| Summary: | gdk-pixbuf2.0 more heap overflow issues (CVE-2015-7673, CVE-2015-7674) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs, yann.cantin |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/659284/ | ||
| Whiteboard: | has_procedure advisory MGA5-32-OK MGA5-64-OK | ||
| Source RPM: | gdk-pixbuf2.0-2.31.2-2.1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-10-01 17:14:56 CEST
The requests were clarified. The commit I identified fixes the second issue with gif files. The first issue with tga files was actually fixed in 2.32.0 with a few commits, so this update was necessary to pull those fixes in: http://openwall.com/lists/oss-security/2015/10/01/6 http://openwall.com/lists/oss-security/2015/10/01/7 Advisory pending CVE requests. Advisory: ======================== Updated gdk-pixbuf packages fix security vulnerabilities: Security researcher Gustavo Grieco reported a heap overflow in gdk-pixbuf before 2.32.0. This issue is triggered by the scaling of a malformed tga format image and results in a potentially exploitable crash. Security researcher Gustavo Grieco reported a heap overflow in gdk-pixbuf before 2.32.1. This issue is triggered by the scaling of a malformed gif format image. References: http://openwall.com/lists/oss-security/2015/10/01/3 http://openwall.com/lists/oss-security/2015/10/01/4 ======================== Updated packages in core/updates_testing: ======================== gdk-pixbuf2.0-2.32.1-1.mga5 libgdk_pixbuf2.0_0-2.32.1-1.mga5 libgdk_pixbuf2.0-devel-2.32.1-1.mga5 libgdk_pixbuf-gir2.0-2.32.1-1.mga5 from gdk-pixbuf2.0-2.32.1-1.mga5.src.rpm Assignee:
bugsquad =>
qa-bugs Working fine Mageia 5 i586. Searched for bunnies in Google Image Search :o) Whiteboard:
(none) =>
has_procedure MGA5-32-OK CVE assignments: http://openwall.com/lists/oss-security/2015/10/02/9 http://openwall.com/lists/oss-security/2015/10/02/10 Advisory: ======================== Updated gdk-pixbuf packages fix security vulnerabilities: Security researcher Gustavo Grieco reported a heap overflow in gdk-pixbuf before 2.32.0. This issue is triggered by the scaling of a malformed tga format image and results in a potentially exploitable crash (CVE-2015-7673). Security researcher Gustavo Grieco reported a heap overflow in gdk-pixbuf before 2.32.1. This issue is triggered by the scaling of a malformed gif format image (CVE-2015-7674). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674 http://openwall.com/lists/oss-security/2015/10/02/9 http://openwall.com/lists/oss-security/2015/10/02/10
David Walser
2015-10-02 21:26:40 CEST
Summary:
gdk-pixbuf2.0 more heap overflow issues =>
gdk-pixbuf2.0 more heap overflow issues (CVE-2015-7673, CVE-2015-7674) mga5 x86_64 Installed packages : lib64gdk_pixbuf-gir2.0-2.32.1-1.mga5.x86_64.rpm lib64gdk_pixbuf2.0_0-2.32.1-1.mga5.x86_64.rpm lib64gdk_pixbuf2.0-devel-2.32.1-1.mga5.x86_64.rpm gdk-pixbuf2.0-2.32.1-1.mga5.x86_64.rpm Bunnies looks fine. Update OK. Whiteboard:
has_procedure MGA5-32-OK =>
has_procedure MGA5-32-OK MGA5-64-OK Bunnies ftw \o/ Validating. Advisory uploaded. Please push to 5 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0388.html Resolution:
(none) =>
FIXED FYI, we have some actual PoCs now: http://seclists.org/oss-sec/2015/q4/31 http://seclists.org/oss-sec/2015/q4/32
David Walser
2015-10-05 23:03:24 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/659284/ |