Ispravljen je sigunosni propust otkriven u paketu nginx koji je udaljeni napadač mogao iskoristiti za izvođenje DoS napada i proizvoljno izvršavanje programskog koda.
Paket:
nginx 1.x
Operacijski sustavi:
openSUSE 11.4, SUSE Linux Enterprise Server (SLES) 11
SUSE Security Update: Security update for nginx-1.0
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1300-1
Rating: important
References: #731084
Cross-References: CVE-2011-4315
Affected Products:
WebYaST 1.2
SUSE Studio Standard Edition 1.2
SUSE Studio Onsite 1.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A flaw in the custom DNS resolver of nginx could lead to a
heap based buffer overflow which could potentially allow
attackers to execute arbitrary code or to cause a Denial
of Service (bnc#731084, CVE-2011-4315).
Security Issue reference:
* CVE-2011-4315
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4315
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- WebYaST 1.2:
zypper in -t patch slewyst12-nginx-1.0-5464
- SUSE Studio Standard Edition 1.2:
zypper in -t patch sleslms12-nginx-1.0-5464
- SUSE Studio Onsite 1.2:
zypper in -t patch slestso12-nginx-1.0-5464
To bring your system up-to-date, use "zypper patch".
Package List:
- WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64):
nginx-1.0-1.0.0-0.11.1
- SUSE Studio Standard Edition 1.2 (x86_64):
nginx-1.0-1.0.0-0.11.1
- SUSE Studio Onsite 1.2 (x86_64):
nginx-1.0-1.0.0-0.11.1
References:
http://support.novell.com/security/cve/CVE-2011-4315.html
https://bugzilla.novell.com/731084
http://download.novell.com/patch/finder/?keywords=27ad6bfa3403bc754de85cea4f1875d0
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke