It was reported that heap overflow and DoS in gdk-pixbuf implementation occurs triggered by scaling TGA file. This library is used also by Firefox and Chromium, making them vulnerable.
Upstream patches: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
CVE request: http://seclists.org/oss-sec/2015/q4/1
Acknowledgements: Red Hat would like to thank Gustavo Grieco for reporting this issue.
CVE assignment: http://seclists.org/oss-sec/2015/q4/18
The infinite loop in RHEL6 is annoying but shouldn't qualify as security issue.