drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in libpng10
Name: |
Denial of Service in libpng10 |
|
ID: |
FEDORA-2018-04eded822e |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 28 |
|
Datum: |
So, 29. Juli 2018, 08:50 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785 |
|
Applikationen: |
libpng |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2018-04eded822e 2018-07-29 03:19:11.836325 ------------------------------------------------------------------------------- -
Name : libpng10 Product : Fedora 28 Version : 1.0.69 Release : 5.fc28 URL : http://www.libpng.org/pub/png/libpng.html Summary : Old version of libpng, needed to run old binaries Description : The libpng10 package contains an old version of libpng, a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files.
This package is needed if you want to run binaries that were linked dynamically with libpng 1.0.x.
------------------------------------------------------------------------------- - Update Information:
Fix for CVE-2018-13785: the libpng10 library was vulnerable to an integer overflow and resultant divide-by-zero in the pngrutil.c:png_check_chunk_length() function. An attacker could exploit this to cause a denial of service via a crafted PNG file. ------------------------------------------------------------------------------- - ChangeLog:
* Fri Jul 13 2018 Paul Howarth <paul@city-fan.org> - 1.0.69-5 - Fix the calculation of row_factor in png_check_chunk_length (CVE-2018-13785) * Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1.0.69-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1599943 - CVE-2018-13785 libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service https://bugzilla.redhat.com/show_bug.cgi?id=1599943 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2018-04eded822e' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZ3N4X57QBQK7RIBYBEVPEKUSDHFALEV/
|
|
|
|