Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in exempi
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in exempi
ID: SUSE-SU-2018:3389-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3
Datum: Mi, 24. Oktober 2018, 18:57
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18236
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7730
Applikationen: exempi

Originalnachricht

   SUSE Security Update: Security update for exempi
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:3389-1
Rating: moderate
References: #1085295 #1085297 #1085583 #1085584 #1085585
#1085589
Cross-References: CVE-2017-18233 CVE-2017-18234 CVE-2017-18236
CVE-2017-18238 CVE-2018-7728 CVE-2018-7730

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for exempi fixes the following security issues:

- CVE-2017-18233: Prevent integer overflow in the Chunk class that allowed
remote attackers to cause a denial of service (infinite loop) via
crafted XMP data in a .avi file (bsc#1085584).
- CVE-2017-18238: The TradQT_Manager::ParseCachedBoxes function allowed
remote attackers to cause a denial of service (infinite loop) via
crafted XMP data in a .qt file (bsc#1085583).
- CVE-2018-7728: Fixed heap-based buffer overflow, which allowed denial of
service via crafted TIFF image (bsc#1085297).
- CVE-2018-7730: Fixed heap-based buffer overflow in
XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18236: The ASF_Support::ReadHeaderObject function allowed
remote attackers to cause a denial of service (infinite loop) via a
crafted .asf file (bsc#1085589).
- CVE-2017-18234: Prevent use-after-free that allowed remote attackers to
cause a denial of service or possibly have unspecified other impact via
a .pdf file containing JPEG data (bsc#1085585).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2434=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2434=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2434=1



Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le
s390x x86_64):

exempi-debugsource-2.2.1-5.7.1
libexempi-devel-2.2.1-5.7.1

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

exempi-debugsource-2.2.1-5.7.1
libexempi3-2.2.1-5.7.1
libexempi3-debuginfo-2.2.1-5.7.1

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

exempi-debugsource-2.2.1-5.7.1
libexempi3-2.2.1-5.7.1
libexempi3-debuginfo-2.2.1-5.7.1


References:

https://www.suse.com/security/cve/CVE-2017-18233.html
https://www.suse.com/security/cve/CVE-2017-18234.html
https://www.suse.com/security/cve/CVE-2017-18236.html
https://www.suse.com/security/cve/CVE-2017-18238.html
https://www.suse.com/security/cve/CVE-2018-7728.html
https://www.suse.com/security/cve/CVE-2018-7730.html
https://bugzilla.suse.com/1085295
https://bugzilla.suse.com/1085297
https://bugzilla.suse.com/1085583
https://bugzilla.suse.com/1085584
https://bugzilla.suse.com/1085585
https://bugzilla.suse.com/1085589

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung