A flaw in libpng, a library for creating and manipulating PNG images, could lead to arbitrary code execution on the affected system. An attacker could use a specially crafted PNG image to exploit a buffer overflow vulnerability in libpng. For more, click here
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.