MGASA-2018-0016

Source
https://advisories.mageia.org/MGASA-2018-0016.html
Import Source
https://advisories.mageia.org/MGASA-2018-0016.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0016
Related
Published
2018-01-01T15:50:28Z
Modified
2018-01-01T15:24:32Z
Summary
Updated gdk-pixbuf2.0 packages fix security vulnerability
Details

JPEG gdkpixbufjpegimageloadincrement Code Execution Vulnerability (CVE-2017-2862).

tiffimageparse Code Execution Vulnerability (CVE-2017-2870).

Ariel Zelivansky discovered that the GDK-PixBuf library did not properly handle printing certain error messages. If an user or automated system were tricked into opening a specially crafted image file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service (CVE-2017-6311).

Out-of-bounds read on io-ico.c (CVE-2017-6312).

A dangerous integer underflow in io-icns.c (CVE-2017-6313).

Infinite loop in io-tiff.c (CVE-2017-6314).

Note, the CVE-2017-2862, CVE-2017-2870, and CVE-2017-6311 issues only affected Mageia 5.

References
Credits

Affected packages

Mageia:5 / gdk-pixbuf2.0

Package

Name
gdk-pixbuf2.0
Purl
pkg:rpm/mageia/gdk-pixbuf2.0?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.32.3-1.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / gdk-pixbuf2.0

Package

Name
gdk-pixbuf2.0
Purl
pkg:rpm/mageia/gdk-pixbuf2.0?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.36.10-1.1.mga6

Ecosystem specific

{
    "section": "core"
}