An update for gdk-pixbuf2 is now available for openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1762
Final
1.0
1.0
2022-07-22
Initial
2022-07-22
2022-07-22
openEuler SA Tool V1.0
2022-07-22
gdk-pixbuf2 security update
An update for gdk-pixbuf2 is now available for openEuler-20.03-LTS-SP3.
gdk is written in C but has been designed from the ground up to support a wide range of languages. It provide a complete set of widgets,and suitable for projects ranging from small one-off tools to complete application suites.
Security Fix(es):
A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-20240)
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.(CVE-2020-29385)
An update for gdk-pixbuf2 is now available for openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
gdk-pixbuf2
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1762
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-20240
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-29385
https://nvd.nist.gov/vuln/detail/CVE-2021-20240
https://nvd.nist.gov/vuln/detail/CVE-2020-29385
openEuler-20.03-LTS-SP3
gdk-pixbuf2-debugsource-2.40.0-2.oe1.aarch64.rpm
gdk-pixbuf2-debuginfo-2.40.0-2.oe1.aarch64.rpm
gdk-pixbuf2-devel-2.40.0-2.oe1.aarch64.rpm
gdk-pixbuf2-2.40.0-2.oe1.aarch64.rpm
gdk-pixbuf2-help-2.40.0-2.oe1.noarch.rpm
gdk-pixbuf2-2.40.0-2.oe1.src.rpm
gdk-pixbuf2-devel-2.40.0-2.oe1.x86_64.rpm
gdk-pixbuf2-debuginfo-2.40.0-2.oe1.x86_64.rpm
gdk-pixbuf2-debugsource-2.40.0-2.oe1.x86_64.rpm
gdk-pixbuf2-2.40.0-2.oe1.x86_64.rpm
A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
2022-07-22
CVE-2021-20240
openEuler-20.03-LTS-SP3
High
8.8
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
gdk-pixbuf2 security update
2022-07-22
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1762
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.
2022-07-22
CVE-2020-29385
openEuler-20.03-LTS-SP3
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
gdk-pixbuf2 security update
2022-07-22
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1762