Name | CVE-2014-9495 |
Description | Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 773823, 773824 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libpng1.6 (PTS) | bullseye | 1.6.37-3 | fixed |
| bookworm | 1.6.39-2 | fixed |
| sid, trixie | 1.6.44-3 | fixed |
texlive-bin (PTS) | bullseye | 2020.20200327.54578-7+deb11u1 | fixed |
| bullseye (security) | 2020.20200327.54578-7+deb11u2 | fixed |
| bookworm | 2022.20220321.62855-5.1+deb12u1 | fixed |
| sid, trixie | 2024.20240313.70630+ds-5 | fixed |
The information below is based on the following data on fixed versions.
Notes
- libpng <not-affected> (Affects 1.5.x and 1.6.x series)
[squeeze] - texlive-bin <not-affected> (has a copy of libpng 1.2)
[wheezy] - texlive-bin <not-affected> (uses system libpng)
- iceweasel <not-affected> (squeeze used the system libpng, and later versions define their own limits)
- icedove <not-affected> (squeeze used the system libpng, and later versions define their own limits)
http://sourceforge.net/p/png-mng/mailman/message/33173461/