Mailinglist Archive: opensuse-updates (99 mails)
< Previous | Next > |
openSUSE-SU-2013:0255-1: moderate: update for libupnp
- From: opensuse-security@xxxxxxxxxxxx
- Date: Thu, 7 Feb 2013 09:04:22 +0100 (CET)
- Message-id: <20130207080422.ED635280AD@maintenance.suse.de>
openSUSE Security Update: update for libupnp
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0255-1
Rating: moderate
References: #801061
Cross-References: CVE-2012-5958 CVE-2012-5959 CVE-2012-5960
Affected Products:
openSUSE 12.2
openSUSE 12.1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
- Update to version 1.6.18 (bnc#801061)
+ Security fix for CERT issue VU#922681 This patch
addresses three possible buffer overflows in function
unique_service_name(). The three issues have the
folowing CVE numbers: CVE-2012-5958 Issue #2: Stack
buffer overflow of Tempbuf CVE-2012-5959 Issue #4:
Stack buffer overflow of Event->UDN CVE-2012-5960 Issue
#8: Stack buffer overflow of Event->UDN
+ Notice that the following issues have already been
dealt by previous work: CVE-2012-5961 Issue #1: Stack
buffer overflow of Evt->UDN CVE-2012-5962 Issue #3:
Stack buffer overflow of Evt->DeviceType CVE-2012-5963
Issue #5: Stack buffer overflow of Event->UDN
CVE-2012-5964 Issue #6: Stack buffer overflow of
Event->DeviceType CVE-2012-5965 Issue #7: Stack buffer
overflow of Event->DeviceType
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:
zypper in -t patch openSUSE-2013-90
- openSUSE 12.1:
zypper in -t patch openSUSE-2013-90
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2 (i586 x86_64):
libupnp-debugsource-1.6.18-6.4.1
libupnp-devel-1.6.18-6.4.1
libupnp6-1.6.18-6.4.1
libupnp6-debuginfo-1.6.18-6.4.1
- openSUSE 12.2 (x86_64):
libupnp6-32bit-1.6.18-6.4.1
libupnp6-debuginfo-32bit-1.6.18-6.4.1
- openSUSE 12.1 (i586 x86_64):
libupnp-devel-1.6.18-2.4.1
libupnp6-1.6.18-2.4.1
libupnp6-debuginfo-1.6.18-2.4.1
libupnp6-debugsource-1.6.18-2.4.1
- openSUSE 12.1 (x86_64):
libupnp6-32bit-1.6.18-2.4.1
libupnp6-debuginfo-32bit-1.6.18-2.4.1
- openSUSE 12.1 (ia64):
libupnp6-debuginfo-x86-1.6.18-2.4.1
libupnp6-x86-1.6.18-2.4.1
References:
http://support.novell.com/security/cve/CVE-2012-5958.html
http://support.novell.com/security/cve/CVE-2012-5959.html
http://support.novell.com/security/cve/CVE-2012-5960.html
https://bugzilla.novell.com/801061
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0255-1
Rating: moderate
References: #801061
Cross-References: CVE-2012-5958 CVE-2012-5959 CVE-2012-5960
Affected Products:
openSUSE 12.2
openSUSE 12.1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
- Update to version 1.6.18 (bnc#801061)
+ Security fix for CERT issue VU#922681 This patch
addresses three possible buffer overflows in function
unique_service_name(). The three issues have the
folowing CVE numbers: CVE-2012-5958 Issue #2: Stack
buffer overflow of Tempbuf CVE-2012-5959 Issue #4:
Stack buffer overflow of Event->UDN CVE-2012-5960 Issue
#8: Stack buffer overflow of Event->UDN
+ Notice that the following issues have already been
dealt by previous work: CVE-2012-5961 Issue #1: Stack
buffer overflow of Evt->UDN CVE-2012-5962 Issue #3:
Stack buffer overflow of Evt->DeviceType CVE-2012-5963
Issue #5: Stack buffer overflow of Event->UDN
CVE-2012-5964 Issue #6: Stack buffer overflow of
Event->DeviceType CVE-2012-5965 Issue #7: Stack buffer
overflow of Event->DeviceType
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.2:
zypper in -t patch openSUSE-2013-90
- openSUSE 12.1:
zypper in -t patch openSUSE-2013-90
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.2 (i586 x86_64):
libupnp-debugsource-1.6.18-6.4.1
libupnp-devel-1.6.18-6.4.1
libupnp6-1.6.18-6.4.1
libupnp6-debuginfo-1.6.18-6.4.1
- openSUSE 12.2 (x86_64):
libupnp6-32bit-1.6.18-6.4.1
libupnp6-debuginfo-32bit-1.6.18-6.4.1
- openSUSE 12.1 (i586 x86_64):
libupnp-devel-1.6.18-2.4.1
libupnp6-1.6.18-2.4.1
libupnp6-debuginfo-1.6.18-2.4.1
libupnp6-debugsource-1.6.18-2.4.1
- openSUSE 12.1 (x86_64):
libupnp6-32bit-1.6.18-2.4.1
libupnp6-debuginfo-32bit-1.6.18-2.4.1
- openSUSE 12.1 (ia64):
libupnp6-debuginfo-x86-1.6.18-2.4.1
libupnp6-x86-1.6.18-2.4.1
References:
http://support.novell.com/security/cve/CVE-2012-5958.html
http://support.novell.com/security/cve/CVE-2012-5959.html
http://support.novell.com/security/cve/CVE-2012-5960.html
https://bugzilla.novell.com/801061
< Previous | Next > |