Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in google-guest-agent
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in google-guest-agent
ID: SUSE-SU-2025:1143-1
Distribution: SUSE
Plattformen: SUSE Manager Server 4.2, SUSE Manager Proxy 4.2, SUSE Manager Retail Branch Server 4.2, SUSE Manager Proxy 4.3, SUSE Manager Server 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise High Performance Computing 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Micro 5.5, SUSE Public Cloud Module 15-SP4, SUSE Public Cloud Module 15-SP3, SUSE Public Cloud Module 15-SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE openSUSE Leap 15.6, SUSE Public Cloud Module 15-SP6
Datum: Fr, 4. April 2025, 23:37
Referenzen: https://www.cve.org/CVERecord?id=CVE-2024-45337
Applikationen: google-guest-agent

Originalnachricht

--===============5543512825157086868==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for google-guest-agent

Announcement ID: SUSE-SU-2025:1143-1
Release Date: 2025-04-04T13:31:36Z
Rating: important
References:

* bsc#1234563
* bsc#1239763
* bsc#1239866


Cross-References:

* CVE-2024-45337


CVSS scores:

* CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N


Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3



An update that solves one vulnerability and has two security fixes can now be
installed.

## Description:

This update for google-guest-agent fixes the following issues:

* CVE-2024-45337: golang.org/x/crypto/ssh: Fixed misuse of
ServerConfig.PublicKeyCallback leading to authorization bypass
(bsc#1234563).

Other fixes: \- Updated to version 20250327.01 (bsc#1239763, bsc#1239866) *
Remove error messages from gce_workload_cert_refresh and metadata script runner
(#527) \- from version 20250327.00 * Update guest-logging-go dependency (#526)
*
Add 'created-by' metadata, and pass it as option to logging library
(#508) *
Revert "oslogin: Correctly handle newlines at the end of modified files
(#520)"
(#523) * Re-enable disabled services if the core plugin was enabled (#522) *
Enable guest services on package upgrade (#519) * oslogin: Correctly handle
newlines at the end of modified files (#520) * Fix core plugin path (#518) *
Fix
package build issues (#517) * Fix dependencies ran go mod tidy -v (#515) * Fix
debian build path (#514) * Bundle compat metadata script runner binary in
package (#513) * Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512) * Update
startup/shutdown services to launch compat manager (#503) * Bundle new gce
metadata script runner binary in agent package (#502) * Revert "Revert
bundling
new binaries in the package (#509)" (#511) \- from version 20250326.00 *
Re-
enable disabled services if the core plugin was enabled (#521) \- from version
20250324.00 * Enable guest services on package upgrade (#519) * oslogin:
Correctly handle newlines at the end of modified files (#520) * Fix core plugin
path (#518) * Fix package build issues (#517) * Fix dependencies ran go mod
tidy
-v (#515) * Fix debian build path (#514) * Bundle compat metadata script runner
binary in package (#513) * Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512) *
Update startup/shutdown services to launch compat manager (#503) * Bundle new
gce metadata script runner binary in agent package (#502) * Revert "Revert
bundling new binaries in the package (#509)" (#511) * Revert bundling new
binaries in the package (#509) * Fix typo in windows build script (#501) *
Include core plugin binary for all packages (#500) * Start packaging compat
manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent
packages (#492) * scripts: introduce a wrapper to locally build deb package
(#490) * Introduce compat-manager systemd unit (#497) \- from version
20250317.00 * Revert "Revert bundling new binaries in the package
(#509)" (#511)
* Revert bundling new binaries in the package (#509) * Fix typo in windows
build
script (#501) * Include core plugin binary for all packages (#500) * Start
packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary
in
all agent packages (#492) * scripts: introduce a wrapper to locally build deb
package (#490) * Introduce compat-manager systemd unit (#497) \- from version
20250312.00 * Revert bundling new binaries in the package (#509) * Fix typo in
windows build script (#501) * Include core plugin binary for all packages
(#500)
* Update crypto library to fix CVE-2024-45337 (#499) * Start packaging compat
manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent
packages (#492) * scripts: introduce a wrapper to locally build deb package
(#490) * Introduce compat-manager systemd unit (#497) \- from version
20250305.00 * Revert bundling new binaries in the package (#509) * Fix typo in
windows build script (#501) * Include core plugin binary for all packages
(#500)
* Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup
binary in all agent packages (#492) * scripts: introduce a wrapper to locally
build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from
version 20250304.01 * Fix typo in windows build script (#501) \- from version
20250214.01 * Include core plugin binary for all packages (#500) \- from
version
20250214.00 * Update crypto library to fix CVE-2024-45337 (#499) \- from
version
20250212.00 * Start packaging compat manager (#498) * Start bundling
ggactl_plugin_cleanup binary in all agent packages (#492) \- from version
20250211.00 * scripts: introduce a wrapper to locally build deb package (#490)
*
Introduce compat-manager systemd unit (#497) \- from version 20250207.00 *
vlan:
toggle vlan configuration in debian packaging (#495) * vlan: move config out of
unstable section (#494) * Add clarification to comments regarding invalid NICs
and the `invalid` tag. (#493) * Include interfaces in lists even if it has an
invalid MAC. (#489) * Fix windows package build failures (#491) * vlan:
don't
index based on the vlan ID (#486) * Revert PR #482 (#488) * Remove Amy and Zach
from OWNERS (#487) * Skip interfaces in interfaceNames() instead of erroring if
there is an (#482) * Fix Debian packaging if guest agent manager is not checked
out (#485) \- from version 20250204.02 * force concourse to move version
forward. \- from version 20250204.01 * vlan: toggle vlan configuration in
debian
packaging (#495) \- from version 20250204.00 * vlan: move config out of
unstable
section (#494) * Add clarification to comments regarding invalid NICs and the
`invalid` tag. (#493) \- from version 20250203.01 * Include interfaces in lists
even if it has an invalid MAC. (#489) \- from version 20250203.00 * Fix windows
package build failures (#491) * vlan: don't index based on the vlan ID
(#486) *
Revert PR #482 (#488) * Remove Amy and Zach from OWNERS (#487) * Skip
interfaces
in interfaceNames() instead of erroring if there is an (#482) * Fix Debian
packaging if guest agent manager is not checked out (#485) \- from version
20250122.00 * networkd(vlan): remove the interface in addition to config (#468)
* Implement support for vlan dynamic removal, update dhclient to remove only if
configured (#465) * Update logging library (#479) * Remove Pat from owners
file.
(#478)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1143=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1143=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-1143=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-1143=1

* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1143=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1143=1

## Package List:

* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* google-guest-agent-20250327.01-150000.1.60.1
* Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* google-guest-agent-20250327.01-150000.1.60.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* google-guest-agent-20250327.01-150000.1.60.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* google-guest-agent-20250327.01-150000.1.60.1
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* google-guest-agent-20250327.01-150000.1.60.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* google-guest-agent-20250327.01-150000.1.60.1

## References:

* https://www.suse.com/security/cve/CVE-2024-45337.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234563
* https://bugzilla.suse.com/show_bug.cgi?id=1239763
* https://bugzilla.suse.com/show_bug.cgi?id=1239866


--===============5543512825157086868==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for google-guest-agent</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:1143-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-04-04T13:31:36Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234563">bsc#1234563</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239763">bsc#1239763</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239866">bsc#1239866</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45337.html">CVE-2024-45337</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45337</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45337</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">Public Cloud
Module 15-SP3</li>

<li class="list-group-item">Public Cloud
Module 15-SP4</li>

<li class="list-group-item">Public Cloud
Module 15-SP5</li>

<li class="list-group-item">Public Cloud
Module 15-SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

<li class="list-group-item">SUSE Manager
Proxy 4.2</li>

<li class="list-group-item">SUSE Manager
Proxy 4.3</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.2</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.3</li>

<li class="list-group-item">SUSE Manager
Server 4.2</li>

<li class="list-group-item">SUSE Manager
Server 4.3</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves one vulnerability and has two security fixes
can now be installed.</p>





