{"id":"USN-5432-1","summary":"libpng vulnerabilities","details":"It was discovered that libpng incorrectly handled memory when parsing\ncertain PNG files. If a user or automated system were tricked into opening\na specially crafted PNG file, an attacker could use this issue to cause\nlibpng to crash, resulting in a denial of service, or possible execute\narbitrary code. (CVE-2017-12652)\n\nZhengxiong Luo discovered that libpng incorrectly handled memory when parsing\ncertain PNG files. If a user or automated system were tricked into opening\na specially crafted PNG file, an attacker could use this issue to cause\nlibpng to crash, resulting in a denial of service, or possible execute\narbitrary code. (CVE-2018-14048)\n","modified":"2026-04-24T09:26:54.115474Z","published":"2022-05-23T10:45:47Z","related":["UBUNTU-CVE-2017-12652","UBUNTU-CVE-2018-14048"],"upstream":["CVE-2017-12652","CVE-2018-14048","UBUNTU-CVE-2017-12652","UBUNTU-CVE-2018-14048"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5432-1"}],"affected":[{"package":{"name":"libpng","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libpng@1.2.54-1ubuntu1.1+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.54-1ubuntu1.1+esm1"}]}],"versions":["1.2.51-0ubuntu3","1.2.54-1","1.2.54-1ubuntu1","1.2.54-1ubuntu1.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"1.2.54-1ubuntu1.1+esm1","binary_name":"libpng12-0"},{"binary_version":"1.2.54-1ubuntu1.1+esm1","binary_name":"libpng3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5432-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}