HNNewShowAskJobs
Built with Tanstack Start
Libpng 1.6.51: Four buffer overflow vulnerabilities fixed(openwall.com)
44 points by ledoge a day ago | 8 comments
  • kevincoxa day ago

    > All vulnerabilities require user interaction (processing a malicious PNG file)

    What world is the author living in where PNGs aren't very frequently read and written with no user interaction. The web obviously displays PNGs with no prompt, sites can generate PNGs with canvas trivially and with no explicit permission. PNGs are also often displayed in notifications and may come from untrustworthy sources.

    This feels like an irresponsible downplay of the severity.

    • lol768a day ago |parent

      I thought this initially too, but there's a comment on https://bugzilla.mozilla.org/show_bug.cgi?id=2001758#c5 that suggests a belief it doesn't affect Firefox at all. So I don't know if the surface for these is particularly obscure such that browsers are insulated?

  • ziotom78a day ago

    It’s fantastic they were able to find these issues!

    That four new CVEs (two high-severity!) were found in a mature and well-tested library like png reminds me how non-trivial and unforgiving software engineering can be.

    Security flaws are often just waiting behind the corner: this should be humbling lesson for all of us.

  • applied_heata day ago

    Affects back to version 1.6.0 released Feb 14, 2013

  • louskena day ago

    rust rewrite when?

    • pornela day ago |parent

      Chrome is already in the process of removing libpng.

      • zamadatixa day ago |parent

        For those curious on what to instead, it seems like they made an in house Skia module (using Rust) named SkPngRustDecoder (and Encoder).

        • tronicala day ago |parent

          …which appears to wrap the png crate. (Good, so not a rewrite)