Vulnerability from csaf_suse
Published
2015-07-31 15:10
Modified
2015-07-31 15:10
Summary
Security update for libwmf
Notes
Title of the patch
Security update for libwmf
Description of the patch
libwmf was updated to fix five security issues.
These security issues were fixed:
- CVE-2009-1364: Fixed realloc return value usage (bsc#495842, bnc#831299)
- CVE-2015-0848: Heap overflow on libwmf0.2-7 (bsc#933109)
- CVE-2015-4588: DecodeImage() did not check that the run-length 'count' fits into the total size of the image, which could lead to a heap-based buffer overflow (bsc#933109)
- CVE-2015-4695: meta_pen_create heap buffer over read (bsc#936058)
- CVE-2015-4696: Use after free (bsc#936062)
Patchnames
SUSE-SLE-DESKTOP-12-2015-481,SUSE-SLE-SDK-12-2015-481,SUSE-SLE-WE-12-2015-481
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for libwmf", title: "Title of the patch", }, { category: "description", text: "libwmf was updated to fix five security issues.\n\nThese security issues were fixed:\n- CVE-2009-1364: Fixed realloc return value usage (bsc#495842, bnc#831299)\n- CVE-2015-0848: Heap overflow on libwmf0.2-7 (bsc#933109)\n- CVE-2015-4588: DecodeImage() did not check that the run-length 'count' fits into the total size of the image, which could lead to a heap-based buffer overflow (bsc#933109)\n- CVE-2015-4695: meta_pen_create heap buffer over read (bsc#936058)\n- CVE-2015-4696: Use after free (bsc#936062)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-2015-481,SUSE-SLE-SDK-12-2015-481,SUSE-SLE-WE-12-2015-481", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1484-1.json", }, { category: "self", summary: "URL for SUSE-SU-2015:1484-1", url: "https://www.suse.com/support/update/announcement/2015/suse-su-20151484-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2015:1484-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html", }, { category: "self", summary: "SUSE Bug 495842", url: "https://bugzilla.suse.com/495842", }, { category: "self", summary: "SUSE Bug 831299", url: "https://bugzilla.suse.com/831299", }, { category: "self", summary: "SUSE Bug 933109", url: "https://bugzilla.suse.com/933109", }, { category: "self", summary: "SUSE Bug 936058", url: "https://bugzilla.suse.com/936058", }, { category: "self", summary: "SUSE Bug 936062", url: "https://bugzilla.suse.com/936062", }, { category: "self", summary: "SUSE CVE CVE-2009-1364 page", url: "https://www.suse.com/security/cve/CVE-2009-1364/", }, { category: "self", summary: "SUSE CVE CVE-2015-0848 page", url: "https://www.suse.com/security/cve/CVE-2015-0848/", }, { category: "self", summary: "SUSE CVE CVE-2015-4588 page", url: "https://www.suse.com/security/cve/CVE-2015-4588/", }, { category: "self", summary: "SUSE CVE CVE-2015-4695 page", url: "https://www.suse.com/security/cve/CVE-2015-4695/", }, { category: "self", summary: "SUSE CVE CVE-2015-4696 page", url: "https://www.suse.com/security/cve/CVE-2015-4696/", }, ], title: "Security update for libwmf", tracking: { current_release_date: "2015-07-31T15:10:23Z", generator: { date: "2015-07-31T15:10:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2015:1484-1", initial_release_date: "2015-07-31T15:10:23Z", revision_history: [ { date: "2015-07-31T15:10:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libwmf-0_2-7-0.2.8.4-242.3.ppc64le", product: { name: "libwmf-0_2-7-0.2.8.4-242.3.ppc64le", product_id: "libwmf-0_2-7-0.2.8.4-242.3.ppc64le", }, }, { category: "product_version", name: "libwmf-devel-0.2.8.4-242.3.ppc64le", product: { name: "libwmf-devel-0.2.8.4-242.3.ppc64le", product_id: "libwmf-devel-0.2.8.4-242.3.ppc64le", }, }, { category: "product_version", name: "libwmf-gnome-0.2.8.4-242.3.ppc64le", product: { name: "libwmf-gnome-0.2.8.4-242.3.ppc64le", product_id: "libwmf-gnome-0.2.8.4-242.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libwmf-0_2-7-0.2.8.4-242.3.s390x", product: { name: "libwmf-0_2-7-0.2.8.4-242.3.s390x", product_id: "libwmf-0_2-7-0.2.8.4-242.3.s390x", }, }, { category: "product_version", name: "libwmf-devel-0.2.8.4-242.3.s390x", product: { name: "libwmf-devel-0.2.8.4-242.3.s390x", product_id: "libwmf-devel-0.2.8.4-242.3.s390x", }, }, { category: "product_version", name: "libwmf-gnome-0.2.8.4-242.3.s390x", product: { name: "libwmf-gnome-0.2.8.4-242.3.s390x", product_id: "libwmf-gnome-0.2.8.4-242.3.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libwmf-0_2-7-0.2.8.4-242.3.x86_64", product: { name: "libwmf-0_2-7-0.2.8.4-242.3.x86_64", product_id: "libwmf-0_2-7-0.2.8.4-242.3.x86_64", }, }, { category: "product_version", name: "libwmf-devel-0.2.8.4-242.3.x86_64", product: { name: "libwmf-devel-0.2.8.4-242.3.x86_64", product_id: "libwmf-devel-0.2.8.4-242.3.x86_64", }, }, { category: "product_version", name: "libwmf-gnome-0.2.8.4-242.3.x86_64", product: { name: "libwmf-gnome-0.2.8.4-242.3.x86_64", product_id: "libwmf-gnome-0.2.8.4-242.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12", product: { name: "SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12", product_identification_helper: { cpe: "cpe:/o:suse:sled:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12", product: { name: "SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12", product: { name: "SUSE Linux Enterprise Workstation Extension 12", product_id: "SUSE Linux Enterprise Workstation Extension 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libwmf-0_2-7-0.2.8.4-242.3.x86_64 as component of SUSE Linux Enterprise Desktop 12", product_id: "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", }, product_reference: "libwmf-0_2-7-0.2.8.4-242.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-0_2-7-0.2.8.4-242.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", }, product_reference: "libwmf-0_2-7-0.2.8.4-242.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-0_2-7-0.2.8.4-242.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", }, product_reference: "libwmf-0_2-7-0.2.8.4-242.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-0_2-7-0.2.8.4-242.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", }, product_reference: "libwmf-0_2-7-0.2.8.4-242.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-devel-0.2.8.4-242.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", }, product_reference: "libwmf-devel-0.2.8.4-242.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-devel-0.2.8.4-242.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", }, product_reference: "libwmf-devel-0.2.8.4-242.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-devel-0.2.8.4-242.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", }, product_reference: "libwmf-devel-0.2.8.4-242.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-gnome-0.2.8.4-242.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", }, product_reference: "libwmf-gnome-0.2.8.4-242.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-gnome-0.2.8.4-242.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", }, product_reference: "libwmf-gnome-0.2.8.4-242.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-gnome-0.2.8.4-242.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", product_id: "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", }, product_reference: "libwmf-gnome-0.2.8.4-242.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12", }, { category: "default_component_of", full_product_name: { name: "libwmf-0_2-7-0.2.8.4-242.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", product_id: "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", }, product_reference: "libwmf-0_2-7-0.2.8.4-242.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12", }, ], }, vulnerabilities: [ { cve: "CVE-2009-1364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1364", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1364", url: "https://www.suse.com/security/cve/CVE-2009-1364", }, { category: "external", summary: "SUSE Bug 495842 for CVE-2009-1364", url: "https://bugzilla.suse.com/495842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-07-31T15:10:23Z", details: "important", }, ], title: "CVE-2009-1364", }, { cve: "CVE-2015-0848", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0848", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0848", url: "https://www.suse.com/security/cve/CVE-2015-0848", }, { category: "external", summary: "SUSE Bug 933109 for CVE-2015-0848", url: "https://bugzilla.suse.com/933109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-07-31T15:10:23Z", details: "moderate", }, ], title: "CVE-2015-0848", }, { cve: "CVE-2015-4588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-4588", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted \"run-length count\" in an image in a WMF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-4588", url: "https://www.suse.com/security/cve/CVE-2015-4588", }, { category: "external", summary: "SUSE Bug 933109 for CVE-2015-4588", url: "https://bugzilla.suse.com/933109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-07-31T15:10:23Z", details: "moderate", }, ], title: "CVE-2015-4588", }, { cve: "CVE-2015-4695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-4695", }, ], notes: [ { category: "general", text: "meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-4695", url: "https://www.suse.com/security/cve/CVE-2015-4695", }, { category: "external", summary: "SUSE Bug 936058 for CVE-2015-4695", url: "https://bugzilla.suse.com/936058", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-07-31T15:10:23Z", details: "moderate", }, ], title: "CVE-2015-4695", }, { cve: "CVE-2015-4696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-4696", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-4696", url: "https://www.suse.com/security/cve/CVE-2015-4696", }, { category: "external", summary: "SUSE Bug 936062 for CVE-2015-4696", url: "https://bugzilla.suse.com/936062", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-devel-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:libwmf-gnome-0.2.8.4-242.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:libwmf-0_2-7-0.2.8.4-242.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-07-31T15:10:23Z", details: "moderate", }, ], title: "CVE-2015-4696", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.