openSUSE Security Update: Security update for libredwg
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0115-1
Rating: moderate
References: #1160520 #1160522 #1160523 #1160524 #1160525
#1160526 #1160527
Cross-References: CVE-2020-6609 CVE-2020-6610 CVE-2020-6611
CVE-2020-6612 CVE-2020-6613 CVE-2020-6614
CVE-2020-6615
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for libredwg fixes the following issues:
libredwg was updated to release 0.10:
API breaking changes:
* Added a new int *isnewp argument to all dynapi utf8text getters, if the
returned string is freshly malloced or not.
* removed the UNKNOWN supertype, there are only UNKNOWN_OBJ and
UNKNOWN_ENT left, with common_entity_data.
* renamed BLOCK_HEADER.preview_data to preview, preview_data_size to
preview_size.
* renamed SHAPE.shape_no to style_id.
* renamed CLASS.wasazombie to is_zombie.
Bugfixes:
* Harmonized INDXFB with INDXF, removed extra src/in_dxfb.c.
* Fixed encoding of added r2000 AUXHEADER address.
* Fixed EED encoding from dwgrewrite.
* Add several checks against [CVE-2020-6609, boo#1160520], [CVE-2020-6610,
boo#1160522], [CVE-2020-6611, boo#1160523], [CVE-2020-6612,
boo#1160524], [CVE-2020-6613, boo#1160525], [CVE-2020-6614,
boo#1160526], [CVE-2020-6615, boo#1160527] This update was imported from
the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-115=1
Package List:
– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
libredwg-devel-0.10-bp151.2.6.1
libredwg-tools-0.10-bp151.2.6.1
libredwg0-0.10-bp151.2.6.1
References:
https://www.suse.com/security/cve/CVE-2020-6609.html
https://www.suse.com/security/cve/CVE-2020-6610.html
https://www.suse.com/security/cve/CVE-2020-6611.html
https://www.suse.com/security/cve/CVE-2020-6612.html
https://www.suse.com/security/cve/CVE-2020-6613.html
https://www.suse.com/security/cve/CVE-2020-6614.html
https://www.suse.com/security/cve/CVE-2020-6615.html
https://bugzilla.suse.com/1160520
https://bugzilla.suse.com/1160522
https://bugzilla.suse.com/1160523
https://bugzilla.suse.com/1160524
https://bugzilla.suse.com/1160525
https://bugzilla.suse.com/1160526
https://bugzilla.suse.com/1160527
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org