|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0225 (ufraw and dcraw)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0225: Updated ufraw & dcraw packages fix CVE-2015-3885
Date:  Wed, 13 May 2015 19:19:22 +0200
Message-ID:  <20150513171922.A3BF243CE9@valstar.mageia.org>

MGASA-2015-0225 - Updated ufraw & dcraw packages fix CVE-2015-3885 Publication date: 13 May 2015 URL: http://advisories.mageia.org/MGASA-2015-0225.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-3885 Description: Updated dcraw and ufraw packages fix security vulnerability: The dcraw tool suffers from an integer overflow condition which lead to a buffer overflow. The vulnerability concerns the 'len' variable, parsed without validation from opened images, used in the ljpeg_start() function. A maliciously crafted raw image file can be used to trigger the vulnerability, causing a Denial of Service condition (CVE-2015-3885). The ufraw package also contains the affected code. The dcraw and ufraw packages have been patched to fix this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=15926 - http://www.ocert.org/advisories/ocert-2015-006.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885 SRPMS: - 4/core/dcraw-9.19-3.1.mga4 - 4/core/ufraw-0.19.2-5.1.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds