Mailinglist Archive: opensuse-updates (48 mails)
< Previous | Next > |
openSUSE-SU-2015:1593-1: moderate: Security update for criu
- From: opensuse-security@xxxxxxxxxxxx
- Date: Tue, 22 Sep 2015 11:09:44 +0200 (CEST)
- Message-id: <20150922090944.5DF5B320FE@maintenance.suse.de>
openSUSE Security Update: Security update for criu
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:1593-1
Rating: moderate
References: #943105
Cross-References: CVE-2015-5228 CVE-2015-5231
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The systemd service in criu was disabled as a temporary workaround for
possibile security issues (CVE-2015-5228, CVE-2015-5231, bsc#943105)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-599=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (x86_64):
criu-1.3.1-4.1
criu-debuginfo-1.3.1-4.1
criu-debugsource-1.3.1-4.1
criu-devel-1.3.1-4.1
libcriu1-1.3.1-4.1
libcriu1-debuginfo-1.3.1-4.1
References:
https://www.suse.com/security/cve/CVE-2015-5228.html
https://www.suse.com/security/cve/CVE-2015-5231.html
https://bugzilla.suse.com/943105
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:1593-1
Rating: moderate
References: #943105
Cross-References: CVE-2015-5228 CVE-2015-5231
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The systemd service in criu was disabled as a temporary workaround for
possibile security issues (CVE-2015-5228, CVE-2015-5231, bsc#943105)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-599=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (x86_64):
criu-1.3.1-4.1
criu-debuginfo-1.3.1-4.1
criu-debugsource-1.3.1-4.1
criu-devel-1.3.1-4.1
libcriu1-1.3.1-4.1
libcriu1-debuginfo-1.3.1-4.1
References:
https://www.suse.com/security/cve/CVE-2015-5228.html
https://www.suse.com/security/cve/CVE-2015-5231.html
https://bugzilla.suse.com/943105
< Previous | Next > |