FEDORA-EPEL-2015-26f2bb9749

security update in Fedora EPEL 6 for libpng10

Status: stable 3 years ago

An underflow read was found in png_check_keyword in libpng10. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image.


The fix for CVE-8126 was incomplete in the previous 1.0.64 update.

Comments 6

This update has been submitted for testing by pghmcfc.

This update has obsoleted libpng10-1.0.65-1.el6, and has inherited its bugs and notes.

This update has been pushed to testing.

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

This update has been submitted for stable by pghmcfc.

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
unspecified
Karma
0
stable threshold: 3
unstable threshold: -1
Autopush (karma)
Enabled
Autopush (time)
Disabled
Dates
submitted 3 years ago
in testing 3 years ago
in stable 3 years ago

Related Bugs 6

00 #1281756 CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
00 #1281759 CVE-2015-8126 libpng10: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-6]
00 #1288264 libpng10-1.0.65 is available
00 #1291312 CVE-2015-8540 libpng: underflow read in png_check_keyword()
00 #1291318 CVE-2015-8540 libpng10: libpng: underflow read in png_check_keyword() [epel-6]
00 #1292648 libpng10-1.0.66 is available

Automated Test Results