SB2019060705 - OpenSUSE Linux update for libpng16
Published: June 7, 2019 Updated: June 9, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2018-13785)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to integer overflow when a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c). A remote attacker can send a specially crafted PNG file, trigger divide-by-zero error and cause the service to crash.
2) Use-after-free (CVE-ID: CVE-2019-7317)
The vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists due to a use-after-free memory error in the png_image_free function, as defined in the png.c source code file when calling on png_safe_execute. A remote attacker can send specially crafted data, trigger a call on png_safe_execute and trigger memory corruption, resulting in a DoS condition.
Remediation
Install update from vendor's website.