13.6-2.7.1
mozilla-nss-tools-3.13.6-2.7.1
mozilla-nss-tools-debuginfo-3.13.6-2.7.1
seamonkey-2.12-2.8.1
seamonkey-debuginfo-2.12-2.8.1
seamonkey-debugsource-2.12-2.8.1
seamonkey-dom-inspector-2.12-2.8.1
seamonkey-irc-2.12-2.8.1
seamonkey-translations-common-2.12-2.8.1
seamonkey-translations-other-2.12-2.8.1
seamonkey-venkman-2.12-2.8.1
xulrunner-15.0-2.8.1
xulrunner-buildsymbols-15.0-2.8.1
xulrunner-debuginfo-15.0-2.8.1
xulrunner-debugsource-15.0-2.8.1
xulrunner-devel-15.0-2.8.1
xulrunner-devel-debuginfo-15.0-2.8.1
- openSUSE 12.2 (x86_64):
libfreebl3-32bit-3.13.6-2.7.1
libfreebl3-debuginfo-32bit-3.13.6-2.7.1
libsoftokn3-32bit-3.13.6-2.7.1
libsoftokn3-debuginfo-32bit-3.13.6-2.7.1
mozilla-js-32bit-15.0-2.8.1
mozilla-js-debuginfo-32bit-15.0-2.8.1
mozilla-nss-32bit-3.13.6-2.7.1
mozilla-nss-certs-32bit-3.13.6-2.7.1
mozilla-nss-certs-debuginfo-32bit-3.13.6-2.7.1
mozilla-nss-debuginfo-32bit-3.13.6-2.7.1
mozilla-nss-sysinit-32bit-3.13.6-2.7.1
mozilla-nss-sysinit-debuginfo-32bit-3.13.6-2.7.1
xulrunner-32bit-15.0-2.8.1
xulrunner-debuginfo-32bit-15.0-2.8.1
References:
http://support.novell.com/security/cve/CVE-2012-1956.html
http://support.novell.com/security/cve/CVE-2012-1970.html
http://support.novell.com/security/cve/CVE-2012-1972.html
http://support.novell.com/security/cve/CVE-2012-1973.html
http://support.novell.com/security/cve/CVE-2012-1974.html
http://support.novell.com/security/cve/CVE-2012-1975.html
http://support.novell.com/security/cve/CVE-2012-1976.html
http://support.novell.com/security/cve/CVE-2012-3956.html
http://support.novell.com/security/cve/CVE-2012-3957.html
http://support.novell.com/security/cve/CVE-2012-3958.html
http://support.novell.com/security/cve/CVE-2012-3959.html
http://support.novell.com/security/cve/CVE-2012-3960.html
http://support.novell.com/security/cve/CVE-2012-3961.html
http://support.novell.com/security/cve/CVE-2012-3962.html
http://support.novell.com/security/cve/CVE-2012-3963.html
http://support.novell.com/security/cve/CVE-2012-3964.html
http://support.novell.com/security/cve/CVE-2012-3965.html
http://support.novell.com/security/cve/CVE-2012-3966.html
http://support.novell.com/security/cve/CVE-2012-3967.html
http://support.novell.com/security/cve/CVE-2012-3968.html
http://support.novell.com/security/cve/CVE-2012-3969.html
http://support.novell.com/security/cve/CVE-2012-3970.html
http://support.novell.com/security/cve/CVE-2012-3971.html
http://support.novell.com/security/cve/CVE-2012-3972.html
http://support.novell.com/security/cve/CVE-2012-3973.html
http://support.novell.com/security/cve/CVE-2012-3975.html
http://support.novell.com/security/cve/CVE-2012-3976.html
http://support.novell.com/security/cve/CVE-2012-3978.html
http://support.novell.com/security/cve/CVE-2012-3980.html
https://bugzilla.novell.com/777588
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
openSUSE Security Update: MozillaFirefox: Update to version 15
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:1064-1
Rating: critical
References: #777588
Cross-References: CVE-2012-1956 CVE-2012-1970 CVE-2012-1972
CVE-2012-1973 CVE-2012-1974 CVE-2012-1975
CVE-2012-1976 CVE-2012-3956 CVE-2012-3957
CVE-2012-3958 CVE-2012-3959 CVE-2012-3960
CVE-2012-3961 CVE-2012-3962 CVE-2012-3963
CVE-2012-3964 CVE-2012-3965 CVE-2012-3966
CVE-2012-3967 CVE-2012-3968 CVE-2012-3969
CVE-2012-3970 CVE-2012-3971 CVE-2012-3972
CVE-2012-3973 CVE-2012-3975 CVE-2012-3976
CVE-2012-3978 CVE-2012-3980
Affected Products:
openSUSE 12.1
openSUSE 11.4
______________________________________________________________________________
An update that fixes 29 vulnerabilities is now available.
