It is suspected that this package is vulnerable to a security vulnerability in LZO. As such we ask maintainers with packages suspected to be vulnerable to verify if the package is (or have been) affected. Please see the information contained in the tracker bug 515246. "An integer overflow may occur when processing any variant of a "literal run" in the lzo1x_decompress_safe function. Each of these three locations is subject to an integer overflow when processing zero bytes.", additional information about the upstream vulnerability is available at http://seclists.org/oss-sec/2014/q2/665 Reproducible: Didn't try
Patch to unbundle libvncserver is applied in upstream git master. Backported in gentoo in tree + kde overlay. New dependency: >=net-libs/libvncserver-0.9.9 Stable candidate: =kde-base/krfb-4.12.5-r1 Target: amd64 ppc ppc64 x86 + + 31 Jul 2014; Johannes Huber <johu@gentoo.org> + +files/krfb-4.12.5-CVE-2014-4607-unbundle-libvncserver.patch, + +krfb-4.12.5-r1.ebuild, +krfb-4.13.3-r1.ebuild, -krfb-4.13.3.ebuild: + Revision bump unbundles libvncserver, bug #515276. + http://git.overlays.gentoo.org/gitweb/?p=proj/kde.git;a=commit;h=93ea1f0d442364cab3392a99672ff650530abff5 https://projects.kde.org/projects/kde/kdenetwork/krfb/repository/revisions/1c85dc7d85570c9e3a5fcc57572feb04e57fe6db
Waiting on info as to what version of net-libs/libvncserver to stabilize as part of the stabilization.
Arches, please test and mark stable: =kde-base/krfb-4.12.5-r1 Target Keywords : "amd64 ppc ppc64 x86" Also dependency: =net-libs/libvncserver-0.9.9-r1 Target Keywords : "amd64 ppc ppc64 x86" Note: Already stable on "amd64/x86" Thank you!
x86 done, thanks.
ppc stable
ppc64 stable
amd64 stable. Thanks all, cleanup done. Nothing to do for kde herd here anymore, removing from cc. + + 09 Aug 2014; Johannes Huber <johu@gentoo.org> -krfb-4.12.5.ebuild, + krfb-4.12.5-r1.ebuild: + amd64 stable, remove vulnerable version, bug #515276. +
Arches and Maintainer(s), Thank you for your work. Added to the GLSA draft for LZO vulnerabilities.
Adjusted severity from A -> B.