Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in libpng10
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in libpng10
ID: FEDORA-2012-2008
Distribution: Fedora
Plattformen: Fedora 15
Datum: Di, 28. Februar 2012, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026
Applikationen: libpng

Originalnachricht

Name        : libpng10
Product : Fedora 15
Version : 1.0.57
Release : 1.fc15
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

-------------------------------------------------------------------------------
-
Update Information:

This update addresses an integer overflow in the libpng10 PNG library, which
could lead to the execution of arbitrary code if a malformed image is processed.
-------------------------------------------------------------------------------
-
ChangeLog:

* Sun Feb 19 2012 Paul Howarth <paul@city-fan.org> 1.0.57-1
- update to 1.0.57 (fixed CVE-2011-3026 buffer overrun bug)
* Thu Jan 5 2012 Paul Howarth <paul@city-fan.org> 1.0.56-2
- rebuilt for gcc 4.7
* Sat Jul 9 2011 Paul Howarth <paul@city-fan.org> 1.0.56-1
- update to 1.0.56
- fix regression in Makefile.am/Makefile.in
- fix "make distcheck"
- drop upstreamed fix for libpng.sym build failure
* Thu Jul 7 2011 Paul Howarth <paul@city-fan.org> 1.0.55-1
- update to 1.0.55
- fixed uninitialized memory read in png_format_buffer()
(CVE-2011-2501, related to CVE-2004-0421)
- pass "" instead of '\0' to png_default_error() in png_err()
(CVE-2011-2691)
- check for up->location !PNG_AFTER_IDAT when writing unknown chunks
before
IDAT
- ported bugfix in pngrtran.c from 1.5.3: when expanding a paletted image,
always expand to RGBA if transparency is present
- check for integer overflow in png_set_rgb_to_gray() (CVE-2011-2690)
- check for sCAL chunk too short (CVE-2011-2692)
- drop upstreamed patch for CVE-2011-2501
- add patch to fix build failure due to regression in libpng.sym creation
* Wed Jun 29 2011 Paul Howarth <paul@city-fan.org> 1.0.54-3
- fix 1-byte uninitialized memory reference in png_format_buffer()
(CVE-2011-2501, related to CVE-2004-0421)
- nobody else likes macros for commands
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #790737 - CVE-2011-3026 libpng: Heap-buffer-overflow in
png_decompress_chunk (MFSA 2012-11)
https://bugzilla.redhat.com/show_bug.cgi?id=790737
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung