An issue was discovered in GEGL through 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.
References
Link | Resource |
---|---|
https://bugzilla.gnome.org/show_bug.cgi?id=795249 | Issue Tracking |
https://github.com/xiaoqx/pocs/tree/master/gegl | Exploit Vendor Advisory |
https://bugzilla.gnome.org/show_bug.cgi?id=795249 | Issue Tracking |
https://github.com/xiaoqx/pocs/tree/master/gegl | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.gnome.org/show_bug.cgi?id=795249 - Issue Tracking | |
References | () https://github.com/xiaoqx/pocs/tree/master/gegl - Exploit, Vendor Advisory |
Information
Published : 2018-04-16 09:58
Updated : 2024-11-21 03:40
NVD link : CVE-2018-10112
Mitre link : CVE-2018-10112
CVE.ORG link : CVE-2018-10112
JSON object : View
Products Affected
gegl
- gegl
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer