Sicherheit: Pufferüberläufe in libpng10
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in libpng10
ID: FEDORA-2015-2830
Distribution: Fedora
Plattformen: Fedora 20
Datum: Mo, 9. März 2015, 11:17
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495
Applikationen: libpng


Name        : libpng10
Product : Fedora 20
Version : 1.0.63
Release : 1.fc20
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

Update Information:

This update addresses a couple of buffer overflows that might allow
context-dependent attackers to execute arbitrary code via very wide PNG images.


* Fri Feb 27 2015 Paul Howarth <paul@city-fan.org> - 1.0.63-1
- Update to 1.0.63
- Issue a png_error() instead of a png_warning() when width is potentially
too large for the architecture, in case the calling application has
overridden the default 1,000,000-column limit (fixes CVE-2014-9495 and
- Quieted some harmless warnings from Coverity-scan
- Display user limits in the output from pngtest (not packaged)
- Changed PNG_USER_CHUNK_MALLOC_MAX from unlimited to 8,000,000; it only
affects the maximum memory that can be allocated to an ancillary chunk,
and does not limit the size of IDAT data, which is instead limited by
- Rebuilt configure scripts with automake-1.15 and libtool-2.4.6
- Update soname patch
* Fri Nov 21 2014 Paul Howarth <paul@city-fan.org> 1.0.62-1
- update to 1.0.62
- avoid out-of-bounds memory access while checking version string in
pngread.c and pngwrite.c
- build fix for Windows
- use %license where possible
* Sun Aug 17 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> 1.0.61-3
- rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun 7 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> 1.0.61-2
- rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Fri Feb 7 2014 Paul Howarth <paul@city-fan.org> 1.0.61-1
- update to 1.0.61
- ignore, with a warning, out-of-range value of num_trans in png_set_tRNS()
- replaced AM_CONFIG_HEADER(config.h) with AC_CONFIG_HEADERS([config.h]) in
- changed default value of PNG_USER_CACHE_MAX from 0 to 32767 in pngconf.h
- avoid a possible memory leak in contrib/gregbook/readpng.c
- revised libpng.3 so that "doclifter" can process it
- changed '"%s"m' to '"%s" m' in png_debug
macros to improve portability
among compilers
- rebuilt the configure scripts with autoconf-2.69 and automake-1.14.1
- removed potentially misleading warning from png_check_IHDR()
- quiet set-but-not-used warnings in pngset.c
- quiet an uninitialized memory warning from VC2013 in png_get_png()
- quiet unused variable warnings from clang by porting PNG_UNUSED() from
- added -DZ_SOLO to CFLAGS in contrib/pngminim/*/makefile
- added an #ifdef PNG_FIXED_POINT_SUPPORTED/#endif in pngset.c
- drop upstreamed aarch64 patch
- drop patch for CVE-2013-6954, which only actually affected libpng versions
1.6.1 to 1.6.7
* Thu Jan 23 2014 Paul Howarth <paul@city-fan.org> 1.0.60-6
- handle zero-length PLTE chunk or NULL palette with png_error(), to avoid
later reading from a NULL pointer (png_ptr->palette) in
png_do_expand_palette() (CVE-2013-6954)

[ 1 ] Bug #1179186 - CVE-2014-9495 libpng: buffer overflow in png_combine_row
[ 2 ] Bug #1177327 - CVE-2015-0973 libpng: Heap-buffer overflow
png_combine_row() with very wide interlaced images

This update can be installed with the "yum" update program. Use
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten