Debian Security Advisory
DLA-1297-1 freexl -- LTS security update
- Date Reported:
- 01 Mar 2018
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-7435, CVE-2018-7436, CVE-2018-7437, CVE-2018-7438, CVE-2018-7439.
- More information:
Leon reported five heap-based buffer-overflow vulnerabilities in FreeXL.
There is a heap-based buffer over-read in the freexl::destroy_cell function.
There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.
There is a heap-based buffer over-read in a memcpy call of the parse_SST function.
There is a heap-based buffer over-read in the parse_unicode_string function.
There is a heap-based buffer over-read in the function read_mini_biff_next_record.
For Debian 7
Wheezy, these problems have been fixed in version 1.0.0b-1+deb7u5.
We recommend that you upgrade your freexl packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS