Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in libpng
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in libpng
ID: MDVSA-2008:156
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Multi Network Firewall 2.0, Mandriva Corporate 4.0, Mandriva 2007.1, Mandriva 2008.0, Mandriva 2008.1
Datum: Di, 29. Juli 2008, 01:55
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382
Applikationen: libpng

Originalnachricht

This is a multi-part message in MIME format...

------------=_1217289338-11275-7629


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:156
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libpng
Date : July 28, 2008
Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Tavis Ormandy of the Google Security Team discovered a flaw in how
libpng handles zero-length unknown chunks in PNG files, which could
lead to memory corruption in applications that make use of certain
functions (CVE-2008-1382).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
328d67168d50a5275919b40845a55fae
2007.1/i586/libpng3-1.2.13-2.3mdv2007.1.i586.rpm
4a5ac2460608139834eb7cd20bec7fea
2007.1/i586/libpng3-devel-1.2.13-2.3mdv2007.1.i586.rpm
b52c8961f58bc7a9a6d5d102c2a75f96
2007.1/i586/libpng3-static-devel-1.2.13-2.3mdv2007.1.i586.rpm
78e5b22e668df03ed267ba74bf4f296a
2007.1/SRPMS/libpng-1.2.13-2.3mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
9e8ffa3e7768314e558bfb36fc272f10
2007.1/x86_64/lib64png3-1.2.13-2.3mdv2007.1.x86_64.rpm
247ccd57b51b378231f1064fca1f8b15
2007.1/x86_64/lib64png3-devel-1.2.13-2.3mdv2007.1.x86_64.rpm
5f29761ec9564b9f1b5e28fc13568e2d
2007.1/x86_64/lib64png3-static-devel-1.2.13-2.3mdv2007.1.x86_64.rpm
78e5b22e668df03ed267ba74bf4f296a
2007.1/SRPMS/libpng-1.2.13-2.3mdv2007.1.src.rpm

Mandriva Linux 2008.0:
e2f33ddc8d287d32f085fbe736cd99d9
2008.0/i586/libpng3-1.2.22-0.2mdv2008.0.i586.rpm
c6e49fb9ee07fdc2ef64f8727945d995
2008.0/i586/libpng-devel-1.2.22-0.2mdv2008.0.i586.rpm
af3c911c477924ba32c398d921684286
2008.0/i586/libpng-source-1.2.22-0.2mdv2008.0.i586.rpm
4be3e32680b5ae0885c410cc7dcb673c
2008.0/i586/libpng-static-devel-1.2.22-0.2mdv2008.0.i586.rpm
df595ba0c708ba4d17c2e701e89ace3f
2008.0/SRPMS/libpng-1.2.22-0.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
8903bb17017b3ee24dd9efa5645ce950
2008.0/x86_64/lib64png3-1.2.22-0.2mdv2008.0.x86_64.rpm
13830901c08977e18bc40e2de6f4f012
2008.0/x86_64/lib64png-devel-1.2.22-0.2mdv2008.0.x86_64.rpm
736d3eabfd20c3f5b0400cdd0daeb1ff
2008.0/x86_64/lib64png-static-devel-1.2.22-0.2mdv2008.0.x86_64.rpm
00f1f10f493b4859dac5961cc20846e7
2008.0/x86_64/libpng-source-1.2.22-0.2mdv2008.0.x86_64.rpm
df595ba0c708ba4d17c2e701e89ace3f
2008.0/SRPMS/libpng-1.2.22-0.2mdv2008.0.src.rpm

