摘要:
gdk-pixbuf2 security update
安全等级: High
公告ID: KylinSec-SA-2024-4020
发布日期: 2024年9月20日
关联CVE: CVE-2022-48622
gdk is written in C but has been designed from the ground up to support a wide range of languages. It provide a complete set of widgets,and suitable for projects ranging from small one-off tools to complete application suites.
Security Fix(es):
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.(CVE-2022-48622)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-48622 | KY3.4-5A | gdk-pixbuf2 | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
gdk-pixbuf2-help | noarch | 2.40.0-6.kb1.ky3_4 |
gdk-pixbuf2 | x86_64 | 2.40.0-6.kb1.ky3_4 |
gdk-pixbuf2-devel | x86_64 | 2.40.0-6.kb1.ky3_4 |
gdk-pixbuf2 | aarch64 | 2.40.0-6.kb1.ky3_4 |
gdk-pixbuf2-devel | aarch64 | 2.40.0-6.kb1.ky3_4 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名