openSUSE Security Update: pam: fixing stack overflow (CVE-2011-3148) and DoS (CVE-2011-3149) ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:1204-1 Rating: important References: #724480 Cross-References: CVE-2011-3148 CVE-2011-3149 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The pam_env module is vulnerable to a stack overflow (CVE-2011-3148) and a DoS condition (CVE-2011-3149) when parsing users .pam_environment files. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch pam-5330 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): pam-1.1.3-4.9.1 pam-devel-1.1.3-4.9.1 pam-doc-1.1.3-4.9.1 - openSUSE 11.4 (x86_64): pam-32bit-1.1.3-4.9.1 pam-devel-32bit-1.1.3-4.9.1 References: http://support.novell.com/security/cve/CVE-2011-3148.html http://support.novell.com/security/cve/CVE-2011-3149.html https://bugzilla.novell.com/724480 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org