Bug 1427218 (CVE-2017-6314)
Summary: | CVE-2017-6314 gdk-pixbuf: Infinite loop in io-tiff.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bmcclain, cfergeau, dblechte, dkholia, eedri, erik-fedora, fedora, gklein, klember, kseifried, lsurette, mclasen, mgoldboi, michal.skrivanek, raveit65.sun, rbalakri, rh-spice-bugs, rjones, sherold, srevivo, trajaraman, ykaul, ylavi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2017-04-28 08:05:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1427225, 1427226, 1427229 | ||
Bug Blocks: | 1427223 |
Description
Andrej Nemec
2017-02-27 15:50:05 UTC
Created gdk-pixbuf2 tracking bugs for this issue: Affects: fedora-all [bug 1427225] Created mingw-gdk-pixbuf tracking bugs for this issue: Affects: fedora-all [bug 1427226] Created mingw-gdk-pixbuf tracking bugs for this issue: Affects: epel-7 [bug 1427229] Hi, I have attached the patch to resolve the infinite loop issue with new_size value when become zero in io-tiff.c. Please refer the comment#1 of https://bugzilla.gnome.org/show_bug.cgi?id=779020. Please review and suggest your comments. Thanks, Thiruvadi Rajaraman Statement: This issue affects the versions of gdk-pixbuf2 as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. |