Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libxml2
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libxml2
ID: SUSE-SU-2016:1604-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Software Development Kit 11-SP4, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Server 11-SP2-LTSS, SUSE Manager 2.1, SUSE Linux Enterprise Debuginfo 11-SP2, SUSE OpenStack Cloud 5, SUSE Linux Enterprise Server 11-SP3-LTSS, SUSE Manager Proxy 2.1
Datum: Fr, 17. Juni 2016, 16:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762
Applikationen: libxml2

Originalnachricht

   SUSE Security Update: Security update for libxml2
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:1604-1
Rating: important
References: #963963 #965283 #978395 #981040 #981041 #981108
#981109 #981111 #981112 #981114 #981115 #981548
#981549 #981550
Cross-References: CVE-2015-8806 CVE-2016-1762 CVE-2016-1833
CVE-2016-1834 CVE-2016-1835 CVE-2016-1837
CVE-2016-1838 CVE-2016-1839 CVE-2016-1840
CVE-2016-2073 CVE-2016-3705 CVE-2016-4447
CVE-2016-4448 CVE-2016-4449 CVE-2016-4483

Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________

An update that fixes 15 vulnerabilities is now available.

Description:


This update for libxml2 fixes the following security issues:

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread was
fixed in libxml2/dict.c [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar
[bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar
[bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs
[bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral and
htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup
[bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName
[bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content
[bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud 5:

zypper in -t patch sleclo50sp3-libxml2-12616=1

- SUSE Manager Proxy 2.1:

zypper in -t patch slemap21-libxml2-12616=1

- SUSE Manager 2.1:

zypper in -t patch sleman21-libxml2-12616=1

- SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-libxml2-12616=1

- SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-libxml2-12616=1

- SUSE Linux Enterprise Server 11-SP3-LTSS:

zypper in -t patch slessp3-libxml2-12616=1

- SUSE Linux Enterprise Server 11-SP2-LTSS:

zypper in -t patch slessp2-libxml2-12616=1

- SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-libxml2-12616=1

- SUSE Linux Enterprise Debuginfo 11-SP3:

zypper in -t patch dbgsp3-libxml2-12616=1

- SUSE Linux Enterprise Debuginfo 11-SP2:

zypper in -t patch dbgsp2-libxml2-12616=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE OpenStack Cloud 5 (x86_64):

libxml2-2.7.6-0.44.1
libxml2-32bit-2.7.6-0.44.1
libxml2-doc-2.7.6-0.44.1
libxml2-python-2.7.6-0.44.4

- SUSE Manager Proxy 2.1 (x86_64):

libxml2-2.7.6-0.44.1
libxml2-32bit-2.7.6-0.44.1
libxml2-doc-2.7.6-0.44.1
libxml2-python-2.7.6-0.44.4

- SUSE Manager 2.1 (s390x x86_64):

libxml2-2.7.6-0.44.1
libxml2-32bit-2.7.6-0.44.1
libxml2-doc-2.7.6-0.44.1
libxml2-python-2.7.6-0.44.4

- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64
s390x x86_64):

libxml2-devel-2.7.6-0.44.1

- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x
x86_64):

libxml2-devel-32bit-2.7.6-0.44.1

- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

libxml2-2.7.6-0.44.1
libxml2-doc-2.7.6-0.44.1
libxml2-python-2.7.6-0.44.4

- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

libxml2-32bit-2.7.6-0.44.1

- SUSE Linux Enterprise Server 11-SP4 (ia64):

libxml2-x86-2.7.6-0.44.1

- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

libxml2-2.7.6-0.44.1
libxml2-doc-2.7.6-0.44.1
libxml2-python-2.7.6-0.44.4

- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):

libxml2-32bit-2.7.6-0.44.1

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

libxml2-2.7.6-0.44.1
libxml2-doc-2.7.6-0.44.1
libxml2-python-2.7.6-0.44.4

- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):

libxml2-32bit-2.7.6-0.44.1

- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

libxml2-debuginfo-2.7.6-0.44.1
libxml2-debugsource-2.7.6-0.44.1
libxml2-python-debuginfo-2.7.6-0.44.4
libxml2-python-debugsource-2.7.6-0.44.4

- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

libxml2-debuginfo-2.7.6-0.44.1
libxml2-debugsource-2.7.6-0.44.1
libxml2-python-debuginfo-2.7.6-0.44.4
libxml2-python-debugsource-2.7.6-0.44.4

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

libxml2-debuginfo-2.7.6-0.44.1
libxml2-debugsource-2.7.6-0.44.1
libxml2-python-debuginfo-2.7.6-0.44.4
libxml2-python-debugsource-2.7.6-0.44.4


References:

https://www.suse.com/security/cve/CVE-2015-8806.html
https://www.suse.com/security/cve/CVE-2016-1762.html
https://www.suse.com/security/cve/CVE-2016-1833.html
https://www.suse.com/security/cve/CVE-2016-1834.html
https://www.suse.com/security/cve/CVE-2016-1835.html
https://www.suse.com/security/cve/CVE-2016-1837.html
https://www.suse.com/security/cve/CVE-2016-1838.html
https://www.suse.com/security/cve/CVE-2016-1839.html
https://www.suse.com/security/cve/CVE-2016-1840.html
https://www.suse.com/security/cve/CVE-2016-2073.html
https://www.suse.com/security/cve/CVE-2016-3705.html
https://www.suse.com/security/cve/CVE-2016-4447.html
https://www.suse.com/security/cve/CVE-2016-4448.html
https://www.suse.com/security/cve/CVE-2016-4449.html
https://www.suse.com/security/cve/CVE-2016-4483.html
https://bugzilla.suse.com/963963
https://bugzilla.suse.com/965283
https://bugzilla.suse.com/978395
https://bugzilla.suse.com/981040
https://bugzilla.suse.com/981041
https://bugzilla.suse.com/981108
https://bugzilla.suse.com/981109
https://bugzilla.suse.com/981111
https://bugzilla.suse.com/981112
https://bugzilla.suse.com/981114
https://bugzilla.suse.com/981115
https://bugzilla.suse.com/981548
https://bugzilla.suse.com/981549
https://bugzilla.suse.com/981550

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung