Debian LTS: DLA-1297-1: freexl security update
Summary
CVE-2018-7435
There is a heap-based buffer over-read in the freexl::destroy_cell
function.
CVE-2018-7436
There is a heap-based buffer over-read in a pointer dereference of
the parse_SST function.
CVE-2018-7437
There is a heap-based buffer over-read in a memcpy call of the
parse_SST function.
CVE-2018-7438
There is a heap-based buffer over-read in the parse_unicode_string
function.
CVE-2018-7439
There is a heap-based buffer over-read in the function
read_mini_biff_next_record.
For Debian 7 "Wheezy", these problems have been fixed in version
1.0.0b-1+deb7u5.
We recommend that you upgrade your freexl packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS