openSUSE-SU-2024:0021-1: moderate: Security update for perl-Spreadsheet-ParseXLSX
openSUSE Security Update: Security update for perl-Spreadsheet-ParseXLSX ______________________________________________________________________________ Announcement ID: openSUSE-SU-2024:0021-1 Rating: moderate References: #1218651 Cross-References: CVE-2024-22368 Affected Products: openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for perl-Spreadsheet-ParseXLSX fixes the following issues: Updated to 0.29: see /usr/share/doc/packages/perl-Spreadsheet-ParseXLSX/Changes 0.29: - Fix for 'Argument "" isn't numeric in addition (+) at /usr/local/shar… - Incorrect cell values due to phonetic data doy#72 - Fix die message in parse() - Cannot open password protected SHA1 encrypted files. doy#68 - use date format detection based on Spreadsheet::XLSX - Add rudimentary support for hyperlinks in cells 0.28: - CVE-2024-22368: out-of-memory condition during parsing of a crafted XLSX document (boo#1218651) - Fix possible memory bomb as reported in https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_x lsx_bomb.md - Updated Dist::Zilla configuration fixing deprecation warnings Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-21=1 Package List: - openSUSE Backports SLE-15-SP5 (noarch): perl-Spreadsheet-ParseXLSX-0.290.0-bp155.2.3.1 References: https://www.suse.com/security/cve/CVE-2024-22368.html https://bugzilla.suse.com/1218651
participants (1)
-
opensuse-security@opensuse.org