Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libcroco
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libcroco
ID: SUSE-SU-2019:1468-1
Distribution: SUSE
Plattformen: SUSE OpenStack Cloud Magnum Orchestration 7, SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE CaaS Platform ALL, SUSE CaaS Platform 3.0, SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4
Datum: Mi, 12. Juni 2019, 15:34
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871
Applikationen: libcroco

Originalnachricht


SUSE Security Update: Security update for libcroco
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:1468-1
Rating: moderate
References: #1034481 #1034482 #1043898 #1043899
Cross-References: CVE-2017-7960 CVE-2017-7961 CVE-2017-8834
CVE-2017-8871
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP4
SUSE Linux Enterprise Desktop 12-SP3
SUSE CaaS Platform ALL
SUSE CaaS Platform 3.0
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before
reading a byte) (bsc#1034481).
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long
rgb values) (bsc#1034482).
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a
crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU
consumption) via a crafted CSS file (bsc#1043899).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP4:

zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1468=1

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-1468=1

- SUSE Linux Enterprise Server 12-SP4:

zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1468=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1468=1

- SUSE Linux Enterprise Desktop 12-SP4:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1468=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1468=1

- SUSE CaaS Platform ALL:

To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.

- SUSE CaaS Platform 3.0:

To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.

- OpenStack Cloud Magnum Orchestration 7:

zypper in -t patch
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1468=1



Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le
s390x x86_64):

libcroco-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1
libcroco-devel-0.6.11-12.3.1

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le
s390x x86_64):

libcroco-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1
libcroco-devel-0.6.11-12.3.1

- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1

- SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):

libcroco-0_6-3-32bit-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-32bit-0.6.11-12.3.1

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1

- SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):

libcroco-0_6-3-32bit-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-32bit-0.6.11-12.3.1

- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-32bit-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-32bit-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-32bit-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-32bit-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1

- SUSE CaaS Platform ALL (x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1

- SUSE CaaS Platform 3.0 (x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1

- OpenStack Cloud Magnum Orchestration 7 (x86_64):

libcroco-0_6-3-0.6.11-12.3.1
libcroco-0_6-3-debuginfo-0.6.11-12.3.1
libcroco-debuginfo-0.6.11-12.3.1
libcroco-debugsource-0.6.11-12.3.1


References:

https://www.suse.com/security/cve/CVE-2017-7960.html
https://www.suse.com/security/cve/CVE-2017-7961.html
https://www.suse.com/security/cve/CVE-2017-8834.html
https://www.suse.com/security/cve/CVE-2017-8871.html
https://bugzilla.suse.com/1034481
https://bugzilla.suse.com/1034482
https://bugzilla.suse.com/1043898
https://bugzilla.suse.com/1043899

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung