An integer overflow flaw was found in the way X BitMap (XBM) image file format loader of gdk-pixbuf, an image loading library used with GNOME, used to read bitmap file data for certain images. A remote attacker could provide a specially-crafted XBM image file, which once loaded in an application linked against gdk-pixbuf, would lead to that application termination (GLib error and application abort). Upstream bug report: [1] https://bugzilla.gnome.org/show_bug.cgi?id=672811 Relevant patch: [2] http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22 CVE request: [3] http://www.openwall.com/lists/oss-security/2012/05/15/8 References: [4] https://bugs.gentoo.org/show_bug.cgi?id=412033 [5] https://bugs.launchpad.net/ubuntu/+source/gdk-pixbuf/+bug/681150 [6] https://bugzilla.novell.com/show_bug.cgi?id=762735
This issue affects the versions of the gdk-pixbuf package, as shipped with Red Hat Enterprise Linux 5. -- This issue affects the versions of the gtk2 package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the versions of the gdk-pixbuf package, as shipped with Fedora release of 15 and 16. Please schedule an update. This issue affects the versions of the gdk-pixbuf2 package, as shipped with Fedora release of 15 and 16. Please schedule an update. This issue affects the versions of the mingw32-gdk-pixbuf package, as shipped with Fedora release of 15 and 16. Please schedule an update.
Created gdk-pixbuf2 tracking bugs for this issue Affects: fedora-all [bug 822470]
Created gdk-pixbuf tracking bugs for this issue Affects: fedora-all [bug 822469]
Created mingw32-gdk-pixbuf tracking bugs for this issue Affects: fedora-all [bug 822471]
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0135 https://rhn.redhat.com/errata/RHSA-2013-0135.html
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.