touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #119321
[Bug 1516592] Re: CVE-2015-8126: Multiple buffer overflows
This bug was fixed in the package libpng - 1.2.51-0ubuntu3.15.04.1
---------------
libpng (1.2.51-0ubuntu3.15.04.1) vivid-security; urgency=medium
[ Andrew Starr-Bochicchio ]
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- debian/patches/CVE-2015-8126.diff: Prevent writing over-length
PLTE chunk and silently truncate over-length PLTE chunk while reading.
Backported from upstream patch.
- CVE-2015-8126
[ Marc Deslauriers ]
* SECURITY UPDATE: out of bounds read in png_set_tIME
- debian/patches/CVE-2015-7981.patch: check bounds in png.c and
pngset.c.
- CVE-2015-7981
-- Marc Deslauriers <marc.deslauriers@xxxxxxxxxx> Thu, 19 Nov 2015
07:59:38 -0500
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
Status in libpng package in Ubuntu:
Triaged
Status in libpng source package in Precise:
New
Status in libpng source package in Trusty:
Fix Released
Status in libpng source package in Vivid:
Fix Released
Status in libpng source package in Wily:
Fix Released
Bug description:
Multiple buffer overflows were found in libpng, see
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+subscriptions