Debian Security Advisory

DLA-1297-1 freexl -- LTS security update

Date Reported:
01 Mar 2018
Affected Packages:
freexl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2018-7435, CVE-2018-7436, CVE-2018-7437, CVE-2018-7438, CVE-2018-7439.
More information:

Leon reported five heap-based buffer-overflow vulnerabilities in FreeXL.

  • CVE-2018-7435

    There is a heap-based buffer over-read in the freexl::destroy_cell function.

  • CVE-2018-7436

    There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.

  • CVE-2018-7437

    There is a heap-based buffer over-read in a memcpy call of the parse_SST function.

  • CVE-2018-7438

    There is a heap-based buffer over-read in the parse_unicode_string function.

  • CVE-2018-7439

    There is a heap-based buffer over-read in the function read_mini_biff_next_record.

For Debian 7 Wheezy, these problems have been fixed in version 1.0.0b-1+deb7u5.

We recommend that you upgrade your freexl packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS