A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.
Workaround:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:12841 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:12862 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:13315 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:14574 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:14575 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:14576 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-7345 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2377063 | issue tracking |
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249 |