Integer overflow vulnerability in Ubuntu via large image fileID: oval:org.secpod.oval:def:50337 | Date: (C)2019-01-25 (M)2023-12-20 |
Class: VULNERABILITY | Family: unix |
Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
Platform: |
Ubuntu 18.10 |
Ubuntu 16.04 |
Ubuntu 14.04 |
Ubuntu 18.04 |
Product: |
gambas3 |
thunar |
pinpoint |
gnome-photos |