Mailinglist Archive: opensuse-updates (84 mails)

< Previous Next >
openSUSE-SU-2011:0316-1 (important): libcgroup1: Fixed heap-based buffer overflow in libcgroup
openSUSE Security Update: libcgroup1: Fixed heap-based buffer overflow in
libcgroup
______________________________________________________________________________

Announcement ID: openSUSE-SU-2011:0316-1
Rating: important
References: #675048 #675506
Cross-References: CVE-2011-1006 CVE-2011-1022
Affected Products:
openSUSE 11.4
openSUSE 11.3
openSUSE 11.2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

Two security bugfixes in libcgroup1 were done:

libcgroup suffered from a heap based buffer overflow
(CVE-2011-1006).

The cgrulesengd daemon did not verify the origin of netlink
messages, allowing local users to spoof events
(CVE-2011-1022).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch libcgroup-devel-4148

- openSUSE 11.3:

zypper in -t patch libcgroup-devel-4087

- openSUSE 11.2:

zypper in -t patch libcgroup-devel-4087

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

libcgroup-devel-0.36.2-6.3.1
libcgroup1-0.36.2-6.3.1

- openSUSE 11.4 (x86_64):

libcgroup1-32bit-0.36.2-6.3.1

- openSUSE 11.3 (i586 x86_64):

libcgroup-devel-0.36.2-2.3.1
libcgroup1-0.36.2-2.3.1

- openSUSE 11.3 (x86_64):

libcgroup1-32bit-0.36.2-2.3.1

- openSUSE 11.2 (i586 x86_64):

libcgroup-devel-0.34-3.3.1
libcgroup1-0.34-3.3.1

- openSUSE 11.2 (x86_64):

libcgroup1-32bit-0.34-3.3.1


References:

http://support.novell.com/security/cve/CVE-2011-1006.html
http://support.novell.com/security/cve/CVE-2011-1022.html
https://bugzilla.novell.com/675048
https://bugzilla.novell.com/675506


< Previous Next >
This Thread
  • No further messages