Source: libpng1.6
Version: 1.6.34-1
Severity: important
Tags: patch security upstream
Forwarded: https://sourceforge.net/p/libpng/bugs/278/

Hi,

The following vulnerability was published for libpng1.6.

CVE-2018-13785[0]:
| In libpng 1.6.34, a wrong calculation of row_factor in the
| png_check_chunk_length function (pngrutil.c) may trigger an integer
| overflow and resultant divide-by-zero while processing a crafted PNG
| file, leading to a denial of service.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-13785
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785
[1] https://sourceforge.net/p/libpng/bugs/278/
[2] 
https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to