FS#70053 - [libcaca] [lib32-libcaca] [Security] arbitrary code execution (CVE-2021-3410)
Attached to Project:
Arch Linux
Opened by Jonas Witschel (diabonas) - Thursday, 18 March 2021, 11:14 GMT
Last edited by Jan Alexander Steffens (heftig) - Thursday, 18 March 2021, 16:06 GMT
Opened by Jonas Witschel (diabonas) - Thursday, 18 March 2021, 11:14 GMT
Last edited by Jan Alexander Steffens (heftig) - Thursday, 18 March 2021, 16:06 GMT
|
Details
Summary
======= The packages libcaca and lib32-libcaca are vulnerable to arbitrary code execution via CVE-2021-3410. Guidance ======== Applying the two commits 46b4ea7cea72d6b3ffe65d33e604b1774dcc2bbd and e4968ba6e93e9fd35429eb16895c785c51072015 referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-1603 https://bugzilla.redhat.com/show_bug.cgi?id=1931968 https://bugzilla.redhat.com/show_bug.cgi?id=1928437 https://github.com/cacalabs/libcaca/issues/52 https://github.com/cacalabs/libcaca/commit/46b4ea7cea72d6b3ffe65d33e604b1774dcc2bbd https://github.com/cacalabs/libcaca/commit/e4968ba6e93e9fd35429eb16895c785c51072015 |
This task depends upon
Closed by Jan Alexander Steffens (heftig)
Thursday, 18 March 2021, 16:06 GMT
Reason for closing: Fixed
Additional comments about closing: 0.99.beta19-4
Thursday, 18 March 2021, 16:06 GMT
Reason for closing: Fixed
Additional comments about closing: 0.99.beta19-4