A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "binary_version": "0.7-1ubuntu0.1", "binary_name": "gcab" }, { "binary_version": "0.7-1ubuntu0.1", "binary_name": "gcab-dbgsym" }, { "binary_version": "0.7-1ubuntu0.1", "binary_name": "gir1.2-libgcab-1.0" }, { "binary_version": "0.7-1ubuntu0.1", "binary_name": "libgcab-1.0-0" }, { "binary_version": "0.7-1ubuntu0.1", "binary_name": "libgcab-1.0-0-dbgsym" }, { "binary_version": "0.7-1ubuntu0.1", "binary_name": "libgcab-dev" }, { "binary_version": "0.7-1ubuntu0.1", "binary_name": "libgcab-doc" } ] }