summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKristian Fiskerstrand <k_f@gentoo.org>2016-02-27 02:49:36 +0100
committerKristian Fiskerstrand <k_f@gentoo.org>2016-02-27 02:49:36 +0100
commita5ed5183d6e8c812946b68051ff77cd946bfafb1 (patch)
treeb25274c5b0ae83522baf6497f953dfadfc056f2e /glsa-201602-03.xml
parentGLSA 201601-05: Add CVEs and versions for bug 567476. (diff)
downloadglsa-a5ed5183d6e8c812946b68051ff77cd946bfafb1.tar.gz
glsa-a5ed5183d6e8c812946b68051ff77cd946bfafb1.tar.bz2
glsa-a5ed5183d6e8c812946b68051ff77cd946bfafb1.zip
Add GLSA 201602-03
Diffstat (limited to 'glsa-201602-03.xml')
-rw-r--r--glsa-201602-03.xml61
1 files changed, 61 insertions, 0 deletions
diff --git a/glsa-201602-03.xml b/glsa-201602-03.xml
new file mode 100644
index 00000000..87744f12
--- /dev/null
+++ b/glsa-201602-03.xml
@@ -0,0 +1,61 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201602-03">
+ <title>libwmf: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in libwmf allowing remote
+ attackers to execute arbitrary code or cause Denial of Service.
+ </synopsis>
+ <product type="ebuild"></product>
+ <announced>February 27, 2016</announced>
+ <revised>February 27, 2016: 1</revised>
+ <bug>551144</bug>
+ <bug>553818</bug>
+ <access>remote</access>
+ <affected>
+ <package name="media-libs/libwmf" auto="yes" arch="*">
+ <unaffected range="ge">0.2.8.4-r6</unaffected>
+ <vulnerable range="lt">0.2.8.4-r6</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libwmf is a library for converting WMF files.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in libwmf. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could possibly execute arbitrary code with the
+ privileges of the process or cause Denial of Service.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known work around at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libwmf users should upgrade to the latest version:
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libwmf-0.2.8.4-r6"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0848">
+ CVE-2015-0848
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4588">
+ CVE-2015-4588
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4695">
+ CVE-2015-4695
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4696">
+ CVE-2015-4696
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="Thu, 25 Feb 2016 06:44:07 +0000">
+ BlueKnight
+ </metadata>
+ <metadata tag="submitter" timestamp="Sat, 27 Feb 2016 01:42:36 +0000">b-man</metadata>
+ </glsa>