SUSE-SU-2016:0049-1: moderate: Security update for libxml2
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Jan 7 09:12:44 MST 2016
SUSE Security Update: Security update for libxml2
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:0049-1
Rating: moderate
References: #928193 #951734 #951735 #954429 #956018 #956021
#956260 #957105 #957106 #957107 #957109 #957110
Cross-References: CVE-2015-1819 CVE-2015-5312 CVE-2015-7497
CVE-2015-7498 CVE-2015-7499 CVE-2015-7500
CVE-2015-7941 CVE-2015-7942 CVE-2015-8035
CVE-2015-8241 CVE-2015-8242 CVE-2015-8317
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12-SP1
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes 12 vulnerabilities is now available.
Description:
- security update: This update fixes the following security issues:
* CVE-2015-1819 Enforce the reader to run in constant memory
[bnc#928193]
* CVE-2015-7941 Fix out of bound read with crafted xml input by
stopping parsing on entities boundaries errors [bnc#951734]
* CVE-2015-7942 Fix another variation of overflow in Conditional
sections [bnc#951735]
* CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF
[bnc#956018]
* CVE-2015-8242 Buffer overead with HTML parser in push mode
[bnc#956021]
* CVE-2015-8317 Return if the encoding declaration is broken or
encoding conversion failed [bnc#956260]
* CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
* CVE-2015-7497 Avoid an heap buffer overflow in
xmlDictComputeFastQKey [bnc#957106]
* CVE-2015-7498 Processes entities after encoding conversion failures
[bnc#957107]
* CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect
incoherency on GROW [bnc#957109]
* CVE-2015-8317 Multiple out-of-bound read could lead to denial of
service [bnc#956260]
* CVE-2015-8035 DoS when parsing specially crafted XML document if XZ
support is enabled [bnc#954429]
* CVE-2015-7500 Fix memory access error due to incorrect entities
boundaries [bnc#957110]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-38=1
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2016-38=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-38=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2016-38=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-38=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-38=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
libxml2-debugsource-2.9.1-13.1
libxml2-devel-2.9.1-13.1
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
libxml2-debugsource-2.9.1-13.1
libxml2-devel-2.9.1-13.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
libxml2-2-2.9.1-13.1
libxml2-2-debuginfo-2.9.1-13.1
libxml2-debugsource-2.9.1-13.1
libxml2-tools-2.9.1-13.1
libxml2-tools-debuginfo-2.9.1-13.1
python-libxml2-2.9.1-13.1
python-libxml2-debuginfo-2.9.1-13.1
python-libxml2-debugsource-2.9.1-13.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
libxml2-2-32bit-2.9.1-13.1
libxml2-2-debuginfo-32bit-2.9.1-13.1
- SUSE Linux Enterprise Server 12-SP1 (noarch):
libxml2-doc-2.9.1-13.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
libxml2-2-2.9.1-13.1
libxml2-2-debuginfo-2.9.1-13.1
libxml2-debugsource-2.9.1-13.1
libxml2-tools-2.9.1-13.1
libxml2-tools-debuginfo-2.9.1-13.1
python-libxml2-2.9.1-13.1
python-libxml2-debuginfo-2.9.1-13.1
python-libxml2-debugsource-2.9.1-13.1
- SUSE Linux Enterprise Server 12 (s390x x86_64):
libxml2-2-32bit-2.9.1-13.1
libxml2-2-debuginfo-32bit-2.9.1-13.1
- SUSE Linux Enterprise Server 12 (noarch):
libxml2-doc-2.9.1-13.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
libxml2-2-2.9.1-13.1
libxml2-2-32bit-2.9.1-13.1
libxml2-2-debuginfo-2.9.1-13.1
libxml2-2-debuginfo-32bit-2.9.1-13.1
libxml2-debugsource-2.9.1-13.1
libxml2-tools-2.9.1-13.1
libxml2-tools-debuginfo-2.9.1-13.1
python-libxml2-2.9.1-13.1
python-libxml2-debuginfo-2.9.1-13.1
python-libxml2-debugsource-2.9.1-13.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
libxml2-2-2.9.1-13.1
libxml2-2-32bit-2.9.1-13.1
libxml2-2-debuginfo-2.9.1-13.1
libxml2-2-debuginfo-32bit-2.9.1-13.1
libxml2-debugsource-2.9.1-13.1
libxml2-tools-2.9.1-13.1
libxml2-tools-debuginfo-2.9.1-13.1
python-libxml2-2.9.1-13.1
python-libxml2-debuginfo-2.9.1-13.1
python-libxml2-debugsource-2.9.1-13.1
References:
https://www.suse.com/security/cve/CVE-2015-1819.html
https://www.suse.com/security/cve/CVE-2015-5312.html
https://www.suse.com/security/cve/CVE-2015-7497.html
https://www.suse.com/security/cve/CVE-2015-7498.html
https://www.suse.com/security/cve/CVE-2015-7499.html
https://www.suse.com/security/cve/CVE-2015-7500.html
https://www.suse.com/security/cve/CVE-2015-7941.html
https://www.suse.com/security/cve/CVE-2015-7942.html
https://www.suse.com/security/cve/CVE-2015-8035.html
https://www.suse.com/security/cve/CVE-2015-8241.html
https://www.suse.com/security/cve/CVE-2015-8242.html
https://www.suse.com/security/cve/CVE-2015-8317.html
https://bugzilla.suse.com/928193
https://bugzilla.suse.com/951734
https://bugzilla.suse.com/951735
https://bugzilla.suse.com/954429
https://bugzilla.suse.com/956018
https://bugzilla.suse.com/956021
https://bugzilla.suse.com/956260
https://bugzilla.suse.com/957105
https://bugzilla.suse.com/957106
https://bugzilla.suse.com/957107
https://bugzilla.suse.com/957109
https://bugzilla.suse.com/957110
More information about the sle-security-updates
mailing list