Security update for graphite2

SUSE Security Update: Security update for graphite2
Announcement ID: SUSE-SU-2016:0779-1
Rating: important
References: #965803 #965807 #965810
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12-SP1
  • SUSE Linux Enterprise Software Development Kit 12
  • SUSE Linux Enterprise Server 12-SP1
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Desktop 12-SP1
  • SUSE Linux Enterprise Desktop 12

  • An update that fixes three vulnerabilities is now available.

    Description:


    This update for graphite2 fixes the following issues:

    - CVE-2016-1521: The directrun function in directmachine.cpp in
    Libgraphite did not validate a certain skip operation, which allowed
    remote attackers to execute arbitrary code, obtain sensitive information,
    or cause a denial of service (out-of-bounds read and application crash)
    via a crafted Graphite smart font.

    - CVE-2016-1523: The SillMap::readFace function in FeatureMap.cpp in
    Libgraphite mishandled a return value, which allowed remote attackers to
    cause a denial of service (missing initialization, NULL pointer
    dereference, and application crash) via a crafted Graphite smart font.

    - CVE-2016-1526: The TtfUtil:LocaLookup function in TtfUtil.cpp in
    Libgraphite incorrectly validated a size value, which allowed remote
    attackers to obtain sensitive information or cause a denial of service
    (out-of-bounds read and application crash) via a crafted Graphite smart
    font.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 12-SP1:
      zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-456=1
    • SUSE Linux Enterprise Software Development Kit 12:
      zypper in -t patch SUSE-SLE-SDK-12-2016-456=1
    • SUSE Linux Enterprise Server 12-SP1:
      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-456=1
    • SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2016-456=1
    • SUSE Linux Enterprise Desktop 12-SP1:
      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-456=1
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2016-456=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
      • graphite2-debuginfo-1.3.1-6.1
      • graphite2-debugsource-1.3.1-6.1
      • graphite2-devel-1.3.1-6.1
    • SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
      • graphite2-debuginfo-1.3.1-6.1
      • graphite2-debugsource-1.3.1-6.1
      • graphite2-devel-1.3.1-6.1
    • SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
      • graphite2-debuginfo-1.3.1-6.1
      • graphite2-debugsource-1.3.1-6.1
      • libgraphite2-3-1.3.1-6.1
      • libgraphite2-3-debuginfo-1.3.1-6.1
    • SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
      • libgraphite2-3-32bit-1.3.1-6.1
      • libgraphite2-3-debuginfo-32bit-1.3.1-6.1
    • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
      • graphite2-debuginfo-1.3.1-6.1
      • graphite2-debugsource-1.3.1-6.1
      • libgraphite2-3-1.3.1-6.1
      • libgraphite2-3-debuginfo-1.3.1-6.1
    • SUSE Linux Enterprise Server 12 (s390x x86_64):
      • libgraphite2-3-32bit-1.3.1-6.1
      • libgraphite2-3-debuginfo-32bit-1.3.1-6.1
    • SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
      • graphite2-debuginfo-1.3.1-6.1
      • graphite2-debugsource-1.3.1-6.1
      • libgraphite2-3-1.3.1-6.1
      • libgraphite2-3-32bit-1.3.1-6.1
      • libgraphite2-3-debuginfo-1.3.1-6.1
      • libgraphite2-3-debuginfo-32bit-1.3.1-6.1
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • graphite2-debuginfo-1.3.1-6.1
      • graphite2-debugsource-1.3.1-6.1
      • libgraphite2-3-1.3.1-6.1
      • libgraphite2-3-32bit-1.3.1-6.1
      • libgraphite2-3-debuginfo-1.3.1-6.1
      • libgraphite2-3-debuginfo-32bit-1.3.1-6.1

    References: