Summary: | app-text/uudeview: Likely vulnerable to same as dev-perl/Convert-UUlib | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kent Fredric (IRC: kent\n) (RETIRED) <kentnl> |
Component: | Auditing | Assignee: | Gentoo Security <security> |
Status: | RESOLVED NEEDINFO | ||
Severity: | normal | CC: | hanno |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: |
https://bugs.gentoo.org/show_bug.cgi?id=724504 https://bugs.gentoo.org/show_bug.cgi?id=724494 |
||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Kent Fredric (IRC: kent\n) (RETIRED)
![]() I am not sure we're actually affected here. The 2019 PoC can be found here: https://bugzilla.redhat.com/show_bug.cgi?id=1711098 It does not trigger any issues in uudeview. For the 2015 one I have not found a reference. 2015 issue: https://rt.cpan.org/Public/Bug/Display.html?id=100960 Have to see how I can check reliably whether uudeview is vulnerable. Having checked these inputs and also done some fuzzing on uudeview I am reasonably confident that it is not vulnerable to any of these. Therefore closing. Please re-open if you can reproduce these issues with any input on uudeview. (In reply to Hanno Böck from comment #3) > Having checked these inputs and also done some fuzzing on uudeview I am > reasonably confident that it is not vulnerable to any of these. > > Therefore closing. Please re-open if you can reproduce these issues with any > input on uudeview. Thanks hanno! |