Sujet : [SECURITY] [DSA 5228-1] gdk-pixbuf security update
De : carnil (at) *nospam* debian.org (Salvatore Bonaccorso)
Groupes : linux.debian.announce.securityDate : 11. Sep 2022, 16:20:01
Autres entêtes
Organisation : linux.* mail to news gateway
Message-ID : <F4vYt-6Qu0-1@gated-at.bofh.it>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5228-1
security@debian.orghttps://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2022
https://www.debian.org/security/faq- -------------------------------------------------------------------------
Package : gdk-pixbuf
CVE ID : CVE-2021-44648 CVE-2021-46829
Debian Bug : 1014600
Several vulnerabilities were discovered in gdk-pixbuf, the GDK
Pixbuf library.
CVE-2021-44648
Sahil Dhar reported a heap-based buffer overflow vulnerability when
decoding the lzw compressed stream of image data, which may result
in the execution of arbitrary code or denial of service if a
malformed GIF image is processed.
CVE-2021-46829
Pedro Ribeiro reported a heap-based buffer overflow vulnerability
when compositing or clearing frames in GIF files, which may result
in the execution of arbitrary code or denial of service if a
malformed GIF image is processed.
For the stable distribution (bullseye), these problems have been fixed in
version 2.42.2+dfsg-1+deb11u1.
We recommend that you upgrade your gdk-pixbuf packages.
For the detailed security status of gdk-pixbuf please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/gdk-pixbufFurther information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/Mailing list:
debian-security-announce@lists.debian.org-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmMd7HBfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0R0tA/+JOBzstPjp2oQms59qsPCIKOp8RmjbBfqtsjxFkdS8aXpiRyc9p+x+f+H
PhZfcZxd5s3IhVJIXceWY9Phjr4Ewcl3B3QoBEzOMKKgy8qPA/r1WLGVtRld9AAi
DYqisl6lI7NimyCdSzLDs6vHgiUtB+qvRKu7wFfpwNwWjhAJCm/IKI6vv+ASW27b
0yLtJX57VLSunrN+7tdnBtVmsAR6ffJ5rbf46ZURootLGc7f9J9XHXd+Pn5Cg7jg
dRfGyUEn4s/4wJZ74KPMpfj+eUuBmloVEEzXsP0VeaI/zmdEFeHZ95DDGK9xRl+u
oRTe3Xq5p+qM32vv8BiuHKGufQipOYFvQlvSOPD5IIJozWufJajVvGAwiHi98svV
QE4Hxwm7RFOqmf77wGW0gJjZHebLstqtcCaM7FMFv63KrvKjsk0wa/iLkMno/qxm
8G5xkq2QQ0swmeDW8hnqWpsyu1xsPfGUVwkMgSA14MikLJi4FmuUztdRMWo7tlV7
QpT+kO8O0AB70IQu5O1qHOxw6dVICBnGjw8RnoDBWrNstTyJKBAGU1GhVNvMFqOZ
ffcIJyVAkaBVteOnUYK1EivCiclvol3eVzpXtQk/WmKu3oFEBvYYvXKSLTnv8Qvz
2rRwUVPbtAA/h8ohgg62ZXi8hMKPfZIFTuFSgeCTcspPJ81ka4Y=
=KpWF
-----END PGP SIGNATURE-----