DEBIAN-CVE-2019-20326

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-20326
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-20326.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-20326
Upstream
Published
2020-03-16T22:15:14Z
Modified
2025-09-19T06:24:31Z
Summary
[none]
Details

A heap-based buffer overflow in cairoimagesurfacecreatefromjpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.

References

Affected packages

Debian:11 / gthumb

Package

Name
gthumb
Purl
pkg:deb/debian/gthumb?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:3.8.3-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / gthumb

Package

Name
gthumb
Purl
pkg:deb/debian/gthumb?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:3.8.3-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / gthumb

Package

Name
gthumb
Purl
pkg:deb/debian/gthumb?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:3.8.3-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / gthumb

Package

Name
gthumb
Purl
pkg:deb/debian/gthumb?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:3.8.3-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}