Metrics
Affected Vendors & Products
No advisories yet.
Solution
Update the library to its latest stable release, if not possible backport the fix commit 7df24cca7144d7bc9233b6b0a71108bd154ce101
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 20 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Out-of-bounds Read in lws_upng_emit_next_line in warmcat libwebsockets allows, when the LWS_WITH_UPNG flag is enabled during compilation and the HTML display stack is used, to read past a heap allocated buffer possibly causing a crash, when the user visits an attacker controlled website that contains a crafted PNG file with a big height dimension. | |
Title | Out-of-bounds Read in libwebsockets PNG parsing | |
Weaknesses | CWE-125 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-20T14:03:41.592Z
Reserved: 2025-10-13T09:56:49.533Z
Link: CVE-2025-11679

Updated: 2025-10-20T14:03:20.604Z

Status : Received
Published: 2025-10-20T14:15:40.353
Modified: 2025-10-20T14:15:40.353
Link: CVE-2025-11679


No data.