[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1SEcTd-0007C5-7C@titan.mandriva.com>
Date: Mon, 02 Apr 2012 10:19:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2012:046 ] libpng
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:046
http://www.mandriva.com/security/
_______________________________________________________________________
Package : libpng
Date : April 2, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A potential memory corruption has been found and corrected in libpng
(CVE-2011-3048).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2010.1:
32abd71c77121d32499ca6b0a2adea11 2010.1/i586/libpng3-1.2.43-1.5mdv2010.2.i586.rpm
64bc26eb682602cb681f24596cc4a2ac 2010.1/i586/libpng-devel-1.2.43-1.5mdv2010.2.i586.rpm
110c7a43ed4fce2854787fdb118b338b 2010.1/i586/libpng-source-1.2.43-1.5mdv2010.2.i586.rpm
dcc52b6e893eab6419da5a23e64c70f0 2010.1/i586/libpng-static-devel-1.2.43-1.5mdv2010.2.i586.rpm
edd41240bf0a82cf1f003d1932b20322 2010.1/SRPMS/libpng-1.2.43-1.5mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64:
14297484d771723c1836969d7916ae4f 2010.1/x86_64/lib64png3-1.2.43-1.5mdv2010.2.x86_64.rpm
e6deb402006790e218bdce7fe8dbc07c 2010.1/x86_64/lib64png-devel-1.2.43-1.5mdv2010.2.x86_64.rpm
0f4eaf1b5cb2a9797a62bfc1c51237ff 2010.1/x86_64/lib64png-static-devel-1.2.43-1.5mdv2010.2.x86_64.rpm
477ff7378350377399f217c3035d4387 2010.1/x86_64/libpng-source-1.2.43-1.5mdv2010.2.x86_64.rpm
edd41240bf0a82cf1f003d1932b20322 2010.1/SRPMS/libpng-1.2.43-1.5mdv2010.2.src.rpm
Mandriva Linux 2011:
42e6677e1cc0bb9bb5aed1cd43f0736e 2011/i586/libpng3-1.2.46-1.3-mdv2011.0.i586.rpm
c30dabb7d3d4a3b0f6c06ca7b8f12dd9 2011/i586/libpng-devel-1.2.46-1.3-mdv2011.0.i586.rpm
90772d7378e18524ffd2d762aa0897f1 2011/i586/libpng-source-1.2.46-1.3-mdv2011.0.i586.rpm
9bd1bfb1fdede615a291b422b8b345a2 2011/i586/libpng-static-devel-1.2.46-1.3-mdv2011.0.i586.rpm
6374920ff2b00d9c4b6a3d4cf4be2ce4 2011/SRPMS/libpng-1.2.46-1.3.src.rpm
Mandriva Linux 2011/X86_64:
49eb04c19c3754e0edafce7a9b275a6c 2011/x86_64/lib64png3-1.2.46-1.3-mdv2011.0.x86_64.rpm
6d9f8f5744025d03a33b78c57ac26cec 2011/x86_64/lib64png-devel-1.2.46-1.3-mdv2011.0.x86_64.rpm
a0aa36751025c8bf8c69111ba1c8630f 2011/x86_64/lib64png-static-devel-1.2.46-1.3-mdv2011.0.x86_64.rpm
a5fdad34063a5455ed605f91d4295fa7 2011/x86_64/libpng-source-1.2.46-1.3-mdv2011.0.x86_64.rpm
6374920ff2b00d9c4b6a3d4cf4be2ce4 2011/SRPMS/libpng-1.2.46-1.3.src.rpm
Mandriva Enterprise Server 5:
48c4b58100e8610b1c02edad1b22f513 mes5/i586/libpng3-1.2.31-2.7mdvmes5.2.i586.rpm
ea8eaff21b47e466c39fb67d05caf5dc mes5/i586/libpng-devel-1.2.31-2.7mdvmes5.2.i586.rpm
b47d4cc245409339a0bb5661d6a042b2 mes5/i586/libpng-source-1.2.31-2.7mdvmes5.2.i586.rpm
0f6c3f3a2f852745298c17d2ab350979 mes5/i586/libpng-static-devel-1.2.31-2.7mdvmes5.2.i586.rpm
b9250ed0aaa605e52c5e42068a1e9e04 mes5/SRPMS/libpng-1.2.31-2.7mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
11f921419ff975163b42d90749745ba6 mes5/x86_64/lib64png3-1.2.31-2.7mdvmes5.2.x86_64.rpm
4c5ca107c3e976b411ea6c0012191ca7 mes5/x86_64/lib64png-devel-1.2.31-2.7mdvmes5.2.x86_64.rpm
b06e79b357af44896ab2ed0d82724b39 mes5/x86_64/lib64png-static-devel-1.2.31-2.7mdvmes5.2.x86_64.rpm
b356a0406ab7403663f6d914e424a3a6 mes5/x86_64/libpng-source-1.2.31-2.7mdvmes5.2.x86_64.rpm
b9250ed0aaa605e52c5e42068a1e9e04 mes5/SRPMS/libpng-1.2.31-2.7mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPeTLimqjQ0CJFipgRAj/VAKC0m/tdpsxpTI8Sszz56XRSIhVUsQCg6cPd
EJ2GOf6tJUkGMX/Tq9k+a+E=
=lFXJ
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists