An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a pointer dereference of the parse_SST function. An attacker can send a malicious crafted xls file to trigger this vulnerability. References: https://bugzilla.redhat.com/show_bug.cgi?id=1547883
All 5 issues (CVE-2018-7435 - CVE-2018-7439) were fixed upstream in version 1.0.5: https://groups.google.com/forum/#%21topic/spatialite-users/b-d9iB5TDPE Upstream commits (not split by CVE): https://www.gaia-gis.it/fossil/freexl/info/1f00f424a24b355e https://www.gaia-gis.it/fossil/freexl/info/97c9f43cea4fcd54
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-7436