You are here
Home > Preporuke > Sigurnosni nedostatak programske biblioteke libpng10

Sigurnosni nedostatak programske biblioteke libpng10

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-3e04e9fe54
2018-07-29 02:18:19.405657
——————————————————————————–

Name : libpng10
Product : Fedora 27
Version : 1.0.69
Release : 5.fc27
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

——————————————————————————–
Update Information:

Fix for CVE-2018-13785: the libpng10 library was vulnerable to an integer
overflow and resultant divide-by-zero in the
pngrutil.c:png_check_chunk_length() function. An attacker could exploit this to
cause a denial of service via a crafted PNG file.
——————————————————————————–
ChangeLog:

* Fri Jul 13 2018 Paul Howarth <paul@city-fan.org> – 1.0.69-5
– Fix the calculation of row_factor in png_check_chunk_length (CVE-2018-13785)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.0.69-4
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Wed Feb 14 2018 Paul Howarth <paul@city-fan.org> – 1.0.69-3
– Avoid use of arch-specific build-requires (#1545195)
* Tue Feb 6 2018 Paul Howarth <paul@city-fan.org> – 1.0.69-2
– ldconfig scriptlets replaced by RPM File Triggers from Fedora 28
– Make zlib-devel dependencies arch-specific
– Preserve upstream timestamps where possible
——————————————————————————–
References:

[ 1 ] Bug #1599943 – CVE-2018-13785 libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
https://bugzilla.redhat.com/show_bug.cgi?id=1599943
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-3e04e9fe54’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LEIASEMMWKXWPVVF74A2FRTY4WAMTJ/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-04eded822e
2018-07-29 03:19:11.836325
——————————————————————————–

Name : libpng10
Product : Fedora 28
Version : 1.0.69
Release : 5.fc28
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

——————————————————————————–
Update Information:

Fix for CVE-2018-13785: the libpng10 library was vulnerable to an integer
overflow and resultant divide-by-zero in the
pngrutil.c:png_check_chunk_length() function. An attacker could exploit this to
cause a denial of service via a crafted PNG file.
——————————————————————————–
ChangeLog:

* Fri Jul 13 2018 Paul Howarth <paul@city-fan.org> – 1.0.69-5
– Fix the calculation of row_factor in png_check_chunk_length (CVE-2018-13785)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.0.69-4
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1599943 – CVE-2018-13785 libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
https://bugzilla.redhat.com/show_bug.cgi?id=1599943
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-04eded822e’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZ3N4X57QBQK7RIBYBEVPEKUSDHFALEV/

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa e2fsprogs

Otkriveni su sigurnosni nedostaci u programskom paketu e2fsprogs za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close