openSUSE Security Update: Security update for glusterfs ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:0528-1 Rating: moderate References: #919879 Cross-References: CVE-2014-3619 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: glusterfs was updated to fix a fragment header infinite loop denial of service attack (CVE-2014-3619). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-241=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): glusterfs-3.5.2-2.4.1 glusterfs-debuginfo-3.5.2-2.4.1 glusterfs-debugsource-3.5.2-2.4.1 glusterfs-devel-3.5.2-2.4.1 libgfapi0-3.5.2-2.4.1 libgfapi0-debuginfo-3.5.2-2.4.1 libgfchangelog0-3.5.2-2.4.1 libgfchangelog0-debuginfo-3.5.2-2.4.1 libgfrpc0-3.5.2-2.4.1 libgfrpc0-debuginfo-3.5.2-2.4.1 libgfxdr0-3.5.2-2.4.1 libgfxdr0-debuginfo-3.5.2-2.4.1 libglusterfs0-3.5.2-2.4.1 libglusterfs0-debuginfo-3.5.2-2.4.1 References: http://support.novell.com/security/cve/CVE-2014-3619.html https://bugzilla.suse.com/919879