Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: SuSE Linux 9.0

This vulnerability report for SuSE Linux 9.0 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in SuSE Linux 9.0 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor SUSE

Product Link View Here (Link to external site)

Affected By 168 Secunia advisories
704 Vulnerabilities

Monitor Product Receive alerts for this product





45 Secunia Advisories in 2004

Secunia has issued a total of 45 Secunia advisories in 2004 for SuSE Linux 9.0. Currently, 4% (2 out of 45) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting SuSE Linux 9.0 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



SUSE update for samba
Vendor Patch. Secunia Advisory 1 of 45 in 2004. 12,727 views.
Release Date:
2004-12-23
Secunia Advisory ID:
SA13623
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


SUSE update for ncpfs
Vendor Patch. Secunia Advisory 2 of 45 in 2004. 12,648 views.
Release Date:
2004-12-22
Secunia Advisory ID:
SA13617
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
SUSE has issued an update for ncpfs. This fixes a potential vulnerability, which can be exploited by malicious, local users. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 3 of 45 in 2004. 12,696 views.
Release Date:
2004-12-22
Secunia Advisory ID:
SA13610
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
SUSE has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited to cause a DoS (Denial of Service), gain knowledge of sensitive information, or gain escalated privileges. [Read More]


SUSE update for file/phprojekt
Vendor Patch. Secunia Advisory 4 of 45 in 2004. 12,606 views.
Release Date:
2004-12-17
Secunia Advisory ID:
SA13517
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
SUSE has issued updates for file and phprojekt. These fix two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or potentially compromise a user's system. [Read More]


SUSE Updates for Multiple Packages
Vendor Patch. Secunia Advisory 5 of 45 in 2004. 10,424 views.
Release Date:
2004-12-08
Secunia Advisory ID:
SA13395
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
SUSE has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited to overwrite files, gain escalated privileges, or potentially compromise a vulnerable system. [Read More]


SUSE update for cyrus-imapd
Vendor Patch. Secunia Advisory 6 of 45 in 2004. 9,709 views.
Release Date:
2004-12-06
Secunia Advisory ID:
SA13366
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SUSE has issued an update for cyrus-imapd. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


SUSE update for kernel
Vendor Patch. Secunia Advisory 7 of 45 in 2004. 9,119 views.
Release Date:
2004-12-02
Secunia Advisory ID:
SA13339
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Exposure of sensitive information
Where:
From local network
Short Description:
SUSE has issued an update for the kernel. This fixes multiple vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges or by malicious people to cause a DoS (Denial of Service) or leak kernel memory. [Read More]


SUSE Updates For Multiple Packages
Vendor Patch. Secunia Advisory 8 of 45 in 2004. 10,708 views.
Release Date:
2004-12-01
Secunia Advisory ID:
SA13345
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
SUSE has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited to bypass certain security functionality, cause a DoS (Denial-of-Service), and potentially compromise a user's system. [Read More]


SUSE Updates For Multiple Packages
Vendor Patch. Secunia Advisory 9 of 45 in 2004. 9,104 views.
Release Date:
2004-11-25
Secunia Advisory ID:
SA13303
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
SUSE has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited to bypass certain security restrictions, cause a DoS (Denial of Service), compromise a vulnerable system, or gain escalated privileges. [Read More]


SUSE update for xshared/XFree86-libs/xorg-x11-libs
Vendor Patch. Secunia Advisory 10 of 45 in 2004. 13,570 views.
Release Date:
2004-11-18
Secunia Advisory ID:
SA13235
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SUSE has issued updates for xshared, XFree86-libs, and xorg-x11-libs. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


SuSE update for xpdf
Partial Fix. Secunia Advisory 11 of 45 in 2004. 10,740 views.
Release Date:
2004-10-26
Secunia Advisory ID:
SA12985
Solution Status:
Partial Fix
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued updates for xpdf, gpdf, kdegraphics3-pdf, pdftohtml, and cups. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


SuSE update for libtiff
Vendor Patch. Secunia Advisory 12 of 45 in 2004. 9,519 views.
Release Date:
2004-10-22
Secunia Advisory ID:
SA12949
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SuSE has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). [Read More]


