Fedora Legacy Test Update Notification: gdk-pixbuf

Marc Deslauriers marcdeslauriers at videotron.ca
Fri Feb 24 00:08:48 UTC 2006


---------------------------------------------------------------------
Fedora Legacy Test Update Notification
FEDORALEGACY-2006-173274
Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=173274
2006-02-23
---------------------------------------------------------------------

Name        : gdk-pixbuf
Versions    : rh73: gdk-pixbuf-0.22.0-7.73.4.legacy
Versions    : rh9: gdk-pixbuf-0.22.0-7.90.4.legacy
Versions    : fc1: gdk-pixbuf-0.22.0-11.3.4.2.legacy
Versions    : fc2: gdk-pixbuf-0.22.0-12.fc2.1.legacy
Summary     : An image loading library used with GNOME.
Description :
The gdk-pixbuf package contains an image loading library used with the
GNOME desktop environment. The GdkPixBuf library provides image
loading facilities, the rendering of a GdkPixBuf into various formats
(drawables or GdkRGB buffers), and a cache interface.

---------------------------------------------------------------------
Update Information:

Updated gdk-pixbuf packages that fix several security issues are now
available.

The gdk-pixbuf package contains an image loading library used with the
GNOME GUI desktop environment.

A bug was found in the way gdk-pixbuf processes XPM images. An attacker
could create a carefully crafted XPM file in such a way that it could
cause an application linked with gdk-pixbuf to execute arbitrary code
when the file was opened by a victim. The Common Vulnerabilities and
Exposures project has assigned the name CVE-2005-3186 to this issue.

Ludwig Nussel discovered an integer overflow bug in the way gdk-pixbuf
processes XPM images. An attacker could create a carefully crafted XPM
file in such a way that it could cause an application linked with
gdk-pixbuf to execute arbitrary code or crash when the file was opened
by a victim. The Common Vulnerabilities and Exposures project has
assigned the name CVE-2005-2976 to this issue.

Ludwig Nussel also discovered an infinite-loop denial of service bug in
the way gdk-pixbuf processes XPM images. An attacker could create a
carefully crafted XPM file in such a way that it could cause an
application linked with gdk-pixbuf to stop responding when the file was
opened by a victim. The Common Vulnerabilities and Exposures project has
assigned the name CVE-2005-2975 to this issue.

Users of gdk-pixbuf are advised to upgrade to these updated packages,
which contain backported patches and are not vulnerable to these issues.

---------------------------------------------------------------------
Changelogs

rh73:
* Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers at videotron.ca> -
1:0.22.0-7.73.4.legacy
- Prevent another integer overflow in the xpm loader (CVE-2005-2976)
- Prevent an infinite loop in the xpm loader (CVE-2005-2975)
- Prevent an integer overflow in the xpm loader (CVE-2005-3186)

rh9:
* Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers at videotron.ca> -
1:0.22.0-7.90.4.legacy
- Prevent another integer overflow in the xpm loader (CVE-2005-2976)
- Prevent an infinite loop in the xpm loader (CVE-2005-2975)
- Prevent an integer overflow in the xpm loader (CVE-2005-3186)

fc1:
* Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers at videotron.ca> -
1:0.22.0-11.3.4.2.legacy
- Prevent another integer overflow in the xpm loader (CVE-2005-2976)
- Prevent an infinite loop in the xpm loader (CVE-2005-2975)
- Prevent an integer overflow in the xpm loader (CVE-2005-3186)

fc2:
* Sun Feb 19 2006 Marc Deslauriers <marcdeslauriers at videotron.ca> -
1:0.22.0-12.fc2.1.legacy
- Prevent another integer overflow in the xpm loader (CVE-2005-2976)
- Prevent an infinite loop in the xpm loader (CVE-2005-2975)
- Prevent an integer overflow in the xpm loader (CVE-2005-3186)

---------------------------------------------------------------------
This update can be downloaded from:
  http://download.fedoralegacy.org/
(sha1sums)

rh73:
68920e1aa48821ef2712597cfbb738a308fed989
redhat/7.3/updates-testing/i386/gdk-pixbuf-0.22.0-7.73.4.legacy.i386.rpm
bed67c95aeba203d572601c03f61f4a87738577e
redhat/7.3/updates-testing/i386/gdk-pixbuf-devel-0.22.0-7.73.4.legacy.i386.rpm
83b2d6fa22c90b3335c80e8516bbf7c013f3e0ce
redhat/7.3/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-7.73.4.legacy.i386.rpm
72d3a78c075cbd1108551c0f003d1d546474f345
redhat/7.3/updates-testing/SRPMS/gdk-pixbuf-0.22.0-7.73.4.legacy.src.rpm

rh9:
d2f5f242b378c44caa4b05ff2d157732b4f50896
redhat/9/updates-testing/i386/gdk-pixbuf-0.22.0-7.90.4.legacy.i386.rpm
5a4b0b7566fb195e3ae9ac9df3a1d0d85f86d53d
redhat/9/updates-testing/i386/gdk-pixbuf-devel-0.22.0-7.90.4.legacy.i386.rpm
99deb34f608c31c177acc48aae2a5a22dbef5e27
redhat/9/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-7.90.4.legacy.i386.rpm
34b8e79dfcfabfbd375636077a606f4c7193aabb
redhat/9/updates-testing/SRPMS/gdk-pixbuf-0.22.0-7.90.4.legacy.src.rpm

fc1:
0c08e3ec62a3ffc2cf4bf020f56dbce6c6abe55e
fedora/1/updates-testing/i386/gdk-pixbuf-0.22.0-11.3.4.2.legacy.i386.rpm
b51c2c8928ef71b22375ef359262f5ab0467ede1
fedora/1/updates-testing/i386/gdk-pixbuf-devel-0.22.0-11.3.4.2.legacy.i386.rpm
c36d9f5d78ddb75cfade93741fac76b692159fc0
fedora/1/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-11.3.4.2.legacy.i386.rpm
a33a275c1c2ff62a4256cd360aa2377989db4fd9
fedora/1/updates-testing/SRPMS/gdk-pixbuf-0.22.0-11.3.4.2.legacy.src.rpm

fc2:
6b55923c343d97bd131685a02cb36aba60be94a2
fedora/2/updates-testing/i386/gdk-pixbuf-0.22.0-12.fc2.1.legacy.i386.rpm
a391b3b8ee9c42bf0f4fed872bfa5aea61cd34a7
fedora/2/updates-testing/i386/gdk-pixbuf-devel-0.22.0-12.fc2.1.legacy.i386.rpm
a76c91bbdb0ff8fc1a30bf7c46a7392fbecf412b
fedora/2/updates-testing/i386/gdk-pixbuf-gnome-0.22.0-12.fc2.1.legacy.i386.rpm
1ee0fd9996c89480305d4831e77406696030ec3f
fedora/2/updates-testing/SRPMS/gdk-pixbuf-0.22.0-12.fc2.1.legacy.src.rpm

---------------------------------------------------------------------

Please test and comment in bugzilla.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 191 bytes
Desc: OpenPGP digital signature
URL: <http://listman.redhat.com/archives/fedora-legacy-list/attachments/20060223/10ecc319/attachment.sig>


More information about the fedora-legacy-list mailing list