<h2>Description:</h2>

<p>This update for google-guest-agent fixes the following
issues:</p>
<ul>
<li>CVE-2024-45337: golang.org/x/crypto/ssh: Fixed misuse of
ServerConfig.PublicKeyCallback leading to authorization bypass (bsc#1234563).</li>
</ul>
<p>Other fixes:
- Updated to version 20250327.01 (bsc#1239763, bsc#1239866)
* Remove error messages from gce_workload_cert_refresh and
metadata script runner (#527)
- from version 20250327.00
* Update guest-logging-go dependency (#526)
* Add &#x27;created-by&#x27; metadata, and pass it as option to
logging library (#508)
* Revert &quot;oslogin: Correctly handle newlines at the end of
modified files (#520)&quot; (#523)
* Re-enable disabled services if the core plugin was enabled (#522)
* Enable guest services on package upgrade (#519)
* oslogin: Correctly handle newlines at the end of modified files (#520)
* Fix core plugin path (#518)
* Fix package build issues (#517)
* Fix dependencies ran go mod tidy -v (#515)
* Fix debian build path (#514)
* Bundle compat metadata script runner binary in package (#513)
* Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512)
* Update startup/shutdown services to launch compat manager (#503)
* Bundle new gce metadata script runner binary in agent package (#502)
* Revert &quot;Revert bundling new binaries in the package
(#509)&quot; (#511)
- from version 20250326.00
* Re-enable disabled services if the core plugin was enabled (#521)
- from version 20250324.00
* Enable guest services on package upgrade (#519)
* oslogin: Correctly handle newlines at the end of modified files (#520)
* Fix core plugin path (#518)
* Fix package build issues (#517)
* Fix dependencies ran go mod tidy -v (#515)
* Fix debian build path (#514)
* Bundle compat metadata script runner binary in package (#513)
* Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512)
* Update startup/shutdown services to launch compat manager (#503)
* Bundle new gce metadata script runner binary in agent package (#502)
* Revert &quot;Revert bundling new binaries in the package
(#509)&quot; (#511)
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- from version 20250317.00
* Revert &quot;Revert bundling new binaries in the package
(#509)&quot; (#511)
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- from version 20250312.00
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Update crypto library to fix CVE-2024-45337 (#499)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- from version 20250305.00
* Revert bundling new binaries in the package (#509)
* Fix typo in windows build script (#501)
* Include core plugin binary for all packages (#500)
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- from version 20250304.01
* Fix typo in windows build script (#501)
- from version 20250214.01
* Include core plugin binary for all packages (#500)
- from version 20250214.00
* Update crypto library to fix CVE-2024-45337 (#499)
- from version 20250212.00
* Start packaging compat manager (#498)
* Start bundling ggactl_plugin_cleanup binary in all agent packages (#492)
- from version 20250211.00
* scripts: introduce a wrapper to locally build deb package (#490)
* Introduce compat-manager systemd unit (#497)
- from version 20250207.00
* vlan: toggle vlan configuration in debian packaging (#495)
* vlan: move config out of unstable section (#494)
* Add clarification to comments regarding invalid NICs and the
<code>invalid</code> tag. (#493)
* Include interfaces in lists even if it has an invalid MAC. (#489)
* Fix windows package build failures (#491)
* vlan: don&#x27;t index based on the vlan ID (#486)
* Revert PR #482 (#488)
* Remove Amy and Zach from OWNERS (#487)
* Skip interfaces in interfaceNames() instead of erroring if there is an
(#482)
* Fix Debian packaging if guest agent manager is not checked out (#485)
- from version 20250204.02
* force concourse to move version forward.
- from version 20250204.01
* vlan: toggle vlan configuration in debian packaging (#495)
- from version 20250204.00
* vlan: move config out of unstable section (#494)
* Add clarification to comments regarding invalid NICs and the
<code>invalid</code> tag. (#493)
- from version 20250203.01
* Include interfaces in lists even if it has an invalid MAC. (#489)
- from version 20250203.00
* Fix windows package build failures (#491)
* vlan: don&#x27;t index based on the vlan ID (#486)
* Revert PR #482 (#488)
* Remove Amy and Zach from OWNERS (#487)
* Skip interfaces in interfaceNames() instead of erroring if there is an
(#482)
* Fix Debian packaging if guest agent manager is not checked out (#485)
- from version 20250122.00
* networkd(vlan): remove the interface in addition to config (#468)
* Implement support for vlan dynamic removal, update dhclient to
remove only if configured (#465)
* Update logging library (#479)
* Remove Pat from owners file. (#478)</p>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
Public Cloud Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1143=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1143=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.6-2025-1143=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.5


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.5-2025-1143=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1143=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1143=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>google-guest-agent-20250327.01-150000.1.60.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>google-guest-agent-20250327.01-150000.1.60.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>google-guest-agent-20250327.01-150000.1.60.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>google-guest-agent-20250327.01-150000.1.60.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
<ul>


<li>google-guest-agent-20250327.01-150000.1.60.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
<ul>


<li>google-guest-agent-20250327.01-150000.1.60.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45337.html">https://www.suse.com/security/cve/CVE-2024-45337.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234563">https://bugzilla.suse.com/show_bug.cgi?id=1234563</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239763">https://bugzilla.suse.com/show_bug.cgi?id=1239763</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239866">https://bugzilla.suse.com/show_bug.cgi?id=1239866</a>
</li>


</ul>

</div>

--===============5543512825157086868==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung