[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1074054: marked as done (bullseye-pu: package gdk-pixbuf/2.42.2+dfsg-1+deb11u2)



Your message dated Sat, 29 Jun 2024 10:47:48 +0000
with message-id <E1sNVcS-002bu5-K4@coccia.debian.org>
and subject line Released with 11.10
has caused the Debian Bug report #1074054,
regarding bullseye-pu: package gdk-pixbuf/2.42.2+dfsg-1+deb11u2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1074054: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074054
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Tags: bullseye
X-Debbugs-Cc: gdk-pixbuf@packages.debian.org, team@security.debian.org
Control: affects -1 + src:gdk-pixbuf
User: release.debian.org@packages.debian.org
Usertags: pu

[ Reason ]
gdk-pixbuf is affected by CVE-2022-48622, a memory corruption via
crafted .ani files, cf. #1071265.

[ Impact ]
At least denial of service but potentially as well arbitrary code
execution. The Debian Security Team has classified it as no-dsa and
requested that we do a stable update for this issue if possible.

[ Tests ]
This is the same set of patches used in Ubuntu 22.04 LTS "Jammy".

[ Risks ]
Isolated changes, and the fix landed in Trixie a month ago. Similar
fix being applied to Bookworm now also. See
https://bugs.debian.org/1073234

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in oldstable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Three commits cherry-picked from upstream:

  * ANI: Reject files with multiple anih chunks (CVE-2022-48622)
    (Closes: #1071265)
  * ANI: Reject files with multiple INAM or IART chunks
  * ANI: Validate anih chunk size

The two other commits are not for CVE-2022-48622 but additional
hardening and fixing changes related to the ANI code.

Updated debian/gbp.conf to point to the debian/bullseye packaging branch.

Thank you,
Jeremy Bícha

Attachment: gdk-pixbuf-bullseye.debdiff
Description: Binary data


--- End Message ---
--- Begin Message ---
Version: 11.10

The upload requested in this bug has been released as part of 11.10.

--- End Message ---

Reply to: