Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200712-24 ] AMD64 x86 emulation GTK+ library: User-assisted execution of arbitrary code
Date: Sun, 30 Dec 2007 18:17:08
Message-Id: 200712301853.09216.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200712-24
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: AMD64 x86 emulation GTK+ library: User-assisted execution of
9 arbitrary code
10 Date: December 30, 2007
11 Bugs: #201860
12 ID: 200712-24
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 Multiple integer overflow vulnerabilities in the AMD64 x86 emulation
20 GTK+ libraries may result in the execution of arbitrary code in
21 applications using Cairo.
22
23 Background
24 ==========
25
26 Cairo is a 2D vector graphics library with cross-device output support.
27 The AMD64 x86 emulation GTK+ library packages Cairo libraries for 32bit
28 x86 emulation on AMD64.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 emul-linux-x86-gtklibs < 20071214 >= 20071214
37 -------------------------------------------------------------------
38 # Package 1 only applies to AMD64 users.
39
40 Description
41 ===========
42
43 The Cairo versions used by the AMD64 x86 emulation GTK+ libraries were
44 vulnerable to integer overflow vulnerabilities (GLSA 200712-04).
45
46 Impact
47 ======
48
49 A remote attacker could entice a user to view or process a specially
50 crafted PNG image file in an application linked against Cairo, possibly
51 leading to the execution of arbitrary code with the privileges of the
52 user running the application.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All AMD64 x86 emulation GTK+ library users should upgrade to the latest
63 version:
64
65 # emerge --sync
66 # emerge -a -1 -v ">=app-emulation/emul-linux-x86-gtklibs-20071214"
67
68 References
69 ==========
70
71 [ 1 ] GLSA 200712-04
72 http://www.gentoo.org/security/en/glsa/glsa-200712-04.xml
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200712-24.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2007 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature