openSUSE Security Update: Security update for libidn ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2135-1 Rating: moderate References: #923241 #990189 #990190 #990191 Cross-References: CVE-2015-2059 CVE-2015-8948 CVE-2016-6261 CVE-2016-6262 CVE-2016-6263 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for libidn fixes the following issues: - CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189) - CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) - CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191) - CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1014=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): libidn-debugsource-1.28-6.1 libidn-devel-1.28-6.1 libidn-tools-1.28-6.1 libidn-tools-debuginfo-1.28-6.1 libidn11-1.28-6.1 libidn11-debuginfo-1.28-6.1 - openSUSE Leap 42.1 (x86_64): libidn11-32bit-1.28-6.1 libidn11-debuginfo-32bit-1.28-6.1 References: https://www.suse.com/security/cve/CVE-2015-2059.html https://www.suse.com/security/cve/CVE-2015-8948.html https://www.suse.com/security/cve/CVE-2016-6261.html https://www.suse.com/security/cve/CVE-2016-6262.html https://www.suse.com/security/cve/CVE-2016-6263.html https://bugzilla.suse.com/923241 https://bugzilla.suse.com/990189 https://bugzilla.suse.com/990190 https://bugzilla.suse.com/990191