Gentoo Logo

GTK+ 2, GdkPixbuf: Multiple XPM decoding vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200511-14 / gtk+
Release Date November 16, 2005
Latest Revision November 16, 2005: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
x11-libs/gtk+ < 2.8.6-r1 >= 2.8.6-r1, revision >= 2.6.10-r1, < 2.0 All supported architectures
media-libs/gdk-pixbuf < 0.22.0-r5 >= 0.22.0-r5 All supported architectures

Related bugreports: #112608


The GdkPixbuf library, that is also included in GTK+ 2, contains vulnerabilities that could lead to a Denial of Service or the execution of arbitrary code.

2.  Impact Information


GTK+ (the GIMP Toolkit) is a toolkit for creating graphical user interfaces. The GdkPixbuf library provides facilities for image handling. It is available as a standalone library and also packaged with GTK+ 2.


iDEFENSE reported a possible heap overflow in the XPM loader (CVE-2005-3186). Upon further inspection, Ludwig Nussel discovered two additional issues in the XPM processing functions : an integer overflow (CVE-2005-2976) that affects only gdk-pixbuf, and an infinite loop (CVE-2005-2975).


Using a specially crafted XPM image an attacker could cause an affected application to enter an infinite loop or trigger the overflows, potentially allowing the execution of arbitrary code.

3.  Resolution Information


There is no known workaround at this time.


All GTK+ 2 users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose x11-libs/gtk+

All GdkPixbuf users should upgrade to the latest version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/gdk-pixbuf-0.22.0-r5"

4.  References


Page updated November 16, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.