* CVE-2021-32614 Description: "A flaw was found in dmg2img through 20170502. fill_mishblk() does not check the length of the read buffer, and copy 0xCC bytes from it. The length of the buffer is controlled by an attacker. By providing a length smaller than 0xCC, memcpy reaches out of the malloc'ed bound. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution." https://github.com/Lekensteyn/dmg2img/issues/11 https://bugzilla.redhat.com/show_bug.cgi?id=1959911 * CVE-2021-3548 Description: "A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution." https://github.com/Lekensteyn/dmg2img/issues/9 https://bugzilla.redhat.com/show_bug.cgi?id=1959585
Package list is empty or all packages have requested keywords.
The bug has been closed via the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=78e4b4349883d742b03fbde213c3799185026f1b commit 78e4b4349883d742b03fbde213c3799185026f1b Author: Florian Schmaus <flow@gentoo.org> AuthorDate: 2023-11-08 12:36:18 +0000 Commit: Florian Schmaus <flow@gentoo.org> CommitDate: 2023-11-08 12:36:29 +0000 sys-fs/dmg2img: treeclean Closes: https://bugs.gentoo.org/792336 Signed-off-by: Florian Schmaus <flow@gentoo.org> profiles/package.mask | 6 - sys-fs/dmg2img/Manifest | 1 - sys-fs/dmg2img/dmg2img-1.6.7-r1.ebuild | 40 ---- sys-fs/dmg2img/files/dmg2img-1.6.7-openssl11.patch | 202 --------------------- sys-fs/dmg2img/metadata.xml | 9 - 5 files changed, 258 deletions(-)