Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libcaca
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libcaca
ID: SUSE-SU-2019:0770-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Server Applications 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
Datum: Mi, 27. März 2019, 19:29
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20546
Applikationen: libcaca

Originalnachricht


SUSE Security Update: Security update for libcaca
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:0770-1
Rating: moderate
References: #1120470 #1120502 #1120503 #1120504 #1120584
#1120589
Cross-References: CVE-2018-20544 CVE-2018-20545 CVE-2018-20546
CVE-2018-20547 CVE-2018-20548 CVE-2018-20549

Affected Products:
SUSE Linux Enterprise Module for Server Applications 15
SUSE Linux Enterprise Module for Open Buildservice
Development Tools 15
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for libcaca fixes the following issues:

Security issues fixed:

- CVE-2018-20544: Fixed a floating point exception at caca/dither.c
(bsc#1120502)
- CVE-2018-20545: Fixed a WRITE memory access in the load_image function
at common-image.c for 4bpp (bsc#1120584)
- CVE-2018-20546: Fixed a READ memory access in the get_rgba_default
function at caca/dither.c for bpp (bsc#1120503)
- CVE-2018-20547: Fixed a READ memory access in the get_rgba_default
function at caca/dither.c for 24bpp (bsc#1120504)
- CVE-2018-20548: Fixed a WRITE memory access in the load_image function
at common-image.c for 1bpp (bsc#1120589)
- CVE-2018-20549: Fixed a WRITE memory access in the caca_file_read
function at caca/file.c (bsc#1120470)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Server Applications 15:

zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-770=1

- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:

zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-770=1



Package List:

- SUSE Linux Enterprise Module for Server Applications 15 (aarch64 ppc64le
s390x x86_64):

libcaca-debugsource-0.99.beta19.git20171003-3.3.7
libcaca-devel-0.99.beta19.git20171003-3.3.7
libcaca0-0.99.beta19.git20171003-3.3.7
libcaca0-debuginfo-0.99.beta19.git20171003-3.3.7
libcaca0-plugins-0.99.beta19.git20171003-3.3.7
libcaca0-plugins-debuginfo-0.99.beta19.git20171003-3.3.7

- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
(aarch64 ppc64le s390x x86_64):

caca-utils-0.99.beta19.git20171003-3.3.7
caca-utils-debuginfo-0.99.beta19.git20171003-3.3.7
libcaca-debugsource-0.99.beta19.git20171003-3.3.7
libcaca-ruby-0.99.beta19.git20171003-3.3.7
libcaca-ruby-debuginfo-0.99.beta19.git20171003-3.3.7

- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
(noarch):

python3-caca-0.99.beta19.git20171003-3.3.7


References:

https://www.suse.com/security/cve/CVE-2018-20544.html
https://www.suse.com/security/cve/CVE-2018-20545.html
https://www.suse.com/security/cve/CVE-2018-20546.html
https://www.suse.com/security/cve/CVE-2018-20547.html
https://www.suse.com/security/cve/CVE-2018-20548.html
https://www.suse.com/security/cve/CVE-2018-20549.html
https://bugzilla.suse.com/1120470
https://bugzilla.suse.com/1120502
https://bugzilla.suse.com/1120503
https://bugzilla.suse.com/1120504
https://bugzilla.suse.com/1120584
https://bugzilla.suse.com/1120589

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung