logo
DATABASE RESOURCES PRICING ABOUT US

freexl - security update

Description

Leon reported five heap-based buffer-overflow vulnerabilities in FreeXL. * [CVE-2018-7435](https://security-tracker.debian.org/tracker/CVE-2018-7435) There is a heap-based buffer over-read in the freexl::destroy\_cell function. * [CVE-2018-7436](https://security-tracker.debian.org/tracker/CVE-2018-7436) There is a heap-based buffer over-read in a pointer dereference of the parse\_SST function. * [CVE-2018-7437](https://security-tracker.debian.org/tracker/CVE-2018-7437) There is a heap-based buffer over-read in a memcpy call of the parse\_SST function. * [CVE-2018-7438](https://security-tracker.debian.org/tracker/CVE-2018-7438) There is a heap-based buffer over-read in the parse\_unicode\_string function. * [CVE-2018-7439](https://security-tracker.debian.org/tracker/CVE-2018-7439) There is a heap-based buffer over-read in the function read\_mini\_biff\_next\_record. For Debian 7 Wheezy, these problems have been fixed in version 1.0.0b-1+deb7u5. We recommend that you upgrade your freexl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
freexl 1.0.0b-1+deb7u2
freexl 1.0.0b-1+deb7u1
freexl 1.0.0b-1+deb7u4
freexl 1.0.0b-1
freexl 1.0.0b-1+deb7u3

Related