SUSE Security Update: Security update for pam ______________________________________________________________________________ Announcement ID: SUSE-SU-2011:1209-1 Rating: important References: #568833 #631802 #703187 #724480 Cross-References: CVE-2010-3316 CVE-2011-3148 CVE-2011-3149 Affected Products: SUSE Linux Enterprise Server 10 SP3 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. Description: The pam_env module is vulnerable to a stack overflow (CVE-2011-3148) and a DoS condition (CVE-2011-3149) when parsing users .pam_environment files. Additionally a missing return value check inside pam_xauth has been fixed (CVE-2010-3316). Security Issue references: * CVE-2011-3148 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148
* CVE-2011-3149 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149
* CVE-2010-3316 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3316
Package List: - SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64): pam-0.99.6.3-28.20.3.4 pam-devel-0.99.6.3-28.20.3.4 - SUSE Linux Enterprise Server 10 SP3 (s390x x86_64): pam-32bit-0.99.6.3-28.20.3.4 pam-devel-32bit-0.99.6.3-28.20.3.4 - SUSE Linux Enterprise Server 10 SP3 (ia64): pam-x86-0.99.6.3-28.20.3.4 - SUSE Linux Enterprise Server 10 SP3 (ppc): pam-64bit-0.99.6.3-28.20.3.4 pam-devel-64bit-0.99.6.3-28.20.3.4 References: http://support.novell.com/security/cve/CVE-2010-3316.html http://support.novell.com/security/cve/CVE-2011-3148.html http://support.novell.com/security/cve/CVE-2011-3149.html https://bugzilla.novell.com/568833 https://bugzilla.novell.com/631802 https://bugzilla.novell.com/703187 https://bugzilla.novell.com/724480 http://download.novell.com/patch/finder/?keywords=c3b33b1f77a3515061a441ec5f... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org