SUSE Security Update: Security update for Xerces-c
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3277-1
Rating:             moderate
References:         #1083630 #985860 
Cross-References:   CVE-2016-4463 CVE-2017-12627
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for Xerces-c fixes the following issues:

   - CVE-2017-12627: Processing of external DTD paths could have resulted in
     a null pointer dereference under certain conditions (bsc#1083630).
   - CVE-2016-4463: Prevent stack-based buffer overflow that allowed
     context-dependent attackers to cause a denial of service via a deeply
     nested DTD (bsc#985860).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-Xerces-c-13828=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-Xerces-c-13828=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      Xerces-c-2.8.0-29.17.5.1
      libXerces-c-devel-2.8.0-29.17.5.1
      libXerces-c28-2.8.0-29.17.5.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      Xerces-c-debuginfo-2.8.0-29.17.5.1
      Xerces-c-debugsource-2.8.0-29.17.5.1


References:

   https://www.suse.com/security/cve/CVE-2016-4463.html
   https://www.suse.com/security/cve/CVE-2017-12627.html
   https://bugzilla.suse.com/1083630
   https://bugzilla.suse.com/985860

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
https://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:3277-1 moderate: Xerces-c

October 22, 2018
An update that fixes two vulnerabilities is now available

Summary

This update for Xerces-c fixes the following issues: - CVE-2017-12627: Processing of external DTD paths could have resulted in a null pointer dereference under certain conditions (bsc#1083630). - CVE-2016-4463: Prevent stack-based buffer overflow that allowed context-dependent attackers to cause a denial of service via a deeply nested DTD (bsc#985860). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-Xerces-c-13828=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-Xerces-c-13828=1 Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): Xerces-c-2.8.0-29.17.5.1 libXerces-c-devel-2.8.0-29.17.5.1 libXerces-c28-2.8.0-29.17.5.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): Xerces-c-debuginfo-2.8.0-29.17.5.1 Xerces-c-debugsource-2.8.0-29.17.5.1

References

#1083630 #985860

Cross- CVE-2016-4463 CVE-2017-12627

Affected Products:

SUSE Linux Enterprise Software Development Kit 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP4

https://www.suse.com/security/cve/CVE-2016-4463.html

https://www.suse.com/security/cve/CVE-2017-12627.html

https://bugzilla.suse.com/1083630

https://bugzilla.suse.com/985860

Severity
Announcement ID: SUSE-SU-2018:3277-1
Rating: moderate