drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in libpng10
Name: |
Pufferüberläufe in libpng10 |
|
ID: |
FEDORA-2015-2830 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Mo, 9. März 2015, 11:17 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973 |
|
Applikationen: |
libpng |
|
Originalnachricht |
Name : libpng10 Product : Fedora 20 Version : 1.0.63 Release : 1.fc20 URL : http://www.libpng.org/pub/png/libpng.html Summary : Old version of libpng, needed to run old binaries Description : The libpng10 package contains an old version of libpng, a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files.
This package is needed if you want to run binaries that were linked dynamically with libpng 1.0.x.
------------------------------------------------------------------------------- - Update Information:
This update addresses a couple of buffer overflows that might allow context-dependent attackers to execute arbitrary code via very wide PNG images.
------------------------------------------------------------------------------- - ChangeLog:
* Fri Feb 27 2015 Paul Howarth <paul@city-fan.org> - 1.0.63-1 - Update to 1.0.63 - Issue a png_error() instead of a png_warning() when width is potentially too large for the architecture, in case the calling application has overridden the default 1,000,000-column limit (fixes CVE-2014-9495 and CVE-2015-0973) - Quieted some harmless warnings from Coverity-scan - Display user limits in the output from pngtest (not packaged) - Changed PNG_USER_CHUNK_MALLOC_MAX from unlimited to 8,000,000; it only affects the maximum memory that can be allocated to an ancillary chunk, and does not limit the size of IDAT data, which is instead limited by PNG_USER_WIDTH_MAX - Rebuilt configure scripts with automake-1.15 and libtool-2.4.6 - Update soname patch * Fri Nov 21 2014 Paul Howarth <paul@city-fan.org> 1.0.62-1 - update to 1.0.62 - avoid out-of-bounds memory access while checking version string in pngread.c and pngwrite.c - build fix for Windows - use %license where possible * Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> 1.0.61-3 - rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> 1.0.61-2 - rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Fri Feb 7 2014 Paul Howarth <paul@city-fan.org> 1.0.61-1 - update to 1.0.61 - ignore, with a warning, out-of-range value of num_trans in png_set_tRNS() - replaced AM_CONFIG_HEADER(config.h) with AC_CONFIG_HEADERS([config.h]) in configure.ac - changed default value of PNG_USER_CACHE_MAX from 0 to 32767 in pngconf.h - avoid a possible memory leak in contrib/gregbook/readpng.c - revised libpng.3 so that "doclifter" can process it - changed '"%s"m' to '"%s" m' in png_debug macros to improve portability among compilers - rebuilt the configure scripts with autoconf-2.69 and automake-1.14.1 - removed potentially misleading warning from png_check_IHDR() - quiet set-but-not-used warnings in pngset.c - quiet an uninitialized memory warning from VC2013 in png_get_png() - quiet unused variable warnings from clang by porting PNG_UNUSED() from libpng-1.4.6 - added -DZ_SOLO to CFLAGS in contrib/pngminim/*/makefile - added an #ifdef PNG_FIXED_POINT_SUPPORTED/#endif in pngset.c - drop upstreamed aarch64 patch - drop patch for CVE-2013-6954, which only actually affected libpng versions 1.6.1 to 1.6.7 * Thu Jan 23 2014 Paul Howarth <paul@city-fan.org> 1.0.60-6 - handle zero-length PLTE chunk or NULL palette with png_error(), to avoid later reading from a NULL pointer (png_ptr->palette) in png_do_expand_palette() (CVE-2013-6954) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1179186 - CVE-2014-9495 libpng: buffer overflow in png_combine_row https://bugzilla.redhat.com/show_bug.cgi?id=1179186 [ 2 ] Bug #1177327 - CVE-2015-0973 libpng: Heap-buffer overflow png_combine_row() with very wide interlaced images https://bugzilla.redhat.com/show_bug.cgi?id=1177327 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libpng10' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|