CVE-2022-48622
Published: September 20, 2024Last modified: September 20, 2024
Description
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 7.8 | 
| Attack Vector | LOCAL | 
| Attack complexity | LOW | 
| Privileges required | NONE | 
| User interaction | REQUIRED | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | gdk-pixbuf | Fixed (2.42.12-r0) | 
| Stream | gdk-pixbuf | Fixed (2.42.12-r1) |