3 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

19 Jul 2021 — GNOME gThumb before 3.10.1 allows an application crash via a malformed JPEG image. GNOME gThumb versiones anteriores a 3.10.1, permite el bloqueo de la aplicación por medio de una imagen JPEG malformada It was discovered that gThumb did not properly managed memory when processing certain image files. If a user were tricked into opening a specially crafted JPEG file, an attacker could possibly use this issue to cause gThumb to crash, resulting in a denial of service, or possibly execute arbitrary code. It wa... • https://download.gnome.org/sources/gthumb/3.10/gthumb-3.10.1.news •

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 1

16 Mar 2020 — A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file. Un desbordamiento de búfer en la región heap de la memoria en la función _cairo_image_surface_create_from_jpeg() en el archivo extensions/cairo_io/cairo-image-surface-jpeg.c en GNOME gThumb versiones anteriores a 3.8.3 y Linux Mint... • https://github.com/Fysac/CVE-2019-20326 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

28 Oct 2018 — An issue was discovered in gThumb through 3.6.2. There is a double-free vulnerability in the add_themes_from_dir method in dlg-contact-sheet.c because of two successive calls of g_free, each of which frees the same buffer. Se ha descubierto un problema en gThumb hasta su versión 3.6.2. Hay una vulnerabilidad de doble liberación (double free) en el método add_themes_from_dir en dlg-contact-sheet.c debido a dos llamadas sucesivas de g_free, cada una de las cuales libera el mismo búfer. • https://gitlab.gnome.org/GNOME/gthumb/issues/18 • CWE-415: Double Free •