|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0224 (libraw)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0224: Updated libraw packages fix CVE-2015-3885
Date:  Wed, 13 May 2015 19:19:21 +0200
Message-ID:  <20150513171921.9135F43CE9@valstar.mageia.org>

MGASA-2015-0224 - Updated libraw packages fix CVE-2015-3885 Publication date: 13 May 2015 URL: http://advisories.mageia.org/MGASA-2015-0224.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-3885 Description: Updated libraw packages fix security vulnerability: The dcraw tool suffers from an integer overflow condition which lead to a buffer overflow. The vulnerability concerns the 'len' variable, parsed without validation from opened images, used in the ljpeg_start() function. A maliciously crafted raw image file can be used to trigger the vulnerability, causing a Denial of Service condition (CVE-2015-3885). LibRaw contains a bundled copy of the affected code. The libraw package has been patched to fix this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=15925 - http://www.ocert.org/advisories/ocert-2015-006.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885 SRPMS: - 4/core/libraw-0.15.4-2.1.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds