openSUSE-SU-2022:0043-1: moderate: Security update for htmldoc
openSUSE Security Update: Security update for htmldoc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0043-1
Rating: moderate
References: #1178561 #1190515 #1192357 #1194178 #1194487
#1195758
Cross-References: CVE-2021-3997 CVE-2021-40985 CVE-2021-43579
CVE-2022-0534
CVSS scores:
CVE-2021-3997 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-40985 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-43579 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0534 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0534 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves four vulnerabilities and has two
fixes is now available.
Description:
htmldoc was updated to fix issues:
- CVE-2021-40985: Fixed buffer overflow may lead to DoS via a crafted BMP
image (bsc#1192357)
- CVE-2021-43579: Fixed stack-based buffer overflow in image_load_bmp()
results in remote code execution if the victim converts an HTML document
linking to a crafted BMP file (bsc#1194487)
- CVE-2022-0534: Fixed stack out-of-bounds read in gif_get_code() when
opening a malicious GIF file results in a segmentation fault
(bsc#1195758)
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-43=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-43=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libsystemd0-246.16-7.33.1
libsystemd0-debuginfo-246.16-7.33.1
libudev-devel-246.16-7.33.1
libudev1-246.16-7.33.1
libudev1-debuginfo-246.16-7.33.1
nss-myhostname-246.16-7.33.1
nss-myhostname-debuginfo-246.16-7.33.1
nss-mymachines-246.16-7.33.1
nss-mymachines-debuginfo-246.16-7.33.1
nss-resolve-246.16-7.33.1
nss-resolve-debuginfo-246.16-7.33.1
nss-systemd-246.16-7.33.1
nss-systemd-debuginfo-246.16-7.33.1
systemd-246.16-7.33.1
systemd-container-246.16-7.33.1
systemd-container-debuginfo-246.16-7.33.1
systemd-coredump-246.16-7.33.1
systemd-coredump-debuginfo-246.16-7.33.1
systemd-debuginfo-246.16-7.33.1
systemd-debugsource-246.16-7.33.1
systemd-devel-246.16-7.33.1
systemd-doc-246.16-7.33.1
systemd-journal-remote-246.16-7.33.1
systemd-journal-remote-debuginfo-246.16-7.33.1
systemd-logger-246.16-7.33.1
systemd-network-246.16-7.33.1
systemd-network-debuginfo-246.16-7.33.1
systemd-sysvinit-246.16-7.33.1
udev-246.16-7.33.1
udev-debuginfo-246.16-7.33.1
- openSUSE Leap 15.3 (x86_64):
libsystemd0-32bit-246.16-7.33.1
libsystemd0-32bit-debuginfo-246.16-7.33.1
libudev-devel-32bit-246.16-7.33.1
libudev1-32bit-246.16-7.33.1
libudev1-32bit-debuginfo-246.16-7.33.1
nss-myhostname-32bit-246.16-7.33.1
nss-myhostname-32bit-debuginfo-246.16-7.33.1
nss-mymachines-32bit-246.16-7.33.1
nss-mymachines-32bit-debuginfo-246.16-7.33.1
systemd-32bit-246.16-7.33.1
systemd-32bit-debuginfo-246.16-7.33.1
- openSUSE Leap 15.3 (noarch):
systemd-lang-246.16-7.33.1
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
htmldoc-1.9.12-bp153.2.6.1
References:
https://www.suse.com/security/cve/CVE-2021-3997.html
https://www.suse.com/security/cve/CVE-2021-40985.html
https://www.suse.com/security/cve/CVE-2021-43579.html
https://www.suse.com/security/cve/CVE-2022-0534.html
https://bugzilla.suse.com/1178561
https://bugzilla.suse.com/1190515
https://bugzilla.suse.com/1192357
https://bugzilla.suse.com/1194178
https://bugzilla.suse.com/1194487
https://bugzilla.suse.com/1195758
A htmldoc security update has been released for openSUSE Leap 15.3 and SUSE Linux Enterprise 15 SP3.