<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gdk-pixbuf</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20084-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-22T14:36:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-22T14:36:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-22T14:36:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gdk-pixbuf</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gdk-pixbuf fixes the following issues:

- CVE-2025-7345: heap buffer overflow in gdk-pixbuf within the gdk_pixbuf__jpeg_image_load_increment function
  (io-jpeg.c) and in glib g_base64_encode_step (bsc#1246114).
- CVE-2025-6199: uninitialized memory could lead to leak arbitrary memory contents (bsc#1245227).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-173</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1245227</URL>
      <Description>SUSE Bug 1245227</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1246114</URL>
      <Description>SUSE Bug 1246114</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6199/</URL>
      <Description>SUSE CVE CVE-2025-6199 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-7345/</URL>
      <Description>SUSE CVE CVE-2025-7345 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-devel-2.42.12-160000.3.1">
      <FullProductName ProductID="gdk-pixbuf-devel-2.42.12-160000.3.1">gdk-pixbuf-devel-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-lang-2.42.12-160000.3.1">
      <FullProductName ProductID="gdk-pixbuf-lang-2.42.12-160000.3.1">gdk-pixbuf-lang-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-query-loaders-2.42.12-160000.3.1">
      <FullProductName ProductID="gdk-pixbuf-query-loaders-2.42.12-160000.3.1">gdk-pixbuf-query-loaders-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1">
      <FullProductName ProductID="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1">gdk-pixbuf-thumbnailer-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1">
      <FullProductName ProductID="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1">libgdk_pixbuf-2_0-0-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1">
      <FullProductName ProductID="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1">typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1">
      <FullProductName ProductID="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1">typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gdk-pixbuf-devel-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gdk-pixbuf-devel-2.42.12-160000.3.1">gdk-pixbuf-devel-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-lang-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gdk-pixbuf-lang-2.42.12-160000.3.1">gdk-pixbuf-lang-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-query-loaders-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gdk-pixbuf-query-loaders-2.42.12-160000.3.1">gdk-pixbuf-query-loaders-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:gdk-pixbuf-thumbnailer-2.42.12-160000.3.1">gdk-pixbuf-thumbnailer-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libgdk_pixbuf-2_0-0-2.42.12-160000.3.1">libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1">typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1">typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the GIF parser of GdkPixbuf's LZW decoder. When an invalid symbol is encountered during decompression, the decoder sets the reported output size to the full buffer length rather than the actual number of written bytes. This logic error results in uninitialized sections of the buffer being included in the output, potentially leaking arbitrary memory contents in the processed image.</Note>
    </Notes>
    <CVE>CVE-2025-6199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-devel-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-lang-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-query-loaders-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-thumbnailer-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgdk_pixbuf-2_0-0-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6199.html</URL>
        <Description>CVE-2025-6199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245227</URL>
        <Description>SUSE Bug 1245227</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw exists in gdk-pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib's g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2025-7345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-devel-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-lang-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-query-loaders-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:gdk-pixbuf-thumbnailer-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libgdk_pixbuf-2_0-0-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-7345.html</URL>
        <Description>CVE-2025-7345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246114</URL>
        <Description>SUSE Bug 1246114</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
