CVE-2021-46829

GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/07/25/1 Mailing List Third Party Advisory
https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md Exploit Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/5398f04d772f7f8baf5265715696ed88db0f0512 Patch Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bca00032ad68d0b0aa2c1f7558db931e52bd9cd2 Patch Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 Exploit Issue Tracking Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/121 Exploit Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/
https://www.debian.org/security/2022/dsa-5228 Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/07/23/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/07/25/1 Mailing List Third Party Advisory
https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md Exploit Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/5398f04d772f7f8baf5265715696ed88db0f0512 Patch Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bca00032ad68d0b0aa2c1f7558db931e52bd9cd2 Patch Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 Exploit Issue Tracking Third Party Advisory
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/121 Exploit Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/
https://www.debian.org/security/2022/dsa-5228 Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/07/23/1 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:34

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/07/25/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/07/25/1 - Mailing List, Third Party Advisory
References () https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md - Exploit, Third Party Advisory () https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md - Exploit, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/5398f04d772f7f8baf5265715696ed88db0f0512 - Patch, Third Party Advisory () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/5398f04d772f7f8baf5265715696ed88db0f0512 - Patch, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bca00032ad68d0b0aa2c1f7558db931e52bd9cd2 - Patch, Third Party Advisory () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bca00032ad68d0b0aa2c1f7558db931e52bd9cd2 - Patch, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 - Exploit, Issue Tracking, Third Party Advisory () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 - Exploit, Issue Tracking, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/121 - Exploit, Third Party Advisory () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/121 - Exploit, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/ -
References () https://www.debian.org/security/2022/dsa-5228 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5228 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2022/07/23/1 - Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2022/07/23/1 - Mailing List, Third Party Advisory

07 Nov 2023, 03:40

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/', 'name': 'FEDORA-2022-7254ec5e96', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/ -

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-787 CWE-190

Information

Published : 2022-07-24 19:15

Updated : 2024-11-21 06:34


NVD link : CVE-2021-46829

Mitre link : CVE-2021-46829

CVE.ORG link : CVE-2021-46829


JSON object : View

Products Affected

gnome

  • gdk-pixbuf

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-190

Integer Overflow or Wraparound