Am Thu, Oct 20, 2022 at 11:28:22PM -0300 schrieb David da Silva Polverari:
> Hi,
>
> I adjusted the affected versions in the BTS, but I couldn't find any
> patch for it. The reference to buffer overflows seem related to
> CVE-2020-27818, so I wonder whether it is a duplicate or not.
>
> If it is,
Sorry, I made a mistake when trying to send the link to the closed bug
[1]. You can find the right link below.
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976350
Regards,
David.
Hi,
I adjusted the affected versions in the BTS, but I couldn't find any
patch for it. The reference to buffer overflows seem related to
CVE-2020-27818, so I wonder whether it is a duplicate or not.
If it is, it was already closed in [1].
[1] CVE-2020-27818
Regards,
David
Source: pngcheck
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for pngcheck.
CVE-2020-35511[0]:
| A global buffer overflow was discovered in pngcheck function in
| pngcheck-2.4.0(5 patches applied) via a crafted png file.
Onl
4 matches
Mail list logo