SUSE-SU-2018:3389-1: moderate: Security update for exempi

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Oct 24 10:47:26 MDT 2018


   SUSE Security Update: Security update for exempi
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3389-1
Rating:             moderate
References:         #1085295 #1085297 #1085583 #1085584 #1085585 
                    #1085589 
Cross-References:   CVE-2017-18233 CVE-2017-18234 CVE-2017-18236
                    CVE-2017-18238 CVE-2018-7728 CVE-2018-7730
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

   An update that fixes 6 vulnerabilities is now available.

Description:

   This update for exempi fixes the following security issues:

   - CVE-2017-18233: Prevent integer overflow in the Chunk class that allowed
     remote attackers to cause a denial of service (infinite loop) via
     crafted XMP data in a .avi file (bsc#1085584).
   - CVE-2017-18238: The TradQT_Manager::ParseCachedBoxes function allowed
     remote attackers to cause a denial of service (infinite loop) via
     crafted XMP data in a .qt file (bsc#1085583).
   - CVE-2018-7728: Fixed heap-based buffer overflow, which allowed denial of
     service via crafted TIFF image (bsc#1085297).
   - CVE-2018-7730: Fixed heap-based buffer overflow in
     XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
   - CVE-2017-18236: The ASF_Support::ReadHeaderObject function allowed
     remote attackers to cause a denial of service (infinite loop) via a
     crafted .asf file (bsc#1085589).
   - CVE-2017-18234: Prevent use-after-free that allowed remote attackers to
     cause a denial of service or possibly have unspecified other impact via
     a .pdf file containing JPEG data (bsc#1085585).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2434=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2434=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2434=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      exempi-debugsource-2.2.1-5.7.1
      libexempi-devel-2.2.1-5.7.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      exempi-debugsource-2.2.1-5.7.1
      libexempi3-2.2.1-5.7.1
      libexempi3-debuginfo-2.2.1-5.7.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      exempi-debugsource-2.2.1-5.7.1
      libexempi3-2.2.1-5.7.1
      libexempi3-debuginfo-2.2.1-5.7.1


References:

   https://www.suse.com/security/cve/CVE-2017-18233.html
   https://www.suse.com/security/cve/CVE-2017-18234.html
   https://www.suse.com/security/cve/CVE-2017-18236.html
   https://www.suse.com/security/cve/CVE-2017-18238.html
   https://www.suse.com/security/cve/CVE-2018-7728.html
   https://www.suse.com/security/cve/CVE-2018-7730.html
   https://bugzilla.suse.com/1085295
   https://bugzilla.suse.com/1085297
   https://bugzilla.suse.com/1085583
   https://bugzilla.suse.com/1085584
   https://bugzilla.suse.com/1085585
   https://bugzilla.suse.com/1085589



More information about the sle-security-updates mailing list