Security update for libwmf
Announcement ID: | SUSE-SU-2015:1484-1 |
Rating: | moderate |
References: | #495842 #831299 #933109 #936058 #936062 |
Affected Products: |
An update that fixes 5 vulnerabilities is now available.
Description:
libwmf was updated to fix five security issues.
These security issues were fixed:
- CVE-2009-1364: Fixed realloc return value usage (bsc#495842, bnc#831299)
- CVE-2015-0848: Heap overflow on libwmf0.2-7 (bsc#933109)
- CVE-2015-4588: DecodeImage() did not check that the run-length "count"
fits into the total size of the image, which could lead to a heap-based
buffer overflow (bsc#933109)
- CVE-2015-4695: meta_pen_create heap buffer over read (bsc#936058)
- CVE-2015-4696: Use after free (bsc#936062)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2015-481=1
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-481=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-481=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
- libwmf-0_2-7-0.2.8.4-242.3
- libwmf-0_2-7-debuginfo-0.2.8.4-242.3
- libwmf-debugsource-0.2.8.4-242.3
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
- libwmf-0_2-7-0.2.8.4-242.3
- libwmf-0_2-7-debuginfo-0.2.8.4-242.3
- libwmf-debugsource-0.2.8.4-242.3
- libwmf-devel-0.2.8.4-242.3
- libwmf-gnome-0.2.8.4-242.3
- libwmf-gnome-debuginfo-0.2.8.4-242.3
- SUSE Linux Enterprise Desktop 12 (x86_64):
- libwmf-0_2-7-0.2.8.4-242.3
- libwmf-0_2-7-debuginfo-0.2.8.4-242.3
- libwmf-debugsource-0.2.8.4-242.3
References:
- https://www.suse.com/security/cve/CVE-2009-1364.html
- https://www.suse.com/security/cve/CVE-2015-0848.html
- https://www.suse.com/security/cve/CVE-2015-4588.html
- https://www.suse.com/security/cve/CVE-2015-4695.html
- https://www.suse.com/security/cve/CVE-2015-4696.html
- https://bugzilla.suse.com/495842
- https://bugzilla.suse.com/831299
- https://bugzilla.suse.com/933109
- https://bugzilla.suse.com/936058
- https://bugzilla.suse.com/936062