Lucene search

K
suseSuseOPENSUSE-SU-2022:0088-1
HistoryMar 21, 2022 - 12:00 a.m.

Security update for htmldoc (important)

2022-03-2100:00:00
lists.opensuse.org
31

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

An update that fixes 5 vulnerabilities is now available.

Description:

htmldoc was updated to fix issues:

  • CVE-2021-40985: Fixed buffer overflow may lead to DoS via a crafted BMP
    image (bsc#1192357)
  • CVE-2021-43579: Fixed stack-based buffer overflow in image_load_bmp()
    results in remote code execution if the victim converts an HTML document
    linking to a crafted BMP file (bsc#1194487)
  • CVE-2022-0534: Fixed stack out-of-bounds read in gif_get_code() when
    opening a malicious GIF file results in a segmentation fault
    (bsc#1195758)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2022-88=1

  • SUSE Package Hub for SUSE Linux Enterprise 12:

    zypper in -t patch openSUSE-2022-88=1

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P