Mandriva Linux 2008.1:
127edcf2e0db074ab54e2115c4079774
2008.1/i586/libpng3-1.2.25-2.1mdv2008.1.i586.rpm
c6f0302fcac1c4204f83345e17d0714a
2008.1/i586/libpng-devel-1.2.25-2.1mdv2008.1.i586.rpm
b7d5ea52ece77b8a5cfad691e80d86af
2008.1/i586/libpng-source-1.2.25-2.1mdv2008.1.i586.rpm
e33a51fb3cf079f5183fbfec62945d63
2008.1/i586/libpng-static-devel-1.2.25-2.1mdv2008.1.i586.rpm
0ebc68ab40793c52cb1ed92545b690bd
2008.1/SRPMS/libpng-1.2.25-2.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
ff6d4a6a4d8d2c87c753c2e003584eda
2008.1/x86_64/lib64png3-1.2.25-2.1mdv2008.1.x86_64.rpm
b09c32d6b8f3a95ac7ff044d3118d620
2008.1/x86_64/lib64png-devel-1.2.25-2.1mdv2008.1.x86_64.rpm
cda848ff05653640b2306a25458cc2f1
2008.1/x86_64/lib64png-static-devel-1.2.25-2.1mdv2008.1.x86_64.rpm
f2be7e503102a46c7e6df1c385b3080a
2008.1/x86_64/libpng-source-1.2.25-2.1mdv2008.1.x86_64.rpm
0ebc68ab40793c52cb1ed92545b690bd
2008.1/SRPMS/libpng-1.2.25-2.1mdv2008.1.src.rpm

Corporate 3.0:
e94d77d776ab04e5d641b80cb4f067c1
corporate/3.0/i586/libpng3-1.2.5-10.10.C30mdk.i586.rpm
7568581fa685f67b99ab377ea8ec4d6c
corporate/3.0/i586/libpng3-devel-1.2.5-10.10.C30mdk.i586.rpm
feda1fe0f0126c9147b545cc202fe8b0
corporate/3.0/i586/libpng3-static-devel-1.2.5-10.10.C30mdk.i586.rpm
64475a8af64644e49b354d56501ac0fb
corporate/3.0/SRPMS/libpng-1.2.5-10.10.C30mdk.src.rpm

Corporate 3.0/X86_64:
636124a5fa31a10a6ddabe66f58944b9
corporate/3.0/x86_64/lib64png3-1.2.5-10.10.C30mdk.x86_64.rpm
310fd92035b6f7e86aec2c01f88da0e2
corporate/3.0/x86_64/lib64png3-devel-1.2.5-10.10.C30mdk.x86_64.rpm
87827d072121bebfd0ae2cdbacea9cc8
corporate/3.0/x86_64/lib64png3-static-devel-1.2.5-10.10.C30mdk.x86_64.rpm
64475a8af64644e49b354d56501ac0fb
corporate/3.0/SRPMS/libpng-1.2.5-10.10.C30mdk.src.rpm

Corporate 4.0:
8203ca10282141997aaf7d3274a1741a
corporate/4.0/i586/libpng3-1.2.8-1.5.20060mlcs4.i586.rpm
8476cfe63ae99781144a0c88e93995db
corporate/4.0/i586/libpng3-devel-1.2.8-1.5.20060mlcs4.i586.rpm
16521bc77b5faeab13197f779eee2430
corporate/4.0/i586/libpng3-static-devel-1.2.8-1.5.20060mlcs4.i586.rpm
b540ed0b099dbd9313aa51a054f94a2d
corporate/4.0/SRPMS/libpng-1.2.8-1.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6c01d458c88701b5a59c333368a26902
corporate/4.0/x86_64/lib64png3-1.2.8-1.5.20060mlcs4.x86_64.rpm
d7d737ca6e1386eaff5b7c4a473a1ff3
corporate/4.0/x86_64/lib64png3-devel-1.2.8-1.5.20060mlcs4.x86_64.rpm
760f0be502e4b467ea0e7082359d6c4b
corporate/4.0/x86_64/lib64png3-static-devel-1.2.8-1.5.20060mlcs4.x86_64.rpm
b540ed0b099dbd9313aa51a054f94a2d
corporate/4.0/SRPMS/libpng-1.2.8-1.5.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
3e8bd4b7fb11d66ea67c0dd75955736e
mnf/2.0/i586/libpng3-1.2.5-10.10.C30mdk.i586.rpm
6a4922c9efebca1ef396966c8d9ef8cb
mnf/2.0/SRPMS/libpng-1.2.5-10.10.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIji0HmqjQ0CJFipgRAgtBAKCjxsBTjielPPNtqJ3YL7Sd877ehgCg9C9x
VUuE9hlQxxE0kdkLpwOe44I=
=ofo5
-----END PGP SIGNATURE-----


------------=_1217289338-11275-7629
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1217289338-11275-7629--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung