stable

dcmtk-3.6.4-11.el8

FEDORA-EPEL-2023-40e1d58afe created by carlwgeorge 6 months ago for Fedora EPEL 8

This update contains several high and critical security fixes.

  • CVE-2021-41687/CVE-2021-41688/CVE-2021-41690
  • CVE-2021-41689
  • CVE-2022-2119/CVE-2022-2120/CVE-2022-2121
  • CVE-2022-43272

It also switches to use bundled charls v1 to match the behavior in Fedora.

This update has been submitted for testing by carlwgeorge.

6 months ago

This update's test gating status has been changed to 'ignored'.

6 months ago

This update has been pushed to testing.

6 months ago

This update has been submitted for stable by bodhi.

6 months ago

This update has been pushed to stable.

6 months ago

Please login to add feedback.

Metadata
Type
security
Severity
urgent
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
6 months ago
in testing
6 months ago
in stable
6 months ago
approved
6 months ago
BZ#2106315 CVE-2021-41688 dcmtk: a double free allows for a DoS [epel-all]
0
0
BZ#2106332 CVE-2021-41690 dcmtk: sending specific requests to the dcmqrdb program can incur a memory leak [epel-all]
0
0
BZ#2106336 CVE-2021-41687 dcmtk: a memory leak allows a DoS [epel-all]
0
0
BZ#2106340 CVE-2021-41689 dcmtk: a head-based overflow may lead to DoS [epel-all]
0
0
BZ#2150931 CVE-2022-43272 dcmtk: memory leak via the T_ASC_Association object. [epel-all]
0
0
BZ#2173039 CVE-2022-2119 dcmtk: path traversal [epel-all]
0
0
BZ#2173042 CVE-2022-2120 dcmtk: relative path traversal [epel-all]
0
0
BZ#2173045 CVE-2022-2121 dcmtk: NULL pointer dereference that could lead to a DoS [epel-all]
0
0

Automated Test Results