Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2016:1604-1: important: Security update for libxml2

Recommended Posts

SUSE Security Update: Security update for libxml2

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2016:1604-1

Rating: important

References: #963963 #965283 #978395 #981040 #981041 #981108

#981109 #981111 #981112 #981114 #981115 #981548

#981549 #981550

Cross-References: CVE-2015-8806 CVE-2016-1762 CVE-2016-1833

CVE-2016-1834 CVE-2016-1835 CVE-2016-1837

CVE-2016-1838 CVE-2016-1839 CVE-2016-1840

CVE-2016-2073 CVE-2016-3705 CVE-2016-4447

CVE-2016-4448 CVE-2016-4449 CVE-2016-4483

 

Affected Products:

SUSE OpenStack Cloud 5

SUSE Manager Proxy 2.1

SUSE Manager 2.1

SUSE Linux Enterprise Software Development Kit 11-SP4

SUSE Linux Enterprise Server 11-SP4

SUSE Linux Enterprise Server 11-SP3-LTSS

SUSE Linux Enterprise Server 11-SP2-LTSS

SUSE Linux Enterprise Debuginfo 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP3

SUSE Linux Enterprise Debuginfo 11-SP2

______________________________________________________________________________

 

An update that fixes 15 vulnerabilities is now available.

 

Description:

 

 

This update for libxml2 fixes the following security issues:

 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread was

fixed in libxml2/dict.c [bsc#963963, bsc#965283, bsc#981114].

- CVE-2016-4483: Code was added to avoid an out of bound access when

serializing malformed strings [bsc#978395].

- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar

[bsc#981040].

- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].

- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar

[bsc#981108].

- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs

[bsc#981109].

- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral and

htmlParseSystemiteral [bsc#981111].

- CVE-2016-1838: Fixed a heap-based buffer overread in

xmlParserPrintFileContextInternal [bsc#981112].

- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup

[bsc#981115].

- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName

[bsc#981548].

- CVE-2016-4448: Fixed some format string warnings with possible format

string vulnerability [bsc#981549],

- CVE-2016-4449: Fixed inappropriate fetch of entities content

[bsc#981550].

- CVE-2016-3705: Fixed missing increment of recursion counter.

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE OpenStack Cloud 5:

 

zypper in -t patch sleclo50sp3-libxml2-12616=1

 

- SUSE Manager Proxy 2.1:

 

zypper in -t patch slemap21-libxml2-12616=1

 

- SUSE Manager 2.1:

 

zypper in -t patch sleman21-libxml2-12616=1

 

- SUSE Linux Enterprise Software Development Kit 11-SP4:

 

zypper in -t patch sdksp4-libxml2-12616=1

 

- SUSE Linux Enterprise Server 11-SP4:

 

zypper in -t patch slessp4-libxml2-12616=1

 

- SUSE Linux Enterprise Server 11-SP3-LTSS:

 

zypper in -t patch slessp3-libxml2-12616=1

 

- SUSE Linux Enterprise Server 11-SP2-LTSS:

 

zypper in -t patch slessp2-libxml2-12616=1

 

- SUSE Linux Enterprise Debuginfo 11-SP4:

 

zypper in -t patch dbgsp4-libxml2-12616=1

 

- SUSE Linux Enterprise Debuginfo 11-SP3:

 

zypper in -t patch dbgsp3-libxml2-12616=1

 

- SUSE Linux Enterprise Debuginfo 11-SP2:

 

zypper in -t patch dbgsp2-libxml2-12616=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE OpenStack Cloud 5 (x86_64):

 

libxml2-2.7.6-0.44.1

libxml2-32bit-2.7.6-0.44.1

libxml2-doc-2.7.6-0.44.1

libxml2-python-2.7.6-0.44.4

 

- SUSE Manager Proxy 2.1 (x86_64):

 

libxml2-2.7.6-0.44.1

libxml2-32bit-2.7.6-0.44.1

libxml2-doc-2.7.6-0.44.1

libxml2-python-2.7.6-0.44.4

 

- SUSE Manager 2.1 (s390x x86_64):

 

libxml2-2.7.6-0.44.1

libxml2-32bit-2.7.6-0.44.1

libxml2-doc-2.7.6-0.44.1

libxml2-python-2.7.6-0.44.4

 

- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

 

libxml2-devel-2.7.6-0.44.1

 

- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

 

libxml2-devel-32bit-2.7.6-0.44.1

 

- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

 

libxml2-2.7.6-0.44.1

libxml2-doc-2.7.6-0.44.1

libxml2-python-2.7.6-0.44.4

 

- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

 

libxml2-32bit-2.7.6-0.44.1

 

- SUSE Linux Enterprise Server 11-SP4 (ia64):

 

libxml2-x86-2.7.6-0.44.1

 

- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

 

libxml2-2.7.6-0.44.1

libxml2-doc-2.7.6-0.44.1

libxml2-python-2.7.6-0.44.4

 

- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):

 

libxml2-32bit-2.7.6-0.44.1

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

 

libxml2-2.7.6-0.44.1

libxml2-doc-2.7.6-0.44.1

libxml2-python-2.7.6-0.44.4

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):

 

libxml2-32bit-2.7.6-0.44.1

 

- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

 

libxml2-debuginfo-2.7.6-0.44.1

libxml2-debugsource-2.7.6-0.44.1

libxml2-python-debuginfo-2.7.6-0.44.4

libxml2-python-debugsource-2.7.6-0.44.4

 

- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

 

libxml2-debuginfo-2.7.6-0.44.1

libxml2-debugsource-2.7.6-0.44.1

libxml2-python-debuginfo-2.7.6-0.44.4

libxml2-python-debugsource-2.7.6-0.44.4

 

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

 

libxml2-debuginfo-2.7.6-0.44.1

libxml2-debugsource-2.7.6-0.44.1

libxml2-python-debuginfo-2.7.6-0.44.4

libxml2-python-debugsource-2.7.6-0.44.4

 

 

References:

 

https://www.suse.com/security/cve/CVE-2015-8806.html

https://www.suse.com/security/cve/CVE-2016-1762.html

https://www.suse.com/security/cve/CVE-2016-1833.html

https://www.suse.com/security/cve/CVE-2016-1834.html

https://www.suse.com/security/cve/CVE-2016-1835.html

https://www.suse.com/security/cve/CVE-2016-1837.html

https://www.suse.com/security/cve/CVE-2016-1838.html

https://www.suse.com/security/cve/CVE-2016-1839.html

https://www.suse.com/security/cve/CVE-2016-1840.html

https://www.suse.com/security/cve/CVE-2016-2073.html

https://www.suse.com/security/cve/CVE-2016-3705.html

https://www.suse.com/security/cve/CVE-2016-4447.html

https://www.suse.com/security/cve/CVE-2016-4448.html

https://www.suse.com/security/cve/CVE-2016-4449.html

https://www.suse.com/security/cve/CVE-2016-4483.html

https://bugzilla.suse.com/963963

https://bugzilla.suse.com/965283

https://bugzilla.suse.com/978395

https://bugzilla.suse.com/981040

https://bugzilla.suse.com/981041

https://bugzilla.suse.com/981108

https://bugzilla.suse.com/981109

https://bugzilla.suse.com/981111

https://bugzilla.suse.com/981112

https://bugzilla.suse.com/981114

https://bugzilla.suse.com/981115

https://bugzilla.suse.com/981548

https://bugzilla.suse.com/981549

https://bugzilla.suse.com/981550

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×