Summary: | <media-libs/libpng-1.5.8: "png_formatted_warning()" Off-by-One Vulnerability (CVE-2011-3464) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/47827/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-02-02 20:39:39 UTC
(In reply to comment #0) > Update to version 1.5.8. In portage since yesterday. Can be stabilized. Thanks Samuli. Arches, please test and mark stable: =media-libs/libpng-1.5.8 Target KEYWORDS : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" amd64 stable x86 stable Stable for HPPA. alpha/arm/ia64/m68k/s390/sh/sparc stable ppc done ppc64 stable, all arches done added to existing glsa request This issue was resolved and addressed in GLSA 201206-15 at http://security.gentoo.org/glsa/glsa-201206-15.xml by GLSA coordinator Sean Amoss (ackle). CVE-2011-3464 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3464): Off-by-one error in the png_formatted_warning function in pngerror.c in libpng 1.5.4 through 1.5.7 might allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors, which trigger a stack-based buffer overflow. |