Описание
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
Отчет
This issue did not affect the versions of libpng as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include the vulnerable code.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | libpng | Not affected | ||
| Red Hat Enterprise Linux 6 | libpng | Not affected | ||
| Red Hat Enterprise Linux 7 | libpng | Not affected | ||
| Red Hat Enterprise Linux 7 | libpng12 | Not affected | ||
| Red Hat Enterprise Linux 8 | libpng | Not affected | ||
| Red Hat Enterprise Linux 8 | libpng12 | Not affected | ||
| Red Hat Virtualization 4 | libpng | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
An issue has been found in third-party PNM decoding associated with li ...
Уязвимость функции get_token компонента pnm2png.c библиотеки для работы с растровой графикой в формате PNG Libpng, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
EPSS
7 High
CVSS3