<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for syslinux is now available for openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2091</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-09-06</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-09-06</InitialReleaseDate>
		<CurrentReleaseDate>2024-09-06</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-09-06</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">syslinux security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for syslinux is now available for openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Security Fix(es):

The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.(CVE-2011-2501)

Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.(CVE-2011-2690)

The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.(CVE-2011-2691)

The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.(CVE-2011-2692)

Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.(CVE-2011-3045)

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.(CVE-2011-3048)

The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.(CVE-2012-3425)

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.(CVE-2015-7981)

Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.(CVE-2015-8126)

Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.(CVE-2015-8472)

Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.(CVE-2015-8540)

The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.(CVE-2016-10087)

libpng before 1.6.32 does not properly check the length of chunks against the user limit.(CVE-2017-12652)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for syslinux is now available for openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">syslinux</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2011-2501</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2011-2690</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2011-2691</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2011-2692</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2011-3045</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2011-3048</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2012-3425</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2015-7981</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2015-8126</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2015-8472</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2015-8540</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2016-10087</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2017-12652</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2011-2501</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2011-2690</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2011-2691</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2011-2692</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2011-3045</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2011-3048</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2012-3425</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2015-7981</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2015-8126</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2015-8472</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2015-8540</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2016-10087</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2017-12652</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debuginfo-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-debuginfo-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debugsource-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-debugsource-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-devel-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-devel-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-efi64-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-efi64-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-extlinux-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-perl-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-perl-6.04-16.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debuginfo-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-debuginfo-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debugsource-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-debugsource-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-devel-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-devel-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-efi64-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-efi64-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-extlinux-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-perl-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-perl-6.04-16.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debuginfo-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-debuginfo-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debugsource-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-debugsource-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-devel-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-devel-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-efi64-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-efi64-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-extlinux-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-perl-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-perl-6.04-16.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debuginfo-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-debuginfo-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debugsource-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-debugsource-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-devel-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-devel-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-efi64-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-efi64-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-extlinux-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-perl-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-perl-6.04-14.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debuginfo-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-debuginfo-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-debugsource-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-debugsource-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-devel-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-devel-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-efi64-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-efi64-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-extlinux-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="syslinux-perl-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-perl-6.04-16.oe2203sp1.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="syslinux-extlinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-extlinux-nonlinux-6.04-16.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-nonlinux-6.04-16.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-tftpboot-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-tftpboot-6.04-16.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-extlinux-nonlinux-6.04-16.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-nonlinux-6.04-16.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-tftpboot-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-tftpboot-6.04-16.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-extlinux-nonlinux-6.04-16.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-nonlinux-6.04-16.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-tftpboot-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-tftpboot-6.04-16.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-nonlinux-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-extlinux-nonlinux-6.04-14.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-nonlinux-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-nonlinux-6.04-14.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-tftpboot-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-tftpboot-6.04-14.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-extlinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-extlinux-nonlinux-6.04-16.oe2203sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-nonlinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-nonlinux-6.04-16.oe2203sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="syslinux-tftpboot-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-tftpboot-6.04-16.oe2203sp1.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">syslinux-6.04-16.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">syslinux-6.04-16.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">syslinux-6.04-16.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-14" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">syslinux-6.04-14.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="syslinux-6.04-16" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">syslinux-6.04-16.oe2203sp1.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2011-2501</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2011-2690</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2011-2691</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2011-2692</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2011-3045</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.8</BaseScore>
				<Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2011-3048</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.8</BaseScore>
				<Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2012-3425</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.3</BaseScore>
				<Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2015-7981</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.0</BaseScore>
				<Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2015-8126</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2015-8472</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.3</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2015-8540</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2016-10087</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libpng before 1.6.32 does not properly check the length of chunks against the user limit.</Note>
		</Notes>
		<ReleaseDate>2024-09-06</ReleaseDate>
		<CVE>CVE-2017-12652</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>syslinux security update</Description>
				<DATE>2024-09-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2091</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>