{"id":"MGASA-2015-0222","summary":"Updated darktable packages fix CVE-2015-3885","details":"Updated darktable package fixes security vulnerability\n\nThe dcraw tool bundled in darktable's libraw copy suffers from an integer\noverflow condition which leads to a buffer overflow. A maliciously crafted\nraw image file can be used to trigger the vulnerability, causing a Denial\nof Service condition.\n\nThe bundled dcraw code has been patched to fix this vulnerability.\n","modified":"2026-04-16T06:23:20.904207201Z","published":"2015-05-13T17:18:54Z","upstream":["CVE-2015-3885"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0222.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15915"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15910"},{"type":"ADVISORY","url":"http://www.ocert.org/advisories/ocert-2015-006.html"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/05/12/8"}],"affected":[{"package":{"name":"darktable","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/darktable?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.3-4.3.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0222.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}