openSUSE Security Update: Security update for matio ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:10235-1 Rating: important References: #1193873 #1193874 Cross-References: CVE-2020-36428 CVE-2021-36977 CVSS scores: CVE-2020-36428 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2021-36977 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: openSUSE Backports SLE-15-SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for matio fixes the following issues: Update to version 1.5.23: * Fixed testsuite regression from version 1.5.22. Changes from version 1.5.22: * Added support for reading large MAT file. * Updated cmake-conan to version 0.17.0. * Fixed CMake build with Conan (MATIO_USE_CONAN:BOOL=ON). * Fixed data type when reading 16-bit character data from HDF5 MAT file. * Fixed heap-based buffer overflows when reading (crafted) MAT file (CVE-2020-36428, CVE-2021-36977). * Confirmed compatibility with HDF5 v1.13.0 and v1.13.1. * Several other fixes, for example for memory leaks. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP4: zypper in -t patch openSUSE-2022-10235=1 Package List: - openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64): libmatio-devel-1.5.23-bp154.2.3.1 libmatio11-1.5.23-bp154.2.3.1 matio-tools-1.5.23-bp154.2.3.1 References: https://www.suse.com/security/cve/CVE-2020-36428.html https://www.suse.com/security/cve/CVE-2021-36977.html https://bugzilla.suse.com/1193873 https://bugzilla.suse.com/1193874