libpng is vulnerable to denial of service (DoS) attacks via null pointer dereference. The vulnerability has existed in libpng since version 0.71. To be vulnerable, an application has to load a text chunk into the png
structure, then delete all text, then add another text chunk to the same png
structure.
www.openwall.com/lists/oss-security/2016/12/29/2
www.openwall.com/lists/oss-security/2016/12/30/4
www.securityfocus.com/bid/95157
github.com/glennrp/libpng/commit/812768d7a9c973452222d454634496b25ed415eb
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
security.gentoo.org/glsa/201701-74
usn.ubuntu.com/3712-1/
usn.ubuntu.com/3712-2/