| Summary: | libheif new security issue CVE-2023-0996 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, smelror, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | libheif-1.10.0-1.1.mga8.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2023-04-06 19:00:58 CEST
David Walser
2023-04-06 19:01:40 CEST
Whiteboard:
(none) =>
MGA8TOO Stig looks after libheif, so assigning this to you. Assignee:
bugsquad =>
smelror This fix was merged in January and version 1.15.2 was published in March. Hence Cauldron is not affected. Will push an update for MGA8 an a backported fix. Whiteboard:
MGA8TOO =>
(none) Advisory ======== An upstream patch has been backported to fix CVE-2023-0996. CVE-2023-0996: There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call. References ========== https://lists.suse.com/pipermail/sle-security-updates/2023-April/014381.html https://bugzilla.suse.com/show_bug.cgi?id=1208640 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0996 Files ===== Uploaded to core/updates_testing lib64heif-devel-1.10.0-1.2.mga8 libheif-1.10.0-1.2.mga8 lib64heif1-1.10.0-1.2.mga8 Uploaded to tainted/updates_testing lib64heif-devel-1.10.0-1.2.mga8.tainted libheif-1.10.0-1.2.mga8.tainted lib64heif1-1.10.0-1.2.mga8.tainted from libheif-1.10.0-1.2.mga8.src.rpm Assignee:
smelror =>
qa-bugs
David Walser
2023-04-10 14:32:22 CEST
Status comment:
Patch available from upstream =>
(none) No installation issues. Updated the core packages in a VirtualBox "untainted" mga8-64 Plasma guest, after which I was able to load and display a sample heif image, but was not allowed to export into that format. Looks OK there. Updated the tainted packages in another VirtualBox guest. Loaded the same image as above into Gimp, but this time was able to export it to a different folder in the same format. Ok there, too. Validating. Advisory in comment 3. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Dave Hodgins
2023-04-15 18:29:46 CEST
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0144.html Status:
NEW =>
RESOLVED |