CVE-2015-4491

NameCVE-2015-4491
DescriptionInteger overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-434-1, DSA-3337-1, DSA-3337-2
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdk-pixbuf (PTS)wheezy2.26.1-1+deb7u3fixed
wheezy (security)2.26.1-1+deb7u6fixed
jessie (security), jessie2.31.1-2+deb8u6fixed
stretch (security), stretch2.36.5-2+deb9u1fixed
buster, sid2.36.11-1fixed
gtk+2.0 (PTS)wheezy2.24.10-2fixed
jessie2.24.25-3+deb8u2fixed
buster, stretch2.24.31-2fixed
sid2.24.31-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdk-pixbufsource(unstable)2.31.7-1medium
gdk-pixbufsourcejessie2.31.1-2+deb8u4mediumDSA-3337-2
gdk-pixbufsourcewheezy2.26.1-1+deb7u3mediumDSA-3337-2
gtk+2.0source(unstable)2.21.5-1medium
gtk+2.0sourcesqueeze2.20.1-2+deb6u2mediumDLA-434-1

Notes

https://bugzilla.gnome.org/show_bug.cgi?id=752297
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=ffec86ed5010c5a2be14f47b33bcf4ed3169a199
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=8dba67cb4f38d62a47757741ad41e3f245b4a32a
http://www.openwall.com/lists/oss-security/2015/07/17/17
https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/
gtk+2.0 2.21.5-1 removed the embedded copy of gdk-pixbuf and build-depends on external gdk-pixbuf

Search for package or bug name: Reporting problems