SuSE update for mozilla
Vendor Patch. Secunia Advisory 13 of 45 in 2004. 8,808 views.
Release Date:
2004-10-07
Secunia Advisory ID:
SA12747
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Manipulation of data
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
SuSE has issued an update for mozilla. This fixes multiple vulnerabilities, which can be exploited to cause a DoS (Denial of Service), spoof content of websites, conduct cross-site scripting attacks, access and modify sensitive information, or compromise a vulnerable system. [Read More]


SuSE update for samba
Vendor Patch. Secunia Advisory 14 of 45 in 2004. 8,654 views.
Release Date:
2004-10-05
Secunia Advisory ID:
SA12735
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
SuSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to access arbitrary files and directories. [Read More]


SuSE update for XFree86
Vendor Patch. Secunia Advisory 15 of 45 in 2004. 9,820 views.
Release Date:
2004-09-18
Secunia Advisory ID:
SA12579
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued an update for XFree86. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


SuSE update for gtk2 and gdk-pixbuf
Vendor Patch. Secunia Advisory 16 of 45 in 2004. 9,534 views.
Release Date:
2004-09-17
Secunia Advisory ID:
SA12588
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SuSE has issued updates for gdk-pixbuf and gtk2. These fix multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


SuSE update for apache2
Vendor Patch. Secunia Advisory 17 of 45 in 2004. 6,459 views.
Release Date:
2004-09-16
Secunia Advisory ID:
SA12555
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
SuSE has issued an update for apache2. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or by malicious, local users to gain escalated privileges. [Read More]


SuSE update for cups
Vendor Patch. Secunia Advisory 18 of 45 in 2004. 7,421 views.
Release Date:
2004-09-16
Secunia Advisory ID:
SA12559
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
SuSE has issued an update for cups. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or by malicious, local users to gain escalated privileges. [Read More]


SUSE update for apache2
Vendor Patch. Secunia Advisory 19 of 45 in 2004. 8,958 views.
Release Date:
2004-09-07
Secunia Advisory ID:
SA12474
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
SUSE has issued an update for apache2. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 20 of 45 in 2004. 8,619 views.
Release Date:
2004-09-02
Secunia Advisory ID:
SA12427
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
SuSE has issued an update for the kernel. This fixes two vulnerabilities, allowing malicious people and local users to cause a DoS (Denial of Service). [Read More]


SuSE update for qt3
Vendor Patch. Secunia Advisory 21 of 45 in 2004. 9,132 views.
Release Date:
2004-08-20
Secunia Advisory ID:
SA12328
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SUSE has issued an update for qt3. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


SuSE update for rsync
Vendor Patch. Secunia Advisory 22 of 45 in 2004. 10,388 views.
Release Date:
2004-08-17
Secunia Advisory ID:
SA12307
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
SuSE has issued an update for rsync. This fixes a vulnerability, which potentially can be exploited by malicious users to read or write arbitrary files on a vulnerable system. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 23 of 45 in 2004. 9,023 views.
Release Date:
2004-08-09
Secunia Advisory ID:
SA12247
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
SuSE has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to disclose sensitive information in kernel memory. [Read More]


SuSE update for libpng
Vendor Patch. Secunia Advisory 24 of 45 in 2004. 12,085 views.
Release Date:
2004-08-05
Secunia Advisory ID:
SA12222
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SuSE has issued an update for libpng. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


SuSE update for samba
Vendor Patch. Secunia Advisory 25 of 45 in 2004. 8,573 views.
Release Date:
2004-07-23
Secunia Advisory ID:
SA12139
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued an update for samba. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


SuSE update for php4
Vendor Patch. Secunia Advisory 26 of 45 in 2004. 9,628 views.
Release Date:
2004-07-19
Secunia Advisory ID:
SA12078
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
SuSE has issued an update for php4. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security functionality or compromise a vulnerable system. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 27 of 45 in 2004. 9,583 views.
Release Date:
2004-07-05
Secunia Advisory ID:
SA12009
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
SuSE has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, cause a DoS (Denial of Service), or gain knowledge of sensitive information. [Read More]


SuSE update for dhcp/dhcp-server
Vendor Patch. Secunia Advisory 28 of 45 in 2004. 14,195 views.
Release Date:
2004-06-23
Secunia Advisory ID:
SA11929
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
SuSE has issued an update for dhcp/dhcp-server. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a Denial of Service or compromise a vulnerable system. [Read More]


