CVE-2015-4491

NameCVE-2015-4491
DescriptionInteger overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-434-1, DSA-3337-1, DSA-3337-2

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdk-pixbuf (PTS)bullseye2.42.2+dfsg-1+deb11u2fixed
bullseye (security)2.42.2+dfsg-1+deb11u1fixed
bookworm2.42.10+dfsg-1+deb12u1fixed
sid, trixie2.42.12+dfsg-1fixed
gtk+2.0 (PTS)bullseye2.24.33-2+deb11u1fixed
bookworm2.24.33-2+deb12u1fixed
sid, trixie2.24.33-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdk-pixbufsourcewheezy2.26.1-1+deb7u3DSA-3337-2
gdk-pixbufsourcejessie2.31.1-2+deb8u4DSA-3337-2
gdk-pixbufsource(unstable)2.31.7-1
gtk+2.0sourcesqueeze2.20.1-2+deb6u2DLA-434-1
gtk+2.0source(unstable)2.21.5-1

Notes

https://bugzilla.gnome.org/show_bug.cgi?id=752297
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=ffec86ed5010c5a2be14f47b33bcf4ed3169a199
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=8dba67cb4f38d62a47757741ad41e3f245b4a32a
https://www.openwall.com/lists/oss-security/2015/07/17/17
https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/
gtk+2.0 2.21.5-1 removed the embedded copy of gdk-pixbuf and build-depends on external gdk-pixbuf

Search for package or bug name: Reporting problems