[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Ous3s-0003kt-H1@titan.mandriva.com>
Date: Sun, 12 Sep 2010 21:18:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2010:179 ] libglpng
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2010:179
http://www.mandriva.com/security/
_______________________________________________________________________
Package : libglpng
Date : September 12, 2010
Affected: 2009.1, 2010.0, 2010.1
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in libglpng:
Multiple integer overflows in glpng.c in glpng 1.45 allow
context-dependent attackers to execute arbitrary code via a crafted
PNG image, related to (1) the pngLoadRawF function and (2) the pngLoadF
function, leading to heap-based buffer overflows (CVE-2010-1519).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1519
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.1:
effe46c6972c268adc41f31c505b2583 2009.1/i586/libglpng1-1.45-3.1mdv2009.1.i586.rpm
b0a442c8635938b895b8e6c6a8091cf4 2009.1/i586/libglpng-devel-1.45-3.1mdv2009.1.i586.rpm
7ae881706d3486227db31b3bee09679e 2009.1/SRPMS/libglpng-1.45-3.1mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64:
b352cb371a7d11d25e3c4d0544fddb54 2009.1/x86_64/lib64glpng1-1.45-3.1mdv2009.1.x86_64.rpm
809d9effac6266699cbb10dad0a95e24 2009.1/x86_64/lib64glpng-devel-1.45-3.1mdv2009.1.x86_64.rpm
7ae881706d3486227db31b3bee09679e 2009.1/SRPMS/libglpng-1.45-3.1mdv2009.1.src.rpm
Mandriva Linux 2010.0:
159297cbcbe23bba381467e50a437de0 2010.0/i586/libglpng1-1.45-4.1mdv2010.0.i586.rpm
2b8206baadd12a11c3050cdb84ae4422 2010.0/i586/libglpng-devel-1.45-4.1mdv2010.0.i586.rpm
caf1ba944ae5024ab75b8836ad785a6c 2010.0/SRPMS/libglpng-1.45-4.1mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64:
d3c492efd72e38c5f1e2b10fbba625ba 2010.0/x86_64/lib64glpng1-1.45-4.1mdv2010.0.x86_64.rpm
497e18abc0f28b26efc870a7f0c447e0 2010.0/x86_64/lib64glpng-devel-1.45-4.1mdv2010.0.x86_64.rpm
caf1ba944ae5024ab75b8836ad785a6c 2010.0/SRPMS/libglpng-1.45-4.1mdv2010.0.src.rpm
Mandriva Linux 2010.1:
390683a975721076f81ac4432d232e33 2010.1/i586/libglpng1-1.45-4.1mdv2010.1.i586.rpm
3f38215f4a4868df76510aad48bf56b5 2010.1/i586/libglpng-devel-1.45-4.1mdv2010.1.i586.rpm
61d2140ccc78edc76e01304ce16ea2e3 2010.1/SRPMS/libglpng-1.45-4.1mdv2010.1.src.rpm
Mandriva Linux 2010.1/X86_64:
33df7a987a7c19af5859c359d9a374cd 2010.1/x86_64/lib64glpng1-1.45-4.1mdv2010.1.x86_64.rpm
a8813040f820ca8b254233c136da946f 2010.1/x86_64/lib64glpng-devel-1.45-4.1mdv2010.1.x86_64.rpm
61d2140ccc78edc76e01304ce16ea2e3 2010.1/SRPMS/libglpng-1.45-4.1mdv2010.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFMjPpCmqjQ0CJFipgRAn/EAKDq1auN1MK7bRnVx0YJJebpNgfV2QCeMCg8
+gyj+1lHGKps/GcXl6eQWFs=
=Wonf
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists