Back to bug 2155525
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-12-21 12:41:48 UTC | Depends On | 2155526 | |
| TEJ RATHI | 2022-12-21 12:43:38 UTC | Doc Text | A global buffer overflow vulnerability was discovered in pngcheck in pngcheck() function of pngcheck.c file. An attacker could exploit the vulnerability via a crafted png file that triggers an out-of-bounds read, leading to a denial-of-service. | |
| TEJ RATHI | 2022-12-21 12:44:01 UTC | Doc Text | A global buffer overflow vulnerability was discovered in pngcheck in pngcheck() function of pngcheck.c file. An attacker could exploit the vulnerability via a crafted png file that triggers an out-of-bounds read, leading to a denial-of-service. | A global buffer overflow vulnerability was discovered in pngcheck in pngcheck() function of pngcheck.c file. An attacker could exploit the vulnerability via a crafted png file that triggers an out-of-bounds read, leading to a denial of service. |
| Ben Beasley | 2022-12-21 15:54:08 UTC | CC | code | |
| Red Hat Bugzilla | 2023-07-07 08:30:30 UTC | Assignee | security-response-team | nobody |
Back to bug 2155525