Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 1 Oct 2015 08:04:12 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: Re: CVE request: Heap overflow and DoS with a tga file
 in gdk-pixbuf < 2.32.1

Can you please post more details, I know on our end there was some
confusion as to whether or not this is the same flaw or closely related to
https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/

On Thu, Oct 1, 2015 at 6:59 AM, Gustavo Grieco <gustavo.grieco@...il.com>
wrote:

> Hello,
>
> We found a heap overflow and a DoS in the gdk-pixbuf implementation
> triggered by the scaling of tga file. These issues are only fixed in the
> recent release of gdk-pixbuf 2.32.1 but affects older versions (we tested
> it in a fully updated Ubuntu 14.04).
>
> These issues were found using QuickFuzz.
>
> Regards,
> Gustavo.
>



-- 

--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