Bug 1264466

Summary: Gdk-pixbuf make check fails on cve-2015-4491
Product: Red Hat Enterprise Linux 7 Reporter: Vadim Rutkovsky <vrutkovs>
Component: gdk-pixbuf2Assignee: Benjamin Otte <otte>
Status: CLOSED ERRATA QA Contact: Desktop QE <desktop-qa-list>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.2CC: mclasen, tlavigne, tpelka, vrutkovs
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: gdk-pixbuf2-2.31.6-3.el7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-11-19 08:19:39 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vadim Rutkovsky 2015-09-18 14:10:42 UTC
Description of problem:
make check for gdk-pixbuf is failing on x86_64

Version-Release number of selected component (if applicable):
gdk-pixbuf2-2.31.6-1.el7.x86_64

How reproducible:
Always

Steps to Reproduce:
1. Run make check

Actual results:
ERROR: cve-2015-4491 - missing test plan
ERROR: cve-2015-4491 - exited with status 134 (terminated by signal 6?)

Expected results:
All tests pass

Additional info:
See https://desktopqe-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/desktop-gdk-pixbuf2-RHEL-7.2-2-runtest/26/artifact/run-260402.log

Comment 1 Matthias Clasen 2015-09-18 16:41:37 UTC
See upstream bug 754387 for problems with this testcase.

Comment 6 Vadim Rutkovsky 2015-09-22 23:17:15 UTC
Verified on gdk-pixbuf2-2.31.6-3.el7.x86_64:

SKIP: cve-2015-4491 1 /pixbuf/cve-2015-4491/original # SKIP Not enough memory to load bitmap image
PASS: cve-2015-4491 2 /pixbuf/cve-2015-4491/scale-overflow
PASS: cve-2015-4491 3 /pixbuf/cve-2015-4491/scale-x-overflow
PASS: cve-2015-4491 4 /pixbuf/cve-2015-4491/scale-y-overflow

Comment 7 errata-xmlrpc 2015-11-19 08:19:39 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-2116.html