Mageia alert MGASA-2015-0224 (libraw)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2015-0224: Updated libraw packages fix CVE-2015-3885 | |
Date: | Wed, 13 May 2015 19:19:21 +0200 | |
Message-ID: | <20150513171921.9135F43CE9@valstar.mageia.org> |
MGASA-2015-0224 - Updated libraw packages fix CVE-2015-3885 Publication date: 13 May 2015 URL: http://advisories.mageia.org/MGASA-2015-0224.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-3885 Description: Updated libraw packages fix security vulnerability: The dcraw tool suffers from an integer overflow condition which lead to a buffer overflow. The vulnerability concerns the 'len' variable, parsed without validation from opened images, used in the ljpeg_start() function. A maliciously crafted raw image file can be used to trigger the vulnerability, causing a Denial of Service condition (CVE-2015-3885). LibRaw contains a bundled copy of the affected code. The libraw package has been patched to fix this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=15925 - http://www.ocert.org/advisories/ocert-2015-006.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885 SRPMS: - 4/core/libraw-0.15.4-2.1.mga4