SUSE-SU-2016:0030-1: moderate: Security update for libxml2

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Jan 5 12:11:18 MST 2016


   SUSE Security Update: Security update for libxml2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:0030-1
Rating:             moderate
References:         #928193 #951734 #951735 #956018 #956021 #956260 
                    #957105 #957106 #957107 #957109 #957110 
Cross-References:   CVE-2015-1819 CVE-2015-5312 CVE-2015-7497
                    CVE-2015-7498 CVE-2015-7499 CVE-2015-7500
                    CVE-2015-7941 CVE-2015-7942 CVE-2015-8241
                    CVE-2015-8242 CVE-2015-8317
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Software Development Kit 11-SP3
                    SUSE Linux Enterprise Server for VMWare 11-SP3
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Server 11-SP3
                    SUSE Linux Enterprise Desktop 11-SP4
                    SUSE Linux Enterprise Desktop 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

   An update that fixes 11 vulnerabilities is now available.

Description:


       This update fixes the following security issues:

       * CVE-2015-1819 Enforce the reader to run in constant memory
         [bnc#928193]
       * CVE-2015-7941 Fix out of bound read with crafted xml input by
         stopping parsing on entities boundaries errors [bnc#951734]
       * CVE-2015-7942 Fix another variation of overflow in Conditional
         sections [bnc#951735]
       * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF
         [bnc#956018]
       * CVE-2015-8242 Buffer overead with HTML parser in push mode
         [bnc#956021]
       * CVE-2015-8317 Return if the encoding declaration is broken or
         encoding conversion failed [bnc#956260]
       * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
       * CVE-2015-7497 Avoid an heap buffer overflow in
         xmlDictComputeFastQKey [bnc#957106]
       * CVE-2015-7498 Processes entities after encoding conversion failures
         [bnc#957107]
       * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect
         incoherency on GROW [bnc#957109]
       * CVE-2015-7500 Fix memory access error due to incorrect entities
         boundaries [bnc#957110]


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Software Development Kit 11-SP3:

      zypper in -t patch sdksp3-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Server for VMWare 11-SP3:

      zypper in -t patch slessp3-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Server 11-SP3:

      zypper in -t patch slessp3-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Desktop 11-SP4:

      zypper in -t patch sledsp4-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Desktop 11-SP3:

      zypper in -t patch sledsp3-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-libxml2-20151221-12298=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-libxml2-20151221-12298=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libxml2-devel-2.7.6-0.34.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      libxml2-devel-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64):

      libxml2-devel-2.7.6-0.34.1

   - SUSE Linux Enterprise Software Development Kit 11-SP3 (ppc64 s390x x86_64):

      libxml2-devel-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64):

      libxml2-2.7.6-0.34.1
      libxml2-doc-2.7.6-0.34.1
      libxml2-python-2.7.6-0.34.4

   - SUSE Linux Enterprise Server for VMWare 11-SP3 (x86_64):

      libxml2-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libxml2-2.7.6-0.34.1
      libxml2-doc-2.7.6-0.34.1
      libxml2-python-2.7.6-0.34.4

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libxml2-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libxml2-x86-2.7.6-0.34.1

   - SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64):

      libxml2-2.7.6-0.34.1
      libxml2-doc-2.7.6-0.34.1
      libxml2-python-2.7.6-0.34.4

   - SUSE Linux Enterprise Server 11-SP3 (ppc64 s390x x86_64):

      libxml2-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Server 11-SP3 (ia64):

      libxml2-x86-2.7.6-0.34.1

   - SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):

      libxml2-2.7.6-0.34.1
      libxml2-python-2.7.6-0.34.4

   - SUSE Linux Enterprise Desktop 11-SP4 (x86_64):

      libxml2-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64):

      libxml2-2.7.6-0.34.1
      libxml2-python-2.7.6-0.34.4

   - SUSE Linux Enterprise Desktop 11-SP3 (x86_64):

      libxml2-32bit-2.7.6-0.34.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libxml2-debuginfo-2.7.6-0.34.1
      libxml2-debugsource-2.7.6-0.34.1
      libxml2-python-debuginfo-2.7.6-0.34.4
      libxml2-python-debugsource-2.7.6-0.34.4

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64):

      libxml2-debuginfo-2.7.6-0.34.1
      libxml2-debugsource-2.7.6-0.34.1
      libxml2-python-debuginfo-2.7.6-0.34.4
      libxml2-python-debugsource-2.7.6-0.34.4


References:

   https://www.suse.com/security/cve/CVE-2015-1819.html
   https://www.suse.com/security/cve/CVE-2015-5312.html
   https://www.suse.com/security/cve/CVE-2015-7497.html
   https://www.suse.com/security/cve/CVE-2015-7498.html
   https://www.suse.com/security/cve/CVE-2015-7499.html
   https://www.suse.com/security/cve/CVE-2015-7500.html
   https://www.suse.com/security/cve/CVE-2015-7941.html
   https://www.suse.com/security/cve/CVE-2015-7942.html
   https://www.suse.com/security/cve/CVE-2015-8241.html
   https://www.suse.com/security/cve/CVE-2015-8242.html
   https://www.suse.com/security/cve/CVE-2015-8317.html
   https://bugzilla.suse.com/928193
   https://bugzilla.suse.com/951734
   https://bugzilla.suse.com/951735
   https://bugzilla.suse.com/956018
   https://bugzilla.suse.com/956021
   https://bugzilla.suse.com/956260
   https://bugzilla.suse.com/957105
   https://bugzilla.suse.com/957106
   https://bugzilla.suse.com/957107
   https://bugzilla.suse.com/957109
   https://bugzilla.suse.com/957110



More information about the sle-updates mailing list