Login
Newsletter
Werbung

Sicherheit: Pufferüberläufe in libpng10
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in libpng10
ID: FEDORA-2015-2863
Distribution: Fedora
Plattformen: Fedora 21
Datum: Mo, 9. März 2015, 11:17
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973
Applikationen: libpng

Originalnachricht

Name        : libpng10
Product : Fedora 21
Version : 1.0.63
Release : 1.fc21
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

-------------------------------------------------------------------------------
-
Update Information:

This update addresses a couple of buffer overflows that might allow
context-dependent attackers to execute arbitrary code via very wide PNG images.

-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Feb 27 2015 Paul Howarth <paul@city-fan.org> - 1.0.63-1
- Update to 1.0.63
- Issue a png_error() instead of a png_warning() when width is potentially
too large for the architecture, in case the calling application has
overridden the default 1,000,000-column limit (fixes CVE-2014-9495 and
CVE-2015-0973)
- Quieted some harmless warnings from Coverity-scan
- Display user limits in the output from pngtest (not packaged)
- Changed PNG_USER_CHUNK_MALLOC_MAX from unlimited to 8,000,000; it only
affects the maximum memory that can be allocated to an ancillary chunk,
and does not limit the size of IDAT data, which is instead limited by
PNG_USER_WIDTH_MAX
- Rebuilt configure scripts with automake-1.15 and libtool-2.4.6
- Update soname patch
* Fri Nov 21 2014 Paul Howarth <paul@city-fan.org> 1.0.62-1
- update to 1.0.62
- avoid out-of-bounds memory access while checking version string in
pngread.c and pngwrite.c
- build fix for Windows
- use %license where possible
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1179186 - CVE-2014-9495 libpng: buffer overflow in png_combine_row
https://bugzilla.redhat.com/show_bug.cgi?id=1179186
[ 2 ] Bug #1177327 - CVE-2015-0973 libpng: Heap-buffer overflow
png_combine_row() with very wide interlaced images
https://bugzilla.redhat.com/show_bug.cgi?id=1177327
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung