Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in libpng
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in libpng
ID: MDVSA-2012:046
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0, Mandriva 2010.1, Mandriva 2011
Datum: Mo, 2. April 2012, 13:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048
Applikationen: libpng

Originalnachricht

This is a multi-part message in MIME format...

------------=_1333354874-2905-118

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:046
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libpng
Date : April 2, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A potential memory corruption has been found and corrected in libpng
(CVE-2011-3048).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
32abd71c77121d32499ca6b0a2adea11
2010.1/i586/libpng3-1.2.43-1.5mdv2010.2.i586.rpm
64bc26eb682602cb681f24596cc4a2ac
2010.1/i586/libpng-devel-1.2.43-1.5mdv2010.2.i586.rpm
110c7a43ed4fce2854787fdb118b338b
2010.1/i586/libpng-source-1.2.43-1.5mdv2010.2.i586.rpm
dcc52b6e893eab6419da5a23e64c70f0
2010.1/i586/libpng-static-devel-1.2.43-1.5mdv2010.2.i586.rpm
edd41240bf0a82cf1f003d1932b20322
2010.1/SRPMS/libpng-1.2.43-1.5mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
14297484d771723c1836969d7916ae4f
2010.1/x86_64/lib64png3-1.2.43-1.5mdv2010.2.x86_64.rpm
e6deb402006790e218bdce7fe8dbc07c
2010.1/x86_64/lib64png-devel-1.2.43-1.5mdv2010.2.x86_64.rpm
0f4eaf1b5cb2a9797a62bfc1c51237ff
2010.1/x86_64/lib64png-static-devel-1.2.43-1.5mdv2010.2.x86_64.rpm
477ff7378350377399f217c3035d4387
2010.1/x86_64/libpng-source-1.2.43-1.5mdv2010.2.x86_64.rpm
edd41240bf0a82cf1f003d1932b20322
2010.1/SRPMS/libpng-1.2.43-1.5mdv2010.2.src.rpm

Mandriva Linux 2011:
42e6677e1cc0bb9bb5aed1cd43f0736e
2011/i586/libpng3-1.2.46-1.3-mdv2011.0.i586.rpm
c30dabb7d3d4a3b0f6c06ca7b8f12dd9
2011/i586/libpng-devel-1.2.46-1.3-mdv2011.0.i586.rpm
90772d7378e18524ffd2d762aa0897f1
2011/i586/libpng-source-1.2.46-1.3-mdv2011.0.i586.rpm
9bd1bfb1fdede615a291b422b8b345a2
2011/i586/libpng-static-devel-1.2.46-1.3-mdv2011.0.i586.rpm
6374920ff2b00d9c4b6a3d4cf4be2ce4 2011/SRPMS/libpng-1.2.46-1.3.src.rpm

Mandriva Linux 2011/X86_64:
49eb04c19c3754e0edafce7a9b275a6c
2011/x86_64/lib64png3-1.2.46-1.3-mdv2011.0.x86_64.rpm
6d9f8f5744025d03a33b78c57ac26cec
2011/x86_64/lib64png-devel-1.2.46-1.3-mdv2011.0.x86_64.rpm
a0aa36751025c8bf8c69111ba1c8630f
2011/x86_64/lib64png-static-devel-1.2.46-1.3-mdv2011.0.x86_64.rpm
a5fdad34063a5455ed605f91d4295fa7
2011/x86_64/libpng-source-1.2.46-1.3-mdv2011.0.x86_64.rpm
6374920ff2b00d9c4b6a3d4cf4be2ce4 2011/SRPMS/libpng-1.2.46-1.3.src.rpm

Mandriva Enterprise Server 5:
48c4b58100e8610b1c02edad1b22f513
mes5/i586/libpng3-1.2.31-2.7mdvmes5.2.i586.rpm
ea8eaff21b47e466c39fb67d05caf5dc
mes5/i586/libpng-devel-1.2.31-2.7mdvmes5.2.i586.rpm
b47d4cc245409339a0bb5661d6a042b2
mes5/i586/libpng-source-1.2.31-2.7mdvmes5.2.i586.rpm
0f6c3f3a2f852745298c17d2ab350979
mes5/i586/libpng-static-devel-1.2.31-2.7mdvmes5.2.i586.rpm
b9250ed0aaa605e52c5e42068a1e9e04
mes5/SRPMS/libpng-1.2.31-2.7mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
11f921419ff975163b42d90749745ba6
mes5/x86_64/lib64png3-1.2.31-2.7mdvmes5.2.x86_64.rpm
4c5ca107c3e976b411ea6c0012191ca7
mes5/x86_64/lib64png-devel-1.2.31-2.7mdvmes5.2.x86_64.rpm
b06e79b357af44896ab2ed0d82724b39
mes5/x86_64/lib64png-static-devel-1.2.31-2.7mdvmes5.2.x86_64.rpm
b356a0406ab7403663f6d914e424a3a6
mes5/x86_64/libpng-source-1.2.31-2.7mdvmes5.2.x86_64.rpm
b9250ed0aaa605e52c5e42068a1e9e04
mes5/SRPMS/libpng-1.2.31-2.7mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPeTLimqjQ0CJFipgRAj/VAKC0m/tdpsxpTI8Sszz56XRSIhVUsQCg6cPd
EJ2GOf6tJUkGMX/Tq9k+a+E=
=lFXJ
-----END PGP SIGNATURE-----


------------=_1333354874-2905-118
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1333354874-2905-118--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung