openSUSE Security Update: Security update for htmldoc ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:0043-1 Rating: moderate References: #1178561 #1190515 #1192357 #1194178 #1194487 #1195758 Cross-References: CVE-2021-3997 CVE-2021-40985 CVE-2021-43579 CVE-2022-0534 CVSS scores: CVE-2021-3997 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-40985 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVE-2021-43579 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2022-0534 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2022-0534 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H Affected Products: openSUSE Backports SLE-15-SP3 openSUSE Leap 15.3 ______________________________________________________________________________ An update that solves four vulnerabilities and has two fixes is now available. Description: htmldoc was updated to fix issues: - CVE-2021-40985: Fixed buffer overflow may lead to DoS via a crafted BMP image (bsc#1192357) - CVE-2021-43579: Fixed stack-based buffer overflow in image_load_bmp() results in remote code execution if the victim converts an HTML document linking to a crafted BMP file (bsc#1194487) - CVE-2022-0534: Fixed stack out-of-bounds read in gif_get_code() when opening a malicious GIF file results in a segmentation fault (bsc#1195758) Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-43=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2022-43=1 Package List: - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): libsystemd0-246.16-7.33.1 libsystemd0-debuginfo-246.16-7.33.1 libudev-devel-246.16-7.33.1 libudev1-246.16-7.33.1 libudev1-debuginfo-246.16-7.33.1 nss-myhostname-246.16-7.33.1 nss-myhostname-debuginfo-246.16-7.33.1 nss-mymachines-246.16-7.33.1 nss-mymachines-debuginfo-246.16-7.33.1 nss-resolve-246.16-7.33.1 nss-resolve-debuginfo-246.16-7.33.1 nss-systemd-246.16-7.33.1 nss-systemd-debuginfo-246.16-7.33.1 systemd-246.16-7.33.1 systemd-container-246.16-7.33.1 systemd-container-debuginfo-246.16-7.33.1 systemd-coredump-246.16-7.33.1 systemd-coredump-debuginfo-246.16-7.33.1 systemd-debuginfo-246.16-7.33.1 systemd-debugsource-246.16-7.33.1 systemd-devel-246.16-7.33.1 systemd-doc-246.16-7.33.1 systemd-journal-remote-246.16-7.33.1 systemd-journal-remote-debuginfo-246.16-7.33.1 systemd-logger-246.16-7.33.1 systemd-network-246.16-7.33.1 systemd-network-debuginfo-246.16-7.33.1 systemd-sysvinit-246.16-7.33.1 udev-246.16-7.33.1 udev-debuginfo-246.16-7.33.1 - openSUSE Leap 15.3 (x86_64): libsystemd0-32bit-246.16-7.33.1 libsystemd0-32bit-debuginfo-246.16-7.33.1 libudev-devel-32bit-246.16-7.33.1 libudev1-32bit-246.16-7.33.1 libudev1-32bit-debuginfo-246.16-7.33.1 nss-myhostname-32bit-246.16-7.33.1 nss-myhostname-32bit-debuginfo-246.16-7.33.1 nss-mymachines-32bit-246.16-7.33.1 nss-mymachines-32bit-debuginfo-246.16-7.33.1 systemd-32bit-246.16-7.33.1 systemd-32bit-debuginfo-246.16-7.33.1 - openSUSE Leap 15.3 (noarch): systemd-lang-246.16-7.33.1 - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64): htmldoc-1.9.12-bp153.2.6.1 References: https://www.suse.com/security/cve/CVE-2021-3997.html https://www.suse.com/security/cve/CVE-2021-40985.html https://www.suse.com/security/cve/CVE-2021-43579.html https://www.suse.com/security/cve/CVE-2022-0534.html https://bugzilla.suse.com/1178561 https://bugzilla.suse.com/1190515 https://bugzilla.suse.com/1192357 https://bugzilla.suse.com/1194178 https://bugzilla.suse.com/1194487 https://bugzilla.suse.com/1195758