FEDORA-EPEL-2012-0728 created by pghmcfc 9 years ago for Fedora EPEL 6
stable

A type conversion flaw leading to an out-of-bounds heap buffer read was found in the way libpng10, a library of functions for manipulation PNG image format files, performed expansion of certain iCCP, iTXt, and zTXt PNG image file chunks.

A remote attacker could provide a specially-crafted Portable Network Graphics (PNG) image file, which once opened in an application, linked against libpng10, could lead to denial of service or in some cases, execution of arbitrary code without permission of the user running such an application.

This update has been submitted for testing by pghmcfc.

9 years ago

This update is currently being pushed to the Fedora EPEL 6 testing updates repository.

9 years ago

This update has been pushed to testing

9 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

9 years ago

This update has been submitted for stable by pghmcfc.

9 years ago

This update is currently being pushed to the Fedora EPEL 6 stable updates repository.

9 years ago

This update has been pushed to stable

9 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
9 years ago
in testing
9 years ago
in stable
9 years ago
BZ#799000 CVE-2011-3045 libpng: buffer overflow in png_inflate caused by invalid type conversions
0
0
BZ#801665 CVE-2011-3045 libpng: buffer overflow in png_inflate caused by invalid type conversions [epel-6]
0
0

Automated Test Results