From ${URL} : Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value. Upstream patch: https://github.com/aquynh/capstone/commit/6fe86eef621b9849f51a5e1e5d73258a93440403 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2017-6952 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6952): Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value.
The report looks a bit odd: - it's a vulnerability in windows kernel driver. Not something you can easily build in gentoo today as it requires MSVS to build a driver - the windows code was added in capstone-3.0.5-rc1. It's not present in 3.0.4 in gentoo at all
To ease CVE tracking of newer versions I've bumped up to vulnerable version and applied upstream patch and removed old 3.0.4 version as: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=83209f33a128ec7f48adbfad813cfbc13a2fd444 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=02d2f9e91bd5ee4d821aeab31a342760f341a738
Whiteboard was categorized incorrectly, corrected (Package was not stable). Sergei, thank you for taking the initiative. I am closing the bug noglsa