Bug 3263

Summary: Updated libpng to fix several CVE issues regarding securities
Product: Mageia Reporter: Funda Wang <fundawang>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED DUPLICATE QA Contact:
Severity: normal    
Priority: Normal    
Version: 1   
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Source RPM: libpng-1.2.46-1.mga1 CVE:
Status comment:

Description Funda Wang 2011-11-04 14:14:35 CET
Advisory text:

Several vulnerabilities were discovered and corrected in libpng:

* All released versions of libpng (from 1.0 onward) have a buffer overrun in the code that promotes palette images with transparency (1 channel) to grayscale+alpha images (2 channels), but only for applications that call png_rgb_to_gray() and not png_set_expand(). (None are known.) An arbitrary amount of memory may be overwritten in this case, with arbitrary (attacker-controlled) data. This vulnerability has been assigned ID CVE-2011-2690. 

* libpng 1.2.20 and later crashes in png_default_error() due to internal use of a NULL pointer instead of the empty string (""). This vulnerability has been assigned ID CVE-2011-2691. 

* Many (most?) versions of libpng read uninitialized memory when handling empty sCAL chunks, and they handle malformed sCAL chunks (those lacking a delimiting NULL between the internal strings) incorrectly. This vulnerability has been assigned ID CVE-2011-2692.

The updated packages have been updated to latest stable version to correct these
issues, plus other enhancements and bug fixes.
Comment 1 Funda Wang 2011-11-04 16:49:00 CET
duplicated

*** This bug has been marked as a duplicate of bug 3264 ***

Status: NEW => RESOLVED
Resolution: (none) => DUPLICATE