Lucene search

K
mageiaGentoo FoundationMGASA-2015-0224
HistoryMay 13, 2015 - 8:18 p.m.

Updated libraw packages fix CVE-2015-3885

2015-05-1320:18:54
Gentoo Foundation
advisories.mageia.org
9

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.048 Low

EPSS

Percentile

92.7%

Updated libraw packages fix security vulnerability: The dcraw tool suffers from an integer overflow condition which lead to a buffer overflow. The vulnerability concerns the ‘len’ variable, parsed without validation from opened images, used in the ljpeg_start() function. A maliciously crafted raw image file can be used to trigger the vulnerability, causing a Denial of Service condition (CVE-2015-3885). LibRaw contains a bundled copy of the affected code. The libraw package has been patched to fix this issue.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchlibraw< 0.15.4-2.1libraw-0.15.4-2.1.mga4

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.048 Low

EPSS

Percentile

92.7%