Deutsch   English   Français   Italiano  
<F4vYt-6Qu0-1@gated-at.bofh.it>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!aioe.org!news.servidellagleba.it!bofh.it!news.nic.it!robomod
From: Salvatore Bonaccorso <carnil@debian.org>
Newsgroups: linux.debian.announce.security
Subject: [SECURITY] [DSA 5228-1] gdk-pixbuf security update
Date: Sun, 11 Sep 2022 16:20:01 +0200
Message-ID: <F4vYt-6Qu0-1@gated-at.bofh.it>
X-Original-To: debian-security-announce@lists.debian.org
X-Mailbox-Line: From debian-security-announce-request@lists.debian.org  Sun Sep 11 14:12:13 2022
Old-Return-Path: <carnil@seger.debian.org>
X-Amavis-Spam-Status: No, score=-116.201 tagged_above=-10000 required=5.3
	tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.001,
	DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
	DKIM_VALID_EF=-0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5,
	PGPSIGNATURE=-5, RCVD_IN_DNSWL_HI=-5, T_SCC_BODY_TEXT_LINE=-0.01,
	USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100]
	autolearn=ham autolearn_force=no
Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org;
	 s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version
	:Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description:
	In-Reply-To:References; bh=AULq8FYaYkSMWnlyfdFqltRPIhxN3ofbzIg33T710sE=; b=KV
	EPNveGlF8pK7uHPl0YbMms0ZraWGqluXy9sdhbOWcc2PxI4WI155jyPw+K1aDuxf65aH040F6SQT/
	64zYwsOikbKpm7BsmKIxLMhJgEEUVtJGZ0jSHGB64uZsgC17oR6CKvKer0JcnpkJGuDkOgNZU+V0B
	Y/EddUMLUQqN2XkmSyi93zapN2SFq6bqy6Vrdylvk2vPAtSLB/d26lS7XurblXCnjNRhFkVVvrPgB
	sdHHKveqPCXrAcrjmoHQBIjO86w8g6ukExdhIfacbfJXCxaG+9qvTC8kUyvvIBPDtSDGgj/nKHS8S
	fGpIV7oqXGzY/ba1NzNb53z3pEDF1Ofw==;
X-Debian: PGP check passed for security officers
Priority: urgent
Reply-To: debian-security-announce-request@lists.debian.org
X-Mailing-List: <debian-security-announce@lists.debian.org> archive/latest/4126
List-ID: <debian-security-announce.lists.debian.org>
List-URL: <http://lists.debian.org/debian-security-announce/>
List-Archive: https://lists.debian.org/msgid-search/E1oXNgb-0003jc-5z@seger.debian.org
Approved: robomod@news.nic.it
Lines: 62
Organization: linux.* mail to news gateway
Sender: robomod@news.nic.it
X-Original-Date: Sun, 11 Sep 2022 14:11:49 +0000
X-Original-Message-ID: <E1oXNgb-0003jc-5z@seger.debian.org>
Bytes: 5010

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5228-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 11, 2022                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gdk-pixbuf
CVE ID         : CVE-2021-44648 CVE-2021-46829
Debian Bug     : 1014600

Several vulnerabilities were discovered in gdk-pixbuf, the GDK
Pixbuf library.

CVE-2021-44648

    Sahil Dhar reported a heap-based buffer overflow vulnerability when
    decoding the lzw compressed stream of image data, which may result
    in the execution of arbitrary code or denial of service if a
    malformed GIF image is processed.

CVE-2021-46829

    Pedro Ribeiro reported a heap-based buffer overflow vulnerability
    when compositing or clearing frames in GIF files, which may result
    in the execution of arbitrary code or denial of service if a
    malformed GIF image is processed.

For the stable distribution (bullseye), these problems have been fixed in
version 2.42.2+dfsg-1+deb11u1.

We recommend that you upgrade your gdk-pixbuf packages.

For the detailed security status of gdk-pixbuf please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/gdk-pixbuf

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=KpWF
-----END PGP SIGNATURE-----