[Pkg-shotwell-maint] Bug#786788: libraw: CVE-2015-3885: input sanitization flaw leading to buffer overflow

Salvatore Bonaccorso carnil at debian.org
Mon May 25 15:06:34 UTC 2015


Source: libraw
Version: 0.14.6-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for libraw.

CVE-2015-3885[0]:
| Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier
| allows remote attackers to cause a denial of service (crash) via a
| crafted image, which triggers a buffer overflow, related to the len
| variable.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3885
[1] http://www.ocert.org/advisories/ocert-2015-006.html
[2] https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5

This does not warrant a DSA for oldstable and stable, but would be
nice to have fixed as well for those via a
(old)stable-proposed-update.

Regards,
Salvatore



More information about the Pkg-shotwell-maint mailing list