Summary: | <media-libs/libpng-1.6.10: denial of service via png_push_read_chunk() (CVE-2014-0333) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1070985 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-02-28 08:23:01 UTC
Test and stabilize for this security bug: =media-libs/libpng-1.6.10 alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 Plus, amd64 and x86 should also stabilize: =media-libs/libpng-1.5.18 amd64 x86 =media-libs/libpng-1.2.51 amd64 x86 Stable for HPPA. arm stable amd64/x86 stable ppc stable alpha stable CVE-2014-0333 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0333): The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero. ppc64 stable ia64 stable sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. Added to new GLSA Request This issue was resolved and addressed in GLSA 201408-06 at http://security.gentoo.org/glsa/glsa-201408-06.xml by GLSA coordinator Mikle Kolyada (Zlogene). |