{"id":"USN-5432-2","summary":"libpng1.6 vulnerabilities","details":"USN-5432-1 fixed vulnerabilities in libpng.\nThis update provides the corresponding updates for libpng1.6.\n\nOriginal advisory details:\n\n It was discovered that libpng incorrectly handled memory when parsing\n certain PNG files. If a user or automated system were tricked into opening\n a specially crafted PNG file, an attacker could use this issue to cause\n libpng to crash, resulting in a denial of service, or possibly execute\n arbitrary code. (CVE-2017-12652)\n\n Zhengxiong Luo discovered that libpng incorrectly handled memory when parsing\n certain PNG files. If a user or automated system were tricked into opening\n a specially crafted PNG file, an attacker could use this issue to cause\n libpng to crash, resulting in a denial of service, or possibly execute\n arbitrary code. (CVE-2018-14048)\n","modified":"2026-04-24T09:27:32.972427Z","published":"2022-05-24T14:21:04Z","related":["UBUNTU-CVE-2017-12652","UBUNTU-CVE-2018-14048"],"upstream":["CVE-2017-12652","CVE-2018-14048","UBUNTU-CVE-2017-12652","UBUNTU-CVE-2018-14048"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5432-2"}],"affected":[{"package":{"name":"libpng1.6","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libpng1.6@1.6.20-2ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.20-2ubuntu0.1~esm1"}]}],"versions":["1.6.20-2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.6.20-2ubuntu0.1~esm1","binary_name":"libpng16-16"},{"binary_version":"1.6.20-2ubuntu0.1~esm1","binary_name":"libpng16-devtools"},{"binary_version":"1.6.20-2ubuntu0.1~esm1","binary_name":"libpng16-tools"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5432-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}