A buffer overflow in gThumb might allow remote attacker(s) to execute arbitrary code.
Package | media-gfx/gthumb on all architectures |
---|---|
Affected versions | < 3.10.0 |
Unaffected versions | >= 3.10.0 |
gThumb is an image viewer and browser for GNOME.
A heap-based buffer overflow in gThumb’s _cairo_image_surface_create_from_jpeg() function, located in extensions/cairo_io/cairo-image-surface-jpeg.c was discovered.
A remote attacker could entice a user to open a specially crafted image file using gThumb, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All gThumb users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-gfx/gthumb-3.10.0"
Release date
August 08, 2020
Latest revision
August 08, 2020: 1
Severity
normal
Exploitable
remote
Bugzilla entries