← Back to team overview

touch-packages team mailing list archive

[Bug 1516592] Re: CVE-2015-8126: Multiple buffer overflows

 

This bug was fixed in the package libpng - 1.2.50-1ubuntu2.14.04.1

---------------
libpng (1.2.50-1ubuntu2.14.04.1) trusty-security; urgency=medium

  [ Andrew Starr-Bochicchio ]
  * SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
    and (2) png_get_PLTE (LP: #1516592).
    - debian/patches/CVE-2015-8126.diff: Prevent writing over-length
      PLTE chunk and silently truncate over-length PLTE chunk while reading.
      Backported from upstream patch.
    - CVE-2015-8126

  [ Marc Deslauriers ]
  * SECURITY UPDATE: out of bounds read in png_set_tIME
    - debian/patches/CVE-2015-7981.patch: check bounds in png.c and
      pngset.c.
    - CVE-2015-7981

 -- Marc Deslauriers <marc.deslauriers@xxxxxxxxxx>  Thu, 19 Nov 2015
08:02:50 -0500

** Changed in: libpng (Ubuntu Trusty)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7981

** Changed in: libpng (Ubuntu Wily)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592

Title:
  CVE-2015-8126: Multiple buffer overflows

Status in libpng package in Ubuntu:
  Triaged
Status in libpng source package in Precise:
  New
Status in libpng source package in Trusty:
  Fix Released
Status in libpng source package in Vivid:
  Fix Released
Status in libpng source package in Wily:
  Fix Released

Bug description:
  Multiple buffer overflows were found in libpng, see
  https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+subscriptions