Mailinglist Archive: opensuse-security-announce (66 mails)

< Previous Next >
[security-announce] openSUSE-SU-2020:0068-1: moderate: Security update for libredwg
openSUSE Security Update: Security update for libredwg
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0068-1
Rating: moderate
References: #1129868 #1129869 #1129870 #1129873 #1129874
#1129875 #1129876 #1129878 #1129879 #1129881
#1154080 #1159824 #1159825 #1159826 #1159827
#1159828 #1159831 #1159832
Cross-References: CVE-2019-20009 CVE-2019-20010 CVE-2019-20011
CVE-2019-20012 CVE-2019-20013 CVE-2019-20014
CVE-2019-20015 CVE-2019-9770 CVE-2019-9771
CVE-2019-9772 CVE-2019-9773 CVE-2019-9774
CVE-2019-9775 CVE-2019-9776 CVE-2019-9777
CVE-2019-9778 CVE-2019-9779
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves 17 vulnerabilities and has one errata
is now available.

Description:

This update for libredwg fixes the following issues:

libredwg was updated to release 0.9.3:

* Added the -x,--extnames option to dwglayers for r13-r14 DWGs.
* Fixed some leaks: SORTENTSTABLE, PROXY_ENTITY.ownerhandle for r13.
* Add DICTIONARY.itemhandles[] for r13 and r14.
* Fixed some dwglayers null pointer derefs, and flush its output for each
layer.
* Added several overflow checks from fuzzing [CVE-2019-20010,
boo#1159825], [CVE-2019-20011, boo#1159826], [CVE-2019-20012,
boo#1159827], [CVE-2019-20013, boo#1159828], [CVE-2019-20014,
boo#1159831], [CVE-2019-20015, boo#1159832]
* Disallow illegal SPLINE scenarios [CVE-2019-20009, boo#1159824]

Update to release 0.9.1:

* Fixed more null pointer dereferences, overflows, hangs and memory leaks
for fuzzed (i.e. illegal) DWGs.

Update to release 0.9 [boo#1154080]:

* Added the DXF importer, using the new dynapi and the r2000 encoder. Only
for r2000 DXFs.
* Added utf8text conversion functions to the dynapi.
* Added 3DSOLID encoder.
* Added APIs to find handles for names, searching in tables and dicts.
* API breaking changes - see NEWS file in package.
* Fixed null pointer dereferences, and memory leaks (except DXF importer)
[boo#1129868, CVE-2019-9779] [boo#1129869, CVE-2019-9778] [boo#1129870,
CVE-2019-9777] [boo#1129873, CVE-2019-9776] [boo#1129874, CVE-2019-9773]
[boo#1129875, CVE-2019-9772] [boo#1129876, CVE-2019-9771] [boo#1129878,
CVE-2019-9775] [boo#1129879, CVE-2019-9774] [boo#1129881, CVE-2019-9770]

Update to 0.8:

* add a new dynamic API, read and write all header and object fields by
name
* API breaking changes
* Fix many errors in DXF output
* Fix JSON output
* Many more bug fixes to handle specific object types


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-68=1



Package List:

- openSUSE Leap 15.1 (x86_64):

libredwg-debuginfo-0.9.3-lp151.2.3.1
libredwg-debugsource-0.9.3-lp151.2.3.1
libredwg-devel-0.9.3-lp151.2.3.1
libredwg-tools-0.9.3-lp151.2.3.1
libredwg-tools-debuginfo-0.9.3-lp151.2.3.1
libredwg0-0.9.3-lp151.2.3.1
libredwg0-debuginfo-0.9.3-lp151.2.3.1


References:

https://www.suse.com/security/cve/CVE-2019-20009.html
https://www.suse.com/security/cve/CVE-2019-20010.html
https://www.suse.com/security/cve/CVE-2019-20011.html
https://www.suse.com/security/cve/CVE-2019-20012.html
https://www.suse.com/security/cve/CVE-2019-20013.html
https://www.suse.com/security/cve/CVE-2019-20014.html
https://www.suse.com/security/cve/CVE-2019-20015.html
https://www.suse.com/security/cve/CVE-2019-9770.html
https://www.suse.com/security/cve/CVE-2019-9771.html
https://www.suse.com/security/cve/CVE-2019-9772.html
https://www.suse.com/security/cve/CVE-2019-9773.html
https://www.suse.com/security/cve/CVE-2019-9774.html
https://www.suse.com/security/cve/CVE-2019-9775.html
https://www.suse.com/security/cve/CVE-2019-9776.html
https://www.suse.com/security/cve/CVE-2019-9777.html
https://www.suse.com/security/cve/CVE-2019-9778.html
https://www.suse.com/security/cve/CVE-2019-9779.html
https://bugzilla.suse.com/1129868
https://bugzilla.suse.com/1129869
https://bugzilla.suse.com/1129870
https://bugzilla.suse.com/1129873
https://bugzilla.suse.com/1129874
https://bugzilla.suse.com/1129875
https://bugzilla.suse.com/1129876
https://bugzilla.suse.com/1129878
https://bugzilla.suse.com/1129879
https://bugzilla.suse.com/1129881
https://bugzilla.suse.com/1154080
https://bugzilla.suse.com/1159824
https://bugzilla.suse.com/1159825
https://bugzilla.suse.com/1159826
https://bugzilla.suse.com/1159827
https://bugzilla.suse.com/1159828
https://bugzilla.suse.com/1159831
https://bugzilla.suse.com/1159832

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages