drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in popt
Name: |
Ausführen beliebiger Kommandos in popt |
|
ID: |
SUSE-SU-2011:1140-2 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE SLE SDK 10 SP3, SUSE Linux Enterprise Server 10 SP3, SUSE Linux Enterprise Desktop 10 SP4, SUSE SLE SDK 10 SP4, SUSE Linux Enterprise Server 10 SP4 |
|
Datum: |
Do, 3. November 2011, 14:03 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378 |
|
Applikationen: |
popt |
|
Originalnachricht |
SUSE Security Update: Security update for popt ______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1140-2 Rating: important References: #720824 Cross-References: CVE-2011-3378 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Server 10 SP3 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 SLE SDK 10 SP3 ______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Specially crafted RPM packages could have caused memory corruption in rpm when verifying signatures (CVE-2011-3378). This has been fixed.
Security Issue reference:
* CVE-2011-3378 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378 >
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
popt-1.7-271.42.2 popt-devel-1.7-271.42.2 rpm-4.4.2-43.42.2 rpm-devel-4.4.2-43.42.2 rpm-python-4.4.2-43.42.2
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
popt-32bit-1.7-271.42.2 popt-devel-32bit-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP4 (ia64):
popt-x86-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP4 (ppc):
popt-64bit-1.7-271.42.2 popt-devel-64bit-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64):
popt-1.7-271.37.38.7 popt-devel-1.7-271.37.38.7 rpm-4.4.2-43.38.38.7 rpm-devel-4.4.2-43.38.38.7 rpm-python-4.4.2-43.38.38.7
- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):
popt-32bit-1.7-271.37.38.7 popt-devel-32bit-1.7-271.37.38.7
- SUSE Linux Enterprise Server 10 SP3 (ia64):
popt-x86-1.7-271.37.38.7
- SUSE Linux Enterprise Server 10 SP3 (ppc):
popt-64bit-1.7-271.37.38.7 popt-devel-64bit-1.7-271.37.38.7
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
popt-1.7-271.42.2 popt-devel-1.7-271.42.2 rpm-4.4.2-43.42.2 rpm-devel-4.4.2-43.42.2 rpm-python-4.4.2-43.42.2
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
popt-32bit-1.7-271.42.2 popt-devel-32bit-1.7-271.42.2
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.42.2
- SLE SDK 10 SP3 (i586 ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.38.38.7
References:
http://support.novell.com/security/cve/CVE-2011-3378.html https://bugzilla.novell.com/720824 ?keywords=37cdbd497da1d0ad591becda0c89a5b0 ?keywords=66be1106fa91062647ce6393c302fb4f
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|