Bug 1686828 (CVE-2017-12447)
| Summary: | CVE-2017-12447 gdk-pixbuf: heap-based overflow caused by invalid palette size | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | erik-fedora, fedora, gnome-sig, klember, mclasen, otte, rh-spice-bugs, rjones |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-03-11 14:10:30 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1686830, 1686831, 1686832 | ||
| Bug Blocks: | 1686829 | ||
|
Description
Dhananjay Arunesh
2019-03-08 12:51:33 UTC
Created gdk-pixbuf2 tracking bugs for this issue: Affects: fedora-all [bug 1686830] Created mingw-gdk-pixbuf tracking bugs for this issue: Affects: fedora-all [bug 1686831] Created mingw-gdk-pixbuf tracking bugs for this issue: Affects: epel-7 [bug 1686832] I believe this has been fixed by https://gitlab.gnome.org/GNOME/gdk-pixbuf/commit/b7bf6fbfb310fceba2d35d4de143b8d5ffdad990 upstream Statement: This issue did not affect the versions of gdk-pixbuf2 as shipped with Red Hat Enterprise Linux 6 and 7. This issue affects the versions of gdk-pixbuf as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. |