From ${URL} : An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability. External References: http://www.talosintelligence.com/reports/TALOS-2016-0189/ Upstream patches: http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.17&r2=1.18 http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.18&r2=1.19 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
commit 19aae64ac3dfc8945dbf9c4edccd835778f81c1d Author: David Seifert <soap@gentoo.org> Date: Sat Jan 21 21:01:22 2017 +0100 media-libs/freeimage: Add patches for CVE-2015-0852 and CVE-2016-5684 Gentoo-bug: 559006, 596350 * EAPI=6 * Make patches -p1 compliant
@ Arches, please test and mark stable: =media-libs/freeimage-3.15.4-r1
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
commit fd7524a9b5584c1fa2d8fa0ed209c217bc0dffc7 Author: David Seifert <soap@gentoo.org> Date: Sun Jan 22 16:38:32 2017 +0100 media-libs/freeimage: Remove old Gentoo-bug: 559006, 596350
GLSA request filed.
This issue was resolved and addressed in GLSA 201701-68 at https://security.gentoo.org/glsa/201701-68 by GLSA coordinator Thomas Deutschmann (whissi).