First published: Tue Aug 23 2022(Updated: )
A global buffer overflow was discovered in pngcheck function in pngcheck-2.4.0(5 patches applied) via a crafted png file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libpng Pngcheck | =2.4.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/pngcheck | <=2.3.0-7+deb10u1 | 3.0.3-1~deb10u2 3.0.3-1~deb11u1 3.0.3-1 3.0.3-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-35511 is high, with a severity value of 7.8.
The affected software versions are pngcheck-2.4.0, Libpng Pngcheck 2.4.0, Debian Debian Linux 10.0, and Debian Debian Linux 11.0.
To fix CVE-2020-35511, upgrade to version 3.0.3-1~deb10u2 or 3.0.3-1~deb11u1 for Debian Debian Linux, or version 3.0.3-3 for debian/pngcheck.
The Common Weakness Enumeration (CWE) ID associated with CVE-2020-35511 are CWE-119 and CWE-126.
You can find more information about CVE-2020-35511 at the following references: [1] http://www.libpng.org/pub/png/apps/pngcheck.html, [2] https://lists.debian.org/debian-lts-announce/2022/12/msg00024.html, [3] https://www.debian.org/security/2022/dsa-5300.