Headline
Ubuntu Security Notice USN-6182-1
Ubuntu Security Notice 6182-1 - It was discovered that pngcheck incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.
==========================================================================Ubuntu Security Notice USN-6182-1June 21, 2023pngcheck vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 20.04 LTS- Ubuntu 18.04 LTS (Available with Ubuntu Pro)- Ubuntu 16.04 LTS (Available with Ubuntu Pro)Summary:Several security issues were fixed in pngcheck.Software Description:- pngcheck: Verifies the integrity of PNG, JNG and MNG filesDetails:It was discovered that pngcheck incorrectly handled certain inputs. If auser or an automated system were tricked into opening a specially craftedinput file, a remote attacker could possibly use this issue to cause adenial of service.Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 20.04 LTS: pngcheck 2.3.0-7ubuntu0.20.04.1Ubuntu 18.04 LTS (Available with Ubuntu Pro): pngcheck 2.3.0-7ubuntu0.18.04.1~esm1Ubuntu 16.04 LTS (Available with Ubuntu Pro): pngcheck 2.3.0-7ubuntu0.16.04.1~esm1In general, a standard system update will make all the necessary changes.References: https://ubuntu.com/security/notices/USN-6182-1 CVE-2020-27818, CVE-2020-35511Package Information: https://launchpad.net/ubuntu/+source/pngcheck/2.3.0-7ubuntu0.20.04.1
Related news
Debian Linux Security Advisory 5300-1 - Multiple security issues were discovered in pngcheck, a tool to verify the integrity of PNG, JNG and MNG files, which could potentially result in the execution of arbitrary code.
A global buffer overflow was discovered in pngcheck function in pngcheck-2.4.0(5 patches applied) via a crafted png file.
A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.