---------- Forwarded Message ---------- Subject: Bug#786785: exactimage: CVE-2015-3885: input sanitization flaw leading to buffer overflow Date: Monday 25 May 2015, 17:00:43 From: Salvatore Bonaccorso <[email protected]> To: [email protected]
Source: exactimage Version: 0.8.5-1 Severity: important Tags: security upstream Hi, the following vulnerability was published for exactimage. CVE-2015-3885[0]: | Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier | allows remote attackers to cause a denial of service (crash) via a | crafted image, which triggers a buffer overflow, related to the len | variable. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2015-3885 [1] http://www.ocert.org/advisories/ocert-2015-006.html Regards, Salvatore -----------------------------------------
signature.asc
Description: This is a digitally signed message part.
----------------------------------------------------------- If you wish to unsubscribe from this mailing, send mail to [email protected] with a subject of: unsubscribe exact-image
