Summary: | <media-libs/libraw-0.18.4: heap-based Buffer Overflow via a crafted file | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Aleksandr Wagner (Kivak) <alwag> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | graphics+disabled |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/LibRaw/LibRaw/issues/100 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
=media-libs/libraw-0.18.4
|
Runtime testing required: | --- |
Bug Depends on: | |||
Bug Blocks: | 629280 |
Description
Aleksandr Wagner (Kivak)
2017-09-12 20:05:50 UTC
Fixed in 0.18.4 now in the tree, feel free to start stabilization. @Maintainer please confirm if SLOT 0/15 is vulnerable. @Arches please test and mark stable. @Security please add cve to database. Gentoo Security Padawan ChrisADR ia64 stable Stable on alpha. hppa stable arm stable ppc stable amd64 stable x86 stable Re-adding ppc64: Ebuild isn't marked stable for ppc64. Must have mixed ppc/ppc64. Thanks for catching that! ppc64 stable sparc stable (thanks to Rolf Eike Beer) Stabilization has been complete, thank you arches. @Maintainer(s): Please remove the vulnerable versions from the tree. Old versions removed. GLSA Vote: No |