drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in libpng10
Name: |
Pufferüberläufe in libpng10 |
|
ID: |
FEDORA-2015-2863 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 21 |
|
Datum: |
Mo, 9. März 2015, 11:17 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973 |
|
Applikationen: |
libpng |
|
Originalnachricht |
Name : libpng10 Product : Fedora 21 Version : 1.0.63 Release : 1.fc21 URL : http://www.libpng.org/pub/png/libpng.html Summary : Old version of libpng, needed to run old binaries Description : The libpng10 package contains an old version of libpng, a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files.
This package is needed if you want to run binaries that were linked dynamically with libpng 1.0.x.
------------------------------------------------------------------------------- - Update Information:
This update addresses a couple of buffer overflows that might allow context-dependent attackers to execute arbitrary code via very wide PNG images.
------------------------------------------------------------------------------- - ChangeLog:
* Fri Feb 27 2015 Paul Howarth <paul@city-fan.org> - 1.0.63-1 - Update to 1.0.63 - Issue a png_error() instead of a png_warning() when width is potentially too large for the architecture, in case the calling application has overridden the default 1,000,000-column limit (fixes CVE-2014-9495 and CVE-2015-0973) - Quieted some harmless warnings from Coverity-scan - Display user limits in the output from pngtest (not packaged) - Changed PNG_USER_CHUNK_MALLOC_MAX from unlimited to 8,000,000; it only affects the maximum memory that can be allocated to an ancillary chunk, and does not limit the size of IDAT data, which is instead limited by PNG_USER_WIDTH_MAX - Rebuilt configure scripts with automake-1.15 and libtool-2.4.6 - Update soname patch * Fri Nov 21 2014 Paul Howarth <paul@city-fan.org> 1.0.62-1 - update to 1.0.62 - avoid out-of-bounds memory access while checking version string in pngread.c and pngwrite.c - build fix for Windows - use %license where possible ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1179186 - CVE-2014-9495 libpng: buffer overflow in png_combine_row https://bugzilla.redhat.com/show_bug.cgi?id=1179186 [ 2 ] Bug #1177327 - CVE-2015-0973 libpng: Heap-buffer overflow png_combine_row() with very wide interlaced images https://bugzilla.redhat.com/show_bug.cgi?id=1177327 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libpng10' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|