Mailinglist Archive: opensuse-security-announce (34 mails)
< Previous | Next > |
[security-announce] SUSE-SU-2011:1140-2: important: Security update for popt
- From: opensuse-security@xxxxxxxxxxxx
- Date: Wed, 2 Nov 2011 23:08:26 +0100 (CET)
- Message-id: <20111102220826.88CAD321AF@maintenance.suse.de>
SUSE Security Update: Security update for popt
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1140-2
Rating: important
References: #720824
Cross-References: CVE-2011-3378
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
SLE SDK 10 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Specially crafted RPM packages could have caused memory
corruption in rpm when verifying signatures
(CVE-2011-3378). This has been fixed.
Security Issue reference:
* CVE-2011-3378
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378
>
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
popt-1.7-271.42.2
popt-devel-1.7-271.42.2
rpm-4.4.2-43.42.2
rpm-devel-4.4.2-43.42.2
rpm-python-4.4.2-43.42.2
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
popt-32bit-1.7-271.42.2
popt-devel-32bit-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP4 (ia64):
popt-x86-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP4 (ppc):
popt-64bit-1.7-271.42.2
popt-devel-64bit-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64):
popt-1.7-271.37.38.7
popt-devel-1.7-271.37.38.7
rpm-4.4.2-43.38.38.7
rpm-devel-4.4.2-43.38.38.7
rpm-python-4.4.2-43.38.38.7
- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):
popt-32bit-1.7-271.37.38.7
popt-devel-32bit-1.7-271.37.38.7
- SUSE Linux Enterprise Server 10 SP3 (ia64):
popt-x86-1.7-271.37.38.7
- SUSE Linux Enterprise Server 10 SP3 (ppc):
popt-64bit-1.7-271.37.38.7
popt-devel-64bit-1.7-271.37.38.7
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
popt-1.7-271.42.2
popt-devel-1.7-271.42.2
rpm-4.4.2-43.42.2
rpm-devel-4.4.2-43.42.2
rpm-python-4.4.2-43.42.2
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
popt-32bit-1.7-271.42.2
popt-devel-32bit-1.7-271.42.2
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.42.2
- SLE SDK 10 SP3 (i586 ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.38.38.7
References:
http://support.novell.com/security/cve/CVE-2011-3378.html
https://bugzilla.novell.com/720824
http://download.novell.com/patch/finder/?keywords=37cdbd497da1d0ad591becda0c89a5b0
http://download.novell.com/patch/finder/?keywords=66be1106fa91062647ce6393c302fb4f
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1140-2
Rating: important
References: #720824
Cross-References: CVE-2011-3378
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
SLE SDK 10 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Specially crafted RPM packages could have caused memory
corruption in rpm when verifying signatures
(CVE-2011-3378). This has been fixed.
Security Issue reference:
* CVE-2011-3378
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378
>
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
popt-1.7-271.42.2
popt-devel-1.7-271.42.2
rpm-4.4.2-43.42.2
rpm-devel-4.4.2-43.42.2
rpm-python-4.4.2-43.42.2
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
popt-32bit-1.7-271.42.2
popt-devel-32bit-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP4 (ia64):
popt-x86-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP4 (ppc):
popt-64bit-1.7-271.42.2
popt-devel-64bit-1.7-271.42.2
- SUSE Linux Enterprise Server 10 SP3 (i586 ia64 ppc s390x x86_64):
popt-1.7-271.37.38.7
popt-devel-1.7-271.37.38.7
rpm-4.4.2-43.38.38.7
rpm-devel-4.4.2-43.38.38.7
rpm-python-4.4.2-43.38.38.7
- SUSE Linux Enterprise Server 10 SP3 (s390x x86_64):
popt-32bit-1.7-271.37.38.7
popt-devel-32bit-1.7-271.37.38.7
- SUSE Linux Enterprise Server 10 SP3 (ia64):
popt-x86-1.7-271.37.38.7
- SUSE Linux Enterprise Server 10 SP3 (ppc):
popt-64bit-1.7-271.37.38.7
popt-devel-64bit-1.7-271.37.38.7
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
popt-1.7-271.42.2
popt-devel-1.7-271.42.2
rpm-4.4.2-43.42.2
rpm-devel-4.4.2-43.42.2
rpm-python-4.4.2-43.42.2
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
popt-32bit-1.7-271.42.2
popt-devel-32bit-1.7-271.42.2
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.42.2
- SLE SDK 10 SP3 (i586 ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.38.38.7
References:
http://support.novell.com/security/cve/CVE-2011-3378.html
https://bugzilla.novell.com/720824
http://download.novell.com/patch/finder/?keywords=37cdbd497da1d0ad591becda0c89a5b0
http://download.novell.com/patch/finder/?keywords=66be1106fa91062647ce6393c302fb4f
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
< Previous | Next > |