Debian Bug report logs -
#1031790
libraw: CVE-2021-32142
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
:
Bug#1031790
; Package src:libraw
.
(Wed, 22 Feb 2023 19:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
.
(Wed, 22 Feb 2023 19:57:03 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: libraw
Version: 0.20.2-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/LibRaw/LibRaw/issues/400
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: fixed -1 0.21.1-1
Hi,
The following vulnerability was published for libraw. The wording for
the CVE description from the feed is disputable, believe this should
be at most DoS.
CVE-2021-32142[0]:
| Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows
| attacker to escalate privileges via the
| LibRaw_buffer_datastream::gets(char*, int) in
| /src/libraw/src/libraw_datastream.cpp.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2021-32142
https://www.cve.org/CVERecord?id=CVE-2021-32142
[1] https://github.com/LibRaw/LibRaw/issues/400
[2] https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Marked as fixed in versions libraw/0.21.1-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org
.
(Wed, 22 Feb 2023 19:57:04 GMT) (full text, mbox, link).
Marked as found in versions libraw/0.20.2-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Wed, 22 Feb 2023 20:21:02 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
:
Bug#1031790
; Package src:libraw
.
(Wed, 22 Feb 2023 21:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to David Bremner <david@tethera.net>
:
Extra info received and forwarded to list. Copy sent to Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
.
(Wed, 22 Feb 2023 21:03:03 GMT) (full text, mbox, link).
Message #14 received at 1031790@bugs.debian.org (full text, mbox, reply):
Salvatore Bonaccorso <carnil@debian.org> writes:
> Source: libraw
> Version: 0.20.2-2
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/LibRaw/LibRaw/issues/400
> X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
> Control: fixed -1 0.21.1-1
>
> Hi,
>
> The following vulnerability was published for libraw. The wording for
> the CVE description from the feed is disputable, believe this should
> be at most DoS.
For (naughty) packages that embed libraw, is this worth
1) Trying to squeeze in a minor version update
2) waiting for stable update?
3) not worrying about for bookworm?
I know the answer is probably "it depends", just looking for feedback
and-or what other maintainers are planning on doing.
d
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Thu Feb 23 13:07:11 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.