Security update for tidy
SUSE Security Update: Security update for tidy
Announcement ID: | SUSE-SU-2015:1525-1 |
Rating: | low |
References: | #933588 |
Affected Products: |
An update that fixes two vulnerabilities is now available.
Description:
This update fixes two heap-based buffer overflows in tidy/libtidy. These
vulnerabilities could allow remote attackers to cause a denial of service
(crash) via vectors involving a command character in an href.
(CVE-2015-5522, CVE-2015-5523)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-tidy-12080=1
- SUSE Linux Enterprise Software Development Kit 11-SP3:
zypper in -t patch sdksp3-tidy-12080=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-tidy-12080=1
- SUSE Linux Enterprise Desktop 11-SP3:
zypper in -t patch sledsp3-tidy-12080=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-tidy-12080=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
- libtidy-1.0-37.1
- libtidy-devel-1.0-37.1
- tidy-1.0-37.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64):
- libtidy-1.0-37.1
- libtidy-devel-1.0-37.1
- tidy-1.0-37.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
- libtidy-1.0-37.1
- SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64):
- libtidy-1.0-37.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
- tidy-debuginfo-1.0-37.1
- tidy-debugsource-1.0-37.1