openSUSE Security Update: mcrypt: Fixed some sprintf buffer overflows ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:1440-1 Rating: low References: #786100 Cross-References: CVE-2012-4527 Affected Products: openSUSE 12.2 openSUSE 12.1 openSUSE 11.4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Some potential mcrypt buffer overflows in the commandline tool were fixed, which could lead to early aborts of mcrypt. Due to FORTIFY_SOURCE catching such cases, it would have only aborted mcrypt with a buffer overflow backtrace. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2: zypper in -t patch openSUSE-2012-758 - openSUSE 12.1: zypper in -t patch openSUSE-2012-758 - openSUSE 11.4: zypper in -t patch openSUSE-2012-758 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.2 (i586 x86_64): mcrypt-2.6.8-24.9.1 mcrypt-debuginfo-2.6.8-24.9.1 mcrypt-debugsource-2.6.8-24.9.1 - openSUSE 12.1 (i586 x86_64): mcrypt-2.6.8-19.9.1 mcrypt-debuginfo-2.6.8-19.9.1 mcrypt-debugsource-2.6.8-19.9.1 - openSUSE 11.4 (i586 x86_64): mcrypt-2.6.8-24.1 mcrypt-debuginfo-2.6.8-24.1 mcrypt-debugsource-2.6.8-24.1 References: http://support.novell.com/security/cve/CVE-2012-4527.html https://bugzilla.novell.com/786100