SUSE-SU-2012:0624-1: moderate: Security update for RPM
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Wed May 16 15:08:13 MDT 2012
SUSE Security Update: Security update for RPM
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0624-1
Rating: moderate
References: #747225 #754281 #754284 #754285
Cross-References: CVE-2012-0060 CVE-2012-0061 CVE-2012-0815
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 10 SP3 LTSS
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
Multiple security vulnerabilities were reported in RPM
which could have been exploited via specially crafted RPM
files to cause a denial of service (application crash) or
potentially allow attackers to execute arbitrary code.
Additionally, a non-security issue has been fixed that
could have caused a division by zero in cycles calculation
under rare circumstances.
Security Issue references:
* CVE-2012-0815
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815
>
* CVE-2012-0060
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060
>
* CVE-2012-0061
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-popt-6191
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-popt-6186
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-popt-6191
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-popt-6191
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-popt-6186
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-popt-6186
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-popt-6191
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-popt-6186
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
popt-devel-1.7-37.50.6
rpm-devel-4.4.2.3-37.50.6
- SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64):
rpm-32bit-4.4.2.3-37.50.6
- SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64):
popt-devel-32bit-1.7-37.50.6
rpm-devel-32bit-4.4.2.3-37.50.6
- SUSE Linux Enterprise Software Development Kit 11 SP2 (ia64):
rpm-x86-4.4.2.3-37.50.6
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64):
popt-devel-1.7-37.29.33.1
rpm-devel-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64):
rpm-32bit-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64):
popt-devel-32bit-1.7-37.29.33.1
rpm-devel-32bit-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (ia64):
rpm-x86-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
popt-1.7-37.50.6
rpm-4.4.2.3-37.50.6
- SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):
popt-32bit-1.7-37.50.6
rpm-32bit-4.4.2.3-37.50.6
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
popt-1.7-37.50.6
rpm-4.4.2.3-37.50.6
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):
popt-32bit-1.7-37.50.6
rpm-32bit-4.4.2.3-37.50.6
- SUSE Linux Enterprise Server 11 SP2 (ia64):
popt-x86-1.7-37.50.6
rpm-x86-4.4.2.3-37.50.6
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
popt-1.7-37.29.33.1
rpm-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64):
popt-32bit-1.7-37.29.33.1
rpm-32bit-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):
popt-1.7-37.29.33.1
rpm-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64):
popt-32bit-1.7-37.29.33.1
rpm-32bit-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Server 11 SP1 (ia64):
popt-x86-1.7-37.29.33.1
rpm-x86-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Server 10 SP4 (ia64 ppc s390x x86_64):
popt-1.7-271.46.16
popt-devel-1.7-271.46.16
rpm-4.4.2-43.46.16
rpm-devel-4.4.2-43.46.16
rpm-python-4.4.2-43.46.16
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
popt-32bit-1.7-271.46.16
popt-devel-32bit-1.7-271.46.16
- SUSE Linux Enterprise Server 10 SP4 (ia64):
popt-x86-1.7-271.46.16
- SUSE Linux Enterprise Server 10 SP4 (ppc):
popt-64bit-1.7-271.46.16
popt-devel-64bit-1.7-271.46.16
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
popt-1.7-271.37.42.36
popt-devel-1.7-271.37.42.36
rpm-4.4.2-43.38.42.36
rpm-devel-4.4.2-43.38.42.36
rpm-python-4.4.2-43.38.42.36
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
popt-32bit-1.7-271.37.42.36
popt-devel-32bit-1.7-271.37.42.36
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
popt-1.7-37.50.6
rpm-4.4.2.3-37.50.6
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64):
popt-32bit-1.7-37.50.6
rpm-32bit-4.4.2.3-37.50.6
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):
popt-1.7-37.29.33.1
rpm-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Desktop 11 SP1 (x86_64):
popt-32bit-1.7-37.29.33.1
rpm-32bit-4.4.2.3-37.29.33.1
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
popt-1.7-271.46.16
popt-32bit-1.7-271.46.16
popt-devel-1.7-271.46.16
popt-devel-32bit-1.7-271.46.16
rpm-4.4.2-43.46.16
rpm-devel-4.4.2-43.46.16
rpm-python-4.4.2-43.46.16
- SLE SDK 10 SP4 (ia64 ppc s390x x86_64):
rpm-devel-4.4.2-43.46.16
References:
http://support.novell.com/security/cve/CVE-2012-0060.html
http://support.novell.com/security/cve/CVE-2012-0061.html
http://support.novell.com/security/cve/CVE-2012-0815.html
https://bugzilla.novell.com/747225
https://bugzilla.novell.com/754281
https://bugzilla.novell.com/754284
https://bugzilla.novell.com/754285
http://download.novell.com/patch/finder/?keywords=1b2d80812b6b10b1756aca4188945da6
http://download.novell.com/patch/finder/?keywords=61f3188b3d9e4127f71a5e83882d65ea
http://download.novell.com/patch/finder/?keywords=a7ba4678f589652692e7c0375486a7a1
http://download.novell.com/patch/finder/?keywords=c95eac3fb537ad2e271b549a1dd78add
More information about the sle-updates
mailing list