libwmf was updated to fix four security issues.
These security issues were fixed: - CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109). - CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109). - CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062). - CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
{ "binaries": [ { "libwmf": "0.2.8.4-206.29.29.1", "libwmf-devel": "0.2.8.4-206.29.29.1", "libwmf-32bit": "0.2.8.4-206.29.29.1", "libwmf-gnome": "0.2.8.4-206.29.29.1", "libwmf-gnome-32bit": "0.2.8.4-206.29.29.1", "libwmf-gnome-x86": "0.2.8.4-206.29.29.1", "libwmf-x86": "0.2.8.4-206.29.29.1" } ] }
{ "binaries": [ { "libwmf": "0.2.8.4-206.29.29.1", "libwmf-devel": "0.2.8.4-206.29.29.1", "libwmf-32bit": "0.2.8.4-206.29.29.1", "libwmf-gnome": "0.2.8.4-206.29.29.1", "libwmf-gnome-32bit": "0.2.8.4-206.29.29.1", "libwmf-gnome-x86": "0.2.8.4-206.29.29.1", "libwmf-x86": "0.2.8.4-206.29.29.1" } ] }