From ${URL} : A remotely exploitable vulnerability was found in the bmp decoder in gdk-pixbuf. A maliciously crafted file could cause the application to crash. Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=768738 Upstream fix: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=779429ce34e439c01d257444fe9d6739e72a2024 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
This is present in gdk-pixbuf-2.35.3 release. I will backport the patch to 2.34.
2.36 was added to the tree masked with Gnome 3.22. If there is any hurry, I can remove it from mask as it appears to be fine on a stable system, otherwise, I should unmask Gnome 3.22 by this weekend.
2.36 is now unmasked. Feel free to go ahead and stabilize it if needed.
PING: The package seems to be stable on all stable arches, and there is no cleanup to do, should we vote for a GLSA and if not necessary close the report?
This issue was resolved and addressed in GLSA 201709-08 at https://security.gentoo.org/glsa/201709-08 by GLSA coordinator Aaron Bauman (b-man).