SUSE 5047 Published by

A libredwg security update has been released for SUSE Linux Enterprise 15 SP5.

openSUSE-SU-2023:0201-1: important: Security update for libredwg

openSUSE Security Update: Security update for libredwg

Announcement ID: openSUSE-SU-2023:0201-1
Rating: important
References: #1200898 #1212705 #1212706 #1212707 #1212709

Cross-References: CVE-2022-33025 CVE-2023-36271 CVE-2023-36272
CVE-2023-36273 CVE-2023-36274
CVSS scores:
CVE-2022-33025 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-36271 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-36272 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-36273 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-36274 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
openSUSE Backports SLE-15-SP5

An update that fixes 5 vulnerabilities is now available.


This update for libredwg fixes the following issues:

Update to version

Security issues fixed:

* CVE-2022-33025: Fixed multiple security issues [boo#1200898]
* CVE-2023-36271: Fixed heap buffer overflow via the function bit_wcs2nlen
* CVE-2023-36272: Fixed heap buffer overflow via the function
bit_utf8_to_TU [boo#1212707]
* CVE-2023-36273: Fixed heap buffer overflow via the function bit_calc_CRC
* CVE-2023-36274: Fixed heap buffer overflow via the function bit_write_TF

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP5:

zypper in -t patch openSUSE-2023-201=1

Package List:

- openSUSE Backports SLE-15-SP5 (aarch64 i586 x86_64):