SB2019040517 - OpenSUSE Linux update for libcaca
Published: April 5, 2019 Updated: September 27, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Division by zero (CVE-ID: CVE-2018-20544)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is floating point exception at caca/dither.c (function caca_dither_bitmap) in libcaca 0.99.beta19.
2) Integer overflow (CVE-ID: CVE-2018-20545)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 4bpp data.
3) Integer overflow (CVE-ID: CVE-2018-20546)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for the default bpp case.
4) Integer overflow (CVE-ID: CVE-2018-20547)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for 24bpp data.
5) Integer overflow (CVE-ID: CVE-2018-20548)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 1bpp data.
6) Improper input validation (CVE-ID: CVE-2018-20549)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists in the caca_file_read function, as defined in the caca/file.c file due to insufficient validation of user-supplied input. A local attacker can execute a file that submits malicious input, trigger an illegal write memory access condition that can be used to cause a DoS condition.
Remediation
Install update from vendor's website.