--------------------------------------------------------------------- Fedora Legacy Test Update Notification FEDORALEGACY-2006-173274 Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=173274 2006-02-23 --------------------------------------------------------------------- Name : gdk-pixbuf Versions : rh73: gdk-pixbuf-0.22.0-7.73.4.legacy Versions : rh9: gdk-pixbuf-0.22.0-7.90.4.legacy Versions : fc1: gdk-pixbuf-0.22.0-11.3.4.2.legacy Versions : fc2: gdk-pixbuf-0.22.0-12.fc2.1.legacy Summary : An image loading library used with GNOME. Description : The gdk-pixbuf package contains an image loading library used with the GNOME desktop environment. The GdkPixBuf library provides image loading facilities, the rendering of a GdkPixBuf into various formats (drawables or GdkRGB buffers), and a cache interface. --------------------------------------------------------------------- Update Information: Updated gdk-pixbuf packages that fix several security issues are now available. The gdk-pixbuf package contains an image loading library used with the GNOME GUI desktop environment. A bug was found in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to execute arbitrary code when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-3186 to this issue. Ludwig Nussel discovered an integer overflow bug in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to execute arbitrary code or crash when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2976 to this issue. Ludwig Nussel also discovered an infinite-loop denial of service bug in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to stop responding when the file was opened by a victim. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2975 to this issue. Users of gdk-pixbuf are advised to upgrade to these updated packages, which contain backported patches and are not vulnerable to these issues. --------------------------------------------------------------------- Changelogs rh73: * Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> - 1:0.22.0-7.73.4.legacy - Prevent another integer overflow in the xpm loader (CVE-2005-2976) - Prevent an infinite loop in the xpm loader (CVE-2005-2975) - Prevent an integer overflow in the xpm loader (CVE-2005-3186) rh9: * Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> - 1:0.22.0-7.90.4.legacy - Prevent another integer overflow in the xpm loader (CVE-2005-2976) - Prevent an infinite loop in the xpm loader (CVE-2005-2975) - Prevent an integer overflow in the xpm loader (CVE-2005-3186) fc1: * Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> - 1:0.22.0-11.3.4.2.legacy - Prevent another integer overflow in the xpm loader (CVE-2005-2976) - Prevent an infinite loop in the xpm loader (CVE-2005-2975) - Prevent an integer overflow in the xpm loader (CVE-2005-3186) fc2: * Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> - 1:0.22.0-12.fc2.1.legacy - Prevent another integer overflow in the xpm loader (CVE-2005-2976) - Prevent an infinite loop in the xpm loader (CVE-2005-2975) - Prevent an integer overflow in the xpm loader (CVE-2005-3186) --------------------------------------------------------------------- This update can be downloaded from: http://download.fedoralegacy.org/ (sha1sums) rh73: 68920e1aa48821ef2712597cfbb738a308fed989 redhat/7.3/updates-testing/i386/gdk-pixbuf-0.22.0-7.73.4.legacy.i386.rpm bed67c95aeba203d572601c03f61f4a87738577e redhat/7.3/updates-testing/i386/gdk-pixbuf-devel-0.22.0-7.73.4.legacy.i386.rpm 83b2d6fa22c90b3335c80e8516bbf7c013f3e0ce redhat/7.3/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-7.73.4.legacy.i386.rpm 72d3a78c075cbd1108551c0f003d1d546474f345 redhat/7.3/updates-testing/SRPMS/gdk-pixbuf-0.22.0-7.73.4.legacy.src.rpm rh9: d2f5f242b378c44caa4b05ff2d157732b4f50896 redhat/9/updates-testing/i386/gdk-pixbuf-0.22.0-7.90.4.legacy.i386.rpm 5a4b0b7566fb195e3ae9ac9df3a1d0d85f86d53d redhat/9/updates-testing/i386/gdk-pixbuf-devel-0.22.0-7.90.4.legacy.i386.rpm 99deb34f608c31c177acc48aae2a5a22dbef5e27 redhat/9/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-7.90.4.legacy.i386.rpm 34b8e79dfcfabfbd375636077a606f4c7193aabb redhat/9/updates-testing/SRPMS/gdk-pixbuf-0.22.0-7.90.4.legacy.src.rpm fc1: 0c08e3ec62a3ffc2cf4bf020f56dbce6c6abe55e fedora/1/updates-testing/i386/gdk-pixbuf-0.22.0-11.3.4.2.legacy.i386.rpm b51c2c8928ef71b22375ef359262f5ab0467ede1 fedora/1/updates-testing/i386/gdk-pixbuf-devel-0.22.0-11.3.4.2.legacy.i386.rpm c36d9f5d78ddb75cfade93741fac76b692159fc0 fedora/1/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-11.3.4.2.legacy.i386.rpm a33a275c1c2ff62a4256cd360aa2377989db4fd9 fedora/1/updates-testing/SRPMS/gdk-pixbuf-0.22.0-11.3.4.2.legacy.src.rpm fc2: 6b55923c343d97bd131685a02cb36aba60be94a2 fedora/2/updates-testing/i386/gdk-pixbuf-0.22.0-12.fc2.1.legacy.i386.rpm a391b3b8ee9c42bf0f4fed872bfa5aea61cd34a7 fedora/2/updates-testing/i386/gdk-pixbuf-devel-0.22.0-12.fc2.1.legacy.i386.rpm a76c91bbdb0ff8fc1a30bf7c46a7392fbecf412b fedora/2/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-12.fc2.1.legacy.i386.rpm 1ee0fd9996c89480305d4831e77406696030ec3f fedora/2/updates-testing/SRPMS/gdk-pixbuf-0.22.0-12.fc2.1.legacy.src.rpm --------------------------------------------------------------------- Please test and comment in bugzilla.
Attachment:
signature.asc
Description: OpenPGP digital signature
-- fedora-legacy-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-legacy-list