cvrf2cusa/cvrf/2022/cvrf-openEuler-SA-2022-1762.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

141 lines
8.5 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for gdk-pixbuf2 is now available for openEuler-20.03-LTS-SP3</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2022-1762</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2022-07-22</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2022-07-22</InitialReleaseDate>
<CurrentReleaseDate>2022-07-22</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2022-07-22</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">gdk-pixbuf2 security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for gdk-pixbuf2 is now available for openEuler-20.03-LTS-SP3.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">gdk is written in C but has been designed from the ground up to support a wide range of languages. It provide a complete set of widgets,and suitable for projects ranging from small one-off tools to complete application suites.
Security Fix(es):
A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-20240)
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c-&gt;self_code equals 10, self-&gt;code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self-&gt;code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.(CVE-2020-29385)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for gdk-pixbuf2 is now available for openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">gdk-pixbuf2</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1762</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-20240</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-29385</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-20240</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-29385</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="gdk-pixbuf2-debugsource-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-debugsource-2.40.0-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gdk-pixbuf2-debuginfo-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-debuginfo-2.40.0-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gdk-pixbuf2-devel-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-devel-2.40.0-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gdk-pixbuf2-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-2.40.0-2.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="gdk-pixbuf2-help-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-help-2.40.0-2.oe1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="gdk-pixbuf2-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-2.40.0-2.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="gdk-pixbuf2-devel-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-devel-2.40.0-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gdk-pixbuf2-debuginfo-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-debuginfo-2.40.0-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gdk-pixbuf2-debugsource-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-debugsource-2.40.0-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gdk-pixbuf2-2.40.0-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gdk-pixbuf2-2.40.0-2.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
</Notes>
<ReleaseDate>2022-07-22</ReleaseDate>
<CVE>CVE-2021-20240</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.8</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>gdk-pixbuf2 security update</Description>
<DATE>2022-07-22</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1762</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c-&gt;self_code equals 10, self-&gt;code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self-&gt;code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.</Note>
</Notes>
<ReleaseDate>2022-07-22</ReleaseDate>
<CVE>CVE-2020-29385</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>5.5</BaseScore>
<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>gdk-pixbuf2 security update</Description>
<DATE>2022-07-22</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1762</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>