Skip to content

Potential Vulnerability in Cloned Code#1064

Open
tabudz wants to merge 1 commit intoArdour:masterfrom
tabudz:cve-2015-4491
Open

Potential Vulnerability in Cloned Code#1064
tabudz wants to merge 1 commit intoArdour:masterfrom
tabudz:cve-2015-4491

Conversation

@tabudz
Copy link

@tabudz tabudz commented Mar 5, 2026

Summary

Our tool detected a potential vulnerability in libs/tk/ydk-pixbuf/pixops/pixops.c which was cloned from GNOME/gdk-pixbuf but did not receive the security patch applied. The original issue was reported and fixed under https://nvd.nist.gov/vuln/detail/cve-2015-4491.

Proposed Fix

Apply the same patch as the one in GNOME/gdk-pixbuf to eliminate the vulnerability.

Reference

https://nvd.nist.gov/vuln/detail/cve-2015-4491
GNOME/gdk-pixbuf@ffec86e

Our loader code is supposed to handle out-of-memory and overflow situations gracefully, reporting errors instead of aborting. But if you load an image at a specific size, we also execute our scaling code, which was not careful enough about overflow in some places.

This commit makes the scaling code silently return if it fails to allocate filter tables. This is the best we can do, since gdk_pixbuf_scale() is not taking a GError.

https://bugzilla.gnome.org/show_bug.cgi?id=752297
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants