Security update for libosip2
Announcement ID: | SUSE-SU-2017:1187-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities can now be installed.
Description:
This update for libosip2 fixes several issues.
These security issues were fixed:
- CVE-2017-7853: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS (bsc#1034570).
- CVE-2016-10326: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS (bsc#1034571).
- CVE-2016-10325: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS (bsc#1034572).
- CVE-2016-10324: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c (bsc#1034574).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP1
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-704=1
-
SUSE Linux Enterprise Desktop 12 SP2
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-704=1
-
SUSE Linux Enterprise Software Development Kit 12 SP1
zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-704=1
-
SUSE Linux Enterprise Software Development Kit 12 12-SP2
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-704=1
-
SUSE Linux Enterprise Workstation Extension 12 SP1
zypper in -t patch SUSE-SLE-WE-12-SP1-2017-704=1
-
SUSE Linux Enterprise Workstation Extension 12 SP2
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-704=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP1 (x86_64)
- libosip2-debuginfo-3.5.0-20.1
- libosip2-debugsource-3.5.0-20.1
- libosip2-3.5.0-20.1
-
SUSE Linux Enterprise Desktop 12 SP2 (x86_64)
- libosip2-debuginfo-3.5.0-20.1
- libosip2-debugsource-3.5.0-20.1
- libosip2-3.5.0-20.1
-
SUSE Linux Enterprise Software Development Kit 12 SP1 (ppc64le s390x x86_64)
- libosip2-debuginfo-3.5.0-20.1
- libosip2-debugsource-3.5.0-20.1
- libosip2-3.5.0-20.1
- libosip2-devel-3.5.0-20.1
-
SUSE Linux Enterprise Software Development Kit 12 12-SP2 (aarch64 ppc64le s390x x86_64)
- libosip2-debuginfo-3.5.0-20.1
- libosip2-debugsource-3.5.0-20.1
- libosip2-3.5.0-20.1
- libosip2-devel-3.5.0-20.1
-
SUSE Linux Enterprise Workstation Extension 12 SP1 (x86_64)
- libosip2-debuginfo-3.5.0-20.1
- libosip2-debugsource-3.5.0-20.1
- libosip2-3.5.0-20.1
-
SUSE Linux Enterprise Workstation Extension 12 SP2 (x86_64)
- libosip2-debuginfo-3.5.0-20.1
- libosip2-debugsource-3.5.0-20.1
- libosip2-3.5.0-20.1
References:
- https://www.suse.com/security/cve/CVE-2016-10324.html
- https://www.suse.com/security/cve/CVE-2016-10325.html
- https://www.suse.com/security/cve/CVE-2016-10326.html
- https://www.suse.com/security/cve/CVE-2017-7853.html
- https://bugzilla.suse.com/show_bug.cgi?id=1034570
- https://bugzilla.suse.com/show_bug.cgi?id=1034571
- https://bugzilla.suse.com/show_bug.cgi?id=1034572
- https://bugzilla.suse.com/show_bug.cgi?id=1034574