cve-2005-3582
Vulnerability from cvelistv5
Published
2005-11-16 07:37
Modified
2024-08-07 23:17
Severity ?
Summary
ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:17:23.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17427",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17427/"
          },
          {
            "name": "GLSA-200511-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml"
          },
          {
            "name": "ADV-2005-2281",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2281"
          },
          {
            "name": "20528",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20528"
          },
          {
            "name": "15120",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15120"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-12-20T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17427",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17427/"
        },
        {
          "name": "GLSA-200511-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml"
        },
        {
          "name": "ADV-2005-2281",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2281"
        },
        {
          "name": "20528",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20528"
        },
        {
          "name": "15120",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15120"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3582",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17427",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17427/"
            },
            {
              "name": "GLSA-200511-02",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml"
            },
            {
              "name": "ADV-2005-2281",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2281"
            },
            {
              "name": "20528",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20528"
            },
            {
              "name": "15120",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15120"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3582",
    "datePublished": "2005-11-16T07:37:00",
    "dateReserved": "2005-11-16T00:00:00",
    "dateUpdated": "2024-08-07T23:17:23.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-3582\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-11-16T07:42:00.000\",\"lastModified\":\"2011-03-08T02:26:48.580\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not vulnerable.  This issue is caused by the way ImageMagick was packaged by Gentoo and does not affect Red Hat Enterprise Linux packages.\",\"lastModified\":\"2006-08-16T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:4.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6453D6A0-DF88-4850-B5EC-26D3459783E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:4.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5249DA0D-1580-4209-BF96-619A2E476BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5102CCA1-31F6-4CCE-BAF9-C7D30FDD24E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72AA00DF-D99F-4C77-9466-44ECB7411584\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99ECD9C7-3E03-4D52-B6C9-BF702208C228\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7AAE3F-5E24-4688-B00B-B5C8A0021877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01173B1A-AA23-476D-A3F9-6B5728E6A273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D83FADC-4C7F-4C16-BBAA-9883D7449744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46159EE9-4059-436B-9C6B-41C059827204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76BD93B-D3AA-4BDF-99DA-ED9485FA7246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D654459-4B94-4339-A037-29734BFD6774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DB259A-4F68-411B-9990-F4D01DF2F82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0BC01FE-874F-42BC-8D81-40A288317640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0751A64A-3668-469D-A984-FA1F06BC1D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"982B2F93-71E9-4261-906E-7A466B22D3ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB06B25-300F-4B91-86B5-CF0FF9C01982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2563ABE-D1C3-4AB8-BC41-8029E358C2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CBAAEC-AF7B-4375-B1C5-617EF6692DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6534A963-C0A7-47D6-8E1B-B8D0F3933428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4234EA44-0B0A-461A-97AD-2C18E3B5C25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D46680-F10C-436E-B949-366921E4AE59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC49C98-950B-4646-969B-3C10037EA00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D688BCB-7B72-4546-BA3C-44B9157FCD9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBBC9032-497C-4B24-9B90-7A3374668C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAEBFAC-52E9-4BD4-BAA9-2007095EB260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E5FC41E-5E0E-4357-AE31-EF9742A155B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F108FC3C-FE51-450E-BB70-93C29B874EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C698D6A2-17AD-4898-AA87-5FDC78B9ED4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2CBD232-B9CD-4EF1-A090-535E713EAAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02E4063-E2B2-4EC5-9864-D2FB3E73F574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF74EDCA-F81A-423A-AEA2-833039400309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCF62FDF-E55E-4B1E-8D84-73C44992FD9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7q8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B358AFB2-347E-4FEC-B1B1-BA1AF49961F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7q16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F03436CB-798E-4196-B5BA-A23149034570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A27CAC75-BFE8-4865-A6AE-20225BFCDBA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6FF60EE-CFFA-43AD-AA46-004EBBFF3765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B851A570-B5D4-4562-8FD2-3211E6A6C19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882E6544-A384-41C8-BEFA-62771D72906A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6741F75-E6B1-4FCE-9C57-C912816C7F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6E66D8-BEC4-4E0D-BAAE-979618405C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED8AE39C-9F96-43AB-843E-42B931154B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F91C63C5-765B-4511-B6CF-CA09433DE051\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8DB31B-68ED-4538-B2F4-6A9188B2969D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E48A747E-27D5-4275-ACB9-E978AB383D7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD85045-0175-4270-9EC4-01236158A71B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12378D7-6A7E-4636-9551-C224907A3219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4464D0E1-BAA9-479F-814A-17DE99BE7D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4644A7F5-57D9-4558-A1AA-D55516FD56B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505A3675-8DA4-4AFD-9A56-13A95B1D0174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338F37B1-0A4C-4600-88FE-F86A020A1239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE671263-8471-4ED5-A836-B7F7D64D8DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF1B109-2299-4AB2-AB82-D73669F1EA7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0EE6928-6449-4241-8DC5-082009724A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8973BA-CC26-499E-A5AB-35B5BD7DAF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C8CA07-E1D3-427B-AFA0-4110868D00DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2F16E9-D441-45F6-B27A-9CB6D19A26BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F50C03E-B94A-47C5-B394-3636BEE34EA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D85FBFE-9674-4ADF-887B-0D985CDC88EF\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/17427/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/20528\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15120\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2281\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.