ALT-BU-2021-3749-6
Branch sisyphus update bulletin.
Package dotnet-bootstrap-5.0 updated to version 5.0.3-alt1 for branch sisyphus in task 266495.
Closed vulnerabilities
BDU:2021-00893
Уязвимость программного средства .NET Core, расширяемого средства автоматизации PowerShell Core и средства разработки программного обеспечения Microsoft Visual Studio, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-06
BDU:2021-00929
Уязвимость программной платформы .NET Core, связанная недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-1721
.NET Core and Visual Studio Denial of Service Vulnerability
Modified: 2024-11-21
CVE-2021-24112
.NET Core Remote Code Execution Vulnerability
Modified: 2022-11-02
GHSA-3gp9-h8hw-pxpw
Denial of service in .NET core
Modified: 2022-10-25
GHSA-rxg9-xrhp-64gj
.NET Core Remote Code Execution Vulnerability
Package dotnet-runtime-5.0 updated to version 5.0.3-alt1 for branch sisyphus in task 266495.
Closed vulnerabilities
BDU:2021-00893
Уязвимость программного средства .NET Core, расширяемого средства автоматизации PowerShell Core и средства разработки программного обеспечения Microsoft Visual Studio, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-06
BDU:2021-00929
Уязвимость программной платформы .NET Core, связанная недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-1721
.NET Core and Visual Studio Denial of Service Vulnerability
Modified: 2024-11-21
CVE-2021-24112
.NET Core Remote Code Execution Vulnerability
Modified: 2022-11-02
GHSA-3gp9-h8hw-pxpw
Denial of service in .NET core
Modified: 2022-10-25
GHSA-rxg9-xrhp-64gj
.NET Core Remote Code Execution Vulnerability
Package dotnet-aspnetcore-5.0 updated to version 5.0.3-alt1 for branch sisyphus in task 266495.
Closed vulnerabilities
BDU:2021-00893
Уязвимость программного средства .NET Core, расширяемого средства автоматизации PowerShell Core и средства разработки программного обеспечения Microsoft Visual Studio, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-06
BDU:2021-00929
Уязвимость программной платформы .NET Core, связанная недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-1721
.NET Core and Visual Studio Denial of Service Vulnerability
Modified: 2024-11-21
CVE-2021-24112
.NET Core Remote Code Execution Vulnerability
Modified: 2022-11-02
GHSA-3gp9-h8hw-pxpw
Denial of service in .NET core
Modified: 2022-10-25
GHSA-rxg9-xrhp-64gj
.NET Core Remote Code Execution Vulnerability
Package dotnet-sdk-5.0 updated to version 5.0.103-alt1 for branch sisyphus in task 266495.
Closed vulnerabilities
BDU:2021-00893
Уязвимость программного средства .NET Core, расширяемого средства автоматизации PowerShell Core и средства разработки программного обеспечения Microsoft Visual Studio, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-06
BDU:2021-00929
Уязвимость программной платформы .NET Core, связанная недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-1721
.NET Core and Visual Studio Denial of Service Vulnerability
Modified: 2024-11-21
CVE-2021-24112
.NET Core Remote Code Execution Vulnerability
Modified: 2022-11-02
GHSA-3gp9-h8hw-pxpw
Denial of service in .NET core
Modified: 2022-10-25
GHSA-rxg9-xrhp-64gj
.NET Core Remote Code Execution Vulnerability
Package dotnet-bootstrap-2.1 updated to version 2.1.25-alt1 for branch sisyphus in task 266507.
