Summary: | <media-gfx/autotrace-0.31.1-r7: stack-based buffer overflow in bmp parser (CVE-2013-1953) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | fonts, graphics+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/04/16/1 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() CVE-2013-1953 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1953): Integer underflow in the input_bmp_reader function in input-bmp.c in AutoTrace 0.31.1 allows context-dependent attackers to cause have an unspecified impact via a small value in the biSize field in the header of a BMP file, which triggers a buffer overflow. Upstream Patch: https://github.com/PhantomX/slackbuilds/blob/master/autotrace/patches/autotrace-0.31.1-CVE-2013-1953.patch and Redhat's: https://bugzilla.redhat.com/attachment.cgi?id=766451 . Please patch and request stabilization in this bug when ready. test <br /> comment. Patch added and package revbumped: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b6d1c95e6a0a3ea6ae4d8b397845120e23e0f67b Minor patch so calling for stabilization: @arches, please stabilize: =media-gfx/autotrace-0.31.1-r7 amd64 stable x86 stable Stable for HPPA. Stable for PPC64. Stable on alpha. ppc stable sparc stable ia64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. (In reply to Agostino Sarubbo from comment #12) > Maintainer(s), please cleanup. > Security, please add it to the existing request, or file a new one. done. No PoC on ACE or privilege escalation. Lowering severity. Tree is clean. GLSA Vote: No |