| Summary: | texlive new security issue CVE-2019-19601 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Marc Krämer <mageia> |
| Status: | RESOLVED INVALID | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | jani.valimaa |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7TOO | ||
| Source RPM: | texlive-20190410-10.mga8.src.rpm | CVE: | |
| Status comment: | Patch available from Fedora | ||
|
Description
David Walser
2020-02-20 22:32:42 CET
David Walser
2020-02-20 22:32:53 CET
Whiteboard:
(none) =>
MGA7TOO
David Walser
2020-02-21 17:54:25 CET
Status comment:
(none) =>
Patch available from Fedora Assigning to Marc as the registered maintainer, CC wally as the main recent committer of 'texlive'. Assignee:
bugsquad =>
mageia I don't think we are affected. This is only true if not linked against libkpathsea; but we link against it. Running the testcase does not produce any buffer overflows. I thnik we can close this one. Sometimes our compiler flags can protect us from actually seeing the buffer overflows, but I think that you're right that we're not hitting that codepath. Status:
NEW =>
RESOLVED |