This update addresses a couple of buffer overflows that might allow context-dependent attackers to execute arbitrary code via very wide PNG images.

How to install

sudo dnf upgrade --advisory=FEDORA-2015-2765

This update has been submitted for testing by pghmcfc.

5 years ago

Taskotron: depcheck test PASSED on i386. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/41916/steps/runtask/logs/stdio (results are informative only)

Taskotron: depcheck test PASSED on x86_64. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/41916/steps/runtask/logs/stdio (results are informative only)

This update is currently being pushed to the Fedora 22 testing updates repository.

5 years ago

This update has been pushed to testing

5 years ago
User Icon iddnna provided feedback 5 years ago
karma

This update has reached 3 days in testing and can be pushed to stable now if the maintainer wishes

5 years ago

This update has been submitted for stable by pghmcfc.

5 years ago

Taskotron: upgradepath test PASSED on noarch. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/44043/steps/runtask/logs/stdio (results are informative only)

This update is currently being pushed to the Fedora 22 stable updates repository.

5 years ago

This update has been pushed to stable

5 years ago

Please login to add feedback.

Metadata
Type
security
Karma
1
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
5 years ago
in testing
5 years ago
in stable
5 years ago
BZ#1177327 CVE-2015-0973 libpng: Heap-buffer overflow png_combine_row() with very wide interlaced images
0
0
BZ#1179186 CVE-2014-9495 libpng: buffer overflow in png_combine_row
0
0
BZ#1196912 libpng10-1.0.63 is available
0
0

Automated Test Results