Summary: | <x11-libs/gdk-pixbuf-2.36.9: multiple vulnerabilities | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> | ||||||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||||||
Status: | RESOLVED FIXED | ||||||||||
Severity: | normal | CC: | gnome, nobrowser, sudormrfhalt | ||||||||
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
||||||||
Version: | unspecified | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
URL: | http://www.openwall.com/lists/oss-security/2017/02/21/4 | ||||||||||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=630026 | ||||||||||
Whiteboard: | B2 [glsa cve] | ||||||||||
Package list: |
=x11-libs/gdk-pixbuf-2.36.9
|
Runtime testing required: | Yes | ||||||||
Bug Depends on: | |||||||||||
Bug Blocks: | 630026 | ||||||||||
Attachments: |
|
Description
Agostino Sarubbo
![]() *** Bug 611672 has been marked as a duplicate of this bug. *** *** Bug 611666 has been marked as a duplicate of this bug. *** *** Bug 611664 has been marked as a duplicate of this bug. *** CVE-2017-6314 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6314): The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file. CVE-2017-6313 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6313): Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file. CVE-2017-6312 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6312): Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations. CVE-2017-6311 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6311): gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to printing an error message. Created attachment 477746 [details, diff]
CVE-2017-6311.patch
Created attachment 477748 [details, diff]
CVE-2017-6312.patch
Created attachment 477750 [details, diff]
CVE-2017-6314.patch
commit c50f87a60070448db5c88e40f671826e0eeb449e Date: Tue Aug 29 00:01:52 2017 +0200 x11-libs/gdk-pixbuf: security version bump 2.36.6 → 2.36.9, bug #611390 @maintainer(s), please let us know when you are ready to stabilize. Hello arches, please proceed with the stabilization of =x11-libs/gdk-pixbuf-2.36.9 ia64 stable amd64/x86 stable Stable on alpha. arm stable stable for hppa/sparc (thanks to Dakon) stable for ppc/ppc64 Last arches are done. Thank you. @Maintainers please verify dependencies for vulnerable versions. Several packages seem to depend on slot 2 from gdk-pixbuf which is vulnerable. @Security please add to an existing glsa or file a new one Gentoo Security Padawan ChrisADR @Maintainers, my bad, sorry for the noise, please proceed with cleanup. Gentoo Security Padawan ChrisADR Just cleaned up affected revisions in 004ec7a497d0afbb3cb2528c1c555d95dc65539f Thank you Gilles, @Security please add to an existing glsa or file a new one. Gentoo Security Padawan ChrisADR GLSA request opened. This issue was resolved and addressed in GLSA 201709-08 at https://security.gentoo.org/glsa/201709-08 by GLSA coordinator Aaron Bauman (b-man). |