Lucene search

K
gentooGentoo FoundationGLSA-201701-55
HistoryJan 23, 2017 - 12:00 a.m.

DirectFB: Multiple vulnerabilities

2017-01-2300:00:00
Gentoo Foundation
security.gentoo.org
28

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.036 Low

EPSS

Percentile

91.6%

Background

DirectFB (Direct Frame Buffer) is a set of graphics APIs implemented on top of the Linux Frame Buffer (fbdev) abstraction layer.

Description

Multiple vulnerabilities have been discovered in DirectFB. Please review the CVE identifiers referenced below for details.

Impact

Remote attackers could cause a Denial of Service condition or execute arbitrary code via the Voodoo interface.

Workaround

There is no known workaround at this time.

Resolution

All DirectFB users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/DirectFB-1.7.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/directfb< 1.7.5UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.036 Low

EPSS

Percentile

91.6%