[SECURITY] Fedora 15 Update: libpng10-1.0.55-1.fc15

updates at fedoraproject.org updates at fedoraproject.org
Sat Jul 23 02:05:12 UTC 2011


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-8844
2011-06-29 21:23:08
--------------------------------------------------------------------------------

Name        : libpng10
Product     : Fedora 15
Version     : 1.0.55
Release     : 1.fc15
URL         : http://www.libpng.org/pub/png/libpng.html
Summary     : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format
files.

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

--------------------------------------------------------------------------------
Update Information:

This update fixes a 1-byte uninitialized memory reference in png_format_buffer(). It allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message. This is CVE-2011-2501.

Also fixed in this release are some other minor security problems and there's additionally a bugfix backported from 1.5.3: when expanding a paletted image, always expand to RGBA if transparency is present.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jul  7 2011 Paul Howarth <paul at city-fan.org> 1.0.55-1
- update to 1.0.55
  - fixed uninitialized memory read in png_format_buffer()
    (CVE-2011-2501, related to CVE-2004-0421)
  - pass "" instead of '\0' to png_default_error() in png_err()
  - check for up->location !PNG_AFTER_IDAT when writing unknown chunks before
    IDAT
  - ported bugfix in pngrtran.c from 1.5.3: when expanding a paletted image,
    always expand to RGBA if transparency is present
  - check for integer overflow in png_set_rgb_to_gray()
  - check for sCAL chunk too short
- drop upstreamed patch for CVE-2011-2501
- add patch to fix build failure due to regression in libpng.sym creation
* Wed Jun 29 2011 Paul Howarth <paul at city-fan.org> 1.0.54-3
- fix 1-byte uninitialized memory reference in png_format_buffer()
  (CVE-2011-2501, related to CVE-2004-0421)
- nobody else likes macros for commands
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #717084 - CVE-2011-2501 libpng: regression of CVE-2004-0421 in 1.2.23+
        https://bugzilla.redhat.com/show_bug.cgi?id=717084
  [ 2 ] Bug #720607 - CVE-2011-2690 libpng: buffer overwrite in png_rgb_to_gray
        https://bugzilla.redhat.com/show_bug.cgi?id=720607
  [ 3 ] Bug #720612 - CVE-2011-2692 libpng: Memory corruption when handling empty sCAL chunks
        https://bugzilla.redhat.com/show_bug.cgi?id=720612
  [ 4 ] Bug #720608 - CVE-2011-2691 libpng: Crash in png_default_error due to use of NULL Pointer
        https://bugzilla.redhat.com/show_bug.cgi?id=720608
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list