Path: ...!news.mixmin.net!aioe.org!news.servidellagleba.it!bofh.it!news.nic.it!robomod From: Salvatore Bonaccorso Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5228-1] gdk-pixbuf security update Date: Sun, 11 Sep 2022 16:20:01 +0200 Message-ID: X-Original-To: debian-security-announce@lists.debian.org X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Sun Sep 11 14:12:13 2022 Old-Return-Path: X-Amavis-Spam-Status: No, score=-116.201 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_HI=-5, T_SCC_BODY_TEXT_LINE=-0.01, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=AULq8FYaYkSMWnlyfdFqltRPIhxN3ofbzIg33T710sE=; b=KV EPNveGlF8pK7uHPl0YbMms0ZraWGqluXy9sdhbOWcc2PxI4WI155jyPw+K1aDuxf65aH040F6SQT/ 64zYwsOikbKpm7BsmKIxLMhJgEEUVtJGZ0jSHGB64uZsgC17oR6CKvKer0JcnpkJGuDkOgNZU+V0B Y/EddUMLUQqN2XkmSyi93zapN2SFq6bqy6Vrdylvk2vPAtSLB/d26lS7XurblXCnjNRhFkVVvrPgB sdHHKveqPCXrAcrjmoHQBIjO86w8g6ukExdhIfacbfJXCxaG+9qvTC8kUyvvIBPDtSDGgj/nKHS8S fGpIV7oqXGzY/ba1NzNb53z3pEDF1Ofw==; X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4126 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/E1oXNgb-0003jc-5z@seger.debian.org Approved: robomod@news.nic.it Lines: 62 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Sun, 11 Sep 2022 14:11:49 +0000 X-Original-Message-ID: Bytes: 5010 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5228-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso September 11, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gdk-pixbuf CVE ID : CVE-2021-44648 CVE-2021-46829 Debian Bug : 1014600 Several vulnerabilities were discovered in gdk-pixbuf, the GDK Pixbuf library. CVE-2021-44648 Sahil Dhar reported a heap-based buffer overflow vulnerability when decoding the lzw compressed stream of image data, which may result in the execution of arbitrary code or denial of service if a malformed GIF image is processed. CVE-2021-46829 Pedro Ribeiro reported a heap-based buffer overflow vulnerability when compositing or clearing frames in GIF files, which may result in the execution of arbitrary code or denial of service if a malformed GIF image is processed. For the stable distribution (bullseye), these problems have been fixed in version 2.42.2+dfsg-1+deb11u1. We recommend that you upgrade your gdk-pixbuf packages. For the detailed security status of gdk-pixbuf please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gdk-pixbuf Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmMd7HBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0R0tA/+JOBzstPjp2oQms59qsPCIKOp8RmjbBfqtsjxFkdS8aXpiRyc9p+x+f+H PhZfcZxd5s3IhVJIXceWY9Phjr4Ewcl3B3QoBEzOMKKgy8qPA/r1WLGVtRld9AAi DYqisl6lI7NimyCdSzLDs6vHgiUtB+qvRKu7wFfpwNwWjhAJCm/IKI6vv+ASW27b 0yLtJX57VLSunrN+7tdnBtVmsAR6ffJ5rbf46ZURootLGc7f9J9XHXd+Pn5Cg7jg dRfGyUEn4s/4wJZ74KPMpfj+eUuBmloVEEzXsP0VeaI/zmdEFeHZ95DDGK9xRl+u oRTe3Xq5p+qM32vv8BiuHKGufQipOYFvQlvSOPD5IIJozWufJajVvGAwiHi98svV QE4Hxwm7RFOqmf77wGW0gJjZHebLstqtcCaM7FMFv63KrvKjsk0wa/iLkMno/qxm 8G5xkq2QQ0swmeDW8hnqWpsyu1xsPfGUVwkMgSA14MikLJi4FmuUztdRMWo7tlV7 QpT+kO8O0AB70IQu5O1qHOxw6dVICBnGjw8RnoDBWrNstTyJKBAGU1GhVNvMFqOZ ffcIJyVAkaBVteOnUYK1EivCiclvol3eVzpXtQk/WmKu3oFEBvYYvXKSLTnv8Qvz 2rRwUVPbtAA/h8ohgg62ZXi8hMKPfZIFTuFSgeCTcspPJ81ka4Y= =KpWF -----END PGP SIGNATURE-----