[GDK] patch - avoid integer overflow when allocating a large block of memory
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
GTK+ |
Fix Released
|
Low
|
|||
gtk+2.0 (Debian) |
Fix Released
|
Unknown
|
|||
gtk+2.0 (Ubuntu) |
High
|
Unassigned | |||
Precise |
Medium
|
Marc Deslauriers | |||
Trusty |
Medium
|
Marc Deslauriers | |||
Wily |
Medium
|
Marc Deslauriers | |||
Xenial |
High
|
Unassigned | |||
gtk+3.0 (Ubuntu) |
Medium
|
Unassigned | |||
Precise |
Medium
|
Marc Deslauriers | |||
Trusty |
Medium
|
Unassigned | |||
Wily |
Medium
|
Unassigned | |||
Xenial |
Medium
|
Unassigned |
Bug Description
[Impact]
Due to a logic error, an attempt to allocate a large block of memory fails in gdk_cairo_
This issue had been fixed [2] in GTK+3, but GTK+2 apps that use the mentioned function still crash when trying to allocate a lot of memory. An example of such app is eom (Eye of MATE), an image viewer, which crashes when trying to load a large image.
I propose fixing it in current Ubuntu releases with the patch which fixes the crash.
The debdiffs are in the attachments in the comments below.
[Test Case]
Steps to reproduce:
1. Have a 64-bit installation of Ubuntu.
2. Install eom if it isn't installed.
3. Download the archive from the attachment of this post and unpack it. (Firefox doesn't allow me to upload image as is - tries to make thumbnail of it right in the file open dialog, then crashes.)
4. Open the unpacked image (27000_
5. eom crashes. The full backtrace is at [3].
You'll also see an error message: "failed to allocate 184467440723305
[Regression Potential]
After several months of testing the patch in Debian Jessie, Debian Testing and Ubuntu 14.04, I haven't noticed any regressions.
[1] https:/
[2] https:/
[3] https:/
Related branches
CVE References
Vlad Orlov (monsta) wrote : | #1 |
Vlad Orlov (monsta) wrote : | #2 |
Vlad Orlov (monsta) wrote : | #3 |
Vlad Orlov (monsta) wrote : | #4 |
Vlad Orlov (monsta) wrote : | #5 |
Changed in gtk+2.0 (Debian): | |
status: | Unknown → New |
Changed in gtk+2.0 (Ubuntu): | |
importance: | Undecided → High |
status: | New → Triaged |
Changed in gtk: | |
importance: | Unknown → Low |
status: | Unknown → Fix Released |
Sebastien Bacher (seb128) wrote : | #7 |
Thank you for your work. I've sponsored the xenial update (with a modified changelog, we don't have designed maintainers/NMUs in Ubuntu, also I tweaked the version number to not be .1 and listed the bug reference).
Once the update gets some testing in xenial we can look at the SRUs
Note that it would be nice to suggest to upstream that they backport the change to gtk-2-24 since they still roll updates to gtk2 sometimes and it could benefit users of other distros that way
Changed in gtk+2.0 (Ubuntu): | |
status: | Triaged → Fix Committed |
Seth Arnold (seth-arnold) wrote : | #8 |
Do you know if this issue has a CVE assigned yet? I didn't see one in the linked bug reports but those references may not have migrated to those sources yet.
Thanks
information type: | Public → Public Security |
Seth Arnold (seth-arnold) wrote : | #9 |
I've requested CVEs here http://
It appears this flaw was copy-pasted to a lot of programs.
Thanks
Launchpad Janitor (janitor) wrote : | #10 |
This bug was fixed in the package gtk+2.0 - 2.24.29-1ubuntu2
---------------
gtk+2.0 (2.24.29-1ubuntu2) xenial; urgency=medium
* gdkcairo-
commit from GTK+3 to avoid integer overflow when allocating a large block
of memory in gdk_cairo_
-- Vlad Orlov <email address hidden> Tue, 02 Feb 2016 10:52:16 +0300
Changed in gtk+2.0 (Ubuntu): | |
status: | Fix Committed → Fix Released |
Marc Deslauriers (mdeslaur) wrote : | #11 |
Since this is a security update, I'll sponsor these as security updates, and not as SRUs.
