#6835: gdk-pixbuf-2.31.6
-------------------------+-------------------------
 Reporter:  fo           |      Owner:  blfs-book@…
     Type:  enhancement  |     Status:  new
 Priority:  high         |  Milestone:  7.8
Component:  BOOK         |    Version:  SVN
 Severity:  normal       |   Keywords:
-------------------------+-------------------------
 [http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.31/gdk-
 pixbuf-2.31.6.tar.xz]

 [http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.31/gdk-
 pixbuf-2.31.6.sha256sum]

 111203d6f295d69d36e7190204248331cd37285130ac483becdedcd3f0135d18

 [http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.31/gdk-
 pixbuf-2.31.6.news]

 {{{
 2.31.6
 ======

 * Really fix bug 752297. This is CVE-2015-4491
 * Translation updates: Catalan
 }}}

 [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491]

 {{{
 Integer overflow in the make_filter_table function in pixops/pixops.c in
 gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and
 Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other
 products, allows remote attackers to execute arbitrary code or cause a
 denial of service (heap-based buffer overflow and application crash) via
 crafted bitmap dimensions that are mishandled during scaling.
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/6835>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to