SuSE update for subversion
Vendor Patch. Secunia Advisory 29 of 45 in 2004. 10,650 views.
Release Date:
2004-06-17
Secunia Advisory ID:
SA11887
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SuSE has issued an update for subversion. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 30 of 45 in 2004. 9,577 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11885
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
SuSE has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


SuSE update for CVS
Vendor Patch. Secunia Advisory 31 of 45 in 2004. 8,586 views.
Release Date:
2004-06-10
Secunia Advisory ID:
SA11829
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
SuSE has issued an update for CVS. This fixes multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


SuSE update for squid
Vendor Patch. Secunia Advisory 32 of 45 in 2004. 9,090 views.
Release Date:
2004-06-10
Secunia Advisory ID:
SA11816
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


SuSE update for kdelibs
Vendor Patch. Secunia Advisory 33 of 45 in 2004. 10,828 views.
Release Date:
2004-05-26
Secunia Advisory ID:
SA11713
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
SuSE has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to create or truncate files on a user's system. [Read More]


SuSE update for cvs
Vendor Patch. Secunia Advisory 34 of 45 in 2004. 10,444 views.
Release Date:
2004-05-19
Secunia Advisory ID:
SA11653
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued updated packages for cvs. These fix a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


SuSE update for mc
Vendor Patch. Secunia Advisory 35 of 45 in 2004. 9,107 views.
Release Date:
2004-05-17
Secunia Advisory ID:
SA11618
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
SuSE has issued updates for mc. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 36 of 45 in 2004. 11,367 views.
Release Date:
2004-05-04
Secunia Advisory ID:
SA11541
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
SuSE has issued updated packages for the kernel. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, gain knowledge of sensitive information, or cause a DoS (Denial of Service). [Read More]


SuSE update for CVS
Vendor Patch. Secunia Advisory 37 of 45 in 2004. 9,251 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11374
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued updated packages for CVS. These fix two vulnerabilities allowing malicious servers to compromise clients, and malicious users to retrieve arbitrary files from a vulnerable server. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 38 of 45 in 2004. 9,365 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11373
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
SuSE has issued updated packages for the kernel. These fix some vulnerabilities, which can be exploited by malicious, local users to escalate their privileges, and cause a Denial of Service. [Read More]


SuSE Linux YaST Temporary File Creation Vulnerability
Unpatched. Secunia Advisory 39 of 45 in 2004. 10,437 views.
Release Date:
2004-04-08
Secunia Advisory ID:
SA11300
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
l0om has reported a vulnerability in SuSE Linux, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


SuSE update for OpenSSL
Vendor Patch. Secunia Advisory 40 of 45 in 2004. 12,769 views.
Release Date:
2004-03-18
Secunia Advisory ID:
SA11146
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
SuSE has issued updated packages for OpenSSL. These fix two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial-of-Service). [Read More]


SuSE update for XFree86
Vendor Patch. Secunia Advisory 41 of 45 in 2004. 9,313 views.
Release Date:
2004-02-24
Secunia Advisory ID:
SA10957
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
SuSE has issued patches, which fix some vulnerabilities in XFree86. These can be exploited by malicious, local users to crash the X server on a vulnerable system. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 42 of 45 in 2004. 9,530 views.
Release Date:
2004-02-19
Secunia Advisory ID:
SA10917
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
SuSE has issued updated packages for the kernel. These fix various vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


SuSE update for gaim
Vendor Patch. Secunia Advisory 43 of 45 in 2004. 10,810 views.
Release Date:
2004-01-29
Secunia Advisory ID:
SA10748
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
SuSE has issued updated packages for gaim. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


SuSE "SuSEconfig.gnome-filesystem" Insecure Temporary File Creation
Unpatched. Secunia Advisory 44 of 45 in 2004. 11,841 views.
Release Date:
2004-01-14
Secunia Advisory ID:
SA10623
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
l0om has reported a vulnerability in SuSE, allowing malicious, local users to escalate their privileges on a vulnerable system. [Read More]


SuSE update for kernel
Vendor Patch. Secunia Advisory 45 of 45 in 2004. 11,677 views.
Release Date:
2004-01-06
Secunia Advisory ID:
SA10541
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
SuSE has issued updated packages for the kernel. These fix two vulnerabilities, which may disclose sensitive information to malicious, local users or allow them to gain escalated privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: SuSE Linux 9.0 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability