openSUSE Security Update: Security update for libredwg
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0096-1
Rating: moderate
References: #1160520 #1160522 #1160523 #1160524 #1160525
#1160526 #1160527
Cross-References: CVE-2020-6609 CVE-2020-6610 CVE-2020-6611
CVE-2020-6612 CVE-2020-6613 CVE-2020-6614
CVE-2020-6615
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for libredwg fixes the following issues:
libredwg was updated to release 0.10:
API breaking changes:
* Added a new int *isnewp argument to all dynapi utf8text getters, if the
returned string is freshly malloced or not.
* removed the UNKNOWN supertype, there are only UNKNOWN_OBJ and
UNKNOWN_ENT left, with common_entity_data.
* renamed BLOCK_HEADER.preview_data to preview, preview_data_size to
preview_size.
* renamed SHAPE.shape_no to style_id.
* renamed CLASS.wasazombie to is_zombie.
Bugfixes:
* Harmonized INDXFB with INDXF, removed extra src/in_dxfb.c.
* Fixed encoding of added r2000 AUXHEADER address.
* Fixed EED encoding from dwgrewrite.
* Add several checks against [CVE-2020-6609, boo#1160520], [CVE-2020-6610,
boo#1160522], [CVE-2020-6611, boo#1160523], [CVE-2020-6612,
boo#1160524], [CVE-2020-6613, boo#1160525], [CVE-2020-6614,
boo#1160526], [CVE-2020-6615, boo#1160527]
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-96=1
Package List:
– openSUSE Leap 15.1 (x86_64):
libredwg-debuginfo-0.10-lp151.2.6.1
libredwg-debugsource-0.10-lp151.2.6.1
libredwg-devel-0.10-lp151.2.6.1
libredwg-tools-0.10-lp151.2.6.1
libredwg-tools-debuginfo-0.10-lp151.2.6.1
libredwg0-0.10-lp151.2.6.1
libredwg0-debuginfo-0.10-lp151.2.6.1
References:
https://www.suse.com/security/cve/CVE-2020-6609.html
https://www.suse.com/security/cve/CVE-2020-6610.html
https://www.suse.com/security/cve/CVE-2020-6611.html
https://www.suse.com/security/cve/CVE-2020-6612.html
https://www.suse.com/security/cve/CVE-2020-6613.html
https://www.suse.com/security/cve/CVE-2020-6614.html
https://www.suse.com/security/cve/CVE-2020-6615.html
https://bugzilla.suse.com/1160520
https://bugzilla.suse.com/1160522
https://bugzilla.suse.com/1160523
https://bugzilla.suse.com/1160524
https://bugzilla.suse.com/1160525
https://bugzilla.suse.com/1160526
https://bugzilla.suse.com/1160527
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for libredwg
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0095-1
Rating: moderate
References: #1129868 #1129869 #1129870 #1129873 #1129874
#1129875 #1129876 #1129878 #1129879 #1129881
#1154080 #1159824 #1159825 #1159826 #1159827
#1159828 #1159831 #1159832
Cross-References: CVE-2019-20009 CVE-2019-20010 CVE-2019-20011
CVE-2019-20012 CVE-2019-20013 CVE-2019-20014
CVE-2019-20015 CVE-2019-9770 CVE-2019-9771
CVE-2019-9772 CVE-2019-9773 CVE-2019-9774
CVE-2019-9775 CVE-2019-9776 CVE-2019-9777
CVE-2019-9778 CVE-2019-9779
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that solves 17 vulnerabilities and has one errata
is now available.
Description:
This update for libredwg fixes the following issues:
libredwg was updated to release 0.9.3:
* Added the -x,–extnames option to dwglayers for r13-r14 DWGs.
* Fixed some leaks: SORTENTSTABLE, PROXY_ENTITY.ownerhandle for r13.
* Add DICTIONARY.itemhandles[] for r13 and r14.
* Fixed some dwglayers null pointer derefs, and flush its output for each
layer.
* Added several overflow checks from fuzzing [CVE-2019-20010,
boo#1159825], [CVE-2019-20011, boo#1159826], [CVE-2019-20012,
boo#1159827], [CVE-2019-20013, boo#1159828], [CVE-2019-20014,
boo#1159831], [CVE-2019-20015, boo#1159832]
* Disallow illegal SPLINE scenarios [CVE-2019-20009, boo#1159824]
Update to release 0.9.1:
* Fixed more null pointer dereferences, overflows, hangs and memory leaks
for fuzzed (i.e. illegal) DWGs.
Update to release 0.9 [boo#1154080]:
* Added the DXF importer, using the new dynapi and the r2000 encoder. Only
for r2000 DXFs.
* Added utf8text conversion functions to the dynapi.
* Added 3DSOLID encoder.
* Added APIs to find handles for names, searching in tables and dicts.
* API breaking changes – see NEWS file in package.
* Fixed null pointer dereferences, and memory leaks (except DXF importer)
[boo#1129868, CVE-2019-9779] [boo#1129869, CVE-2019-9778] [boo#1129870,
CVE-2019-9777] [boo#1129873, CVE-2019-9776] [boo#1129874, CVE-2019-9773]
[boo#1129875, CVE-2019-9772] [boo#1129876, CVE-2019-9771] [boo#1129878,
CVE-2019-9775] [boo#1129879, CVE-2019-9774] [boo#1129881, CVE-2019-9770]
Update to 0.8:
* add a new dynamic API, read and write all header and object fields by
name
* API breaking changes
* Fix many errors in DXF output
* Fix JSON output
* Many more bug fixes to handle specific object types
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-95=1
Package List:
– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
libredwg-devel-0.9.3-bp151.2.3.1
libredwg-tools-0.9.3-bp151.2.3.1
libredwg0-0.9.3-bp151.2.3.1
References:
https://www.suse.com/security/cve/CVE-2019-20009.html
https://www.suse.com/security/cve/CVE-2019-20010.html
https://www.suse.com/security/cve/CVE-2019-20011.html
https://www.suse.com/security/cve/CVE-2019-20012.html
https://www.suse.com/security/cve/CVE-2019-20013.html
https://www.suse.com/security/cve/CVE-2019-20014.html
https://www.suse.com/security/cve/CVE-2019-20015.html
https://www.suse.com/security/cve/CVE-2019-9770.html
https://www.suse.com/security/cve/CVE-2019-9771.html
https://www.suse.com/security/cve/CVE-2019-9772.html
https://www.suse.com/security/cve/CVE-2019-9773.html
https://www.suse.com/security/cve/CVE-2019-9774.html
https://www.suse.com/security/cve/CVE-2019-9775.html
https://www.suse.com/security/cve/CVE-2019-9776.html
https://www.suse.com/security/cve/CVE-2019-9777.html
https://www.suse.com/security/cve/CVE-2019-9778.html
https://www.suse.com/security/cve/CVE-2019-9779.html
https://bugzilla.suse.com/1129868
https://bugzilla.suse.com/1129869
https://bugzilla.suse.com/1129870
https://bugzilla.suse.com/1129873
https://bugzilla.suse.com/1129874
https://bugzilla.suse.com/1129875
https://bugzilla.suse.com/1129876
https://bugzilla.suse.com/1129878
https://bugzilla.suse.com/1129879
https://bugzilla.suse.com/1129881
https://bugzilla.suse.com/1154080
https://bugzilla.suse.com/1159824
https://bugzilla.suse.com/1159825
https://bugzilla.suse.com/1159826
https://bugzilla.suse.com/1159827
https://bugzilla.suse.com/1159828
https://bugzilla.suse.com/1159831
https://bugzilla.suse.com/1159832
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org