|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0891: gdk-pixbuf double free | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | E-mail List <gnome-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-0891: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Ludwig Nussel
2005-03-29 08:21:58 UTC
It looks like the impact is limited to a denial-of-service condition and not being a code execution scenario. I did not find a hint that an attacker is able to overwrite the internal structures used by glibc for handling dyn. allocated memory chunks. The glibc implementation of SL 9.2 even catches double free bugs (unfortunately not safely). so rather low prio. CAN-2005-0891 also affects gtk2 would you please fix this bug in stable so we can close it? http://bugzilla.gnome.org/show_bug.cgi?id=171707#c5 backported to gdk-pixbuf. gtk2 not fixed. It will be updated for sure during 10.0 release cycle to the latest version. CVE-2005-0891: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) |