From ${URL} : It was reported that heap overflow and DoS in gdk-pixbuf implementation occurs triggered by scaling TGA file. This library is used also by Firefox and Chromium, making them vulnerable. Upstream patches: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
Fixed by =gdk-pixbuf-2.32.1 - I think stabilization for both this and CVE-2015-7674 should be handled in one place, bug #562878 to avoid confusing arches :) *** This bug has been marked as a duplicate of bug 562878 ***
(In reply to Alexandre Rostovtsev from comment #1) > Fixed by =gdk-pixbuf-2.32.1 - I think stabilization for both this and > CVE-2015-7674 should be handled in one place, bug #562878 to avoid confusing > arches :) Yes but duplicate means other.
This issue was resolved and addressed in GLSA 201512-05 at https://security.gentoo.org/glsa/201512-05 by GLSA coordinator Yury German (BlueKnight).