SUSE-SU-2018:3389-1: moderate: Security update for exempi
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Oct 24 10:47:26 MDT 2018
SUSE Security Update: Security update for exempi
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3389-1
Rating: moderate
References: #1085295 #1085297 #1085583 #1085584 #1085585
#1085589
Cross-References: CVE-2017-18233 CVE-2017-18234 CVE-2017-18236
CVE-2017-18238 CVE-2018-7728 CVE-2018-7730
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for exempi fixes the following security issues:
- CVE-2017-18233: Prevent integer overflow in the Chunk class that allowed
remote attackers to cause a denial of service (infinite loop) via
crafted XMP data in a .avi file (bsc#1085584).
- CVE-2017-18238: The TradQT_Manager::ParseCachedBoxes function allowed
remote attackers to cause a denial of service (infinite loop) via
crafted XMP data in a .qt file (bsc#1085583).
- CVE-2018-7728: Fixed heap-based buffer overflow, which allowed denial of
service via crafted TIFF image (bsc#1085297).
- CVE-2018-7730: Fixed heap-based buffer overflow in
XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18236: The ASF_Support::ReadHeaderObject function allowed
remote attackers to cause a denial of service (infinite loop) via a
crafted .asf file (bsc#1085589).
- CVE-2017-18234: Prevent use-after-free that allowed remote attackers to
cause a denial of service or possibly have unspecified other impact via
a .pdf file containing JPEG data (bsc#1085585).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2434=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2434=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2434=1
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
exempi-debugsource-2.2.1-5.7.1
libexempi-devel-2.2.1-5.7.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
exempi-debugsource-2.2.1-5.7.1
libexempi3-2.2.1-5.7.1
libexempi3-debuginfo-2.2.1-5.7.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
exempi-debugsource-2.2.1-5.7.1
libexempi3-2.2.1-5.7.1
libexempi3-debuginfo-2.2.1-5.7.1
References:
https://www.suse.com/security/cve/CVE-2017-18233.html
https://www.suse.com/security/cve/CVE-2017-18234.html
https://www.suse.com/security/cve/CVE-2017-18236.html
https://www.suse.com/security/cve/CVE-2017-18238.html
https://www.suse.com/security/cve/CVE-2018-7728.html
https://www.suse.com/security/cve/CVE-2018-7730.html
https://bugzilla.suse.com/1085295
https://bugzilla.suse.com/1085297
https://bugzilla.suse.com/1085583
https://bugzilla.suse.com/1085584
https://bugzilla.suse.com/1085585
https://bugzilla.suse.com/1085589
More information about the sle-security-updates
mailing list