[Bug 1021517] New: VUL-0: CVE-2016-8710: libbpg: Image Decoding Code Execution [TALOS-2016-0223]
http://bugzilla.opensuse.org/show_bug.cgi?id=1021517 Bug ID: 1021517 Summary: VUL-0: CVE-2016-8710: libbpg: Image Decoding Code Execution [TALOS-2016-0223] Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: mikhail.kasimov@gmail.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Refs: ================================================================================= [1] http://blog.talosintel.com/2017/01/vulnerability-spotlight-libbpg-image.html (Vulnerability Spotlight - LibBPG Image Decoding Code Execution) [2] http://www.talosintelligence.com/reports/TALOS-2016-0223/ (Libbpg BGP image decoding Code Execution Vulnerability) ================================================================================= [1] Known vulnerable versions: Libbpg - 0.9.4 and 0.9.7 https://software.opensuse.org/package/libbpg -- TW, 42.1|2, 13.2: 0.9.7. BPG Specification: http://bellard.org/bpg/bpg_spec.txt [2] Technical details (Crash Information chapter) and patch info (Mitigation chapter). In particular, pay, please, attention here on phrase -- "The following patch will fix the vulnerability, but it is untested as to whether it breaks any legitimate images." -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1021517 Mikhail Kasimov <mikhail.kasimov@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Alias| |CVE-2016-8710 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1021517 Andreas Stieger <astieger@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |astieger@suse.com Component|Security |3rd party software Version|Leap 42.2 |unspecified Product|openSUSE Distribution |openSUSE.org Summary|CVE-2016-8710: libbpg: |VUL-0: CVE-2016-8710: |Image Decoding Code |libbpg: Image Decoding Code |Execution [TALOS-2016-0223] |Execution [TALOS-2016-0223] QA Contact|qa-bugs@suse.de |opensuse-communityscreening | |@forge.provo.novell.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1021517 http://bugzilla.opensuse.org/show_bug.cgi?id=1021517#c5 --- Comment #5 from Luigi Baldoni <aloisio@gmx.com> --- Update: the author writes that he's not going to address the problem for the time being. Secondly, the patch itself appears to be a backport from the official libavcodec, but once applied, libbpg doesn't build anymore. If the reporter or anyone else wishes to give it a try, they're very welcome to. Regards -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1021517 http://bugzilla.opensuse.org/show_bug.cgi?id=1021517#c6 Luigi Baldoni <aloisio@gmx.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX --- Comment #6 from Luigi Baldoni <aloisio@gmx.com> --- WONTFIX -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com