SUSE: 2019:0855-1 moderate: netpbm
Summary
This update for netpbm fixes the following issues: - CVE-2018-8975: The pm_mallocarray2 function allowed remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file (bsc#1086777). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Desktop Applications 15: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-855=1 - SUSE Linux Enterprise Module for Basesystem 15: zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-855=1 Package List: - SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64): libnetpbm-devel-10.80.1-3.3.36 netpbm-debuginfo-10.80.1-3.3.36 netpbm-debugsource-10.80.1-3.3.36 - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64): libnetpbm11-10.80.1-3.3.36 libnetpbm11-debuginfo-10.80.1-3.3.36 netpbm-10.80.1-3.3.36 netpbm-debuginfo-10.80.1-3.3.36 netpbm-debugsource-10.80.1-3.3.36
References
#1086777
Cross- CVE-2018-8975
Affected Products:
SUSE Linux Enterprise Module for Desktop Applications 15
SUSE Linux Enterprise Module for Basesystem 15
https://www.suse.com/security/cve/CVE-2018-8975.html
https://bugzilla.suse.com/1086777