-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5228-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso September 11, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gdk-pixbuf CVE ID : CVE-2021-44648 CVE-2021-46829 Debian Bug : 1014600 Several vulnerabilities were discovered in gdk-pixbuf, the GDK Pixbuf library. CVE-2021-44648 Sahil Dhar reported a heap-based buffer overflow vulnerability when decoding the lzw compressed stream of image data, which may result in the execution of arbitrary code or denial of service if a malformed GIF image is processed. CVE-2021-46829 Pedro Ribeiro reported a heap-based buffer overflow vulnerability when compositing or clearing frames in GIF files, which may result in the execution of arbitrary code or denial of service if a malformed GIF image is processed. For the stable distribution (bullseye), these problems have been fixed in version 2.42.2+dfsg-1+deb11u1. We recommend that you upgrade your gdk-pixbuf packages. For the detailed security status of gdk-pixbuf please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gdk-pixbuf Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmMd7HBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0R0tA/+JOBzstPjp2oQms59qsPCIKOp8RmjbBfqtsjxFkdS8aXpiRyc9p+x+f+H PhZfcZxd5s3IhVJIXceWY9Phjr4Ewcl3B3QoBEzOMKKgy8qPA/r1WLGVtRld9AAi DYqisl6lI7NimyCdSzLDs6vHgiUtB+qvRKu7wFfpwNwWjhAJCm/IKI6vv+ASW27b 0yLtJX57VLSunrN+7tdnBtVmsAR6ffJ5rbf46ZURootLGc7f9J9XHXd+Pn5Cg7jg dRfGyUEn4s/4wJZ74KPMpfj+eUuBmloVEEzXsP0VeaI/zmdEFeHZ95DDGK9xRl+u oRTe3Xq5p+qM32vv8BiuHKGufQipOYFvQlvSOPD5IIJozWufJajVvGAwiHi98svV QE4Hxwm7RFOqmf77wGW0gJjZHebLstqtcCaM7FMFv63KrvKjsk0wa/iLkMno/qxm 8G5xkq2QQ0swmeDW8hnqWpsyu1xsPfGUVwkMgSA14MikLJi4FmuUztdRMWo7tlV7 QpT+kO8O0AB70IQu5O1qHOxw6dVICBnGjw8RnoDBWrNstTyJKBAGU1GhVNvMFqOZ ffcIJyVAkaBVteOnUYK1EivCiclvol3eVzpXtQk/WmKu3oFEBvYYvXKSLTnv8Qvz 2rRwUVPbtAA/h8ohgg62ZXi8hMKPfZIFTuFSgeCTcspPJ81ka4Y= =KpWF -----END PGP SIGNATURE-----