{"id":"USN-5681-1","summary":"gThumb vulnerabilities","details":"It was discovered that gThumb did not properly managed\nmemory under certain circumstances. An attacker could\npossibly use this issue to cause gThumb to crash, resulting\nin a denial of service, or possibly execute arbitrary code.\n(CVE-2018-18718)\n\nIt was discovered that gThumb did not properly managed\nmemory when processing certain image files. If a user were\ntricked into opening a specially crafted JPEG file, an\nattacker could possibly use this issue to cause gThumb to\ncrash, resulting in a denial of service, or possibly\nexecute arbitrary code. (CVE-2019-20326)\n\nIt was discovered that gThumb did not properly handled\ncertain malformed image files. If a user were tricked into\nopening a specially crafted JPEG file, an attacker could\npossibly use this issue to cause gThumb to crash, resulting\nin a denial of service. (CVE-2020-36427)\n","modified":"2026-02-10T04:42:48Z","published":"2022-10-14T14:13:08Z","related":["UBUNTU-CVE-2018-18718","UBUNTU-CVE-2019-20326","UBUNTU-CVE-2020-36427"],"upstream":["CVE-2018-18718","CVE-2019-20326","CVE-2020-36427","UBUNTU-CVE-2018-18718","UBUNTU-CVE-2019-20326","UBUNTU-CVE-2020-36427"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5681-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18718"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-20326"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36427"}],"affected":[{"package":{"name":"gthumb","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/gthumb@3:3.4.3-1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:3.4.3-1ubuntu0.1~esm1"}]}],"versions":["3:3.3.1.is.3.2.8-0ubuntu3","3:3.4.1-2","3:3.4.1-3","3:3.4.1-4","3:3.4.3-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3:3.4.3-1ubuntu0.1~esm1","binary_name":"gthumb"},{"binary_version":"3:3.4.3-1ubuntu0.1~esm1","binary_name":"gthumb-data"},{"binary_version":"3:3.4.3-1ubuntu0.1~esm1","binary_name":"gthumb-dev"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18718"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-20326"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-36427"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5681-1.json"}},{"package":{"name":"gthumb","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/gthumb@3:3.6.1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3:3.6.1-1ubuntu0.1~esm1"}]}],"versions":["3:3.5.2-2ubuntu1","3:3.5.3-1","3:3.5.4-1","3:3.6.0-1","3:3.6.0-2","3:3.6.0-3","3:3.6.0-4","3:3.6.1-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3:3.6.1-1ubuntu0.1~esm1","binary_name":"gthumb"},{"binary_version":"3:3.6.1-1ubuntu0.1~esm1","binary_name":"gthumb-data"},{"binary_version":"3:3.6.1-1ubuntu0.1~esm1","binary_name":"gthumb-dev"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18718"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-20326"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-36427"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5681-1.json"}}],"schema_version":"1.7.3"}