Your message dated Fri, 23 Dec 2022 12:47:13 +
with message-id
and subject line Bug#1021278: fixed in pngcheck 3.0.3-1~deb11u1
has caused the Debian Bug report #1021278,
regarding pngcheck: CVE-2020-35511
to be marked as done.
This means that you claim that the problem has been dealt with
fixed 1021278 3.0.2-2
thanks
fixed 1021278 3.0.2-1
thanks
Your message dated Mon, 05 Dec 2022 20:44:10 +
with message-id
and subject line Bug#1021278: fixed in pngcheck 3.0.3-1
has caused the Debian Bug report #1021278,
regarding pngcheck: CVE-2020-35511
to be marked as done.
This means that you claim that the problem has been dealt with.
If this
Am Thu, Oct 20, 2022 at 11:28:22PM -0300 schrieb David da Silva Polverari:
> Hi,
>
> I adjusted the affected versions in the BTS, but I couldn't find any
> patch for it. The reference to buffer overflows seem related to
> CVE-2020-27818, so I wonder whether it is a duplicate or not.
>
> If it is,
Sorry, I made a mistake when trying to send the link to the closed bug
[1]. You can find the right link below.
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976350
Regards,
David.
Hi,
I adjusted the affected versions in the BTS, but I couldn't find any
patch for it. The reference to buffer overflows seem related to
CVE-2020-27818, so I wonder whether it is a duplicate or not.
If it is, it was already closed in [1].
[1] CVE-2020-27818
Regards,
David
Source: pngcheck
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for pngcheck.
CVE-2020-35511[0]:
| A global buffer overflow was discovered in pngcheck function in
| pngcheck-2.4.0(5 patches applied) via a crafted png file.
Onl
8 matches
Mail list logo