First published: Mon Feb 04 2019(Updated: )
A vulnerability was found in libpng 1.6.36. The function png_image_free in png.c has a use-after-free because png_image_free_function is called under png_safe_execute. References: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803</a> <a href="https://github.com/glennrp/libpng/issues/275">https://github.com/glennrp/libpng/issues/275</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libpng |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1672409 is considered high due to the use-after-free vulnerability in libpng.
To fix REDHAT-BUG-1672409, you should update to the latest version of libpng that addresses this use-after-free issue.
REDHAT-BUG-1672409 affects libpng version 1.6.36 and potentially earlier versions.
Applications that utilize libpng for PNG image processing may be impacted by REDHAT-BUG-1672409.
Currently, there are no known effective workarounds for REDHAT-BUG-1672409 other than upgrading libpng.