Description:
Mozilla Firefox, Thunderbird, xulrunner, seamonkey 15.0
update (bnc#777588)
* MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety
hazards
* MFSA
2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1
975
CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-
2012-3959
CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-
2012-3964 Use-after-free issues found using Address
Sanitizer
* MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object
can be shadowed using Object.defineProperty
* MFSA 2012-60/CVE-2012-3965 (bmo#769108) Escalation of
privilege through about:newtab
* MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793)
Memory corruption with bitmap format images with
negative height
* MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL
use-after-free and memory corruption
* MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer
overflow and use-after-free issues
* MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption
* MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds
read in format-number in XSLT
* MFSA 2012-66/CVE-2012-3973 (bmo#757128) HTTPMonitor
extension allows for remote debugging without explicit
activation
* MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads
linked resources in extensions when parsing text/html
* MFSA 2012-69/CVE-2012-3976 (bmo#768568) Incorrect site
SSL certificate data display
* MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object
security checks bypassed by chrome code
* MFSA 2012-72/CVE-2012-3980 (bmo#771859) Web console
eval capable of executing chrome-privileged code
- fix HTML5 video crash with GStreamer enabled (bmo#761030)
- GStreamer is only used for MP4 (no WebM, OGG)
- updated filelist
- moved browser specific preferences to correct location
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.1:
zypper in -t patch openSUSE-2012-534
- openSUSE 11.4:
zypper in -t patch openSUSE-2012-534
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.1 (i586 x86_64):
MozillaFirefox-15.0-2.36.1
MozillaFirefox-branding-upstream-15.0-2.36.1
MozillaFirefox-buildsymbols-15.0-2.36.1
MozillaFirefox-debuginfo-15.0-2.36.1
MozillaFirefox-debugsource-15.0-2.36.1
MozillaFirefox-devel-15.0-2.36.1
MozillaFirefox-translations-common-15.0-2.36.1
MozillaFirefox-translations-other-15.0-2.36.1
MozillaThunderbird-15.0-33.29.1
MozillaThunderbird-buildsymbols-15.0-33.29.1
MozillaThunderbird-debuginfo-15.0-33.29.1
MozillaThunderbird-debugsource-15.0-33.29.1
MozillaThunderbird-devel-15.0-33.29.1
MozillaThunderbird-devel-debuginfo-15.0-33.29.1
MozillaThunderbird-translations-common-15.0-33.29.1
MozillaThunderbird-translations-other-15.0-33.29.1
enigmail-1.4.4+15.0-33.29.1
enigmail-debuginfo-1.4.4+15.0-33.29.1
libfreebl3-3.13.6-9.17.1
libfreebl3-debuginfo-3.13.6-9.17.1
libsoftokn3-3.13.6-9.17.1
libsoftokn3-debuginfo-3.13.6-9.17.1
mozilla-js-15.0-2.35.1
mozilla-js-debuginfo-15.0-2.35.1
mozilla-nspr-4.9.2-3.6.1
mozilla-nspr-debuginfo-4.9.2-3.6.1
mozilla-nspr-debugsource-4.9.2-3.6.1
mozilla-nspr-devel-4.9.2-3.6.1
mozilla-nss-3.13.6-9.17.1
mozilla-nss-certs-3.13.6-9.17.1
