Search for packages
Package details: pkg:deb/ubuntu/libpng@1.2.50-1ubuntu2.14.04.2
purl pkg:deb/ubuntu/libpng@1.2.50-1ubuntu2.14.04.2
Next non-vulnerable version 1.2.50-1ubuntu2.14.04.3
Latest non-vulnerable version 1.2.54-1ubuntu1.1
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-7ep2-beej-aaaf
Aliases:
CVE-2016-10087
NULL Pointer Dereference The png_set_text_2 function in libpng allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
1.2.50-1ubuntu2.14.04.3
Affected by 0 other vulnerabilities.
1.2.54-1ubuntu1.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-52ek-nmkc-aaaf Out-of-bounds Read Integer underflow in the png_check_keyword function in pngwutil.c in libpng allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read. CVE-2015-8540
VCID-canc-ytmr-aaae Improper Restriction of Operations within the Bounds of a Memory Buffer Buffer overflow in the png_set_PLTE function in libpng allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126. CVE-2015-8472

Date Actor Action Vulnerability Source VulnerableCode Version