File _patchinfo of Package patchinfo.718
<patchinfo incident="718">
<issue id="831299" tracker="bnc">libwmf: Change and/or patches may have been lost</issue>
<issue id="495842" tracker="bnc">VUL-0: libwmf embedded gd use-after-free error</issue>
<issue id="933109" tracker="bnc">VUL-1: CVE-2015-0848,CVE-2015-4588: libwmf: CVE-2015-0848 - Heap overflow on libwmf0.2-7</issue>
<issue id="936058" tracker="bnc"></issue>
<issue id="936062" tracker="bnc"></issue>
<issue id="CVE-2015-4588" tracker="cve" />
<issue id="CVE-2015-0848" tracker="cve" />
<issue id="CVE-2009-1364" tracker="cve" />
<issue id="CVE-2015-4695" tracker="cve" />
<issue id="CVE-2015-4696" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>fstrba</packager>
<description>libwmf was updated to fix five security issues.
These security issues were fixed:
- CVE-2009-1364: Fixed realloc return value usage (bsc#495842, bnc#831299)
- CVE-2015-0848: Heap overflow on libwmf0.2-7 (bsc#933109)
- CVE-2015-4588: DecodeImage() did not check that the run-length "count" fits into the total size of the image, which could lead to a heap-based buffer overflow (bsc#933109)
- CVE-2015-4695: meta_pen_create heap buffer over read (bsc#936058)
- CVE-2015-4696: Use after free (bsc#936062)
</description>
<summary>Security update for libwmf</summary>
</patchinfo>