Sicherheit: Denial of Service in libpng10
Aktuelle Meldungen Distributionen
Name: Denial of Service in libpng10
ID: FEDORA-2018-3e04e9fe54
Distribution: Fedora
Plattformen: Fedora 27
Datum: So, 29. Juli 2018, 08:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785
Applikationen: libpng


Fedora Update Notification
2018-07-29 02:18:19.405657

Name : libpng10
Product : Fedora 27
Version : 1.0.69
Release : 5.fc27
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

Update Information:

Fix for CVE-2018-13785: the libpng10 library was vulnerable to an integer
overflow and resultant divide-by-zero in the
pngrutil.c:png_check_chunk_length() function. An attacker could exploit this to
cause a denial of service via a crafted PNG file.

* Fri Jul 13 2018 Paul Howarth <paul@city-fan.org> - 1.0.69-5
- Fix the calculation of row_factor in png_check_chunk_length (CVE-2018-13785)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> -
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Wed Feb 14 2018 Paul Howarth <paul@city-fan.org> - 1.0.69-3
- Avoid use of arch-specific build-requires (#1545195)
* Tue Feb 6 2018 Paul Howarth <paul@city-fan.org> - 1.0.69-2
- ldconfig scriptlets replaced by RPM File Triggers from Fedora 28
- Make zlib-devel dependencies arch-specific
- Preserve upstream timestamps where possible

[ 1 ] Bug #1599943 - CVE-2018-13785 libpng: Integer overflow and resultant
divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-3e04e9fe54' at the command
line. For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LEIASEMMWKXWPVVF74A2FRTY4WAMTJ/
Unterstützer werden
Neue Nachrichten