Mailinglist Archive: opensuse-updates (98 mails)
< Previous | Next > |
openSUSE-SU-2015:0528-1: moderate: Security update for glusterfs
- From: opensuse-security@xxxxxxxxxxxx
- Date: Wed, 18 Mar 2015 18:08:02 +0100 (CET)
- Message-id: <20150318170802.22ED132390@maintenance.suse.de>
openSUSE Security Update: Security update for glusterfs
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0528-1
Rating: moderate
References: #919879
Cross-References: CVE-2014-3619
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
glusterfs was updated to fix a fragment header infinite loop denial of
service attack (CVE-2014-3619).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-241=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
glusterfs-3.5.2-2.4.1
glusterfs-debuginfo-3.5.2-2.4.1
glusterfs-debugsource-3.5.2-2.4.1
glusterfs-devel-3.5.2-2.4.1
libgfapi0-3.5.2-2.4.1
libgfapi0-debuginfo-3.5.2-2.4.1
libgfchangelog0-3.5.2-2.4.1
libgfchangelog0-debuginfo-3.5.2-2.4.1
libgfrpc0-3.5.2-2.4.1
libgfrpc0-debuginfo-3.5.2-2.4.1
libgfxdr0-3.5.2-2.4.1
libgfxdr0-debuginfo-3.5.2-2.4.1
libglusterfs0-3.5.2-2.4.1
libglusterfs0-debuginfo-3.5.2-2.4.1
References:
http://support.novell.com/security/cve/CVE-2014-3619.html
https://bugzilla.suse.com/919879
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0528-1
Rating: moderate
References: #919879
Cross-References: CVE-2014-3619
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
glusterfs was updated to fix a fragment header infinite loop denial of
service attack (CVE-2014-3619).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-241=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
glusterfs-3.5.2-2.4.1
glusterfs-debuginfo-3.5.2-2.4.1
glusterfs-debugsource-3.5.2-2.4.1
glusterfs-devel-3.5.2-2.4.1
libgfapi0-3.5.2-2.4.1
libgfapi0-debuginfo-3.5.2-2.4.1
libgfchangelog0-3.5.2-2.4.1
libgfchangelog0-debuginfo-3.5.2-2.4.1
libgfrpc0-3.5.2-2.4.1
libgfrpc0-debuginfo-3.5.2-2.4.1
libgfxdr0-3.5.2-2.4.1
libgfxdr0-debuginfo-3.5.2-2.4.1
libglusterfs0-3.5.2-2.4.1
libglusterfs0-debuginfo-3.5.2-2.4.1
References:
http://support.novell.com/security/cve/CVE-2014-3619.html
https://bugzilla.suse.com/919879
< Previous | Next > |