<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpng16-16-1.6.37-3.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10972-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpng16-16-1.6.37-3.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpng16-16-1.6.37-3.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10972</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-5793/</URL>
      <Description>SUSE CVE CVE-2006-5793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-3964/</URL>
      <Description>SUSE CVE CVE-2008-3964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0040/</URL>
      <Description>SUSE CVE CVE-2009-0040 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10087/</URL>
      <Description>SUSE CVE CVE-2016-10087 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5735/</URL>
      <Description>SUSE CVE CVE-2016-5735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12652/</URL>
      <Description>SUSE CVE CVE-2017-12652 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13785/</URL>
      <Description>SUSE CVE CVE-2018-13785 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14048/</URL>
      <Description>SUSE CVE CVE-2018-14048 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7317/</URL>
      <Description>SUSE CVE CVE-2019-7317 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-16-1.6.37-3.3">
      <FullProductName ProductID="libpng16-16-1.6.37-3.3">libpng16-16-1.6.37-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-16-32bit-1.6.37-3.3">
      <FullProductName ProductID="libpng16-16-32bit-1.6.37-3.3">libpng16-16-32bit-1.6.37-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-compat-devel-1.6.37-3.3">
      <FullProductName ProductID="libpng16-compat-devel-1.6.37-3.3">libpng16-compat-devel-1.6.37-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-compat-devel-32bit-1.6.37-3.3">
      <FullProductName ProductID="libpng16-compat-devel-32bit-1.6.37-3.3">libpng16-compat-devel-32bit-1.6.37-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-devel-1.6.37-3.3">
      <FullProductName ProductID="libpng16-devel-1.6.37-3.3">libpng16-devel-1.6.37-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-devel-32bit-1.6.37-3.3">
      <FullProductName ProductID="libpng16-devel-32bit-1.6.37-3.3">libpng16-devel-32bit-1.6.37-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-tools-1.6.37-3.3">
      <FullProductName ProductID="libpng16-tools-1.6.37-3.3">libpng16-tools-1.6.37-3.3</FullProductName>
    </Branch>
    <Relationship ProductReference="libpng16-16-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-16-1.6.37-3.3">libpng16-16-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-16-32bit-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3">libpng16-16-32bit-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-compat-devel-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3">libpng16-compat-devel-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-compat-devel-32bit-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3">libpng16-compat-devel-32bit-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-devel-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3">libpng16-devel-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-devel-32bit-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3">libpng16-devel-32bit-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-tools-1.6.37-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3">libpng16-tools-1.6.37-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2006-5793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-5793.html</URL>
        <Description>CVE-2006-5793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/219007</URL>
        <Description>SUSE Bug 219007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/222859</URL>
        <Description>SUSE Bug 222859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.</Note>
    </Notes>
    <CVE>CVE-2008-3964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-3964.html</URL>
        <Description>CVE-2008-3964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/424739</URL>
        <Description>SUSE Bug 424739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.</Note>
    </Notes>
    <CVE>CVE-2009-0040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0040.html</URL>
        <Description>CVE-2009-0040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/472745</URL>
        <Description>SUSE Bug 472745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/478625</URL>
        <Description>SUSE Bug 478625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/608040</URL>
        <Description>SUSE Bug 608040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.</Note>
    </Notes>
    <CVE>CVE-2016-10087</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10087.html</URL>
        <Description>CVE-2016-10087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017646</URL>
        <Description>SUSE Bug 1017646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149680</URL>
        <Description>SUSE Bug 1149680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2016-5735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5735.html</URL>
        <Description>CVE-2016-5735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173616</URL>
        <Description>SUSE Bug 1173616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libpng before 1.6.32 does not properly check the length of chunks against the user limit.</Note>
    </Notes>
    <CVE>CVE-2017-12652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12652.html</URL>
        <Description>CVE-2017-12652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141493</URL>
        <Description>SUSE Bug 1141493</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-13785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13785.html</URL>
        <Description>CVE-2018-13785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100687</URL>
        <Description>SUSE Bug 1100687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112153</URL>
        <Description>SUSE Bug 1112153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116574</URL>
        <Description>SUSE Bug 1116574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in libpng 1.6.34. It is a SEGV in the function png_free_data in png.c, related to the recommended error handling for png_read_image.</Note>
    </Notes>
    <CVE>CVE-2018-14048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14048.html</URL>
        <Description>CVE-2018-14048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101418</URL>
        <Description>SUSE Bug 1101418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.</Note>
    </Notes>
    <CVE>CVE-2019-7317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpng16-16-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-16-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-devel-32bit-1.6.37-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libpng16-tools-1.6.37-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7317.html</URL>
        <Description>CVE-2019-7317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124211</URL>
        <Description>SUSE Bug 1124211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135824</URL>
        <Description>SUSE Bug 1135824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141780</URL>
        <Description>SUSE Bug 1141780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147021</URL>
        <Description>SUSE Bug 1147021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165297</URL>
        <Description>SUSE Bug 1165297</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
