Date: Thu, 1 Oct 2015 11:56:33 -0300 From: Gustavo Grieco <gustavo.grieco@...il.com> To: oss-security@...ts.openwall.com Subject: Re: CVE request: Heap overflow and DoS with a tga file in gdk-pixbuf < 2.32.1 2015-10-01 11:04 GMT-03:00 Kurt Seifried <kseifried@...hat.com>: > Can you please post more details, I know on our end there was some > confusion as to whether or not this is the same flaw or closely related to > https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/ Sure. According to upstream, it was fixed in 2.32.0 with the 3 commits starting with https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d Do you also need a crasher and a stack trace? > > > On Thu, Oct 1, 2015 at 6:59 AM, Gustavo Grieco <gustavo.grieco@...il.com> > wrote: > > > Hello, > > > > We found a heap overflow and a DoS in the gdk-pixbuf implementation > > triggered by the scaling of tga file. These issues are only fixed in the > > recent release of gdk-pixbuf 2.32.1 but affects older versions (we tested > > it in a fully updated Ubuntu 14.04). > > > > These issues were found using QuickFuzz. > > > > Regards, > > Gustavo. > > > > > > -- > > -- > Kurt Seifried -- Red Hat -- Product Security -- Cloud > PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 > Red Hat Product Security contact: secalert@...hat.com >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