First published: Sat Apr 14 2018(Updated: )
An issue was discovered in GEGL through 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gegl Gegl | <=0.3.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10112 is a vulnerability discovered in GEGL, which allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file.
The severity of CVE-2018-10112 is high with a CVSS score of 8.8.
Versions up to and including 0.3.32 of GEGL are affected by CVE-2018-10112.
CVE-2018-10112 can be exploited by sending a malformed PNG file to the affected GEGL application.
Yes, updating GEGL to version 0.3.33 or higher can fix CVE-2018-10112.