On 2015-06-03 17:00, Hubert Chathi wrote:
I have fixed the security issue below for ufraw. The security team has
marked the issue as no-dsa, but has suggested that it be fixed via
jessie-pu. Please let us know whether this update will be allowed. (I
understand that we'll miss the point release
Hi Hubert,
On Mon, Jun 01, 2015 at 01:20:08PM -0400, Hubert Chathi wrote:
> On Mon, 25 May 2015 16:40:00 +0200, Salvatore Bonaccorso
> said:
>
> > the following vulnerability was published for ufraw.
>
> > CVE-2015-3885[0]: | Integer overflow in the ljpeg_start function in
> > dcraw 7.00 and e
On Mon, 25 May 2015, Hubert Chathi wrote:
> the type of len from int to ushort. However, len is only ever set to
>
> len = (data[2] << 8 | data[3]) - 2
>
> and so will always be less than 0x1, so I don't see how len can
> overflow with >= 32-bit ints. I can see how it could cause proble
[Cc:ing other related bugs, to get other maintainers' opinions]
On Mon, 25 May 2015 16:40:00 +0200, Salvatore Bonaccorso
said:
> CVE-2015-3885[0]: | Integer overflow in the ljpeg_start function in
> dcraw 7.00 and earlier | allows remote attackers to cause a denial of
> service (crash) via a |
Source: ufraw
Version: 0.18-1
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for ufraw.
CVE-2015-3885[0]:
| Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier
| allows remote attackers to cause a denial of service (crash) via a
| cra
5 matches
Mail list logo