U radu programskog paketa xorg-x11-server uočene su dvije nove sigurnosne ranjivosti. Udaljeni ih napadač može iskoristiti za otkrivanje osjetljivih informacija te dobivanje većih ovlasti.
Paket:
xorg-x11 6.x
Operacijski sustavi:
openSUSE 11.3
Kritičnost:
3.5
Problem:
nepravilno rukovanje ovlastima
Iskorištavanje:
lokalno
Posljedica:
dobivanje većih privilegija, otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-4028, CVE-2011-4029
Izvorni ID preporuke:
openSUSE-SU-2012:0227-1
Izvor:
SUSE
Problem:
Sigurnosni propusti se javljaju zbog neodgovarajućeg rukovanja ovlastima prilikom stvaranja lock datoteke.
Posljedica:
Lokalni napadač spomenute propuste može iskoristiti za neovlašteno otkrivanje osjetljivih podataka te dobivanje većih privilegija u sustavu.
Rješenje:
Svim se korisnicima navedenog programskog paketa savjetuje korištenje njegove najnovije inačice.
openSUSE Security Update: xorg-x11-server
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0227-1
Rating: important
References: #722944
Cross-References: CVE-2011-4028 CVE-2011-4029
Affected Products:
openSUSE 11.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The X server had two security issues and one bug that is
fixed by this update.
CVE-2011-4028: It is possible for a local attacker to
deduce if a file exists or not by exploiting the way that
Xorg creates its lock files.
CVE-2011-4029: It is possible for a non-root local user to
set the read permission for all users on any file or
directory.
Special Instructions and Notes:
Please reboot the system after installing this update.This
update triggers a restart of the software management stack.
More updates will be available for installation after
applying this update and restarting the application. This
update triggers a restart of the software management stack.
More updates will be available for installation after
applying this update and restarting the application.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch xorg-x11-Xvnc-5490
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64):
xorg-x11-Xvnc-7.5_1.8.0-10.15.2
xorg-x11-server-7.5_1.8.0-10.15.2
xorg-x11-server-extra-7.5_1.8.0-10.15.2
xorg-x11-server-sdk-7.5_1.8.0-10.15.2
References:
http://support.novell.com/security/cve/CVE-2011-4028.html
http://support.novell.com/security/cve/CVE-2011-4029.html
https://bugzilla.novell.com/722944
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke