Bug 1732221 (CVE-2019-1010228)
Summary: | CVE-2019-1010228 DCMTK: buffer overflow in DcmRLEDecoder::decompress() leads to possible code execution and denial of service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED UPSTREAM | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | igor.raits, neuro-sig, sanjay.ankur |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | DCMTK 3.6.4 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-23 09:06:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1732222 | ||
Bug Blocks: |
Description
Dhananjay Arunesh
2019-07-23 04:37:30 UTC
Created dcmtk tracking bugs for this issue: Affects: fedora-all [bug 1732222] This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products. Hi, So is this bug closed now? Is there anything we maintainers need to do? The blocking bug is still open? Cheers, Ankur |