8.8
CVSSv3

CVE-2018-10112

Published: 16/04/2018 Updated: 17/05/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in GEGL up to and including 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote malicious users to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.

Vulnerable Product Search on Vulmon Subscribe to Product

gegl gegl

Vendor Advisories

Debian Bug report logs - #1014710 gegl: CVE-2018-10111 CVE-2018-10112 Package: src:gegl; Maintainer for src:gegl is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Sun, 10 Jul 2022 17:21:04 UTC Severity: important Tags: security, upstrea ...
An issue was discovered in GEGL through 0332 The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swapc allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel fu ...