Lucene search

K
mageiaGentoo FoundationMGASA-2015-0225
HistoryMay 13, 2015 - 8:18 p.m.

Updated ufraw & dcraw packages fix CVE-2015-3885

2015-05-1320:18:54
Gentoo Foundation
advisories.mageia.org
8

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.048 Low

EPSS

Percentile

92.7%

Updated dcraw and ufraw packages fix security vulnerability: The dcraw tool suffers from an integer overflow condition which lead to a buffer overflow. The vulnerability concerns the ‘len’ variable, parsed without validation from opened images, used in the ljpeg_start() function. A maliciously crafted raw image file can be used to trigger the vulnerability, causing a Denial of Service condition (CVE-2015-3885). The ufraw package also contains the affected code. The dcraw and ufraw packages have been patched to fix this issue.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchdcraw< 9.19-3.1dcraw-9.19-3.1.mga4
Mageia4noarchufraw< 0.19.2-5.1ufraw-0.19.2-5.1.mga4

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.048 Low

EPSS

Percentile

92.7%