Bug 431529

Summary: CVE-2008-0553 tk: GIF handling buffer overflow [rawhide]
Product: [Fedora] Fedora Reporter: Andreas Bierfert <andreas.bierfert>
Component: perl-TkAssignee: Andreas Bierfert <andreas.bierfert>
Status: CLOSED NEXTRELEASE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: rawhideCC: andreas.bierfert, mmaslano, perl-devel, wtogami
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: source=redhat,reported=20080124,public=20080201,impact=moderate
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-02-05 11:39:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 431518    

Description Andreas Bierfert 2008-02-05 10:50:21 UTC
+++ This bug was initially created as a clone of Bug #431518 +++

tk GIF handling code is based on the same code as used by gd and SDL_image and
is affected by the overflow known as CVE-2006-4484 and CVE-2007-6697.

ReadImage function in tkImgGIF.c does not properly check the value of
initialCodeSize value read from GIF image before using it as upper bound during
the initialization of append array.  This can result in stack buffer overflow.

Upstream fix:
http://tktoolkit.cvs.sourceforge.net/tktoolkit/tk/generic/tkImgGIF.c?r1=1.40&r2=1.41

This is expected to be included in upstream tk version 8.5.1.

Related issues:
CVE-2006-4484 (gd), CVE-2007-6697 (SDL_image), CVE-2008-0554 (netpbm)

-- Additional comment from thoger on 2008-02-05 03:55 EST --
perl-Tk uses embedded copy of tk source code and is affected by this problem
too.  Adding perl-Tk maintainers to the CC list too.

-- Additional comment from mmaslano on 2008-02-05 03:58 EST --
Tk is fixed in rawhide, F-8, F-7. The upstream fix was used.