CVE-2022-3857

Publication date 6 March 2023

Last updated 7 November 2024


Ubuntu priority

Cvss 3 Severity Score

5.5 · Medium

Score breakdown

A flaw was found in libpng 1.6.38. A crafted PNG image can lead to a segmentation fault and denial of service in png_setup_paeth_row() function.

Read the notes from the security team

Status

Package Ubuntu Release Status
chromium-browser 24.10 oracular
Not affected
24.04 LTS noble
Not affected
23.10 mantic
Not affected
23.04 lunar
Not affected
22.10 kinetic
Not affected
22.04 LTS jammy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic Ignored end of standard support, was deferred
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Ignored end of standard support
firefox 24.10 oracular
Not affected
24.04 LTS noble
Not affected
23.10 mantic
Not affected
23.04 lunar
Not affected
22.10 kinetic
Not affected
22.04 LTS jammy
Not affected
20.04 LTS focal Ignored bundled deps handled by upstream in new versions
18.04 LTS bionic Ignored end of standard support, was deferred
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Ignored end of standard support
libpng 22.10 kinetic Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial
Vulnerable, fix deferred
14.04 LTS trusty Ignored end of ESM support, was deferred
libpng1.6 24.10 oracular
Vulnerable, fix deferred
24.04 LTS noble
Vulnerable, fix deferred
23.10 mantic Ignored end of life, was deferred
23.04 lunar Ignored end of life, was deferred
22.10 kinetic Ignored end of life, was deferred
22.04 LTS jammy
Vulnerable, fix deferred
20.04 LTS focal
Vulnerable, fix deferred
18.04 LTS bionic
Vulnerable, fix deferred
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty Not in release
thunderbird 24.10 oracular Ignored bundled deps handled by upstream in new versions
24.04 LTS noble Ignored bundled deps handled by upstream in new versions
23.10 mantic Ignored end of life, was ignored [bundled deps handled by upstream in new versions]
23.04 lunar Ignored end of life, was ignored [bundled deps handled by upstream in new versions]
22.10 kinetic Ignored end of life, was deferred
22.04 LTS jammy Ignored bundled deps handled by upstream in new versions
20.04 LTS focal Ignored bundled deps handled by upstream in new versions
18.04 LTS bionic Ignored end of standard support, was deferred
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Ignored end of standard support

Notes


iconstantin

this CVE has been rejected by upstream and marked as a false-positive, with a note that the flaw does not exist and was erroneously tested

Severity score breakdown

Parameter Value
Base score 5.5 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H