diff options
| author | Polarian <polarian@polarian.dev> | 2025-12-05 02:36:48 +0000 |
|---|---|---|
| committer | Charlie Li <vishwin@FreeBSD.org> | 2025-12-05 01:14:17 -0500 |
| commit | df1135a895c37fcc13ad9e435f48cfb3f5df5c49 (patch) | |
| tree | 2fd86937f428ffb17aa21c25558401ccf9f3377d | |
| parent | devel/cmake*: Update to 3.31.10 (diff) | |
security/vuxml: Out of bounds read in graphics/png
PR: 291266, 291410
| -rw-r--r-- | security/vuxml/vuln/2025.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 8ddea6b75286..30fc9668a946 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,34 @@ + <vuln vid="f323f148-d181-11f0-841f-843a4b343614"> + <topic>png -- Out-of-bounds read</topic> + <affects> + <package> + <name>png</name> + <range><lt>1.6.52</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f reports:</p> + <blockquote cite="https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"> + <p>Prior to 1.6.52, an out-of-bounds read vulnerability in + libpng's simplified API allows reading up to 1012 bytes beyond the + png_sRGB_base[512] array when processing valid palette PNG images + with partial transparency and gamma correction. The PNG files that + trigger this vulnerability are valid per the PNG specification; the + bug is in libpng's internal state management.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-66293</cvename> + <url>https://cveawg.mitre.org/api/cve/CVE-2025-66293</url> + </references> + <dates> + <discovery>2025-12-03</discovery> + <entry>2025-12-05</entry> + </dates> + </vuln> + <vuln vid="be3167b5-d140-11f0-ad27-c01803b56cc4"> <topic>libvirt -- Multiple vulnerabilities</topic> <affects> |
