First published: Tue Aug 11 2015(Updated: )
Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME gdk-pixbuf | <=2.31.4 | |
Google Chrome | ||
Mozilla Firefox | <=39.0.3 | |
Mozilla Firefox ESR | =38.0 | |
Mozilla Firefox ESR | =38.0.1 | |
Mozilla Firefox ESR | =38.0.5 | |
Mozilla Firefox ESR | =38.1.0 | |
Linux Linux kernel | ||
Oracle Solaris | =10 | |
Oracle Solaris | =11.3 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
All of | ||
GNOME gdk-pixbuf | <=2.31.4 | |
Any of | ||
Google Chrome | ||
Mozilla Firefox | <=39.0.3 | |
Mozilla Firefox | =38.0 | |
Mozilla Firefox | =38.0.1 | |
Mozilla Firefox | =38.0.5 | |
Mozilla Firefox | =38.1.0 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.