Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in MozillaFirefox und seamonkey
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in MozillaFirefox und seamonkey
ID: SUSE-SA:2008:008
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 9, SUSE Novell Linux Desktop 9, SUSE Open Enterprise Server, SUSE LINUX 10.1, SUSE Novell Linux POS 9, openSUSE 10.2, SUSE Linux Enterprise Desktop 10 SP1, SUSE Linux Enterprise Server 10 SP1, openSUSE 10.3
Datum: Fr, 15. Februar 2008, 17:09
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
Applikationen: Mozilla Firefox, Mozilla SeaMonkey

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

SUSE Security Announcement

Package: MozillaFirefox,seamonkey
Announcement ID: SUSE-SA:2008:008
Date: Fri, 15 Feb 2008 17:00:00 +0000
Affected Products: SUSE LINUX 10.1
openSUSE 10.2
openSUSE 10.3
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP1
SUSE Linux Enterprise Server 10 SP1
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2008-0412, CVE-2008-0413, CVE-2008-0414
CVE-2008-0415, CVE-2008-0417, CVE-2008-0418
CVE-2008-0419, CVE-2008-0591, CVE-2008-0592
CVE-2008-0593, CVE-2008-0594, MFSA 2008-01
MFSA 2008-02, MFSA 2008-03, MFSA 2008-04
MFSA 2008-05, MFSA 2008-06, MFSA 2008-08
MFSA 2008-09, MFSA 2008-10, MFSA 2008-11

Content of This Advisory:
1) Security Vulnerability Resolved:
Mozilla Firefox, Seamonkey security updates
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

The web browser Mozilla Firefox has been brought to security update
version 2.0.0.12.

The Firefox versions was upgraded to 2.0.0.12 on:
- SUSE Linux 10.1, openSUSE 10.2 and 10.3
- SUSE Linux Enterprise Server and Desktop 10

All Firefox fixes were also back ported to the Firefox 1.5.0.14 version
in Novell Linux Desktop 9.

Also released were Mozilla Seamonkey Suite 1.8.1.12 packages for
openSUSE 10.2 and 10.3. All Mozilla Seamonkey fixes were back ported
to the SUSE Linux 10.1 seamonkey 1.8.0 version.

Following security problems were fixed:
- MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with div overlay
- MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect
- MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files
- MFSA 2008-08/CVE-2008-0591 File action dialog tampering
- MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation
stealing
- MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI
- MFSA 2008-04/CVE-2008-0417 Stored password corruption
- MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code
Execution
- MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing
vulnerabilities
- MFSA 2008-01/CVE-2008-0412/CVE-2008-0413 Crashes with evidence of
memory corruption (rv:1.8.1.12)

2) Solution or Work-Around

There is no known workaround, please install the update packages.

3) Special Instructions and Notes

Please close and restart all running instances of Firefox and seamonkey
after the update.

4) Package Location and Checksums

The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command

rpm -Fhv <file.rpm>

to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.


x86 Platform:

openSUSE 10.3:
seamonkey-1.1.8-0.1.i586.rpm
a8a852b6753d3a9a7449bb4a3f2f9765
seamonkey-dom-inspector-1.1.8-0.1.i586.rpm
89df63709a92eca6b81a94fb4860bfab
seamonkey-irc-1.1.8-0.1.i586.rpm
0364ddd40bd602863b108a4e9a95d4c6
seamonkey-mail-1.1.8-0.1.i586.rpm
6c41ddb95c841f79e42d26f7d1ed1a05
seamonkey-spellchecker-1.1.8-0.1.i586.rpm
826ca71e07414734e164a121562f8b42
seamonkey-venkman-1.1.8-0.1.i586.rpm
556ca543d0c616b819205b48d18a8fd7

openSUSE 10.2:
MozillaFirefox-2.0.0.12-0.1.i586.rpm
7e9730173c71a84bf1fed6d3e421a896
MozillaFirefox-translations-2.0.0.12-0.1.i586.rpm
a0afdbfa5eebeec21134358f7b546a8c
seamonkey-1.1.8-0.1.i586.rpm
ddb1e906304f891d58f6389054a6212d
seamonkey-dom-inspector-1.1.8-0.1.i586.rpm
5fc48ded7b9223878384fdb8b6e0022d
seamonkey-irc-1.1.8-0.1.i586.rpm
dc4919a5df479b57990a25be41daac8c
seamonkey-mail-1.1.8-0.1.i586.rpm
b0f0a1aac9fb239c9f5cf49c4154b980
seamonkey-spellchecker-1.1.8-0.1.i586.rpm
aef29179696e18fd9b0dd92cec9399c7
seamonkey-venkman-1.1.8-0.1.i586.rpm
550a4b7a989a26333bc4db233584c71a

SUSE LINUX 10.1:
MozillaFirefox-2.0.0.12-0.2.i586.rpm
a36c6fddaf43f19fb6db426eb4252f82
MozillaFirefox-translations-2.0.0.12-0.2.i586.rpm
2421e25c0f104e55171eae7c9d8e6167
seamonkey-1.0.9-1.10.i586.rpm
29c195e77854053efdce833353ed0b76
seamonkey-calendar-1.0.9-1.10.i586.rpm
5926f72e2adf7677bdffd5e536128dd9
seamonkey-dom-inspector-1.0.9-1.10.i586.rpm
ebf9c7d4c62b65c41b169506e8b40196
seamonkey-irc-1.0.9-1.10.i586.rpm
d883c2df0efde3473f02755bac0425ec
seamonkey-mail-1.0.9-1.10.i586.rpm
b02f49069b91569f5694a8688a25703b
seamonkey-spellchecker-1.0.9-1.10.i586.rpm
7de69401d08169f3a308fdbb14f0a090
seamonkey-venkman-1.0.9-1.10.i586.rpm
b1368668ad37aea4b71fe5af930c2454

openSUSE 10.3:
MozillaFirefox-2.0.0.12-0.1.i586.rpm
e0132d73ab722bbca579a79f253ffe48
MozillaFirefox-translations-2.0.0.12-0.1.i586.rpm
45ae7d71d9168715a631cab85ab36eda

Power PC Platform:

openSUSE 10.3:
MozillaFirefox-2.0.0.12-0.1.ppc.rpm
abae9d38f2cb314696ccceb09b0a9b90
MozillaFirefox-translations-2.0.0.12-0.1.ppc.rpm
ba61a431ae34aae1a804f82c781f4ffe
seamonkey-1.1.8-0.1.ppc.rpm
2a22a1a221bef5715d665530ad1bd233
seamonkey-dom-inspector-1.1.8-0.1.ppc.rpm
c1f6c0ff2487f2e6d0e92a7d7f670d40
seamonkey-irc-1.1.8-0.1.ppc.rpm
de9df3f24ed5852b098e5bb9eed5ff26
seamonkey-mail-1.1.8-0.1.ppc.rpm
3a0a89d873a429b127100ec7f06e7f0f
seamonkey-spellchecker-1.1.8-0.1.ppc.rpm
d4520354bd3755487f8ba4e7770e6e69
seamonkey-venkman-1.1.8-0.1.ppc.rpm
bb8619aea4a3cab26885333dcb4f5edc

openSUSE 10.2:
MozillaFirefox-2.0.0.12-0.1.ppc.rpm
508a4703c1b69f2280f1c0ae7984ee30
MozillaFirefox-translations-2.0.0.12-0.1.ppc.rpm
b89287432ea5d74460cc2a83484dbe54
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/seamonkey-1.1.8-0.1.ppc.rpm
91dab78e8bb89cf93fc722d05e041176
seamonkey-dom-inspector-1.1.8-0.1.ppc.rpm
4fc802f1ab92b63902cbf12a133016df
seamonkey-irc-1.1.8-0.1.ppc.rpm
304ed7aef3feecf40b4c9c0c5106580d
seamonkey-mail-1.1.8-0.1.ppc.rpm
0598850fbcce57d67b59d697567cace2
seamonkey-spellchecker-1.1.8-0.1.ppc.rpm
f6af75ff58c754f9834a4a73e45b6e7c
seamonkey-venkman-1.1.8-0.1.ppc.rpm
9856d718f6a4a952f3c606b5d1111c13

SUSE LINUX 10.1:
MozillaFirefox-2.0.0.12-0.2.ppc.rpm
5a8e7d0860018f1b8caf8b6f46093df6
MozillaFirefox-translations-2.0.0.12-0.2.ppc.rpm
0cbe495221155d2ef200215ed8dc9b94
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/seamonkey-1.0.9-1.10.ppc.rpm
691403e435c3014addffb3cc1cc1f555
seamonkey-calendar-1.0.9-1.10.ppc.rpm
0f9f800fc6929fa443f698905cec5a76
seamonkey-dom-inspector-1.0.9-1.10.ppc.rpm
a8608e710c60d42ccc7b032807d741bb
seamonkey-irc-1.0.9-1.10.ppc.rpm
bbe83ebdcb12656f882347ef0b54e2a9
seamonkey-mail-1.0.9-1.10.ppc.rpm
9dbde43fcb3faab1462116e45410ee64
seamonkey-spellchecker-1.0.9-1.10.ppc.rpm
1126c0eaa250a4f3d35edd0f009b350f
seamonkey-venkman-1.0.9-1.10.ppc.rpm
59ca36ad2c6a3f3415c0bcc2665686eb

x86-64 Platform:

openSUSE 10.3:
MozillaFirefox-2.0.0.12-0.1.x86_64.rpm
d5207589aaa5f59008b92e7b861bedb2
MozillaFirefox-translations-2.0.0.12-0.1.x86_64.rpm
a8023cfa267fbef2b9fadf8091a45d56
seamonkey-1.1.8-0.1.x86_64.rpm
f0e3bae6d0a9c2db81e9e5f4f14cff01
seamonkey-dom-inspector-1.1.8-0.1.x86_64.rpm
3c05f2619c650459481458e4af288e9b
seamonkey-irc-1.1.8-0.1.x86_64.rpm
7c37e3bf4e6e4e483200efcbf377cc31
seamonkey-mail-1.1.8-0.1.x86_64.rpm
e4546cc3a2d553c9451c0126fba56862
seamonkey-spellchecker-1.1.8-0.1.x86_64.rpm
5a3547a8d6e13e3feaf03e8c0aeea72e
seamonkey-venkman-1.1.8-0.1.x86_64.rpm
a71168d175b21bdf72cf3689c783f9cc

openSUSE 10.2:
MozillaFirefox-2.0.0.12-0.1.x86_64.rpm
b4f22b31de60049b59cbf5250a6a528e
MozillaFirefox-translations-2.0.0.12-0.1.x86_64.rpm
638cd35fedad0d32dd01c761115093f6
seamonkey-1.1.8-0.1.x86_64.rpm
d63901ff1b1dc3b3c9ca4be19630d5f5
seamonkey-dom-inspector-1.1.8-0.1.x86_64.rpm
f96ce993ba6296a9e339b7b5edee1739
seamonkey-irc-1.1.8-0.1.x86_64.rpm
946ff1773cbb270e5041bb202cc3bff8
seamonkey-mail-1.1.8-0.1.x86_64.rpm
c75eaef024493b08c50e0f98708686dc
seamonkey-spellchecker-1.1.8-0.1.x86_64.rpm
fc2da248d7af5695889218cdeb7b121f
seamonkey-venkman-1.1.8-0.1.x86_64.rpm
b25ddffe225fd802b451eb873ea3ea83

