CVE-2025-7345

A flaw exists in gdkpixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glibs g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Debian logo
Debian Releases
Debian Product
Codename
gdk-pixbuf
bullseye
vulnerable
bookworm
postponed
bullseye (security)
vulnerable
bookworm (security)
vulnerable
trixie
2.42.12+dfsg-4
fixed
forky
2.42.12+dfsg-5
fixed
sid
2.42.12+dfsg-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gdk-pixbuf
plucky
Fixed 2.42.12+dfsg-2ubuntu0.1
released
oracular
ignored
noble
Fixed 2.42.10+dfsg-3ubuntu3.2
released
jammy
Fixed 2.42.8+dfsg-1ubuntu0.4
released
focal
Fixed 2.40.0+dfsg-3ubuntu0.5+esm1
released
bionic
Fixed 2.36.11-2ubuntu0.1~esm2
released
xenial
Fixed 2.32.2-1ubuntu1.6+esm2
released