SUSE-SU-2015:1378-1: moderate: Security update for libwmf
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Aug 13 05:10:04 MDT 2015
SUSE Security Update: Security update for libwmf
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1378-1
Rating: moderate
References: #831299 #933109 #936058 #936062
Cross-References: CVE-2015-0848 CVE-2015-4588 CVE-2015-4695
CVE-2015-4696
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Software Development Kit 11-SP3
SUSE Linux Enterprise Desktop 11-SP4
SUSE Linux Enterprise Desktop 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
libwmf was updated to fix four security issues.
These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function
allowed remote attackers to cause a denial of service (crash) or
possibly execute arbitrary code via a crafted "run-length count" in an
image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to
cause a denial of service (crash) or possibly execute arbitrary code via
a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to
cause a denial of service (crash) via a crafted WMF file to the (1)
wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of
service (out-of-bounds read) via a crafted WMF file (bsc#936058).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-libwmf-12027=1
- SUSE Linux Enterprise Software Development Kit 11-SP3:
zypper in -t patch sdksp3-libwmf-12027=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-libwmf-12027=1
- SUSE Linux Enterprise Desktop 11-SP3:
zypper in -t patch sledsp3-libwmf-12027=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-libwmf-12027=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libwmf-0.2.8.4-206.29.29.1
libwmf-devel-0.2.8.4-206.29.29.1
libwmf-gnome-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):
libwmf-32bit-0.2.8.4-206.29.29.1
libwmf-gnome-32bit-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ia64):
libwmf-gnome-x86-0.2.8.4-206.29.29.1
libwmf-x86-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64):
libwmf-0.2.8.4-206.29.29.1
libwmf-devel-0.2.8.4-206.29.29.1
libwmf-gnome-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (ppc64 s390x x86_64):
libwmf-32bit-0.2.8.4-206.29.29.1
libwmf-gnome-32bit-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (ia64):
libwmf-gnome-x86-0.2.8.4-206.29.29.1
libwmf-x86-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
libwmf-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Desktop 11-SP3 (i586 x86_64):
libwmf-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64):
libwmf-debuginfo-0.2.8.4-206.29.29.1
libwmf-debugsource-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (ppc64 s390x x86_64):
libwmf-debuginfo-32bit-0.2.8.4-206.29.29.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (ia64):
libwmf-debuginfo-x86-0.2.8.4-206.29.29.1
References:
https://www.suse.com/security/cve/CVE-2015-0848.html
https://www.suse.com/security/cve/CVE-2015-4588.html
https://www.suse.com/security/cve/CVE-2015-4695.html
https://www.suse.com/security/cve/CVE-2015-4696.html
https://bugzilla.suse.com/831299
https://bugzilla.suse.com/933109
https://bugzilla.suse.com/936058
https://bugzilla.suse.com/936062
More information about the sle-updates
mailing list