mozilla-nss-certs-debuginfo-3.13.6-9.17.1
mozilla-nss-debuginfo-3.13.6-9.17.1
mozilla-nss-debugsource-3.13.6-9.17.1
mozilla-nss-devel-3.13.6-9.17.1
mozilla-nss-sysinit-3.13.6-9.17.1
mozilla-nss-sysinit-debuginfo-3.13.6-9.17.1
mozilla-nss-tools-3.13.6-9.17.1
mozilla-nss-tools-debuginfo-3.13.6-9.17.1
seamonkey-2.12-2.27.1
seamonkey-debuginfo-2.12-2.27.1
seamonkey-debugsource-2.12-2.27.1
seamonkey-dom-inspector-2.12-2.27.1
seamonkey-irc-2.12-2.27.1
seamonkey-translations-common-2.12-2.27.1
seamonkey-translations-other-2.12-2.27.1
seamonkey-venkman-2.12-2.27.1
xulrunner-15.0-2.35.1
xulrunner-buildsymbols-15.0-2.35.1
xulrunner-debuginfo-15.0-2.35.1
xulrunner-debugsource-15.0-2.35.1
xulrunner-devel-15.0-2.35.1
xulrunner-devel-debuginfo-15.0-2.35.1
- openSUSE 12.1 (x86_64):
libfreebl3-32bit-3.13.6-9.17.1
libfreebl3-debuginfo-32bit-3.13.6-9.17.1
libsoftokn3-32bit-3.13.6-9.17.1
libsoftokn3-debuginfo-32bit-3.13.6-9.17.1
mozilla-js-32bit-15.0-2.35.1
mozilla-js-debuginfo-32bit-15.0-2.35.1
mozilla-nspr-32bit-4.9.2-3.6.1
mozilla-nspr-debuginfo-32bit-4.9.2-3.6.1
mozilla-nss-32bit-3.13.6-9.17.1
mozilla-nss-certs-32bit-3.13.6-9.17.1
mozilla-nss-certs-debuginfo-32bit-3.13.6-9.17.1
mozilla-nss-debuginfo-32bit-3.13.6-9.17.1
mozilla-nss-sysinit-32bit-3.13.6-9.17.1
mozilla-nss-sysinit-debuginfo-32bit-3.13.6-9.17.1
xulrunner-32bit-15.0-2.35.1
xulrunner-debuginfo-32bit-15.0-2.35.1
- openSUSE 12.1 (ia64):
libfreebl3-debuginfo-x86-3.13.6-9.17.1
libfreebl3-x86-3.13.6-9.17.1
libsoftokn3-debuginfo-x86-3.13.6-9.17.1
libsoftokn3-x86-3.13.6-9.17.1
mozilla-js-debuginfo-x86-15.0-2.35.1
mozilla-js-x86-15.0-2.35.1
mozilla-nspr-debuginfo-x86-4.9.2-3.6.1
mozilla-nspr-x86-4.9.2-3.6.1
mozilla-nss-certs-debuginfo-x86-3.13.6-9.17.1
mozilla-nss-certs-x86-3.13.6-9.17.1
mozilla-nss-debuginfo-x86-3.13.6-9.17.1
mozilla-nss-sysinit-debuginfo-x86-3.13.6-9.17.1
mozilla-nss-sysinit-x86-3.13.6-9.17.1
mozilla-nss-x86-3.13.6-9.17.1
xulrunner-debuginfo-x86-15.0-2.35.1
xulrunner-x86-15.0-2.35.1
- openSUSE 11.4 (i586 x86_64):
MozillaFirefox-15.0-31.1
MozillaFirefox-branding-upstream-15.0-31.1
MozillaFirefox-buildsymbols-15.0-31.1
MozillaFirefox-debuginfo-15.0-31.1
MozillaFirefox-debugsource-15.0-31.1
MozillaFirefox-devel-15.0-31.1
MozillaFirefox-translations-common-15.0-31.1
MozillaFirefox-translations-other-15.0-31.1
MozillaThunderbird-15.0-27.1
MozillaThunderbird-buildsymbols-15.0-27.1
MozillaThunderbird-debuginfo-15.0-27.1
MozillaThunderbird-debugsource-15.0-27.1
MozillaThunderbird-devel-15.0-27.1
MozillaThunderbird-devel-debuginfo-15.0-27.1
MozillaThunderbird-translations-common-15.0-27.1
MozillaThunderbird-translations-other-15.0-27.1
enigmail-1.4.4+15.0-27.1
enigmail-debuginfo-1.4.4+15.0-27.1
libfreebl3-3.13.6-47.1
libfreebl3-debuginfo-3.13.6-47.1
libsoftokn3-3.13.6-47.1
libsoftokn3-debuginfo-3.13.6-47.1
mozilla-nspr-4.9.2-16.1
mozilla-nspr-debuginfo-4.9.2-16.1
mozilla-nspr-debugsource-4.9.2-16.1
mozilla-nspr-devel-4.9.2-16.1
mozilla-nss-3.13.6-47.1
mozilla-nss-certs-3.13.6-47.1
mozilla-nss-certs-debuginfo-3.13.6-47.1
mozilla-nss-debuginfo-3.13.6-47.1
mozilla-nss-debugsource-3.13.6-47.1
mozilla-nss-devel-3.13.6-47.1
