{"id":"MGASA-2015-0225","summary":"Updated ufraw & dcraw packages fix CVE-2015-3885","details":"Updated dcraw and ufraw packages fix security vulnerability:\n\nThe dcraw tool suffers from an integer overflow condition which lead to a\nbuffer overflow. The vulnerability concerns the 'len' variable, parsed without\nvalidation from opened images, used in the ljpeg_start() function. A\nmaliciously crafted raw image file can be used to trigger the vulnerability,\ncausing a Denial of Service condition (CVE-2015-3885).\n\nThe ufraw package also contains the affected code.  The dcraw and ufraw\npackages have been patched to fix this issue.\n","modified":"2026-04-16T01:46:39.581355821Z","published":"2015-05-13T17:18:54Z","upstream":["CVE-2015-3885"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0225.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15926"},{"type":"ADVISORY","url":"http://www.ocert.org/advisories/ocert-2015-006.html"}],"affected":[{"package":{"name":"dcraw","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/dcraw?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.19-3.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0225.json"}},{"package":{"name":"ufraw","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/ufraw?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.19.2-5.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0225.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}