Vulnerability Description
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Gdkpixbuf | <= 2.42.10 |
Related Weaknesses (CWE)
References
- https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202ExploitIssue Tracking
- https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202ExploitIssue Tracking
FAQ
What is CVE-2022-48622?
CVE-2022-48622 is a vulnerability with a CVSS score of 7.8 (HIGH). In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani f...
How severe is CVE-2022-48622?
CVE-2022-48622 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48622?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Gdkpixbuf.