CVE-2015-4491

NameCVE-2015-4491
DescriptionInteger overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-434-1, DSA-3337-1, DSA-3337-2
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdk-pixbuf (PTS)jessie (security), jessie2.31.1-2+deb8u7fixed
stretch (security), stretch2.36.5-2+deb9u2fixed
buster, sid2.36.11-2fixed
gtk+2.0 (PTS)jessie2.24.25-3+deb8u2fixed
stretch2.24.31-2fixed
buster, sid2.24.32-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdk-pixbufsource(unstable)2.31.7-1medium
gdk-pixbufsourcejessie2.31.1-2+deb8u4mediumDSA-3337-2
gdk-pixbufsourcewheezy2.26.1-1+deb7u3mediumDSA-3337-2
gtk+2.0source(unstable)2.21.5-1medium
gtk+2.0sourcesqueeze2.20.1-2+deb6u2mediumDLA-434-1

Notes

https://bugzilla.gnome.org/show_bug.cgi?id=752297
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=ffec86ed5010c5a2be14f47b33bcf4ed3169a199
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=8dba67cb4f38d62a47757741ad41e3f245b4a32a
http://www.openwall.com/lists/oss-security/2015/07/17/17
https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/
gtk+2.0 2.21.5-1 removed the embedded copy of gdk-pixbuf and build-depends on external gdk-pixbuf

Search for package or bug name: Reporting problems