U radu programskog paketa libpng10, za operacijske sustave Fedora 15 i 16, otkrivena je sigurnosna ranjivost. Udaljenom napadaču omogućuje izvođenje DoS (eng. Denial of Service) napada ili pokretanje proizvoljnog programskog koda.
Paket: | libpng10 1.x |
Operacijski sustavi: | Fedora 15, Fedora 16 |
Problem: | pogreška u programskoj funkciji, preljev međuspremnika |
Iskorištavanje: | udaljeno |
Posljedica: | proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-3045 |
Izvorni ID preporuke: | FEDORA-2012-3545 |
Izvor: | Fedora |
Problem: | |
Ranjivost je posljedica prepisivanja spremnika na gomili u funkciji "png_inflate". |
|
Posljedica: | |
Napadač ju može iskoristiti za izvođenje DoS napada ili proizvoljno izvršavanje programskog koda, podmetanjem posebno oblikovane PNG datoteke. |
|
Rješenje: | |
Korisnicima se preporuča instalacija novih programskih rješenja. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-3545
2012-03-10 21:24:36
--------------------------------------------------------------------------------
Name : libpng10
Product : Fedora 16
Version : 1.0.58
Release : 1.fc16
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.
This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.
--------------------------------------------------------------------------------
Update Information:
A type conversion flaw leading to an out-of-bounds heap buffer read was found in
the way libpng10, a library of functions for manipulation PNG image format
files, performed expansion of certain iCCP, iTXt, and zTXt PNG image file
chunks.
A remote attacker could provide a specially-crafted Portable Network Graphics
(PNG) image file, which once opened in an application, linked against libpng10,
could lead to denial of service or in some cases, execution of arbitrary code
without permission of the user running such an application.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Mar 9 2012 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.58-1
- update to 1.0.58
- fix bug with png_handle_hIST with odd chunk length
- fix incorrect type (int copy should be png_size_t copy) in png_inflate()
(CVE-2011-3045)
- fix off-by-one bug in png_handle_sCAL() when using fixed point arithmetic,
causing out-of-bounds read in png_set_sCAL() because of failure to copy
the string terminators
- remove the png_free() of unused png_ptr->current_text from pngread.c
- remove all of the assembler code from pnggccrd.c and just "return 2;"
* Sun Feb 19 2012 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.57-1
- update to 1.0.57 (fixed CVE-2011-3026 buffer overrun bug)
* Thu Jan 5 2012 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.56-2
- rebuilt for gcc 4.7
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #799000 - CVE-2011-3045 libpng: buffer overflow in png_inflate
caused by invalid type conversions
https://bugzilla.redhat.com/show_bug.cgi?id=799000
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-3536
2012-03-10 21:24:09
--------------------------------------------------------------------------------
Name : libpng10
Product : Fedora 15
Version : 1.0.58
Release : 1.fc15
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.
This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.
--------------------------------------------------------------------------------
Update Information:
A type conversion flaw leading to an out-of-bounds heap buffer read was found in
the way libpng10, a library of functions for manipulation PNG image format
files, performed expansion of certain iCCP, iTXt, and zTXt PNG image file
chunks.
A remote attacker could provide a specially-crafted Portable Network Graphics
(PNG) image file, which once opened in an application, linked against libpng10,
could lead to denial of service or in some cases, execution of arbitrary code
without permission of the user running such an application.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Mar 9 2012 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.58-1
- update to 1.0.58
- fix bug with png_handle_hIST with odd chunk length
- fix incorrect type (int copy should be png_size_t copy) in png_inflate()
(CVE-2011-3045)
- fix off-by-one bug in png_handle_sCAL() when using fixed point arithmetic,
causing out-of-bounds read in png_set_sCAL() because of failure to copy
the string terminators
- remove the png_free() of unused png_ptr->current_text from pngread.c
- remove all of the assembler code from pnggccrd.c and just "return 2;"
* Sun Feb 19 2012 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.57-1
- update to 1.0.57 (fixed CVE-2011-3026 buffer overrun bug)
* Thu Jan 5 2012 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.56-2
- rebuilt for gcc 4.7
* Sat Jul 9 2011 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.56-1
- update to 1.0.56
- fix regression in Makefile.am/Makefile.in
- fix "make distcheck"
- drop upstreamed fix for libpng.sym build failure
* Thu Jul 7 2011 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.55-1
- update to 1.0.55
- fixed uninitialized memory read in png_format_buffer()
(CVE-2011-2501, related to CVE-2004-0421)
- pass "" instead of '�' to png_default_error() in png_err() (CVE-2011-2691)
- check for up->location !PNG_AFTER_IDAT when writing unknown chunks before
IDAT
- ported bugfix in pngrtran.c from 1.5.3: when expanding a paletted image,
always expand to RGBA if transparency is present
- check for integer overflow in png_set_rgb_to_gray() (CVE-2011-2690)
- check for sCAL chunk too short (CVE-2011-2692)
- drop upstreamed patch for CVE-2011-2501
- add patch to fix build failure due to regression in libpng.sym creation
* Wed Jun 29 2011 Paul Howarth <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.54-3
- fix 1-byte uninitialized memory reference in png_format_buffer()
(CVE-2011-2501, related to CVE-2004-0421)
- nobody else likes macros for commands
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #799000 - CVE-2011-3045 libpng: buffer overflow in png_inflate
caused by invalid type conversions
https://bugzilla.redhat.com/show_bug.cgi?id=799000
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke