openSUSE Security Update: pam: fixing stack overflow (CVE-2011-3148), a local DoS (CVE-2011-3149) and CVE-2010-3316. ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:1208-1 Rating: important References: #631802 #724480 Cross-References: CVE-2010-3316 CVE-2011-3148 CVE-2011-3149 Affected Products: openSUSE 11.3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: The pam_env module is vulnerable to a stack overflow (CVE-2011-3148) and a DoS condition (CVE-2011-3149) when parsing users .pam_environment files. Additionally a missing return value check inside pam_xauth has been fixed (CVE-2010-3316). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch pam-5331 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 x86_64): pam-1.1.1.90-2.3.1 pam-devel-1.1.1.90-2.3.1 - openSUSE 11.3 (x86_64): pam-32bit-1.1.1.90-2.3.1 pam-devel-32bit-1.1.1.90-2.3.1 - openSUSE 11.3 (noarch): pam-doc-1.1.1.90-2.3.1 References: http://support.novell.com/security/cve/CVE-2010-3316.html http://support.novell.com/security/cve/CVE-2011-3148.html http://support.novell.com/security/cve/CVE-2011-3149.html https://bugzilla.novell.com/631802 https://bugzilla.novell.com/724480 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org