I checked in the fix for this in commit 435a2ca (
https://github.com/sshock/AFFLIBv3/commit/435a2ca). (Sorry I didn't have a
CVE id yet so that was not included in the commit comment.)
What needs to happen now? Do I need to do anything or can you guys take it
On Sun, Mar 11, 2018 at 3:40 AM, Salvatore Bonaccorso <car...@debian.org>
> Source: afflib
> Version: 3.7.5-1
> Severity: important
> Tags: patch security upstream
> the following vulnerability was published for afflib.
> | The af_get_page() function in lib/afflib_pages.cpp in AFFLIB (aka
> | AFFLIBv3) through 3.7.16 allows remote attackers to cause a denial of
> | service (segmentation fault) via a corrupt AFF image that triggers an
> | unexpected pagesize value.
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> For further information see:
>  https://security-tracker.debian.org/tracker/CVE-2018-8050
>  https://github.com/sshock/AFFLIBv3/commit/
> Please adjust the affected versions in the BTS as needed.
forensics-devel mailing list