{"id":"USN-3085-1","summary":"gdk-pixbuf vulnerabilities","details":"It was discovered that the GDK-PixBuf library did not properly handle specially\ncrafted bmp images, leading to a heap-based buffer overflow. If a user or\nautomated system were tricked into opening a specially crafted bmp file, a\nremote attacker could use this flaw to cause GDK-PixBuf to crash, resulting\nin a denial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-7552)\n\nIt was discovered that the GDK-PixBuf library contained an integer overflow\nwhen handling certain images. If a user or automated system were tricked into\nopening a crafted image file, a remote attacker could use this flaw to cause\nGDK-PixBuf to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8875)\n\nFranco Costantini discovered that the GDK-PixBuf library contained an \nout-of-bounds write error when parsing an ico file. If a user or automated\nsystem were tricked into opening a crafted ico file, a remote attacker could\nuse this flaw to cause GDK-PixBuf to crash, resulting in a denial of service.\nThis issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6352)\n","modified":"2026-04-22T09:28:36.102896Z","published":"2016-09-21T21:29:42Z","related":["UBUNTU-CVE-2015-7552","UBUNTU-CVE-2015-8875","UBUNTU-CVE-2016-6352"],"upstream":["CVE-2015-7552","CVE-2015-8875","CVE-2016-6352","UBUNTU-CVE-2015-7552","UBUNTU-CVE-2015-8875","UBUNTU-CVE-2016-6352"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3085-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7552"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8875"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6352"}],"affected":[{"package":{"name":"gdk-pixbuf","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gdk-pixbuf@2.30.7-0ubuntu1.6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.30.7-0ubuntu1.6"}]}],"versions":["2.28.1-1ubuntu2","2.30.0-0ubuntu2","2.30.1-0ubuntu2","2.30.2-0ubuntu1","2.30.2-0ubuntu2","2.30.3-0ubuntu1","2.30.4-0ubuntu1","2.30.5-0ubuntu1","2.30.6-1","2.30.7-0ubuntu1","2.30.7-0ubuntu1.1","2.30.7-0ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.30.7-0ubuntu1.6","binary_name":"gir1.2-gdkpixbuf-2.0"},{"binary_version":"2.30.7-0ubuntu1.6","binary_name":"libgdk-pixbuf2.0-0"},{"binary_version":"2.30.7-0ubuntu1.6","binary_name":"libgdk-pixbuf2.0-common"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3085-1.json","cves_map":{"cves":[{"id":"CVE-2015-7552","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2015-8875","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6352","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"gdk-pixbuf","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gdk-pixbuf@2.32.2-1ubuntu1.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.32.2-1ubuntu1.2"}]}],"versions":["2.32.1-1","2.32.2-1","2.32.2-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.32.2-1ubuntu1.2","binary_name":"gir1.2-gdkpixbuf-2.0"},{"binary_version":"2.32.2-1ubuntu1.2","binary_name":"libgdk-pixbuf2.0-0"},{"binary_version":"2.32.2-1ubuntu1.2","binary_name":"libgdk-pixbuf2.0-common"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3085-1.json","cves_map":{"cves":[{"id":"CVE-2016-6352","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.5"}