CVE-2017-2862

Priority
Medium
Description
An exploitable heap overflow vulnerability exists in the
gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A
specially crafted jpeg file can cause a heap overflow resulting in remote
code execution. An attacker can send a file or url to trigger this
vulnerability.
References
Bugs
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):not-affected (2.36.10-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (2.30.7-0ubuntu1.7)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.32.2-1ubuntu1.3)
Ubuntu 17.04 (Zesty Zapus):released (2.36.5-3ubuntu0.2)
Patches:
Upstream:https://git.gnome.org/browse/gdk-pixbuf/commit/?id=c2a40a92fe3df4111ed9da51fe3368c079b86926
Upstream:https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6dd89e126a277460faafc1f679db44ccf78446fb
More Information

Updated: 2017-09-25 19:14:41 UTC (commit 13395)