https://bugzilla.redhat.com/show_bug.cgi?id=2235275
Bug ID: 2235275 Summary: CVE-2020-22628 LibRaw-epel: libraw: Out of bounds read in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp [epel-all] Product: Fedora EPEL Version: epel8 Status: NEW Component: LibRaw-epel Keywords: Security, SecurityTracking Severity: medium Priority: medium Assignee: ngompa13@gmail.com Reporter: trathi@redhat.com CC: epel-packagers-sig@lists.fedoraproject.org, michel@michel-slm.name, ngompa13@gmail.com Target Milestone: --- Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2234992
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
https://bugzilla.redhat.com/show_bug.cgi?id=2235275
--- Comment #1 from TEJ RATHI trathi@redhat.com --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable.
=====
# bugfix, security, enhancement, newpackage (required) type=security
# low, medium, high, urgent (required) severity=medium
# testing, stable request=testing
# Bug numbers: 1234,9876 bugs=2234992,2235275
# Description of your update notes=Security fix for [PUT CVEs HERE]
# Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3
# Automatically close bugs when this marked as stable close_bugs=True
# Suggest that users restart after update suggest_reboot=False
======
Additionally, you may opt to use the bodhi web interface to submit updates:
https://bodhi.fedoraproject.org/updates/new
https://bugzilla.redhat.com/show_bug.cgi?id=2235275
TEJ RATHI trathi@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2234992 (CVE-2020-22628)
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2234992 [Bug 2234992] CVE-2020-22628 libraw: Out of bounds read in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp
https://bugzilla.redhat.com/show_bug.cgi?id=2235275
--- Comment #2 from Michel Lind michel@michel-slm.name --- Looks like LibRaw-0.19.5 in epel8 is affected, however we can't fix it until c8s' version is fixed as this just provides missing subpackages
Note however that the EPEL 9 branch is currently lagging behind c9s and needs to be updated
https://bugzilla.redhat.com/show_bug.cgi?id=2235275
Michel Lind michel@michel-slm.name changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Issue Tracker | |RHEL-12500
epel-packagers-sig@lists.fedoraproject.org