[Cc:ing other related bugs, to get other maintainers' opinions]

On Mon, 25 May 2015 16:40:00 +0200, Salvatore Bonaccorso <car...@debian.org> 
said:

> CVE-2015-3885[0]: | Integer overflow in the ljpeg_start function in
> dcraw 7.00 and earlier | allows remote attackers to cause a denial of
> service (crash) via a | crafted image, which triggers a buffer
> overflow, related to the len | variable.

The patch from rawstudio and libraw is easy enough to port over, being a
one-line change, but I'd like a second opinion.  The patch just changes
the type of len from int to ushort.  However, len is only ever set to

    len = (data[2] << 8 | data[3]) - 2

and so will always be less than 0x10000, so I don't see how len can
overflow with >= 32-bit ints.  I can see how it could cause problems
with a signed 16-bit int, but unless I'm missing something, it shouldn't
affect Debian in any way, since all our arch's are >= 32-bits.

Is that correct, or is my assessment wrong?

-- 
Hubert Chathi <uho...@debian.org> -- Jabber: hub...@uhoreg.ca
PGP/GnuPG key: 1024D/124B61FA         http://www.uhoreg.ca/
Fingerprint: 96C5 012F 5F74 A5F7 1FF7  5291 AF29 C719 124B 61FA


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to