By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Another highly critical image-based security hole has been found, sparking a flurry of patches from Linux suppliers.
Exploitation in GdkPixBuf can be used to caused a denial of service or provide remote system access.
One is a variant of the previous discovered Qt hole in bitmap images that can make an application run in an infinite loop.
A second occurs in the "pixbuf_create_from_xpm()" function when decoding XPM images. A specially crafted image can cause a buffer overflow.
A third is a boundary error in the "xpm_extract_color()" function, again when decoding XPM images. This can also cause a buffer overlow.
And lastly, an input validation error in ICO image decoding can cause an integer overflow, causing a crash.
Secunia said in its advisory that there is no official updated version of GdkPixBuf.
So far, Red Hat, Debian, Fedora and MandrakeSoft have all put out updates and patches.
Kieren McCarthy writes for Techworld.com