lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1S0ArY-0007oh-FJ@titan.mandriva.com>
Date: Wed, 22 Feb 2012 13:00:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:022 ] libpng

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:022
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : libpng
 Date    : February 22, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in libpng:
 
 Integer overflow in libpng allows remote attackers to cause a denial
 of service or possibly have unspecified other impact via unknown
 vectors that trigger an integer truncation (CVE-2011-3026).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 c4855b723b25b62a8e80f27db90c15a3  2010.1/i586/libpng3-1.2.43-1.3mdv2010.2.i586.rpm
 0485c0180727805f96ae132a888827a3  2010.1/i586/libpng-devel-1.2.43-1.3mdv2010.2.i586.rpm
 26f1bff42f385116d55b1685feda0a1e  2010.1/i586/libpng-source-1.2.43-1.3mdv2010.2.i586.rpm
 f01bdae23b93da1536aed6c3131e8f85  2010.1/i586/libpng-static-devel-1.2.43-1.3mdv2010.2.i586.rpm 
 17738e1f426097875b5682cba8f16415  2010.1/SRPMS/libpng-1.2.43-1.3mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 0c8d9cd9c9e6f57ae72e442419a803df  2010.1/x86_64/lib64png3-1.2.43-1.3mdv2010.2.x86_64.rpm
 eed384ae359919c39c1ca442d0c303ba  2010.1/x86_64/lib64png-devel-1.2.43-1.3mdv2010.2.x86_64.rpm
 d10fafba157200fb9ddbade65ecc8d6d  2010.1/x86_64/lib64png-static-devel-1.2.43-1.3mdv2010.2.x86_64.rpm
 40f7967c617dc26e3e9e9cf6963ebcd0  2010.1/x86_64/libpng-source-1.2.43-1.3mdv2010.2.x86_64.rpm 
 17738e1f426097875b5682cba8f16415  2010.1/SRPMS/libpng-1.2.43-1.3mdv2010.2.src.rpm

 Mandriva Linux 2011:
 bd9413334a6960530e994f48d515b5e2  2011/i586/libpng3-1.2.46-1.1-mdv2011.0.i586.rpm
 08624bc6f3f185c91c20a5c11a37f7b5  2011/i586/libpng-devel-1.2.46-1.1-mdv2011.0.i586.rpm
 367296b0f78af677e2b8ca3e97a10375  2011/i586/libpng-source-1.2.46-1.1-mdv2011.0.i586.rpm
 ba795279eb1e7d3d1c7d6733ac1613f0  2011/i586/libpng-static-devel-1.2.46-1.1-mdv2011.0.i586.rpm 
 d9d76f9711fe8c91808550398c6fadb3  2011/SRPMS/libpng-1.2.46-1.1.src.rpm

 Mandriva Linux 2011/X86_64:
 48f1307f1927a8136765c2b1c93e5e84  2011/x86_64/lib64png3-1.2.46-1.1-mdv2011.0.x86_64.rpm
 60da8adfff64b0b0c505eacc211b8c7c  2011/x86_64/lib64png-devel-1.2.46-1.1-mdv2011.0.x86_64.rpm
 9cf527b249680266e28d7fad6cb9840f  2011/x86_64/lib64png-static-devel-1.2.46-1.1-mdv2011.0.x86_64.rpm
 dc3b6304233dcd785178f26e6cae0916  2011/x86_64/libpng-source-1.2.46-1.1-mdv2011.0.x86_64.rpm 
 d9d76f9711fe8c91808550398c6fadb3  2011/SRPMS/libpng-1.2.46-1.1.src.rpm

 Mandriva Enterprise Server 5:
 bd2f9ef883d4c7c650092136604c93d6  mes5/i586/libpng3-1.2.31-2.5mdvmes5.2.i586.rpm
 03a50f86d3bec91252f194851ce97d37  mes5/i586/libpng-devel-1.2.31-2.5mdvmes5.2.i586.rpm
 f7dab6addec1e0961fd09ac145923b4d  mes5/i586/libpng-source-1.2.31-2.5mdvmes5.2.i586.rpm
 170753445a4511900ea260a65a27fc21  mes5/i586/libpng-static-devel-1.2.31-2.5mdvmes5.2.i586.rpm 
 fe12ec7437628c735fb4e52a814d79b7  mes5/SRPMS/libpng-1.2.31-2.5mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 5c696961a091bcf67bc6715c96a14459  mes5/x86_64/lib64png3-1.2.31-2.5mdvmes5.2.x86_64.rpm
 88eea8de1c1e4e43498dbffabfedf96a  mes5/x86_64/lib64png-devel-1.2.31-2.5mdvmes5.2.x86_64.rpm
 011fcf8505018f3aa3cd4a08289b80ff  mes5/x86_64/lib64png-static-devel-1.2.31-2.5mdvmes5.2.x86_64.rpm
 1ba894529af1775bf39e41f1b7726dc4  mes5/x86_64/libpng-source-1.2.31-2.5mdvmes5.2.x86_64.rpm 
 fe12ec7437628c735fb4e52a814d79b7  mes5/SRPMS/libpng-1.2.31-2.5mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPRKrLmqjQ0CJFipgRAjR7AJ9wJxfAe+llXmAUovEuWa1V5HBzAgCglUPx
T7bG+jPIIPB8BIm1u7kA12Y=
=Qz5/
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