openSUSE Security Update: libcgroup1: Fixed heap-based buffer overflow in libcgroup ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:0316-1 Rating: important References: #675048 #675506 Cross-References: CVE-2011-1006 CVE-2011-1022 Affected Products: openSUSE 11.4 openSUSE 11.3 openSUSE 11.2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: Two security bugfixes in libcgroup1 were done: libcgroup suffered from a heap based buffer overflow (CVE-2011-1006). The cgrulesengd daemon did not verify the origin of netlink messages, allowing local users to spoof events (CVE-2011-1022). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch libcgroup-devel-4148 - openSUSE 11.3: zypper in -t patch libcgroup-devel-4087 - openSUSE 11.2: zypper in -t patch libcgroup-devel-4087 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): libcgroup-devel-0.36.2-6.3.1 libcgroup1-0.36.2-6.3.1 - openSUSE 11.4 (x86_64): libcgroup1-32bit-0.36.2-6.3.1 - openSUSE 11.3 (i586 x86_64): libcgroup-devel-0.36.2-2.3.1 libcgroup1-0.36.2-2.3.1 - openSUSE 11.3 (x86_64): libcgroup1-32bit-0.36.2-2.3.1 - openSUSE 11.2 (i586 x86_64): libcgroup-devel-0.34-3.3.1 libcgroup1-0.34-3.3.1 - openSUSE 11.2 (x86_64): libcgroup1-32bit-0.34-3.3.1 References: http://support.novell.com/security/cve/CVE-2011-1006.html http://support.novell.com/security/cve/CVE-2011-1022.html https://bugzilla.novell.com/675048 https://bugzilla.novell.com/675506