First published: Tue Jan 02 2018(Updated: )
Gnome gdk-pixbuf 2.36.8 and older is vulnerable to several integer overflow in the gif_get_lzw function resulting in memory corruption and potential code execution
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME gdk-pixbuf | <=2.36.8 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
debian/gdk-pixbuf | 2.42.2+dfsg-1+deb11u2 2.42.2+dfsg-1+deb11u1 2.42.10+dfsg-1+deb12u1 2.42.12+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000422 is a vulnerability in Gnome gdk-pixbuf 2.36.8 and older that allows for several integer overflows in the gif_get_lzw function, resulting in memory corruption and potential code execution.
CVE-2017-1000422 has a severity rating of 8.8 (high).
Gnome gdk-pixbuf versions 2.36.8 and older are affected by CVE-2017-1000422.
For Ubuntu, upgrade to gdk-pixbuf version 2.30.7-0ubuntu1.8, 2.36.11-1, or 2.32.2-1ubuntu1.4. For Debian, upgrade to gdk-pixbuf version 2.38.1+dfsg-1, 2.42.2+dfsg-1+deb11u1, 2.42.10+dfsg-1, or 2.42.10+dfsg-2.
You can find more information about CVE-2017-1000422 at the following references: [Bugzilla](https://bugzilla.gnome.org/show_bug.cgi?id=785973), [Debian LTS Announcement](https://lists.debian.org/debian-lts-announce/2018/01/msg00007.html), [Gentoo Security](https://security.gentoo.org/glsa/201804-14).