SUSE SLED12 Security Update : libreoffice (SUSE-SU-2017:1821-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

LibreOffice was updated to version 5.3.3.2, bringing new features and
enhancements: Writer :

- New 'Go to Page' dialog for quickly jumping to another
page.

- Support for 'Table Styles'.

- New drawing tools were added.

- Improvements in the toolbar.

- Borderless padding is displayed. Calc :

- New drawing tools were added.

- In new installations the default setting for new
documents is now 'Enable wildcards in formulas' instead
of regular expressions.

- Improved compatibility with ODF 1.2 Impress :

- Images inserted via 'Photo Album' can now be linked
instead of embedded in the document.

- When launching Impress, a Template Selector allows you
to choose a Template to start with.

- Two new default templates: Vivid and Pencil.

- All existing templates have been improved. Draw :

- New arrow endings, including Crow's foot notation's
ones. Base :

- Firebird has been upgraded to version 3.0.0. It is
unable to read back Firebird 2.5 data, so embedded
Firebird odb files created in LibreOffice version up to
5.2 cannot be opened with LibreOffice 5.3. Some security
issues have also been fixed :

- CVE-2017-7870: An out-of-bounds write caused by a
heap-based buffer overflow related to the
tools::Polygon::Insert function.

- CVE-2017-7882: An out-of-bounds write related to the
HWPFile::TagsRead function.

- CVE-2017-8358: an out-of-bounds write caused by a
heap-based buffer overflow related to the ReadJPEG
function.

- CVE-2016-10327: An out-of-bounds write caused by a
heap-based buffer overflow related to the
EnhWMFReader::ReadEnhWMF function.

- CVE-2017-9433: An out-of-bounds write caused by a
heap-based buffer overflow related to the
MsWrd1Parser::readFootnoteCorrespondance function in
libmwaw. A comprehensive list of new features and
changes in this release is available at:
https://wiki.documentfoundation.org/ReleaseNotes/5.3

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/1015115
https://bugzilla.suse.com/1015118
https://bugzilla.suse.com/1015360
https://bugzilla.suse.com/1017925
https://bugzilla.suse.com/1021369
https://bugzilla.suse.com/1021373
https://bugzilla.suse.com/1028817
https://bugzilla.suse.com/1034192
https://bugzilla.suse.com/1034329
https://bugzilla.suse.com/1034568
https://bugzilla.suse.com/1035087
https://bugzilla.suse.com/1036975
https://bugzilla.suse.com/1042828
https://bugzilla.suse.com/948058
https://bugzilla.suse.com/959926
https://bugzilla.suse.com/962777
https://bugzilla.suse.com/963436
https://bugzilla.suse.com/972777
https://bugzilla.suse.com/975283
https://bugzilla.suse.com/976831
https://bugzilla.suse.com/989564
https://wiki.documentfoundation.org/ReleaseNotes/5.3
https://www.suse.com/security/cve/CVE-2015-8947.html
https://www.suse.com/security/cve/CVE-2016-10327.html
https://www.suse.com/security/cve/CVE-2016-2052.html
https://www.suse.com/security/cve/CVE-2017-7870.html
https://www.suse.com/security/cve/CVE-2017-7882.html
https://www.suse.com/security/cve/CVE-2017-8358.html
https://www.suse.com/security/cve/CVE-2017-9433.html
http://www.nessus.org/u?2c2b25f0

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 12-SP2:zypper in -t patch
SUSE-SLE-WE-12-SP2-2017-1125=1

SUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t
patch SUSE-SLE-SDK-12-SP2-2017-1125=1

SUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch
SUSE-SLE-DESKTOP-12-SP2-2017-1125=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 101353 ()

Bugtraq ID:

CVE ID: CVE-2015-8947
CVE-2016-10327
CVE-2016-2052
CVE-2017-7870
CVE-2017-7882
CVE-2017-8358
CVE-2017-9433

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now