Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.854943
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for gdk-pixbuf (SUSE-SU-2022:2995-1)
Summary:The remote host is missing an update for the 'gdk-pixbuf'; package(s) announced via the SUSE-SU-2022:2995-1 advisory.
Description:Summary:
The remote host is missing an update for the 'gdk-pixbuf'
package(s) announced via the SUSE-SU-2022:2995-1 advisory.

Vulnerability Insight:
This update for gdk-pixbuf fixes the following issues:
Update to version 2.42.8, including the following:

- CVE-2021-46829: Fixed a heap-based buffer overflow when compositing or
clearing frames in GIF files (bsc#1201826).

Affected Software/OS:
'gdk-pixbuf' package(s) on openSUSE Leap 15.4.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-46829
Debian Security Information: DSA-5228 (Google Search)
https://www.debian.org/security/2022/dsa-5228
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5IHHEYFD6GDZVALKIPPRD2U4JNZUZWR/
https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/5398f04d772f7f8baf5265715696ed88db0f0512
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bca00032ad68d0b0aa2c1f7558db931e52bd9cd2
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/121
https://www.openwall.com/lists/oss-security/2022/07/23/1
http://www.openwall.com/lists/oss-security/2022/07/25/1
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.