mozilla-nss-sysinit-3.13.6-47.1
mozilla-nss-sysinit-debuginfo-3.13.6-47.1
mozilla-nss-tools-3.13.6-47.1
mozilla-nss-tools-debuginfo-3.13.6-47.1
seamonkey-2.12-27.1
seamonkey-debuginfo-2.12-27.1
seamonkey-debugsource-2.12-27.1
seamonkey-dom-inspector-2.12-27.1
seamonkey-irc-2.12-27.1
seamonkey-translations-common-2.12-27.1
seamonkey-translations-other-2.12-27.1
seamonkey-venkman-2.12-27.1
- openSUSE 11.4 (x86_64):
libfreebl3-32bit-3.13.6-47.1
libfreebl3-debuginfo-32bit-3.13.6-47.1
libsoftokn3-32bit-3.13.6-47.1
libsoftokn3-debuginfo-32bit-3.13.6-47.1
mozilla-nspr-32bit-4.9.2-16.1
mozilla-nspr-debuginfo-32bit-4.9.2-16.1
mozilla-nss-32bit-3.13.6-47.1
mozilla-nss-certs-32bit-3.13.6-47.1
mozilla-nss-certs-debuginfo-32bit-3.13.6-47.1
mozilla-nss-debuginfo-32bit-3.13.6-47.1
mozilla-nss-sysinit-32bit-3.13.6-47.1
mozilla-nss-sysinit-debuginfo-32bit-3.13.6-47.1
- openSUSE 11.4 (ia64):
libfreebl3-debuginfo-x86-3.13.6-47.1
libfreebl3-x86-3.13.6-47.1
libsoftokn3-debuginfo-x86-3.13.6-47.1
libsoftokn3-x86-3.13.6-47.1
mozilla-nspr-debuginfo-x86-4.9.2-16.1
mozilla-nspr-x86-4.9.2-16.1
mozilla-nss-certs-debuginfo-x86-3.13.6-47.1
mozilla-nss-certs-x86-3.13.6-47.1
mozilla-nss-debuginfo-x86-3.13.6-47.1
mozilla-nss-sysinit-debuginfo-x86-3.13.6-47.1
mozilla-nss-sysinit-x86-3.13.6-47.1
mozilla-nss-x86-3.13.6-47.1
References:
http://support.novell.com/security/cve/CVE-2012-1956.html
http://support.novell.com/security/cve/CVE-2012-1970.html
http://support.novell.com/security/cve/CVE-2012-1972.html
http://support.novell.com/security/cve/CVE-2012-1973.html
http://support.novell.com/security/cve/CVE-2012-1974.html
http://support.novell.com/security/cve/CVE-2012-1975.html
http://support.novell.com/security/cve/CVE-2012-1976.html
http://support.novell.com/security/cve/CVE-2012-3956.html
http://support.novell.com/security/cve/CVE-2012-3957.html
http://support.novell.com/security/cve/CVE-2012-3958.html
http://support.novell.com/security/cve/CVE-2012-3959.html
http://support.novell.com/security/cve/CVE-2012-3960.html
http://support.novell.com/security/cve/CVE-2012-3961.html
http://support.novell.com/security/cve/CVE-2012-3962.html
http://support.novell.com/security/cve/CVE-2012-3963.html
http://support.novell.com/security/cve/CVE-2012-3964.html
http://support.novell.com/security/cve/CVE-2012-3965.html
http://support.novell.com/security/cve/CVE-2012-3966.html
http://support.novell.com/security/cve/CVE-2012-3967.html
http://support.novell.com/security/cve/CVE-2012-3968.html
http://support.novell.com/security/cve/CVE-2012-3969.html
http://support.novell.com/security/cve/CVE-2012-3970.html
http://support.novell.com/security/cve/CVE-2012-3971.html
http://support.novell.com/security/cve/CVE-2012-3972.html
http://support.novell.com/security/cve/CVE-2012-3973.html
http://support.novell.com/security/cve/CVE-2012-3975.html
http://support.novell.com/security/cve/CVE-2012-3976.html
http://support.novell.com/security/cve/CVE-2012-3978.html
http://support.novell.com/security/cve/CVE-2012-3980.html
https://bugzilla.novell.com/777588
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke