Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2008:156 ] - Updated libpng packages fix vulnerability

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1217289338-11275-7629

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2008:156

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : libpng

Date : July 28, 2008

Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0,

Multi Network Firewall 2.0

_______________________________________________________________________

 

Problem Description:

 

Tavis Ormandy of the Google Security Team discovered a flaw in how

libpng handles zero-length unknown chunks in PNG files, which could

lead to memory corruption in applications that make use of certain

functions (CVE-2008-1382).

 

The updated packages have been patched to correct this issue.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2007.1:

328d67168d50a5275919b40845a55fae 2007.1/i586/libpng3-1.2.13-2.3mdv2007.1.i586.rpm

4a5ac2460608139834eb7cd20bec7fea 2007.1/i586/libpng3-devel-1.2.13-2.3mdv2007.1.i586.rpm

b52c8961f58bc7a9a6d5d102c2a75f96 2007.1/i586/libpng3-static-devel-1.2.13-2.3mdv2007.1.i586.rpm

78e5b22e668df03ed267ba74bf4f296a 2007.1/SRPMS/libpng-1.2.13-2.3mdv2007.1.src.rpm

 

Mandriva Linux 2007.1/X86_64:

9e8ffa3e7768314e558bfb36fc272f10 2007.1/x86_64/lib64png3-1.2.13-2.3mdv2007.1.x86_64.rpm

247ccd57b51b378231f1064fca1f8b15 2007.1/x86_64/lib64png3-devel-1.2.13-2.3mdv2007.1.x86_64.rpm

5f29761ec9564b9f1b5e28fc13568e2d 2007.1/x86_64/lib64png3-static-devel-1.2.13-2.3mdv2007.1.x86_64.rpm

78e5b22e668df03ed267ba74bf4f296a 2007.1/SRPMS/libpng-1.2.13-2.3mdv2007.1.src.rpm

 

Mandriva Linux 2008.0:

e2f33ddc8d287d32f085fbe736cd99d9 2008.0/i586/libpng3-1.2.22-0.2mdv2008.0.i586.rpm

c6e49fb9ee07fdc2ef64f8727945d995 2008.0/i586/libpng-devel-1.2.22-0.2mdv2008.0.i586.rpm

af3c911c477924ba32c398d921684286 2008.0/i586/libpng-source-1.2.22-0.2mdv2008.0.i586.rpm

4be3e32680b5ae0885c410cc7dcb673c 2008.0/i586/libpng-static-devel-1.2.22-0.2mdv2008.0.i586.rpm

df595ba0c708ba4d17c2e701e89ace3f 2008.0/SRPMS/libpng-1.2.22-0.2mdv2008.0.src.rpm

 

Mandriva Linux 2008.0/X86_64:

8903bb17017b3ee24dd9efa5645ce950 2008.0/x86_64/lib64png3-1.2.22-0.2mdv2008.0.x86_64.rpm

13830901c08977e18bc40e2de6f4f012 2008.0/x86_64/lib64png-devel-1.2.22-0.2mdv2008.0.x86_64.rpm

736d3eabfd20c3f5b0400cdd0daeb1ff 2008.0/x86_64/lib64png-static-devel-1.2.22-0.2mdv2008.0.x86_64.rpm

00f1f10f493b4859dac5961cc20846e7 2008.0/x86_64/libpng-source-1.2.22-0.2mdv2008.0.x86_64.rpm

df595ba0c708ba4d17c2e701e89ace3f 2008.0/SRPMS/libpng-1.2.22-0.2mdv2008.0.src.rpm

 

Mandriva Linux 2008.1:

127edcf2e0db074ab54e2115c4079774 2008.1/i586/libpng3-1.2.25-2.1mdv2008.1.i586.rpm

c6f0302fcac1c4204f83345e17d0714a 2008.1/i586/libpng-devel-1.2.25-2.1mdv2008.1.i586.rpm

b7d5ea52ece77b8a5cfad691e80d86af 2008.1/i586/libpng-source-1.2.25-2.1mdv2008.1.i586.rpm

e33a51fb3cf079f5183fbfec62945d63 2008.1/i586/libpng-static-devel-1.2.25-2.1mdv2008.1.i586.rpm

0ebc68ab40793c52cb1ed92545b690bd 2008.1/SRPMS/libpng-1.2.25-2.1mdv2008.1.src.rpm

 

