Revision Date: | 2017-05-06 | Version: | 1 |
Title: | Security update for libosip2 (Moderate) |
Description: |
This update for libosip2 fixes several issues.
These security issues were fixed:
- CVE-2017-7853: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS (bsc#1034570). - CVE-2016-10326: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS (bsc#1034571). - CVE-2016-10325: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS (bsc#1034572). - CVE-2016-10324: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c (bsc#1034574).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1034570 1034571 1034572 1034574 CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853 SUSE-SU-2017:1187-1
|
Platform(s): | SUSE Linux Enterprise Desktop 12 SP1
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP1 is installed AND libosip2-3.5.0-20.1 is installed
|