SuSE: Weekly Summary 2011:004
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2011:004
Date: Tue, 22 Feb 2011 13:00:00 +0000
Cross-References: CVE-2010-2542, CVE-2010-3906, CVE-2010-4022
CVE-2010-4352, CVE-2011-0017, CVE-2011-0281
CVE-2011-0282
Content of this advisory:
1) Solved Security Vulnerabilities:
- exim
- krb5
- git
- dbus-1
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- exim
Exim was updated to verify the return value of the setuid/setgid calls
now. (CVE-2011-0017)
Affected Products: openSUSE 11.2, 11.3
- krb5
Multiple KDC DoS vulnerabilities if used with LDAP backends have been
fixed in krb5. CVE-2011-0281 and CVE-2011-0282 have been assigned.
Additionally a DoS vulnerability in kpropd has been fixed in openSUSE.
CVE-2010-4022 has been assigned to this issue.
Affected Products: SLE11-SP1, openSUSE 11.2, 11.3
- git
This update fixes two vulnerabilities:
+ CVE-2010-3906: XSS vulnerability in gitweb; a remote attacker could
craft an URL such that arbitrary content would be inserted to the
generated web page.
+ CVE-2010-2542: Stack overflow vulnerability that can lead to arbitrary
code execution if user runs any git command on a specially crafted git
working copy.
Affected Products: SLE11-SP1, openSUSE 11.2, 11.3
- dbus-1
Local users could crash the D-Bus daemon by sending a specially crafted
message (CVE-2010-4352).
Affected Products: SLE11-SP1
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References