Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in popt
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in popt
ID: SUSE-SU-2011:1140-2
Distribution: SUSE
Plattformen: SUSE SLE SDK 10 SP3, SUSE Linux Enterprise Server 10 SP3, SUSE Linux Enterprise Desktop 10 SP4, SUSE SLE SDK 10 SP4, SUSE Linux Enterprise Server 10 SP4
Datum: Do, 3. November 2011, 14:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378
Applikationen: popt

Originalnachricht

   SUSE Security Update: Security update for popt
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:1140-2
Rating: important
References: #720824
Cross-References: CVE-2011-3378
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
SLE SDK 10 SP3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


Specially crafted RPM packages could have caused memory
corruption in rpm when verifying signatures
(CVE-2011-3378). This has been fixed.

Security Issue reference:

* CVE-2011-3378
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378
>



Package List:

- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

popt-1.7-271.42.2
popt-devel-1.7-271.42.2
rpm-4.4.2-43.42.2
rpm-devel-4.4.2-43.42.2
rpm-python-4.4.2-43.42.2

- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

popt-32bit-1.7-271.42.2
popt-devel-32bit-1.7-271.42.2

- SUSE Linux Enterprise Server 10 SP4 (ia64):

popt-x86-1.7-271.42.2

- SUSE Linux Enterprise Server 10 SP4 (ppc):

popt-64bit-1.7-271.42.2
popt-devel-64bit-1.7-271.42.2

- SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64):

popt-1.7-271.37.38.7
popt-devel-1.7-271.37.38.7
rpm-4.4.2-43.38.38.7
rpm-devel-4.4.2-43.38.38.7
rpm-python-4.4.2-43.38.38.7

- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):

popt-32bit-1.7-271.37.38.7
popt-devel-32bit-1.7-271.37.38.7

- SUSE Linux Enterprise Server 10 SP3 (ia64):

popt-x86-1.7-271.37.38.7

- SUSE Linux Enterprise Server 10 SP3 (ppc):

popt-64bit-1.7-271.37.38.7
popt-devel-64bit-1.7-271.37.38.7

- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

popt-1.7-271.42.2
popt-devel-1.7-271.42.2
rpm-4.4.2-43.42.2
rpm-devel-4.4.2-43.42.2
rpm-python-4.4.2-43.42.2

- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):

popt-32bit-1.7-271.42.2
popt-devel-32bit-1.7-271.42.2

- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):

rpm-devel-4.4.2-43.42.2

- SLE SDK 10 SP3 (i586 ia64 ppc s390x x86_64):

rpm-devel-4.4.2-43.38.38.7


References:

http://support.novell.com/security/cve/CVE-2011-3378.html
https://bugzilla.novell.com/720824
?keywords=37cdbd497da1d0ad591becda0c89a5b0
?keywords=66be1106fa91062647ce6393c302fb4f

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung