You are here
Home > Preporuke > Ranjivost programske biblioteke libfpx

Ranjivost programske biblioteke libfpx

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201605-03
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: libfpx: Denial of Service
Date: May 30, 2016
Bugs: #395367
ID: 201605-03

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

A double free vulnerability has been discovered in libfpx that allows
remote attackers to cause a Denial of Service.

Background
==========

A library for manipulating FlashPIX images.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 media-libs/libfpx < 1.3.1_p6 >= 1.3.1_p6

Description
===========

A double free vulnerability has been discovered in the Free_All_Memory
function in jpeg/dectile.c.

Impact
======

A remote attacker could entice a user to open a specially crafted FPX
image using an application linked against libfpx, possibly resulting in
a Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All libfpx users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=media-libs/libfpx-1.3.1_p6”

Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.

References
==========

[ 1 ] CVE-2012-0025
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0025

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201605-03

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–

iQEcBAEBCAAGBQJXTIXUAAoJEDkRiObnjK1y5iEH/iEvAe+34XWkDefBC8ScJ7hB
YTcw10e4FR+6+cXU/8OFCqJHTfi38L2EeI5sXgFjiZ72TcyxffZyrfmoZpiGyAej
jg29/RvXTQm30LYWkK8qrdzwO2VQAOLPkNX9co9U8BvGrkOFJxUxUKz2hQ2hSIvW
nWnBh+FfVyKCRHjodSC8SZwCs9MzRw+EJABOBWCv4OV5zuDRp5ZDGo1SGIFRm8xP
paJi3ly8f1qkPr17QBAGCekRM8uqJesTlwolYVI5zV95bNIF/yQWB86FIR3WCw73
ekGLmcj5uubkLJHJ0BvzO6VWJCQF8QCstqTd8/84XMXDMvF22J9WdS2D4k/1MnM=
=gFxZ
—–END PGP SIGNATURE—–

Top
More in Preporuke
Ranjivosti programskog paketa gdk-pixbuf

Otkrivene su dvije ranjivosti u programskom paketu gdk-pixbuf za Debian. Ranjivosti su posljedica prekoračenja spremnika gomile u funkciji gdk_pixbuf_flip function...

Close