vulnerability
Amazon Linux 2023: CVE-2021-46829: Medium priority package update for gdk-pixbuf2
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Jul 24, 2022 | Feb 17, 2025 | Dec 4, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 24, 2022
Added
Feb 17, 2025
Modified
Dec 4, 2025
Description
GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems.
A heap-based buffer overflow vulnerability was found in GNOME GdkPixbuf (aka GDK-PixBuf) when compositing or clearing frames in GIF files. The vulnerability exists due to a boundary error when processing GIF images. This flaw allows an attacker to create a specially crafted GIF image, trick the victim into opening it, triggering an out-of-bounds write, which allows executing arbitrary code on the target system or causing a potential crash.
A heap-based buffer overflow vulnerability was found in GNOME GdkPixbuf (aka GDK-PixBuf) when compositing or clearing frames in GIF files. The vulnerability exists due to a boundary error when processing GIF images. This flaw allows an attacker to create a specially crafted GIF image, trick the victim into opening it, triggering an out-of-bounds write, which allows executing arbitrary code on the target system or causing a potential crash.
Solutions
amazon-linux-2023-upgrade-gdk-pixbuf2amazon-linux-2023-upgrade-gdk-pixbuf2-debuginfoamazon-linux-2023-upgrade-gdk-pixbuf2-debugsourceamazon-linux-2023-upgrade-gdk-pixbuf2-develamazon-linux-2023-upgrade-gdk-pixbuf2-devel-debuginfoamazon-linux-2023-upgrade-gdk-pixbuf2-modulesamazon-linux-2023-upgrade-gdk-pixbuf2-modules-debuginfoamazon-linux-2023-upgrade-gdk-pixbuf2-testsamazon-linux-2023-upgrade-gdk-pixbuf2-tests-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.