openSUSE Security Update: Security update for icoutils
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2017:0168-1
Rating:             important
References:         #1018756 
Cross-References:   CVE-2017-5208 CVE-2017-5331 CVE-2017-5332
                    CVE-2017-5333
Affected Products:
                    openSUSE 13.2
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:


   This update for icoutils to version 0.31.1 fixes the following issues:

   - CVE-2017-5208: An integer overflow allows maliciously crafted files to
     cause DoS or code execution (boo#1018756).
   - CVE-2017-5331: Incorrect out of bounds checks in check_offset allow for
     DoS or code execution (boo#1018756).
   - CVE-2017-5332: Missing out of bounds checks in
     extract_group_icon_cursor_resource allow for DoS or code execution
     (boo#1018756).
   - CVE-2017-5333: Incorrect out of bounds checks in check_offset allow for
     DoS or code execution (boo#1018756).


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2017-103=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      icoutils-0.31.1-4.3.1
      icoutils-debuginfo-0.31.1-4.3.1
      icoutils-debugsource-0.31.1-4.3.1


References:

   https://www.suse.com/security/cve/CVE-2017-5208.html
   https://www.suse.com/security/cve/CVE-2017-5331.html
   https://www.suse.com/security/cve/CVE-2017-5332.html
   https://www.suse.com/security/cve/CVE-2017-5333.html
   https://bugzilla.suse.com/1018756

-- 

openSUSE: 2017:0168-1: important: icoutils

January 17, 2017
An update that fixes four vulnerabilities is now available.

Description

This update for icoutils to version 0.31.1 fixes the following issues: - CVE-2017-5208: An integer overflow allows maliciously crafted files to cause DoS or code execution (boo#1018756). - CVE-2017-5331: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). - CVE-2017-5332: Missing out of bounds checks in extract_group_icon_cursor_resource allow for DoS or code execution (boo#1018756). - CVE-2017-5333: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756).

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2017-103=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.2 (i586 x86_64): icoutils-0.31.1-4.3.1 icoutils-debuginfo-0.31.1-4.3.1 icoutils-debugsource-0.31.1-4.3.1


References

https://www.suse.com/security/cve/CVE-2017-5208.html https://www.suse.com/security/cve/CVE-2017-5331.html https://www.suse.com/security/cve/CVE-2017-5332.html https://www.suse.com/security/cve/CVE-2017-5333.html https://bugzilla.suse.com/1018756--


Severity
Announcement ID: openSUSE-SU-2017:0168-1
Rating: important
Affected Products: openSUSE 13.2

Related News