Security update for libwmf
Announcement ID: | SUSE-SU-2015:1378-1 |
Rating: | moderate |
References: | #831299 #933109 #936058 #936062 |
Affected Products: |
An update that fixes four vulnerabilities is now available.
Description:
libwmf was updated to fix four security issues.
These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function
allowed remote attackers to cause a denial of service (crash) or
possibly execute arbitrary code via a crafted "run-length count" in an
image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to
cause a denial of service (crash) or possibly execute arbitrary code via
a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to
cause a denial of service (crash) via a crafted WMF file to the (1)
wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of
service (out-of-bounds read) via a crafted WMF file (bsc#936058).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-libwmf-12027=1
- SUSE Linux Enterprise Software Development Kit 11-SP3:
zypper in -t patch sdksp3-libwmf-12027=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-libwmf-12027=1
- SUSE Linux Enterprise Desktop 11-SP3:
zypper in -t patch sledsp3-libwmf-12027=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-libwmf-12027=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
- libwmf-0.2.8.4-206.29.29.1
- libwmf-devel-0.2.8.4-206.29.29.1
- libwmf-gnome-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):
- libwmf-32bit-0.2.8.4-206.29.29.1
- libwmf-gnome-32bit-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ia64):
- libwmf-gnome-x86-0.2.8.4-206.29.29.1
- libwmf-x86-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64):
- libwmf-0.2.8.4-206.29.29.1
- libwmf-devel-0.2.8.4-206.29.29.1
- libwmf-gnome-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (ppc64 s390x x86_64):
- libwmf-32bit-0.2.8.4-206.29.29.1
- libwmf-gnome-32bit-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (ia64):
- libwmf-gnome-x86-0.2.8.4-206.29.29.1
- libwmf-x86-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
- libwmf-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64):
- libwmf-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64):
- libwmf-debuginfo-0.2.8.4-206.29.29.1
- libwmf-debugsource-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (ppc64 s390x x86_64):
- libwmf-debuginfo-32bit-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (ia64):
- libwmf-debuginfo-x86-0.2.8.4-206.29.29.1
References:
- https://www.suse.com/security/cve/CVE-2015-0848.html
- https://www.suse.com/security/cve/CVE-2015-4588.html
- https://www.suse.com/security/cve/CVE-2015-4695.html
- https://www.suse.com/security/cve/CVE-2015-4696.html
- https://bugzilla.suse.com/831299
- https://bugzilla.suse.com/933109
- https://bugzilla.suse.com/936058
- https://bugzilla.suse.com/936062