openSUSE-SU-2017:1957-1: moderate: Recommended update for gsoap
openSUSE Security Update: Recommended update for gsoap ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1957-1 Rating: moderate References: #1049348 Cross-References: CVE-2017-9765 Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for gsoap fixes the following security issue: - CVE-2017-9765: A remote attacker may have triggered a buffer overflow to cause a server crash (denial of service) after sending 2GB of a specially crafted XML message, or possibly have unspecified futher impact. (bsc#1049348) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2017-842=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-842=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (i586 x86_64): gsoap-debugsource-2.8.46-3.1 gsoap-devel-2.8.46-3.1 gsoap-devel-debuginfo-2.8.46-3.1 libgsoap-2_8_46-2.8.46-3.1 libgsoap-2_8_46-debuginfo-2.8.46-3.1 - openSUSE Leap 42.3 (noarch): gsoap-doc-2.8.46-3.1 - openSUSE Leap 42.2 (i586 x86_64): gsoap-debugsource-2.8.33-2.3.1 gsoap-devel-2.8.33-2.3.1 gsoap-devel-debuginfo-2.8.33-2.3.1 libgsoap-2_8_33-2.8.33-2.3.1 libgsoap-2_8_33-debuginfo-2.8.33-2.3.1 References: https://www.suse.com/security/cve/CVE-2017-9765.html https://bugzilla.suse.com/1049348
participants (1)
-
opensuse-security@opensuse.org