Bug 431529 - CVE-2008-0553 tk: GIF handling buffer overflow [rawhide]
CVE-2008-0553 tk: GIF handling buffer overflow [rawhide]
Product: Fedora
Classification: Fedora
Component: perl-Tk (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Andreas Bierfert
Fedora Extras Quality Assurance
: Security
Depends On:
Blocks: CVE-2008-0553
  Show dependency treegraph
Reported: 2008-02-05 05:50 EST by Andreas Bierfert
Modified: 2008-02-05 06:39 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-02-05 06:39:17 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Andreas Bierfert 2008-02-05 05:50:21 EST
+++ This bug was initially created as a clone of Bug #431518 +++

tk GIF handling code is based on the same code as used by gd and SDL_image and
is affected by the overflow known as CVE-2006-4484 and CVE-2007-6697.

ReadImage function in tkImgGIF.c does not properly check the value of
initialCodeSize value read from GIF image before using it as upper bound during
the initialization of append array.  This can result in stack buffer overflow.

Upstream fix:

This is expected to be included in upstream tk version 8.5.1.

Related issues:
CVE-2006-4484 (gd), CVE-2007-6697 (SDL_image), CVE-2008-0554 (netpbm)

-- Additional comment from thoger@redhat.com on 2008-02-05 03:55 EST --
perl-Tk uses embedded copy of tk source code and is affected by this problem
too.  Adding perl-Tk maintainers to the CC list too.

-- Additional comment from mmaslano@redhat.com on 2008-02-05 03:58 EST --
Tk is fixed in rawhide, F-8, F-7. The upstream fix was used.

Note You need to log in before you can comment on or make changes to this bug.