Changed in gtk+2.0 (Ubuntu Precise): | |
status: | New → Confirmed |
Changed in gtk+2.0 (Ubuntu Trusty): | |
status: | New → Confirmed |
Changed in gtk+2.0 (Ubuntu Wily): | |
status: | New → Confirmed |
Changed in gtk+2.0 (Ubuntu Precise): | |
importance: | Undecided → Medium |
Changed in gtk+2.0 (Ubuntu Trusty): | |
importance: | Undecided → Medium |
Changed in gtk+2.0 (Ubuntu Wily): | |
importance: | Undecided → Medium |
Changed in gtk+2.0 (Ubuntu Precise): | |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
Changed in gtk+2.0 (Ubuntu Trusty): | |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
Changed in gtk+2.0 (Ubuntu Wily): | |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
Changed in gtk+3.0 (Ubuntu Precise): | |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
importance: | Undecided → Medium |
status: | New → Confirmed |
Changed in gtk+3.0 (Ubuntu Trusty): | |
status: | New → Fix Released |
Changed in gtk+3.0 (Ubuntu Wily): | |
status: | New → Fix Released |
Changed in gtk+3.0 (Ubuntu Xenial): | |
status: | New → Fix Released |
Changed in gtk+2.0 (Debian): | |
status: | New → Confirmed |
Changed in gtk+3.0 (Ubuntu Trusty): | |
importance: | Undecided → Medium |
Changed in gtk+3.0 (Ubuntu Wily): | |
importance: | Undecided → Medium |
Changed in gtk+3.0 (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Launchpad Janitor (janitor) wrote : | #12 |
This bug was fixed in the package gtk+2.0 - 2.24.10-0ubuntu6.3
---------------
gtk+2.0 (2.24.10-
* gdkcairo-
commit from GTK+3 to avoid integer overflow when allocating a large block
of memory in gdk_cairo_
- CVE-2013-7447
-- Vlad Orlov <email address hidden> Tue, 22 Sep 2015 09:51:11 +0300
Changed in gtk+2.0 (Ubuntu Precise): | |
status: | Confirmed → Fix Released |
Launchpad Janitor (janitor) wrote : | #13 |
This bug was fixed in the package gtk+2.0 - 2.24.23-0ubuntu1.4
---------------
gtk+2.0 (2.24.23-
* gdkcairo-
commit from GTK+3 to avoid integer overflow when allocating a large block
of memory in gdk_cairo_
- CVE-2013-7447
-- Vlad Orlov <email address hidden> Tue, 22 Sep 2015 11:09:21 +0300
Changed in gtk+2.0 (Ubuntu Trusty): | |
status: | Confirmed → Fix Released |
Launchpad Janitor (janitor) wrote : | #14 |
This bug was fixed in the package gtk+3.0 - 3.4.2-0ubuntu0.9
---------------
gtk+3.0 (3.4.2-0ubuntu0.9) precise-security; urgency=medium
* SECURITY UPDATE: integer overflow via large sized image (LP: #1540811)
- debian/
gdk_
- CVE-2013-7447
-- Marc Deslauriers <email address hidden> Fri, 12 Feb 2016 08:37:18 -0500
Changed in gtk+3.0 (Ubuntu Precise): | |
status: | Confirmed → Fix Released |
Launchpad Janitor (janitor) wrote : | #15 |
This bug was fixed in the package gtk+2.0 - 2.24.28-1ubuntu1.1
---------------
gtk+2.0 (2.24.28-
* gdkcairo-
commit from GTK+3 to avoid integer overflow when allocating a large block
of memory in gdk_cairo_
- CVE-2013-7447
-- Vlad Orlov <email address hidden> Tue, 22 Sep 2015 13:27:04 +0300
Changed in gtk+2.0 (Ubuntu Wily): | |
status: | Confirmed → Fix Released |
Vlad Orlov (monsta) wrote : | #16 |
Thank you guys!
Hope someone from Debian maintainers will take care of it as well...
Changed in gtk+2.0 (Debian): | |
status: | Confirmed → Fix Committed |
Changed in gtk+2.0 (Debian): | |
status: | Fix Committed → Fix Released |
The attachment "debdiff with the fix for Precise" seems to be a debdiff. The ubuntu-sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. If the attachment isn't a patch, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are member of the ~ubuntu-sponsors, unsubscribe the team.
[This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issue please contact him.]