Mandriva Linux 2008.1/X86_64:

ff6d4a6a4d8d2c87c753c2e003584eda 2008.1/x86_64/lib64png3-1.2.25-2.1mdv2008.1.x86_64.rpm

b09c32d6b8f3a95ac7ff044d3118d620 2008.1/x86_64/lib64png-devel-1.2.25-2.1mdv2008.1.x86_64.rpm

cda848ff05653640b2306a25458cc2f1 2008.1/x86_64/lib64png-static-devel-1.2.25-2.1mdv2008.1.x86_64.rpm

f2be7e503102a46c7e6df1c385b3080a 2008.1/x86_64/libpng-source-1.2.25-2.1mdv2008.1.x86_64.rpm

0ebc68ab40793c52cb1ed92545b690bd 2008.1/SRPMS/libpng-1.2.25-2.1mdv2008.1.src.rpm

 

Corporate 3.0:

e94d77d776ab04e5d641b80cb4f067c1 corporate/3.0/i586/libpng3-1.2.5-10.10.C30mdk.i586.rpm

7568581fa685f67b99ab377ea8ec4d6c corporate/3.0/i586/libpng3-devel-1.2.5-10.10.C30mdk.i586.rpm

feda1fe0f0126c9147b545cc202fe8b0 corporate/3.0/i586/libpng3-static-devel-1.2.5-10.10.C30mdk.i586.rpm

64475a8af64644e49b354d56501ac0fb corporate/3.0/SRPMS/libpng-1.2.5-10.10.C30mdk.src.rpm

 

Corporate 3.0/X86_64:

636124a5fa31a10a6ddabe66f58944b9 corporate/3.0/x86_64/lib64png3-1.2.5-10.10.C30mdk.x86_64.rpm

310fd92035b6f7e86aec2c01f88da0e2 corporate/3.0/x86_64/lib64png3-devel-1.2.5-10.10.C30mdk.x86_64.rpm

87827d072121bebfd0ae2cdbacea9cc8 corporate/3.0/x86_64/lib64png3-static-devel-1.2.5-10.10.C30mdk.x86_64.rpm

64475a8af64644e49b354d56501ac0fb corporate/3.0/SRPMS/libpng-1.2.5-10.10.C30mdk.src.rpm

 

Corporate 4.0:

8203ca10282141997aaf7d3274a1741a corporate/4.0/i586/libpng3-1.2.8-1.5.20060mlcs4.i586.rpm

8476cfe63ae99781144a0c88e93995db corporate/4.0/i586/libpng3-devel-1.2.8-1.5.20060mlcs4.i586.rpm

16521bc77b5faeab13197f779eee2430 corporate/4.0/i586/libpng3-static-devel-1.2.8-1.5.20060mlcs4.i586.rpm

b540ed0b099dbd9313aa51a054f94a2d corporate/4.0/SRPMS/libpng-1.2.8-1.5.20060mlcs4.src.rpm

 

Corporate 4.0/X86_64:

6c01d458c88701b5a59c333368a26902 corporate/4.0/x86_64/lib64png3-1.2.8-1.5.20060mlcs4.x86_64.rpm

d7d737ca6e1386eaff5b7c4a473a1ff3 corporate/4.0/x86_64/lib64png3-devel-1.2.8-1.5.20060mlcs4.x86_64.rpm

760f0be502e4b467ea0e7082359d6c4b corporate/4.0/x86_64/lib64png3-static-devel-1.2.8-1.5.20060mlcs4.x86_64.rpm

b540ed0b099dbd9313aa51a054f94a2d corporate/4.0/SRPMS/libpng-1.2.8-1.5.20060mlcs4.src.rpm

 

Multi Network Firewall 2.0:

3e8bd4b7fb11d66ea67c0dd75955736e mnf/2.0/i586/libpng3-1.2.5-10.10.C30mdk.i586.rpm

6a4922c9efebca1ef396966c8d9ef8cb mnf/2.0/SRPMS/libpng-1.2.5-10.10.C30mdk.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFIji0HmqjQ0CJFipgRAgtBAKCjxsBTjielPPNtqJ3YL7Sd877ehgCg9C9x

VUuE9hlQxxE0kdkLpwOe44I=

=ofo5

-----END PGP SIGNATURE-----

 

 

------------=_1217289338-11275-7629

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1217289338-11275-7629--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×