Debian Linux Security Advisory 5228-1 - Several vulnerabilities were discovered in gdk-pixbuf, the GDK Pixbuf library.
2779b19645046756f046040b839f7910204298a4f8304bb68cd29482f89ab133
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5228-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : gdk-pixbuf
CVE ID : CVE-2021-44648 CVE-2021-46829
Debian Bug : 1014600
Several vulnerabilities were discovered in gdk-pixbuf, the GDK
Pixbuf library.
CVE-2021-44648
Sahil Dhar reported a heap-based buffer overflow vulnerability when
decoding the lzw compressed stream of image data, which may result
in the execution of arbitrary code or denial of service if a
malformed GIF image is processed.
CVE-2021-46829
Pedro Ribeiro reported a heap-based buffer overflow vulnerability
when compositing or clearing frames in GIF files, which may result
in the execution of arbitrary code or denial of service if a
malformed GIF image is processed.
For the stable distribution (bullseye), these problems have been fixed in
version 2.42.2+dfsg-1+deb11u1.
We recommend that you upgrade your gdk-pixbuf packages.
For the detailed security status of gdk-pixbuf please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/gdk-pixbuf
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=KpWF
-----END PGP SIGNATURE-----