| Summary: | eom: new integer overflow security issue (CVE-2013-7447) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Atilla ÖNTAŞ <tarakbumba> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | sysadmin-bugs, tarazed25 |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/675834/ | ||
| Whiteboard: | has_procedure advisory MGA5-64-OK MGA5-32-OK | ||
| Source RPM: | eom-1.8.1-2.mga5 | CVE: | |
| Status comment: | |||
| Bug Depends on: | |||
| Bug Blocks: | 17731 | ||
|
Description
Atilla ÖNTAŞ
2016-02-11 23:05:01 CET
Atilla ÖNTAŞ
2016-02-11 23:05:40 CET
Blocks:
(none) =>
17731
David Walser
2016-02-12 00:49:15 CET
Severity:
critical =>
major mga5 x86_64 Mate Installed eom-1.8.1-2.1 after the gtk2 update in bug #17738. Ran eom on the same files as used in the bug #17738 test and all displayed correctly, including the 27000x27000 PNG image. Installed eom-devel-1.8.1-2.1 after the fact because i had forgotten install it beforehand. # urpmi --search-media "Updates Testing" eom-devel CC:
(none) =>
tarazed25
Len Lawrence
2016-02-12 10:18:28 CET
Whiteboard:
(none) =>
has_procedure MGA5-64-OK mga5 i586 in virtualbox Mate eom had already been tested against the updated gtk+2.0. Updated eom to eom-1.8.1-2.1 and repeated the image display tests. The very large PNG image displayed at 4%x4% of its actual size. Displayed several images of different sizes; PNG, JPEG and SVG. Switched to KDE4 to make sure that as a Mate tool the update is Desktop agnostic. The tests all ran fine but eom picked out a corrupt JPEG in my icons folder. It objected to AngryGuyInABunnySuit.jpg because the header starts with four zero bytes. identify also reports this but gqview ignores the problem and displays the icon anyway. $ file AngryGuyInBunnySuit.jpg AngryGuyInBunnySuit.jpg: MS Windows icon resource - 1 icon, 32x32 eog also traps this as well. This update can be pushed to Mageia 5 Updates.
Len Lawrence
2016-02-13 17:17:16 CET
Keywords:
(none) =>
validated_update Advisory uploaded. Whiteboard:
has_procedure MGA5-64-OK MGA5-32-OK =>
has_procedure advisory MGA5-64-OK MGA5-32-OK
David Walser
2016-02-16 20:25:06 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/675834/ An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0070.html Status:
NEW =>
RESOLVED |