• 公告ID (KylinSec-SA-2024-1593)

摘要:

In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.

安全等级: Low

公告ID: KylinSec-SA-2024-1593

发布日期: 2024年5月27日

关联CVE: CVE-2022-48622  

  • 详细介绍

1. 漏洞描述

   

In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-48622 KY3.4-4A gtk3 Unaffected
CVE-2022-48622 KY3.4-5 gtk3 Unaffected
CVE-2022-48622 KY3.5.1 gtk3 Unaffected
CVE-2022-48622 KY3.5.2 gtk3 Unaffected
CVE-2022-48622 V6 gtk3 Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-1592 下一篇:KylinSec-SA-2024-1594