Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.Referenceshttp://www.openwall.com/lists/oss-security/2015/01/04/3http://www.securityfocus.com/bid/71820http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlhttps://support.apple.com/HT206167http://sourceforge.net/p/png-mng/mailman/message/33173461/http://www.openwall.com/lists/oss-security/2015/01/10/1http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlhttp://www.openwall.com/lists/oss-security/2015/01/10/3http://sourceforge.net/p/png-mng/mailman/message/33172831/http://www.securitytracker.com/id/1031444http://secunia.com/advisories/62725