SUSE-SU-2017:2201-1: moderate: Security update for libplist

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Aug 17 04:14:08 MDT 2017


   SUSE Security Update: Security update for libplist
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2201-1
Rating:             moderate
References:         #1029638 #1029639 #1029706 #1029707 #1029751 
                    
Cross-References:   CVE-2017-6435 CVE-2017-6436 CVE-2017-6437
                    CVE-2017-6438 CVE-2017-6439
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP3
                    SUSE Linux Enterprise Workstation Extension 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that fixes 5 vulnerabilities is now available.

Description:

   This update for libplist fixes the following issues:

   Security issues fixed:

   - CVE-2017-6439: Heap-based buffer overflow in the parse_string_node
     function. (bsc#1029638)
   - CVE-2017-6438: Heap-based buffer overflow in the parse_unicode_node
     function. (bsc#1029706)
   - CVE-2017-6437: The base64encode function in base64.c allows local users
     to cause denial of service (out-of-bounds read) via a crafted plist
     file. (bsc#1029707)
   - CVE-2017-6436: Integer overflow in parse_string_node. (bsc#1029751)
   - CVE-2017-6435: Crafted plist file could lead to Heap-buffer overflow.
     (bsc#1029639)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP3:

      zypper in -t patch SUSE-SLE-WE-12-SP3-2017-1342=1

   - SUSE Linux Enterprise Workstation Extension 12-SP2:

      zypper in -t patch SUSE-SLE-WE-12-SP2-2017-1342=1

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1342=1

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1342=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1342=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1342=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1342=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1342=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1342=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):

      libplist++3-1.12-20.3.2
      libplist++3-debuginfo-1.12-20.3.2
      libplist-debugsource-1.12-20.3.2

   - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):

      libplist++3-1.12-20.3.2
      libplist++3-debuginfo-1.12-20.3.2
      libplist-debugsource-1.12-20.3.2

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      libplist++-devel-1.12-20.3.2
      libplist++3-1.12-20.3.2
      libplist++3-debuginfo-1.12-20.3.2
      libplist-debugsource-1.12-20.3.2
      libplist-devel-1.12-20.3.2

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      libplist++-devel-1.12-20.3.2
      libplist++3-1.12-20.3.2
      libplist++3-debuginfo-1.12-20.3.2
      libplist-debugsource-1.12-20.3.2
      libplist-devel-1.12-20.3.2

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      libplist-debugsource-1.12-20.3.2
      libplist3-1.12-20.3.2
      libplist3-debuginfo-1.12-20.3.2

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      libplist-debugsource-1.12-20.3.2
      libplist3-1.12-20.3.2
      libplist3-debuginfo-1.12-20.3.2

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

      libplist-debugsource-1.12-20.3.2
      libplist3-1.12-20.3.2
      libplist3-debuginfo-1.12-20.3.2

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      libplist++3-1.12-20.3.2
      libplist++3-debuginfo-1.12-20.3.2
      libplist-debugsource-1.12-20.3.2
      libplist3-1.12-20.3.2
      libplist3-debuginfo-1.12-20.3.2

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      libplist++3-1.12-20.3.2
      libplist++3-debuginfo-1.12-20.3.2
      libplist-debugsource-1.12-20.3.2
      libplist3-1.12-20.3.2
      libplist3-debuginfo-1.12-20.3.2


References:

   https://www.suse.com/security/cve/CVE-2017-6435.html
   https://www.suse.com/security/cve/CVE-2017-6436.html
   https://www.suse.com/security/cve/CVE-2017-6437.html
   https://www.suse.com/security/cve/CVE-2017-6438.html
   https://www.suse.com/security/cve/CVE-2017-6439.html
   https://bugzilla.suse.com/1029638
   https://bugzilla.suse.com/1029639
   https://bugzilla.suse.com/1029706
   https://bugzilla.suse.com/1029707
   https://bugzilla.suse.com/1029751



More information about the sle-security-updates mailing list