openSUSE Security Update : graphite2 (openSUSE-2016-389)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for graphite2 fixes the following issues :

- CVE-2016-1521: The directrun function in
directmachine.cpp in Libgraphite did not validate a
certain skip operation, which allowed remote attackers
to execute arbitrary code, obtain sensitive information,
or cause a denial of service (out-of-bounds read and
application crash) via a crafted Graphite smart font.

- CVE-2016-1523: The SillMap::readFace function in
FeatureMap.cpp in Libgraphite mishandled a return value,
which allowed remote attackers to cause a denial of
service (missing initialization, NULL pointer
dereference, and application crash) via a crafted
Graphite smart font.

- CVE-2016-1526: The TtfUtil:LocaLookup function in
TtfUtil.cpp in Libgraphite incorrectly validated a size
value, which allowed remote attackers to obtain
sensitive information or cause a denial of service
(out-of-bounds read and application crash) via a crafted
Graphite smart font.

This update was imported from the SUSE:SLE-12:Update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=965803
https://bugzilla.opensuse.org/show_bug.cgi?id=965807
https://bugzilla.opensuse.org/show_bug.cgi?id=965810

Solution :

Update the affected graphite2 packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 90167 ()

Bugtraq ID:

CVE ID: CVE-2016-1521
CVE-2016-1523
CVE-2016-1526

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now