Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 15.10 | |
ubuntu_linux | eq | 14.04 | |
x14j_firmware | eq | tms14jakucb1102.5 |
lists.opensuse.org/opensuse-updates/2016-03/msg00010.html
www.openwall.com/lists/oss-security/2016/02/10/2
www.openwall.com/lists/oss-security/2016/02/10/6
www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
www.securityfocus.com/bid/83239
www.ubuntu.com/usn/USN-2898-1
www.ubuntu.com/usn/USN-2898-2
bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811
bugzilla.gnome.org/show_bug.cgi?id=703220
git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6
git.gnome.org/browse/gtk+/tree/NEWS
github.com/mate-desktop/eom/issues/93