GTK+ - (bulletinjan2017)ID: oval:org.secpod.oval:def:2100454 | Date: (C)2019-12-30 (M)2022-10-10 |
Class: PATCH | Family: unix |
Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
Product: |
library/desktop/gtk2 |
library/desktop/gtk2/gtk-backend-cups |
image/viewer/eog |