Lucene search

K
debianDebianDEBIAN:DLA-3238-1:D3DFA
HistoryDec 13, 2022 - 3:10 p.m.

[SECURITY] [DLA 3238-1] pngcheck security update

2022-12-1315:10:28
lists.debian.org
8
pngcheck
security
buffer overflow
debian 10

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.2%


Debian LTS Advisory DLA-3238-1 [email protected]
https://www.debian.org/lts/security/ Tobias Frost
December 13, 2022 https://wiki.debian.org/LTS

Package : pngcheck
Version : 3.0.3-1~deb10u2
CVE ID : CVE-2020-35511
Debian Bugs : 1021278

Multiple security issues were discovered in pngcheck, a tool to verify the
integrity of PNG, JNG and MNG files, which could potentially result
in the execution of arbitrary code.

CVE-2020-35511

A global buffer overflow was discovered in pngcheck function in
pngcheck-2.4.0 (5 patches applied) via a crafted png file.

For Debian 10 buster, these problems have been fixed in version
3.0.3-1~deb10u2.

We recommend that you upgrade your pngcheck packages.

For the detailed security status of pngcheck please refer to its security
tracker page at: https://security-tracker.debian.org/tracker/pngcheck

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.2%