[ Andrew Starr-Bochicchio ]
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- debian/patches/CVE-2015-8126.diff: Prevent writing over-length
PLTE chunk and silently truncate over-length PLTE chunk while reading.
Backported from upstream patch.
- CVE-2015-8126
[ Marc Deslauriers ]
* SECURITY UPDATE: out of bounds read in png_set_tIME
- debian/patches/CVE-2015-7981.patch: check bounds in png.c and
pngset.c.
- CVE-2015-7981
* SECURITY UPDATE: out of bounds read in png_push_read_zTXt
- debian/patches/CVE-2012-3425.patch: check for truncated chunk in
pngpread.c.
- CVE-2012-3425
-- Marc Deslauriers <email address hidden> Thu, 19 Nov 2015 08:05:59 -0500
This bug was fixed in the package libpng - 1.2.46-3ubuntu4.1
---------------
libpng (1.2.46-3ubuntu4.1) precise-security; urgency=medium
[ Andrew Starr-Bochicchio ] patches/ CVE-2015- 8126.diff: Prevent writing over-length
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- debian/
PLTE chunk and silently truncate over-length PLTE chunk while reading.
Backported from upstream patch.
- CVE-2015-8126
[ Marc Deslauriers ] patches/ CVE-2015- 7981.patch: check bounds in png.c and patches/ CVE-2012- 3425.patch: check for truncated chunk in
* SECURITY UPDATE: out of bounds read in png_set_tIME
- debian/
pngset.c.
- CVE-2015-7981
* SECURITY UPDATE: out of bounds read in png_push_read_zTXt
- debian/
pngpread.c.
- CVE-2012-3425
-- Marc Deslauriers <email address hidden> Thu, 19 Nov 2015 08:05:59 -0500