Mailinglist Archive: opensuse-updates (94 mails)

< Previous Next >
openSUSE-SU-2012:1440-1: mcrypt: Fixed some sprintf buffer overflows
openSUSE Security Update:
mcrypt: Fixed some sprintf buffer overflows

______________________________________________________________________________

Announcement ID: openSUSE-SU-2012:1440-1
Rating: low
References: #786100
Cross-References: CVE-2012-4527
Affected Products:
openSUSE 12.2
openSUSE 12.1
openSUSE 11.4
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


Some potential mcrypt buffer overflows in the commandline
tool were fixed, which could lead to early aborts of
mcrypt. Due to FORTIFY_SOURCE catching such cases, it would
have only aborted mcrypt with a buffer overflow backtrace.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.2:

zypper in -t patch openSUSE-2012-758

- openSUSE 12.1:

zypper in -t patch openSUSE-2012-758

- openSUSE 11.4:

zypper in -t patch openSUSE-2012-758

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.2 (i586 x86_64):

mcrypt-2.6.8-24.9.1
mcrypt-debuginfo-2.6.8-24.9.1
mcrypt-debugsource-2.6.8-24.9.1

- openSUSE 12.1 (i586 x86_64):

mcrypt-2.6.8-19.9.1
mcrypt-debuginfo-2.6.8-19.9.1
mcrypt-debugsource-2.6.8-19.9.1

- openSUSE 11.4 (i586 x86_64):

mcrypt-2.6.8-24.1
mcrypt-debuginfo-2.6.8-24.1
mcrypt-debugsource-2.6.8-24.1


References:

http://support.novell.com/security/cve/CVE-2012-4527.html
https://bugzilla.novell.com/786100


< Previous Next >
This Thread
  • No further messages