Description
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-375-1 | libpng security update |
Debian DSA |
DSA-3443-1 | libpng security update |
Ubuntu USN |
USN-2861-1 | libpng vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Libpng
Subscribe
Libpng
Subscribe
Redhat
Subscribe
Enterprise Linux Desktop Supplementary
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Server Supplementary
Subscribe
Enterprise Linux Workstation Supplementary
Subscribe
Network Satellite
Subscribe
Rhel Extras
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:20:42.512Z
Reserved: 2015-12-10T00:00:00.000Z
Link: CVE-2015-8540
No data.
Status : Deferred
Published: 2016-04-14T14:59:03.287
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-8540
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN