Exempi through version 2.4.5 is vulnerable to a NULL pointer dereference in the WEBP_Support.hpp:WEBP::GetLE32() function. An attacker could exploit this to cause a denial of service via a crafted file. Gentoo Security Scout Florian Schuhmacher
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=73a84757832eef175ea2b082378277d546c8accc commit 73a84757832eef175ea2b082378277d546c8accc Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2018-09-30 16:46:58 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2018-09-30 16:46:58 +0000 media-libs/exempi: Fix CVE-2018-12648 Bug: https://bugs.gentoo.org/659038 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> Package-Manager: Portage-2.3.50, Repoman-2.3.11 media-libs/exempi/exempi-2.4.5-r1.ebuild | 58 ++++++++++++++++++++++ .../exempi/files/exempi-2.4.5-CVE-2018-12648.patch | 42 ++++++++++++++++ 2 files changed, 100 insertions(+)
x86 stable
Stable on alpha.
sparc done.
amd64 stable
ppc/ppc64 stable
No arm, hppa, ia64 revdeps, removing from stable list.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5b7205c0084397703a7865bd397d64243347403b commit 5b7205c0084397703a7865bd397d64243347403b Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2018-10-06 19:47:32 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2018-10-06 20:45:02 +0000 media-libs/exempi: Security cleanup Bug: https://bugs.gentoo.org/659038 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> Package-Manager: Portage-2.3.50, Repoman-2.3.11 media-libs/exempi/exempi-2.4.5.ebuild | 52 ----------------------------------- 1 file changed, 52 deletions(-)