https://bugzilla.redhat.com/show_bug.cgi?id=1086514
Bug ID: 1086514
Summary: CVE-2013-7353 Integer overflow leading to a heap-based
buffer overflow in png_set_unknown_chunks()
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: huzaifas(a)redhat.com
CC: drizt(a)land.ru, erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
jkoncick(a)redhat.com, jkurik(a)redhat.com,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
pfrields(a)redhat.com, phracek(a)redhat.com,
rjones(a)redhat.com
An integer overflow leading to a heap-based buffer overflow was found in the
png_set_unknown_chunks() API function of libpng. A attacker could create a
specially-crafated image file and render it with an application written to
explicitly call png_set_unknown_chunks() function, could cause libpng to crash
or execute arbitrary code with the permissions of the user running such an
application.
The vendor mentions that internal calls use safe values. These issues could
potentially affect applications that use the libpng API. Apparently no such
applications were identified.
Reference:
http://sourceforge.net/p/libpng/bugs/199/http://seclists.org/oss-sec/2014/q2/83
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=70jisqeWxf&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=890087
Ján Rusnačko <jrusnack(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=low,public=20121215, |impact=low,public=20121215,
|reported=20121225,source=in |reported=20121225,source=in
|ternet,cvss2=4.3/AV:N/AC:M/ |ternet,cvss2=4.3/AV:N/AC:M/
|Au:N/C:N/I:N/A:P,rhel-5/fre |Au:N/C:N/I:N/A:P,rhel-5/fre
|etype=notaffected,rhel-6/fr |etype=notaffected,rhel-6/fr
|eetype=wontfix,fedora-all/f |eetype=wontfix,fedora-all/f
|reetype=affected,fedora-all |reetype=affected,fedora-all
|/mingw32-freetype=affected |/mingw32-freetype=affected,
| |cwe=CWE-476[auto]
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1086516
Bug ID: 1086516
Summary: CVE-2013-7354 Integer overflow leading to a heap-based
buffer overflow in png_set_sPLT() and png_set_text_2()
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: huzaifas(a)redhat.com
CC: drizt(a)land.ru, erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
jkoncick(a)redhat.com, jkurik(a)redhat.com,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
pfrields(a)redhat.com, phracek(a)redhat.com,
rjones(a)redhat.com
An integer overflow leading to a heap-based buffer overflow was found in the
png_set_sPLT() and png_set_text_2() API functions of libpng. A attacker could
create a specially-crafated image file and render it with an application
written to explicitly call png_set_sPLT() or png_set_text_2() function, could
cause libpng to crash or execute arbitrary code with the permissions of the
user running such an application.
The vendor mentions that internal calls use safe values. These issues could
potentially affect applications that use the libpng API. Apparently no such
applications were identified.