Closed vulnerabilities
BDU:2021-00893
Уязвимость программного средства .NET Core, расширяемого средства автоматизации PowerShell Core и средства разработки программного обеспечения Microsoft Visual Studio, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-06
BDU:2021-00929
Уязвимость программной платформы .NET Core, связанная недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-1721
.NET Core and Visual Studio Denial of Service Vulnerability
Modified: 2024-11-21
CVE-2021-24112
.NET Core Remote Code Execution Vulnerability
Modified: 2022-11-02
GHSA-3gp9-h8hw-pxpw
Denial of service in .NET core
Modified: 2022-10-25
GHSA-rxg9-xrhp-64gj
.NET Core Remote Code Execution Vulnerability
Closed vulnerabilities
Modified: 2026-04-30
BDU:2015-00532
Уязвимость программной платформы Java Platform, позволяющая удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2021-03-23
BDU:2016-01858
Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии
Modified: 2021-03-23
BDU:2016-01859
Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии
Modified: 2024-04-17
BDU:2019-03330
Уязвимость функции png_image_free (png.c) библиотеки для работы с растровой графикой в формате PNG libpng, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-04-27
BDU:2023-07609
Уязвимость функции get_token компонента pnm2png.c библиотеки для работы с растровой графикой в формате PNG Libpng, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07738
Уязвимость библиотеки для работы с растровой графикой в формате PNG Libpng, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2026-04-20
BDU:2025-15390
Уязвимость функции png_image_read_composite() библиотеки libpng, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
Modified: 2026-04-20
BDU:2026-01774
Уязвимость функции png_set_quantize() библиотеки для работы с растровой графикой в формате PNG libpng, позволяющая нарушителю выполнить произвольный код
Modified: 2026-04-20
BDU:2026-02923
Уязвимость функции png_do_quantize() компонента pngrtran.c библиотеки для работы с растровой графикой в формате PNG Libpng, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2026-04-29
CVE-2013-6954
The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
- http://advisories.mageia.org/MGASA-2014-0075.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
- http://marc.info/?l=bugtraq&m=140852886808946&w=2
- http://marc.info/?l=bugtraq&m=140852974709252&w=2
- http://secunia.com/advisories/58974
- http://secunia.com/advisories/59058
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
- http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- http://www.kb.cert.org/vuls/id/650142
- http://www.libpng.org/pub/png/libpng.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.securityfocus.com/bid/64493
- https://access.redhat.com/errata/RHSA-2014:0413
- https://access.redhat.com/errata/RHSA-2014:0414
- https://bugzilla.redhat.com/show_bug.cgi?id=1045561
- https://www.ibm.com/support/docview.wss?uid=swg21675973
- http://advisories.mageia.org/MGASA-2014-0075.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
- http://marc.info/?l=bugtraq&m=140852886808946&w=2
- http://marc.info/?l=bugtraq&m=140852974709252&w=2
- http://secunia.com/advisories/58974
- http://secunia.com/advisories/59058
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
- http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- http://www.kb.cert.org/vuls/id/650142
- http://www.libpng.org/pub/png/libpng.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.securityfocus.com/bid/64493
- https://access.redhat.com/errata/RHSA-2014:0413
- https://access.redhat.com/errata/RHSA-2014:0414
- https://bugzilla.redhat.com/show_bug.cgi?id=1045561
- https://www.ibm.com/support/docview.wss?uid=swg21675973
Modified: 2025-04-12
CVE-2016-3751
Unspecified vulnerability in libpng before 1.6.20, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01, allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23265085.
- http://source.android.com/security/bulletin/2016-07-01.html
- http://www.openwall.com/lists/oss-security/2016/07/09/4
- https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca
- https://security.netapp.com/advisory/ntap-20240719-0004/
- http://source.android.com/security/bulletin/2016-07-01.html
- http://www.openwall.com/lists/oss-security/2016/07/09/4
- https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca
- https://security.netapp.com/advisory/ntap-20240719-0004/
Modified: 2025-06-09
CVE-2017-12652
libpng before 1.6.32 does not properly check the length of chunks against the user limit.
- http://www.securityfocus.com/bid/109269
- https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE
- https://github.com/pnggroup/libpng/commit/347538efbdc21b8df684ebd92d37400b3ce85d55
- https://security.netapp.com/advisory/ntap-20220506-0003/
- https://support.f5.com/csp/article/K88124225
- https://support.f5.com/csp/article/K88124225?utm_source=f5support&utm_medium=RSS
- http://www.securityfocus.com/bid/109269
- https://github.com/glennrp/libpng/blob/df7e9dae0c4aac63d55361e35709c864fa1b8363/ANNOUNCE
- https://security.netapp.com/advisory/ntap-20220506-0003/
- https://support.f5.com/csp/article/K88124225
- https://support.f5.com/csp/article/K88124225?utm_source=f5support&%3Butm_medium=RSS
Modified: 2024-11-21
CVE-2018-13785
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/105599
- http://www.securitytracker.com/id/1041889
- https://access.redhat.com/errata/RHSA-2018:3000
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3533
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
- https://security.gentoo.org/glsa/201908-10
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://sourceforge.net/p/libpng/bugs/278/
- https://usn.ubuntu.com/3712-1/
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/105599
- http://www.securitytracker.com/id/1041889
- https://access.redhat.com/errata/RHSA-2018:3000
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3533
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
- https://security.gentoo.org/glsa/201908-10
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://sourceforge.net/p/libpng/bugs/278/
- https://usn.ubuntu.com/3712-1/
Modified: 2024-11-21
CVE-2018-14048
An issue has been found in libpng 1.6.34. It is a SEGV in the function png_free_data in png.c, related to the recommended error handling for png_read_image.
