We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7345

Gdk‑pixbuf: heap‑buffer‑overflow in gdk‑pixbuf



Description

A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.

Reserved 2025-07-08 | Published 2025-07-08 | Updated 2025-07-09 | Assigner redhat


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-07-08:Reported to Red Hat.
2025-07-08:Made public.

Credits

Red Hat would like to thank Yifan Zhang (Programming Languages Lab, Peking University) for reporting this issue.

References

access.redhat.com/security/cve/CVE-2025-7345 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2377063 (RHBZ#2377063) issue-tracking

gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249

cve.org (CVE-2025-7345)

nvd.nist.gov (CVE-2025-7345)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7345

Support options

Helpdesk Chat, Email, Knowledgebase