Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "gir1.2-gdkpixbuf-2.0",
"binary_version": "2.30.7-0ubuntu1.8"
},
{
"binary_name": "libgdk-pixbuf2.0-0",
"binary_version": "2.30.7-0ubuntu1.8"
},
{
"binary_name": "libgdk-pixbuf2.0-common",
"binary_version": "2.30.7-0ubuntu1.8"
},
{
"binary_name": "libgdk-pixbuf2.0-dev",
"binary_version": "2.30.7-0ubuntu1.8"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "gir1.2-gdkpixbuf-2.0",
"binary_version": "2.32.2-1ubuntu1.4"
},
{
"binary_name": "libgdk-pixbuf2.0-0",
"binary_version": "2.32.2-1ubuntu1.4"
},
{
"binary_name": "libgdk-pixbuf2.0-common",
"binary_version": "2.32.2-1ubuntu1.4"
},
{
"binary_name": "libgdk-pixbuf2.0-dev",
"binary_version": "2.32.2-1ubuntu1.4"
}
]
}