Novell XTier framework 5198
This document (5114990) is provided subject to the disclaimer at the end of this document.
patches this patch supersedes
patches that supersede this patch
Important: Security update for Novell XTier framework (5198)
Applies to:Package(s): novell-novfsd novell-novfsd-debuginfo novell-novfsd-debugsource novell-xtier-base novell-xtier-core novell-xtier-devel novell-xtier-web novell-xtier-xplat
SUSE Linux Enterprise Desktop 11 SP1
Everyone should update.
Several user supplied header length variables for the HTTP server component in the Novell XTier framework were not size limited, allowing integer overflow attacks to crash the service or potentially execute code. (CVE-2011-1710)
Security Issue reference:
This update is provided as a set of RPM packages that can easily be installed onto a running system by using the YaST online update module. Please install the update.
|novell-novfsd-3.0.0-0.11.1.i586.rpm||76.9 KB (78794)||2011-10-25 11:45:12|
|novell-xtier-core-3.1.8-0.7.1.i586.rpm||1.0 MB (1065689)||2011-10-25 11:45:19|
|novell-xtier-base-3.1.8-0.7.1.i586.rpm||4.0 MB (4213146)||2011-10-25 11:45:17|
|novell-xtier-xplat-3.1.8-0.7.1.i586.rpm||173.3 KB (177473)||2011-10-25 11:45:19|
source packagesDownload the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information. Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.
Novell is a registered trademark of Novell, Inc. in the United States and other countries. SUSE is a registered trademark of SUSE Linux AG, a Novell business. *All third-party trademarks are the property of their respective owners.
© 2007 Novell, Inc. All Rights Reserved.