From ${URL} : In wallpaper.c in feh before v2.18.3, if a malicious client pretends to be the E17 window manager, it is possible to trigger an out-of-boundary heap write while receiving an IPC message. An integer overflow leads to a buffer overflow and/or a double free. Upstream patch: https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d References: https://feh.finalrewind.org/archive/2.18.3/ @maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
Feel free to start stabilization.
Arches, please test and mark stable: =media-gfx/feh-2.18.3 Target Keywords : "amd64 ppc ppc64 x86" Thank you!
amd64 stable
ppc stable
ppc64 stable
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Maintainer(s), Thank you for your work. New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s).
(In reply to Yury German from comment #7) > Maintainer(s), please drop the vulnerable version(s). done.
This issue was resolved and addressed in GLSA 201707-08 at https://security.gentoo.org/glsa/201707-08 by GLSA coordinator Thomas Deutschmann (whissi).