SUSE-SU-2018:3277-1: moderate: Security update for Xerces-c
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Mon Oct 22 07:20:12 MDT 2018
SUSE Security Update: Security update for Xerces-c
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3277-1
Rating: moderate
References: #1083630 #985860
Cross-References: CVE-2016-4463 CVE-2017-12627
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for Xerces-c fixes the following issues:
- CVE-2017-12627: Processing of external DTD paths could have resulted in
a null pointer dereference under certain conditions (bsc#1083630).
- CVE-2016-4463: Prevent stack-based buffer overflow that allowed
context-dependent attackers to cause a denial of service via a deeply
nested DTD (bsc#985860).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-Xerces-c-13828=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-Xerces-c-13828=1
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
Xerces-c-2.8.0-29.17.5.1
libXerces-c-devel-2.8.0-29.17.5.1
libXerces-c28-2.8.0-29.17.5.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
Xerces-c-debuginfo-2.8.0-29.17.5.1
Xerces-c-debugsource-2.8.0-29.17.5.1
References:
https://www.suse.com/security/cve/CVE-2016-4463.html
https://www.suse.com/security/cve/CVE-2017-12627.html
https://bugzilla.suse.com/1083630
https://bugzilla.suse.com/985860
More information about the sle-updates
mailing list