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://github.com/fouzhe/security/tree/master/libpng
- https://github.com/glennrp/libpng/issues/238
- https://seclists.org/bugtraq/2019/Apr/30
- https://security.gentoo.org/glsa/201908-02
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://github.com/fouzhe/security/tree/master/libpng
- https://github.com/glennrp/libpng/issues/238
- https://seclists.org/bugtraq/2019/Apr/30
- https://security.gentoo.org/glsa/201908-02
Modified: 2024-11-21
CVE-2018-14550
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
- https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
- https://github.com/glennrp/libpng/issues/246
- https://security.gentoo.org/glsa/201908-02
- https://security.netapp.com/advisory/ntap-20221028-0001/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
- https://github.com/glennrp/libpng/issues/246
- https://security.gentoo.org/glsa/201908-02
- https://security.netapp.com/advisory/ntap-20221028-0001/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2019-7317
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- http://www.securityfocus.com/bid/108098
- https://access.redhat.com/errata/RHSA-2019:1265
- https://access.redhat.com/errata/RHSA-2019:1267
- https://access.redhat.com/errata/RHSA-2019:1269
- https://access.redhat.com/errata/RHSA-2019:1308
- https://access.redhat.com/errata/RHSA-2019:1309
- https://access.redhat.com/errata/RHSA-2019:1310
- https://access.redhat.com/errata/RHSA-2019:2494
- https://access.redhat.com/errata/RHSA-2019:2495
- https://access.redhat.com/errata/RHSA-2019:2585
- https://access.redhat.com/errata/RHSA-2019:2590
- https://access.redhat.com/errata/RHSA-2019:2592
- https://access.redhat.com/errata/RHSA-2019:2737
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
- https://github.com/glennrp/libpng/issues/275
- https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
- https://seclists.org/bugtraq/2019/Apr/30
- https://seclists.org/bugtraq/2019/Apr/36
- https://seclists.org/bugtraq/2019/May/56
- https://seclists.org/bugtraq/2019/May/59
- https://seclists.org/bugtraq/2019/May/67
- https://security.gentoo.org/glsa/201908-02
- https://security.netapp.com/advisory/ntap-20190719-0005/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
- https://usn.ubuntu.com/3962-1/
- https://usn.ubuntu.com/3991-1/
- https://usn.ubuntu.com/3997-1/
- https://usn.ubuntu.com/4080-1/
- https://usn.ubuntu.com/4083-1/
- https://www.debian.org/security/2019/dsa-4435
- https://www.debian.org/security/2019/dsa-4448
- https://www.debian.org/security/2019/dsa-4451
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- http://www.securityfocus.com/bid/108098
- https://access.redhat.com/errata/RHSA-2019:1265
- https://access.redhat.com/errata/RHSA-2019:1267
- https://access.redhat.com/errata/RHSA-2019:1269
- https://access.redhat.com/errata/RHSA-2019:1308
- https://access.redhat.com/errata/RHSA-2019:1309
- https://access.redhat.com/errata/RHSA-2019:1310
- https://access.redhat.com/errata/RHSA-2019:2494
- https://access.redhat.com/errata/RHSA-2019:2495
- https://access.redhat.com/errata/RHSA-2019:2585
- https://access.redhat.com/errata/RHSA-2019:2590
- https://access.redhat.com/errata/RHSA-2019:2592
- https://access.redhat.com/errata/RHSA-2019:2737
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
- https://github.com/glennrp/libpng/issues/275
- https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
- https://seclists.org/bugtraq/2019/Apr/30
- https://seclists.org/bugtraq/2019/Apr/36
- https://seclists.org/bugtraq/2019/May/56
- https://seclists.org/bugtraq/2019/May/59
- https://seclists.org/bugtraq/2019/May/67
- https://security.gentoo.org/glsa/201908-02
- https://security.netapp.com/advisory/ntap-20190719-0005/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
- https://usn.ubuntu.com/3962-1/
- https://usn.ubuntu.com/3991-1/
- https://usn.ubuntu.com/3997-1/
- https://usn.ubuntu.com/4080-1/
- https://usn.ubuntu.com/4083-1/
- https://www.debian.org/security/2019/dsa-4435
- https://www.debian.org/security/2019/dsa-4448
- https://www.debian.org/security/2019/dsa-4451
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Modified: 2025-11-26
CVE-2025-64505
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Modified: 2025-12-16
CVE-2025-66293
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
- https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1
- https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a
- https://github.com/pnggroup/libpng/issues/764
- https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f
- http://www.openwall.com/lists/oss-security/2025/12/03/6
- http://www.openwall.com/lists/oss-security/2025/12/03/7
- http://www.openwall.com/lists/oss-security/2025/12/03/8
- https://github.com/pnggroup/libpng/issues/764
Modified: 2026-02-13
CVE-2026-25646
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.
Modified: 2026-04-02
CVE-2026-33416
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue.
- https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb
- https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667
- https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25
- https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1
- https://github.com/pnggroup/libpng/pull/824
- https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
Modified: 2021-10-22
GHSA-qwwr-qc2p-6283
Out-of-bounds write in libpng
- https://nvd.nist.gov/vuln/detail/CVE-2018-14550
- https://github.com/glennrp/libpng/issues/246
- https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
- https://github.com/glennrp/libpng
- https://security.gentoo.org/glsa/201908-02
- https://security.netapp.com/advisory/ntap-20221028-0001
- https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Package kernel-image-un-def updated to version 5.10.16-alt1 for branch sisyphus in task 266479.
Closed vulnerabilities
Modified: 2025-01-29
BDU:2021-03254
Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-3600
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
- https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
- https://ubuntu.com/security/notices/USN-5003-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
- https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
- https://ubuntu.com/security/notices/USN-5003-1
