openSUSE Security Update: libqt4: fixed stack-based buffer overflow in glyph
handling (CVE-2011-3922)
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0091-1
Rating: important
References: #739904
Cross-References: CVE-2011-3922
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A stack-based buffer overflow in the glyph handling of
libqt4's harfbuzz has been fixed. CVE-2011-3922 has been
assigned to this issue.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch libQtWebKit-devel-5628
- openSUSE 11.3:
zypper in -t patch libQtWebKit-devel-5628
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
libQtWebKit-devel-4.7.1-8.17.1
libQtWebKit4-4.7.1-8.17.1
libqt4-4.7.1-8.17.1
libqt4-devel-4.7.1-8.17.1
libqt4-qt3support-4.7.1-8.17.1
libqt4-sql-4.7.1-8.17.1
libqt4-sql-sqlite-4.7.1-8.17.1
libqt4-x11-4.7.1-8.17.1
- openSUSE 11.4 (x86_64):
libQtWebKit4-32bit-4.7.1-8.17.1
libqt4-32bit-4.7.1-8.17.1
libqt4-qt3support-32bit-4.7.1-8.17.1
libqt4-sql-32bit-4.7.1-8.17.1
libqt4-sql-sqlite-32bit-4.7.1-8.17.1
libqt4-x11-32bit-4.7.1-8.17.1
- openSUSE 11.3 (i586 x86_64):
libQtWebKit-devel-4.6.3-2.7.1
libQtWebKit4-4.6.3-2.7.1
libqt4-4.6.3-2.7.1
libqt4-devel-4.6.3-2.7.1
libqt4-qt3support-4.6.3-2.7.1
libqt4-sql-4.6.3-2.7.1
libqt4-sql-sqlite-4.6.3-2.7.1
libqt4-x11-4.6.3-2.7.1
- openSUSE 11.3 (x86_64):
libQtWebKit4-32bit-4.6.3-2.7.1
libqt4-32bit-4.6.3-2.7.1
libqt4-qt3support-32bit-4.6.3-2.7.1
libqt4-sql-32bit-4.6.3-2.7.1
libqt4-sql-sqlite-32bit-4.6.3-2.7.1
libqt4-x11-32bit-4.6.3-2.7.1
References:
http://support.novell.com/security/cve/CVE-2011-3922.html
https://bugzilla.novell.com/739904
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke