<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpng12-0-1.2.56-1.5 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10184</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpng12-0-1.2.56-1.5 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpng12-0-1.2.56-1.5 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10184</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10184</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1205/</URL>
      <Description>SUSE CVE CVE-2010-1205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2501/</URL>
      <Description>SUSE CVE CVE-2011-2501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3026/</URL>
      <Description>SUSE CVE CVE-2011-3026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3045/</URL>
      <Description>SUSE CVE CVE-2011-3045 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3048/</URL>
      <Description>SUSE CVE CVE-2011-3048 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3386/</URL>
      <Description>SUSE CVE CVE-2012-3386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7353/</URL>
      <Description>SUSE CVE CVE-2013-7353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7354/</URL>
      <Description>SUSE CVE CVE-2013-7354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9495/</URL>
      <Description>SUSE CVE CVE-2014-9495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0973/</URL>
      <Description>SUSE CVE CVE-2015-0973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8126/</URL>
      <Description>SUSE CVE CVE-2015-8126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8540/</URL>
      <Description>SUSE CVE CVE-2015-8540 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpng12-0-1.2.56-1.5">
      <FullProductName ProductID="libpng12-0-1.2.56-1.5">libpng12-0-1.2.56-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng12-0-32bit-1.2.56-1.5">
      <FullProductName ProductID="libpng12-0-32bit-1.2.56-1.5">libpng12-0-32bit-1.2.56-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng12-compat-devel-1.2.56-1.5">
      <FullProductName ProductID="libpng12-compat-devel-1.2.56-1.5">libpng12-compat-devel-1.2.56-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng12-compat-devel-32bit-1.2.56-1.5">
      <FullProductName ProductID="libpng12-compat-devel-32bit-1.2.56-1.5">libpng12-compat-devel-32bit-1.2.56-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng12-devel-1.2.56-1.5">
      <FullProductName ProductID="libpng12-devel-1.2.56-1.5">libpng12-devel-1.2.56-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng12-devel-32bit-1.2.56-1.5">
      <FullProductName ProductID="libpng12-devel-32bit-1.2.56-1.5">libpng12-devel-32bit-1.2.56-1.5</FullProductName>
    </Branch>
    <Relationship ProductReference="libpng12-0-1.2.56-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng12-0-1.2.56-1.5">libpng12-0-1.2.56-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng12-0-32bit-1.2.56-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5">libpng12-0-32bit-1.2.56-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng12-compat-devel-1.2.56-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5">libpng12-compat-devel-1.2.56-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng12-compat-devel-32bit-1.2.56-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5">libpng12-compat-devel-32bit-1.2.56-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng12-devel-1.2.56-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5">libpng12-devel-1.2.56-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng12-devel-32bit-1.2.56-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5">libpng12-devel-32bit-1.2.56-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.</Note>
    </Notes>
    <CVE>CVE-2010-1205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1205.html</URL>
        <Description>CVE-2010-1205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188284</URL>
        <Description>SUSE Bug 1188284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/617866</URL>
        <Description>SUSE Bug 617866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/622506</URL>
        <Description>SUSE Bug 622506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639941</URL>
        <Description>SUSE Bug 639941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.</Note>
    </Notes>
    <CVE>CVE-2011-2501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2501.html</URL>
        <Description>CVE-2011-2501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/702578</URL>
        <Description>SUSE Bug 702578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.</Note>
    </Notes>
    <CVE>CVE-2011-3026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3026.html</URL>
        <Description>CVE-2011-3026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/747311</URL>
        <Description>SUSE Bug 747311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/747327</URL>
        <Description>SUSE Bug 747327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/747328</URL>
        <Description>SUSE Bug 747328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/773612</URL>
        <Description>SUSE Bug 773612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.</Note>
    </Notes>
    <CVE>CVE-2011-3045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3045.html</URL>
        <Description>CVE-2011-3045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/752008</URL>
        <Description>SUSE Bug 752008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/754456</URL>
        <Description>SUSE Bug 754456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2011-3048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3048.html</URL>
        <Description>CVE-2011-3048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/754745</URL>
        <Description>SUSE Bug 754745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2012-3386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3386.html</URL>
        <Description>CVE-2012-3386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770618</URL>
        <Description>SUSE Bug 770618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/786745</URL>
        <Description>SUSE Bug 786745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2013-7353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7353.html</URL>
        <Description>CVE-2013-7353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873124</URL>
        <Description>SUSE Bug 873124</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2013-7354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7354.html</URL>
        <Description>CVE-2013-7354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/873123</URL>
        <Description>SUSE Bug 873123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.</Note>
    </Notes>
    <CVE>CVE-2014-9495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9495.html</URL>
        <Description>CVE-2014-9495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912076</URL>
        <Description>SUSE Bug 912076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912929</URL>
        <Description>SUSE Bug 912929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.</Note>
    </Notes>
    <CVE>CVE-2015-0973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0973.html</URL>
        <Description>CVE-2015-0973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912929</URL>
        <Description>SUSE Bug 912929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.</Note>
    </Notes>
    <CVE>CVE-2015-8126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8126.html</URL>
        <Description>CVE-2015-8126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954980</URL>
        <Description>SUSE Bug 954980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958198</URL>
        <Description>SUSE Bug 958198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969333</URL>
        <Description>SUSE Bug 969333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2015-8540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng12-0-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8540.html</URL>
        <Description>CVE-2015-8540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149680</URL>
        <Description>SUSE Bug 1149680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958791</URL>
        <Description>SUSE Bug 958791</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
