Source: xcftools
Version: 1.0.7-6
Severity: important
Tags: security upstream

Hi,

The following vulnerabilities were published for xcftools.

CVE-2019-5086[0]:
| An exploitable integer overflow vulnerability exists in the
| flattenIncrementally function in the xcf2png and xcf2pnm binaries of
| xcftools, version 1.0.7. An integer overflow can occur while walking
| through tiles that could be exploited to corrupt memory and execute
| arbitrary code. In order to trigger this vulnerability, a victim would
| need to open a specially crafted XCF file.


CVE-2019-5087[1]:
| An exploitable integer overflow vulnerability exists in the
| flattenIncrementally function in the xcf2png and xcf2pnm binaries of
| xcftools 1.0.7. An integer overflow can occur while calculating the
| row's allocation size, that could be exploited to corrupt memory and
| eventually execute arbitrary code. In order to trigger this
| vulnerability, a victim would need to open a specially crafted XCF
| file.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-5086
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5086
[1] https://security-tracker.debian.org/tracker/CVE-2019-5087
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5087

Please adjust the affected versions in the BTS as needed.

Is xcftools still maintained (upstream)?

Regards,
Salvatore

Reply via email to