UBUNTU-CVE-2015-7981

Source
https://ubuntu.com/security/CVE-2015-7981
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-7981.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-7981
Upstream
  • CVE-2015-7981
Downstream
Related
Published
2015-10-26T00:00:00Z
Modified
2026-02-04T03:12:29.253567Z
Severity
  • Ubuntu - low
Summary
[none]
Details

The pngconvertto_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

References

Affected packages

Ubuntu:14.04:LTS / libpng

Package

Name
libpng
Purl
pkg:deb/ubuntu/libpng@1.2.50-1ubuntu2.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.50-1ubuntu2.14.04.1

Affected versions

1.*
1.2.49-4ubuntu1
1.2.49-5ubuntu1
1.2.50-1ubuntu1
1.2.50-1ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.2.50-1ubuntu2.14.04.1",
            "binary_name": "libpng12-0"
        },
        {
            "binary_version": "1.2.50-1ubuntu2.14.04.1",
            "binary_name": "libpng12-dev"
        },
        {
            "binary_version": "1.2.50-1ubuntu2.14.04.1",
            "binary_name": "libpng3"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-7981.json"