Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 617326

Summary: dev-libs/librevenge: Container-overflow in librevenge::RVNGStringStreamPrivate::RVNGStringStreamPrivate
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: normal CC: office
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=962
Whiteboard: A3 [upstream/ebuild]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2017-05-03 12:03:53 UTC
OSS-Fuzz is a Continuous Fuzzing for Open Source Software.

When a bug is found, it is filed on bugs.chromium.org instead of the upstream's bugzilla.
If the bug at $URL is public, that means that the issue has been fixed in the upstream git repository, so when upstream does not add anything useful in that place, you can:
1) Check the range date when ClusterFuzz has detected that the issue has been fixed and dig into upstream git repository;
2) Check if upstream made a new release after the issue has been fixed;
3) Get in touch with upstream.

See $URL for more details about the issue.

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2017-05-03 19:05:26 UTC
1) the linked commit is not in librevenge
2) the linked commit does not refer to this problem at all

Please add more info, otherwise this is a waste of time.