<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpng16-16-1.6.26-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10050</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpng16-16-1.6.26-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpng16-16-1.6.26-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10050</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1205/</URL>
      <Description>SUSE CVE CVE-2010-1205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2501/</URL>
      <Description>SUSE CVE CVE-2011-2501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2690/</URL>
      <Description>SUSE CVE CVE-2011-2690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2691/</URL>
      <Description>SUSE CVE CVE-2011-2691 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2692/</URL>
      <Description>SUSE CVE CVE-2011-2692 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3328/</URL>
      <Description>SUSE CVE CVE-2011-3328 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6954/</URL>
      <Description>SUSE CVE CVE-2013-6954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0333/</URL>
      <Description>SUSE CVE CVE-2014-0333 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8126/</URL>
      <Description>SUSE CVE CVE-2015-8126 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-16-1.6.26-1.1">
      <FullProductName ProductID="libpng16-16-1.6.26-1.1">libpng16-16-1.6.26-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-16-32bit-1.6.26-1.1">
      <FullProductName ProductID="libpng16-16-32bit-1.6.26-1.1">libpng16-16-32bit-1.6.26-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-compat-devel-1.6.26-1.1">
      <FullProductName ProductID="libpng16-compat-devel-1.6.26-1.1">libpng16-compat-devel-1.6.26-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-compat-devel-32bit-1.6.26-1.1">
      <FullProductName ProductID="libpng16-compat-devel-32bit-1.6.26-1.1">libpng16-compat-devel-32bit-1.6.26-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-devel-1.6.26-1.1">
      <FullProductName ProductID="libpng16-devel-1.6.26-1.1">libpng16-devel-1.6.26-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-devel-32bit-1.6.26-1.1">
      <FullProductName ProductID="libpng16-devel-32bit-1.6.26-1.1">libpng16-devel-32bit-1.6.26-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-tools-1.6.26-1.1">
      <FullProductName ProductID="libpng16-tools-1.6.26-1.1">libpng16-tools-1.6.26-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpng16-16-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-16-1.6.26-1.1">libpng16-16-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-16-32bit-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1">libpng16-16-32bit-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-compat-devel-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1">libpng16-compat-devel-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-compat-devel-32bit-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1">libpng16-compat-devel-32bit-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-devel-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1">libpng16-devel-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-devel-32bit-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1">libpng16-devel-32bit-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-tools-1.6.26-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1">libpng16-tools-1.6.26-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.</Note>
    </Notes>
    <CVE>CVE-2010-1205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1205.html</URL>
        <Description>CVE-2010-1205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188284</URL>
        <Description>SUSE Bug 1188284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/617866</URL>
        <Description>SUSE Bug 617866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/622506</URL>
        <Description>SUSE Bug 622506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639941</URL>
        <Description>SUSE Bug 639941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.</Note>
    </Notes>
    <CVE>CVE-2011-2501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2501.html</URL>
        <Description>CVE-2011-2501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/702578</URL>
        <Description>SUSE Bug 702578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.</Note>
    </Notes>
    <CVE>CVE-2011-2690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2690.html</URL>
        <Description>CVE-2011-2690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/706387</URL>
        <Description>SUSE Bug 706387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/706388</URL>
        <Description>SUSE Bug 706388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.</Note>
    </Notes>
    <CVE>CVE-2011-2691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2691.html</URL>
        <Description>CVE-2011-2691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/706388</URL>
        <Description>SUSE Bug 706388</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.</Note>
    </Notes>
    <CVE>CVE-2011-2692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2692.html</URL>
        <Description>CVE-2011-2692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/706389</URL>
        <Description>SUSE Bug 706389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_handle_cHRM function in pngrutil.c in libpng 1.5.4, when color-correction support is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed PNG image containing a cHRM chunk associated with a certain zero value.</Note>
    </Notes>
    <CVE>CVE-2011-3328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3328.html</URL>
        <Description>CVE-2011-3328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/720017</URL>
        <Description>SUSE Bug 720017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.</Note>
    </Notes>
    <CVE>CVE-2013-6954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6954.html</URL>
        <Description>CVE-2013-6954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856522</URL>
        <Description>SUSE Bug 856522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873872</URL>
        <Description>SUSE Bug 873872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873873</URL>
        <Description>SUSE Bug 873873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877429</URL>
        <Description>SUSE Bug 877429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877430</URL>
        <Description>SUSE Bug 877430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.</Note>
    </Notes>
    <CVE>CVE-2014-0333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0333.html</URL>
        <Description>CVE-2014-0333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/866298</URL>
        <Description>SUSE Bug 866298</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.</Note>
    </Notes>
    <CVE>CVE-2015-8126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.26-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.26-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8126.html</URL>
        <Description>CVE-2015-8126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954980</URL>
        <Description>SUSE Bug 954980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958198</URL>
        <Description>SUSE Bug 958198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969333</URL>
        <Description>SUSE Bug 969333</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
