First published: Mon Jul 21 2008(Updated: )
zypp-refresh-patches in zypper in SUSE openSUSE 10.2, 10.3, and 11.0 does not ask the user before accepting repository keys, which allows remote repositories to cause a denial of service (package data corruption) via a spoofed key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE zypper | =10.2 | |
openSUSE zypper | =10.3 | |
openSUSE zypper | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3187 has a moderate severity rating due to its potential for denial of service and data corruption.
To fix CVE-2008-3187, update zypper to a patched version that includes a fix for the repository key acceptance issue.
CVE-2008-3187 affects SUSE openSUSE zypper versions 10.2, 10.3, and 11.0.
CVE-2008-3187 is a vulnerability related to insufficient user confirmation for accepting remote repository keys.
If CVE-2008-3187 is not addressed, it could lead to denial of service through package data corruption from malicious remote repositories.