Reference:
http://sourceforge.net/p/libpng/bugs/199/http://seclists.org/oss-sec/2014/q2/83
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=lqm7CkaJep&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=890094
Ján Rusnačko <jrusnack(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=important,public=201 |impact=important,public=201
|21215,reported=20121231,sou |21215,reported=20121231,sou
|rce=internet,cvss2=6.8/AV:N |rce=internet,cvss2=6.8/AV:N
|/AC:M/Au:N/C:P/I:P/A:P,rhel |/AC:M/Au:N/C:P/I:P/A:P,rhel
|-5/freetype=notaffected,rhe |-5/freetype=notaffected,rhe
|l-6/freetype=notaffected,fe |l-6/freetype=notaffected,fe
|dora-all/freetype=notaffect |dora-all/freetype=notaffect
|ed,fedora-all/mingw32-freet |ed,fedora-all/mingw32-freet
|ype=notaffected |ype=notaffected,cwe=CWE-787
| |[auto]
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=724906
Ján Rusnačko <jrusnack(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=low,public=20110720, |impact=low,public=20110720,
|reported=20110721,source=cv |reported=20110721,source=cv
|e,cvss2=5.1/AV:N/AC:H/Au:N/ |e,cvss2=5.1/AV:N/AC:H/Au:N/
|C:P/I:P/A:P,fedora-all/libx |C:P/I:P/A:P,fedora-all/libx
|ml=notaffected,fedora-all/l |ml=notaffected,fedora-all/l
|ibxml2=affected,fedora-all/ |ibxml2=affected,fedora-all/
|mingw32-libxml2=affected,rh |mingw32-libxml2=affected,rh
|el-4/libxml2=affected,rhel- |el-4/libxml2=affected,rhel-
|5/libxml2=affected,rhel-6/l |5/libxml2=affected,rhel-6/l
|ibxml2=affected,rhel-6/ming |ibxml2=affected,rhel-6/ming
|w32-libxml2=affected |w32-libxml2=affected,cwe=CW
| |E-122[auto]
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1124500
Ján Rusnačko <jrusnack(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard| |
|impact=low,public=20140214, |impact=low,public=20140214,
|reported=20140729,source=cv |reported=20140729,source=cv
|e,cvss2=1.2/AV:L/AC:H/Au:N/ |e,cvss2=1.2/AV:L/AC:H/Au:N/
|C:N/I:N/A:P,rhel-5/cairo=ne |C:N/I:N/A:P,rhel-5/cairo=ne
|w,rhel-6/cairo=new,rhel-7/c |w,rhel-6/cairo=new,rhel-7/c
|airo=new,fedora-all/cairo=n |airo=new,fedora-all/cairo=n
|ew,rhev-m-3/mingw-virt-view |ew,rhev-m-3/mingw-virt-view
|er=new,fedora-all/mingw-cai |er=new,fedora-all/mingw-cai
|ro=new,epel-5/mingw32-cairo |ro=new,epel-5/mingw32-cairo
|=new,epel-7/mingw-cairo=new |=new,epel-7/mingw-cairo=new
| |,cwe=CWE-476[auto]
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1262377
Bug ID: 1262377
Summary: freetype: Infinite loop in parse_encoding in t1load.c
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: amaris(a)redhat.com
CC: behdad(a)fedoraproject.org, erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
fonts-bugs(a)lists.fedoraproject.org,
kevin(a)tigcc.ticalc.org, lfarkas(a)lfarkas.org,
mkasik(a)redhat.com, rjones(a)redhat.com
If the Postscript stream contains a broken number-with-base (e.g. "8#garbage")
the cursor doesn't advance and parse_encoding enters an infinite loop.
Upstream patch:
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0…
CVE request:
http://seclists.org/oss-sec/2015/q3/537
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Q45dqAndJZ&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=835863
Ján Rusnačko <jrusnack(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=moderate,public=2012 |impact=moderate,public=2012
|0626,reported=20120627,sour |0626,reported=20120627,sour
|ce=cve,cvss2=5.1/AV:N/AC:H/ |ce=cve,cvss2=5.1/AV:N/AC:H/
|Au:N/C:P/I:P/A:P,rhel-5/lib |Au:N/C:P/I:P/A:P,rhel-5/lib
|xml2=affected,rhel-6/libxml |xml2=affected,rhel-6/libxml
|2=affected,openshift-1/libx |2=affected,openshift-1/libx
|ml2=notaffected,fedora-all/ |ml2=notaffected,fedora-all/
|libxml2=affected,fedora-all |libxml2=affected,fedora-all
|/libxml=notaffected,rhel-6/ |/libxml=notaffected,rhel-6/
|mingw32-libxml2=notaffected |mingw32-libxml2=notaffected
|,epel-5/mingw32-libxml2=aff |,epel-5/mingw32-libxml2=aff
|ected,fedora-all/mingw32-li |ected,fedora-all/mingw32-li
|bxml2=affected |bxml2=affected,cwe=CWE-190[
| |auto]
--
You are receiving this mail because:
You are on the CC list for the bug.