CVE-2015-8472

Priority
Description
Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x
and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25,
and 1.6.x before 1.6.20 allows remote attackers to cause a denial of
service (application crash) or possibly have unspecified other impact via a
small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
NOTE: this vulnerability exists because of an incomplete fix for
CVE-2015-8126.
Notes
sarnoldIncomplete fix for CVE-2015-8126
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [uses system libpng])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system libpng)
Package
Upstream:not-affected (doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0)
Package
Upstream:released (1.6.20, 1.5.25, 1.4.18, 1.2.55, and 1.0.65)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.2.50-1ubuntu2.14.04.2)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.2.54-1ubuntu1)
Patches:
Upstream:https://github.com/glennrp/libpng/commit/7e1ca9ceba4e64259863efdd98bab9b55bdc0b9c
Upstream:https://github.com/glennrp/libpng/commit/4488a96126bbefda51d07835411d8e847a88b2b7
Upstream:https://github.com/glennrp/libpng/commit/ad224c6907e8a274f2679eae4c2e3085fdc7e8c8
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [uses system libpng])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system libpng)
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [uses system libpng])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system libpng)
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system libpng)
Package
Upstream:not-affected (doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0)
More Information

Updated: 2019-12-05 18:43:19 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)