First published: Mon Mar 16 2020(Updated: )
A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME gThumb | <3.8.3 | |
Linuxmint Pix | <2.4.5 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20326 is a vulnerability that allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5.
The severity of CVE-2019-20326 is high, with a severity value of 7.8.
The affected software for CVE-2019-20326 includes GNOME gThumb before version 3.8.3, Linux Mint Pix before version 2.4.5, and Debian Debian Linux version 9.0.
CVE-2019-20326 works by exploiting a heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() function in GNOME gThumb and Linux Mint Pix, allowing attackers to potentially execute arbitrary code via a crafted JPEG file.
To fix CVE-2019-20326, users should update to the latest versions of GNOME gThumb and Linux Mint Pix, which are 3.8.3 and 2.4.5 respectively.