SUSE LINUX 10.1:
seamonkey-1.0.9-1.10.x86_64.rpm
b6c02874d473977cab1cc00b70565cb1
seamonkey-calendar-1.0.9-1.10.x86_64.rpm
83f6aceefef48bcd1b4a045d6555308b
seamonkey-dom-inspector-1.0.9-1.10.x86_64.rpm
39f4652b9970e2dbbca84ce66258dcbb
seamonkey-irc-1.0.9-1.10.x86_64.rpm
fb603db004367109928a2547014b5a63
seamonkey-mail-1.0.9-1.10.x86_64.rpm
74af4aaf3b63d82b03994198a84d67fd
seamonkey-spellchecker-1.0.9-1.10.x86_64.rpm
4749b27bfdeb8a9f32b2c1c12542a1ba
seamonkey-venkman-1.0.9-1.10.x86_64.rpm
75edd9a8cadb8f0479cd876224012158

Sources:

openSUSE 10.3:
MozillaFirefox-2.0.0.12-0.1.src.rpm
39fe144c735b8e7d74c331958d89ffe2
seamonkey-1.1.8-0.1.src.rpm
33c21b39a7a57aa16b8fe8de576c990f

openSUSE 10.2:
MozillaFirefox-2.0.0.12-0.1.src.rpm
e88392a655c700628dc8ad2b64d0e2c2
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/seamonkey-1.1.8-0.1.src.rpm
21f2e768b74d62a44c0f1ae1688dc23d

SUSE LINUX 10.1:
MozillaFirefox-2.0.0.12-0.2.src.rpm
9485fce4fefea332b587efb16473149c
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/seamonkey-1.0.9-1.10.src.rpm
a0931f73bcad08e7794e883d517a56b8

Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:

Novell Linux Desktop 9
25e2ffcf469ccafcac7d9108475aa0a8.html

SUSE Linux Enterprise Server 10 SP1
7731713870954ee13e98b603bd413b0b.html

SUSE Linux Enterprise Desktop 10 SP1
7731713870954ee13e98b603bd413b0b.html

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

- Announcement authenticity verification:

SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.

To verify the signature of the announcement, save it as text into a file
and run the command

gpg --verify <file>

replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:

gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team
<security@suse.de>"

where <DATE> is replaced by the date the document was signed.

If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command

gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

- Package authenticity verification:

SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.

There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:

1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement

1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command

rpm -v --checksig <file.rpm>

to verify the signature of the package, replacing <file.rpm> with
the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.

This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.

2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command

md5sum <filename.rpm>

after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.

- SUSE runs two security mailing lists to which any interested party may
subscribe:

opensuse-security@opensuse.org
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security+subscribe@opensuse.org>.

opensuse-security-announce@opensuse.org
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<opensuse-security-announce+subscribe@opensuse.org>.

=====================================================================
SUSE's security contact is <security@suse.com> or
<security@suse.de>.
The <security@suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________

The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.

SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.

Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)

mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA
BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz
JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh
1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U
P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+
cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg
VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b
yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7
tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ
xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63
Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo
choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI
BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u
v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+
x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0
Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq
MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2
saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o
L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU
F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS
FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW
tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It
Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF
AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+
3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk
YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP
+Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR
8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U
8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S
cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh
ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB
UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo
AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n
KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi
BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro
nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg
KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx
yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn
B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV
wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh
UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF
5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3
D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu
zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd
9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi
a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13
CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp
271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE
t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG
B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw
rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt
IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL
rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H
RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa
g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA
CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO
=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iQEVAwUBR7W4jney5gA9JdPZAQJpfgf/eP+r+uw+jsevKfHOZZtIqubkjc1VHnKg
Azk5VZK2glSrGXyz0EwfepJuY03wrH8llHUnJyF8N4QH2gXnKOalQG/mMFDDnoZ9
2vhqmdRDaKAMwjlIdTlWbhQF3z2gRjDC6mFwSgTy/0F14ynbcj7vam3UwIRfI255
lMCbrZja95mQZblvbozS/NI72lfSwzaj+J2vINVKF7C2uGr+iAz2iwzu5e990PvY
h3embIgMP3SZgrJ7vBrjC/Es+OYpZ9FLFwqWeaFdBlS8qZhFvisxwaKNKBoicwg+
vyUYFeuu4EBSObzCrLVGJZd2whi6Tjp5kJLsdMnAppFMqxcwP1sSHA==
=tT2A
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung