openSUSE Security Update: Security update for matio ______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10235-1 Rating: important References: #1193873 #1193874 Cross-References: CVE-2020-36428 CVE-2021-36977 CVSS scores: CVE-2020-36428 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2021-36977 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products: openSUSE Backports SLE-15-SP4 ______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for matio fixes the following issues:
Update to version 1.5.23:
* Fixed testsuite regression from version 1.5.22.
Changes from version 1.5.22:
* Added support for reading large MAT file. * Updated cmake-conan to version 0.17.0. * Fixed CMake build with Conan (MATIO_USE_CONAN:BOOL=ON). * Fixed data type when reading 16-bit character data from HDF5 MAT file. * Fixed heap-based buffer overflows when reading (crafted) MAT file (CVE-2020-36428, CVE-2021-36977). * Confirmed compatibility with HDF5 v1.13.0 and v1.13.1. * Several other fixes, for example for memory leaks.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2022-10235=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64):
libmatio-devel-1.5.23-bp154.2.3.1 libmatio11-1.5.23-bp154.2.3.1 matio-tools-1.5.23-bp154.2.3.1
References:
https://www.suse.com/security/cve/CVE-2020-36428.html https://www.suse.com/security/cve/CVE-2021-36977.html https://bugzilla.suse.com/1193873 https://bugzilla.suse.com/1193874