Bug 2242138 (CVE-2023-43907)
| Summary: | CVE-2023-43907 optipng: global buffer overflow via the 'buffer' variable at gifread.c. | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Patrick Del Bello <pdelbell> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A vulnerability has been identified in OptiPNG related to its handling of GIF file processing. The issue arises from a global buffer overflow occurring in the 'buffer' variable within the gifread.c component. This vulnerability can potentially be exploited by malicious actors to crash the OptiPNG program by manipulating specially crafted GIF files during processing.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2242460, 2242461 | ||
| Bug Blocks: | 2242137 | ||
|
Description
Patrick Del Bello
2023-10-04 15:33:09 UTC
Created optipng tracking bugs for this issue: Affects: epel-all [bug 2242460] Affects: fedora-all [bug 2242461] |