| Revision Date: | 2018-10-29 | Version: | 1 |
| Title: | Security update for lcms2 (Moderate) |
| Description: |
This update for lcms2 fixes the following security issues:
- CVE-2016-10165: The Type_MLU_Read function allowed remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggered an out-of-bounds heap read (bsc#1021364). - CVE-2018-16435: A integer overflow was fixed in the AllocateDataSet function in cmscgats.c, that could lead to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile. (bsc#1108813) - Ensure that LUT stages match channel count (bsc#1026649). - sanitize input and output channels on MPE profiles (bsc#1026650).
|
| Family: | unix | Class: | patch |
| Status: | | Reference(s): | 1021364 1026649 1026650 1108813 CVE-2016-10165 CVE-2018-16435 SUSE-SU-2018:3545-1
|
| Platform(s): | SUSE Linux Enterprise Desktop 12 SP3
| Product(s): | |
| Definition Synopsis |
| SUSE Linux Enterprise Desktop 12 SP3 is installed AND Package Information
lcms2-2.7-9.7.1 is installed
OR liblcms2-2-2.7-9.7.1 is installed
OR liblcms2-2-32bit-2.7-9.7.1 is installed
|