An infinite loop vulnerability was found in gdk-pixbuf. Loading a maliciously crafted tiff image would cause the application to crash. References: http://seclists.org/oss-sec/2017/q1/466 http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=779020
Created gdk-pixbuf2 tracking bugs for this issue: Affects: fedora-all [bug 1427225] Created mingw-gdk-pixbuf tracking bugs for this issue: Affects: fedora-all [bug 1427226]
Created mingw-gdk-pixbuf tracking bugs for this issue: Affects: epel-7 [bug 1427229]
Hi, I have attached the patch to resolve the infinite loop issue with new_size value when become zero in io-tiff.c. Please refer the comment#1 of https://bugzilla.gnome.org/show_bug.cgi?id=779020. Please review and suggest your comments. Thanks, Thiruvadi Rajaraman
Statement: This issue affects the versions of gdk-pixbuf2 as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.